Welcome
user_choices_background_image
Welcome
login container bottom
Search Libraries Catalogue
Duplicate Items
Add to My List

Print
Sorts and Limits


Title: Building a Comprehensive IT Security Program Practical Guidelines and Best Practices / by Jeremy Wittkop.
Main Entry: Wittkop, Jeremy. author.
SpringerLink (Online service)

Publisher: Apress : Imprint: Apress,
Publication Date: 2016.
Publication Place: Berkeley, CA :
ISBN: 9781484220535
Subject: Computer science.
Computer security.
Data structures (Computer Science).
Computer science.
Systems and Data Security.
Data Structures, Cryptology and Information Theory.

Contents: Chapter 1: The Problem We Are Facing -- Chapter 2 : Protecting Critical Assets -- Chapter 3: Monetizing Risk -- Chapter 4: Security Intelligence Model -- Chapter 5: Incident Response Planning -- Chapter 6: The People Problem -- Chapter 7: Assigning Accountability -- Chapter 8: Shifting the Paradigm -- Chapter 9: The Definition of Insanity -- Chapter 10: Déjà Vu -- Chapter 11: The Information Security Community -- Chapter 12: Partnering with Governments -- .
Related Records: Springer eBooks
Printed edition: 9781484220528

Cover Image: http://images.amazon.com/images/P/9781484220535.jpg

Results 1 - 1 of 1
  Agency: Collection: Call No.: Item Type: Status: Barcode: Media Type:
JUST Main Library Electronic Resources QA76.9.A25 No Circulation Available Online -755698 Book