The cybersecurity playbook for modern enterprises
Learn how to build a cybersecurity program for a changing world with the help of proven best practices and emerging techniques. Security is everyone's responsibility and for any organization, the focus should be to educate their employees about the different types of security attacks and how to...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
[Birmingham, United Kingdom]
Packt Publishing Ltd.
2022
|
Ausgabe: | [First edition]. |
Schlagworte: | |
Online-Zugang: | lizenzpflichtig |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-077854896 | ||
003 | DE-627-1 | ||
005 | 20240228121625.0 | ||
007 | cr uuu---uuuuu | ||
008 | 220513s2022 xx |||||o 00| ||eng c | ||
020 | |a 9781803248639 |9 978-1-80324-863-9 | ||
035 | |a (DE-627-1)077854896 | ||
035 | |a (DE-599)KEP077854896 | ||
035 | |a (ORHE)9781803248639 | ||
035 | |a (DE-627-1)077854896 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Wittkop, Jeremy |e VerfasserIn |4 aut | |
245 | 1 | 4 | |a The cybersecurity playbook for modern enterprises |c Jeremy Wittkop |
250 | |a [First edition]. | ||
264 | 1 | |a [Birmingham, United Kingdom] |b Packt Publishing Ltd. |c 2022 | |
300 | |a 1 online resource (280 pages) | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
520 | |a Learn how to build a cybersecurity program for a changing world with the help of proven best practices and emerging techniques. Security is everyone's responsibility and for any organization, the focus should be to educate their employees about the different types of security attacks and how to ensure that security is not compromised. This cybersecurity book starts by defining the modern security and regulatory landscape, helping you understand the challenges related to human behavior and how attacks take place. You'll then see how to build effective cybersecurity awareness and modern information security programs. Once you've learned about the challenges in securing a modern enterprise, the book will take you through solutions or alternative approaches to overcome those issues and explain the importance of technologies such as cloud access security brokers, identity and access management solutions, and endpoint security platforms. As you advance, you'll discover how automation plays an important role in solving some key challenges and controlling long-term costs while building a maturing program. Toward the end, you'll also find tips and tricks to keep yourself and your loved ones safe from an increasingly dangerous digital world. By the end of this book, you'll have gained a holistic understanding of cybersecurity and how it evolves to meet the challenges of today and tomorrow. | ||
650 | 0 | |a Computer security | |
650 | 2 | |a Computer Security | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Computer security | |
856 | 4 | 0 | |l TUM01 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781803248639/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-077854896 |
---|---|
_version_ | 1818767253858942976 |
adam_text | |
any_adam_object | |
author | Wittkop, Jeremy |
author_facet | Wittkop, Jeremy |
author_role | aut |
author_sort | Wittkop, Jeremy |
author_variant | j w jw |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)077854896 (DE-599)KEP077854896 (ORHE)9781803248639 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | [First edition]. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02626cam a22003852 4500</leader><controlfield tag="001">ZDB-30-ORH-077854896</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121625.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">220513s2022 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781803248639</subfield><subfield code="9">978-1-80324-863-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)077854896</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP077854896</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781803248639</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)077854896</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Wittkop, Jeremy</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="4"><subfield code="a">The cybersecurity playbook for modern enterprises</subfield><subfield code="c">Jeremy Wittkop</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">[First edition].</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Birmingham, United Kingdom]</subfield><subfield code="b">Packt Publishing Ltd.</subfield><subfield code="c">2022</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (280 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Learn how to build a cybersecurity program for a changing world with the help of proven best practices and emerging techniques. Security is everyone's responsibility and for any organization, the focus should be to educate their employees about the different types of security attacks and how to ensure that security is not compromised. This cybersecurity book starts by defining the modern security and regulatory landscape, helping you understand the challenges related to human behavior and how attacks take place. You'll then see how to build effective cybersecurity awareness and modern information security programs. Once you've learned about the challenges in securing a modern enterprise, the book will take you through solutions or alternative approaches to overcome those issues and explain the importance of technologies such as cloud access security brokers, identity and access management solutions, and endpoint security platforms. As you advance, you'll discover how automation plays an important role in solving some key challenges and controlling long-term costs while building a maturing program. Toward the end, you'll also find tips and tricks to keep yourself and your loved ones safe from an increasingly dangerous digital world. By the end of this book, you'll have gained a holistic understanding of cybersecurity and how it evolves to meet the challenges of today and tomorrow.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781803248639/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-077854896 |
illustrated | Not Illustrated |
indexdate | 2024-12-18T08:46:57Z |
institution | BVB |
isbn | 9781803248639 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 online resource (280 pages) |
psigel | ZDB-30-ORH |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | Packt Publishing Ltd. |
record_format | marc |
spelling | Wittkop, Jeremy VerfasserIn aut The cybersecurity playbook for modern enterprises Jeremy Wittkop [First edition]. [Birmingham, United Kingdom] Packt Publishing Ltd. 2022 1 online resource (280 pages) Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Learn how to build a cybersecurity program for a changing world with the help of proven best practices and emerging techniques. Security is everyone's responsibility and for any organization, the focus should be to educate their employees about the different types of security attacks and how to ensure that security is not compromised. This cybersecurity book starts by defining the modern security and regulatory landscape, helping you understand the challenges related to human behavior and how attacks take place. You'll then see how to build effective cybersecurity awareness and modern information security programs. Once you've learned about the challenges in securing a modern enterprise, the book will take you through solutions or alternative approaches to overcome those issues and explain the importance of technologies such as cloud access security brokers, identity and access management solutions, and endpoint security platforms. As you advance, you'll discover how automation plays an important role in solving some key challenges and controlling long-term costs while building a maturing program. Toward the end, you'll also find tips and tricks to keep yourself and your loved ones safe from an increasingly dangerous digital world. By the end of this book, you'll have gained a holistic understanding of cybersecurity and how it evolves to meet the challenges of today and tomorrow. Computer security Computer Security Sécurité informatique TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9781803248639/?ar X:ORHE Aggregator lizenzpflichtig Volltext |
spellingShingle | Wittkop, Jeremy The cybersecurity playbook for modern enterprises Computer security Computer Security Sécurité informatique |
title | The cybersecurity playbook for modern enterprises |
title_auth | The cybersecurity playbook for modern enterprises |
title_exact_search | The cybersecurity playbook for modern enterprises |
title_full | The cybersecurity playbook for modern enterprises Jeremy Wittkop |
title_fullStr | The cybersecurity playbook for modern enterprises Jeremy Wittkop |
title_full_unstemmed | The cybersecurity playbook for modern enterprises Jeremy Wittkop |
title_short | The cybersecurity playbook for modern enterprises |
title_sort | cybersecurity playbook for modern enterprises |
topic | Computer security Computer Security Sécurité informatique |
topic_facet | Computer security Computer Security Sécurité informatique |
url | https://learning.oreilly.com/library/view/-/9781803248639/?ar |
work_keys_str_mv | AT wittkopjeremy thecybersecurityplaybookformodernenterprises AT wittkopjeremy cybersecurityplaybookformodernenterprises |