Evidence-based security

The business world faces an interesting paradox: although companies spend more money than ever on security solutions and protective technologies, breaches and other attacks continue to escalate. This raises the question: are we, as an industry, doing something wrong? With the increase in targeted cy...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Frenz, Christopher (VerfasserIn), Reiber, Jonathan (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Sebastopol, CA O'Reilly Media, Inc. 2023
Ausgabe:First edition.
Schlagworte:
Online-Zugang:lizenzpflichtig
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000cam a22000002 4500
001 ZDB-30-ORH-092808573
003 DE-627-1
005 20240228121959.0
007 cr uuu---uuuuu
008 230530s2023 xx |||||o 00| ||eng c
035 |a (DE-627-1)092808573 
035 |a (DE-599)KEP092808573 
035 |a (ORHE)9781098148942 
035 |a (DE-627-1)092808573 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
082 0 |a 005.8  |2 23/eng/20230516 
100 1 |a Frenz, Christopher  |e VerfasserIn  |4 aut 
245 1 0 |a Evidence-based security  |c Christopher Frenz & Jonathan Reiber 
250 |a First edition. 
264 1 |a Sebastopol, CA  |b O'Reilly Media, Inc.  |c 2023 
300 |a 1 online resource (43 pages)  |b illustrations 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
500 |a Includes bibliographical references 
520 |a The business world faces an interesting paradox: although companies spend more money than ever on security solutions and protective technologies, breaches and other attacks continue to escalate. This raises the question: are we, as an industry, doing something wrong? With the increase in targeted cyberattacks, rising risk levels, and high-impact consequences, it's more important than ever to be able to answer that question. In this report, Christopher Frenz and Jonathan Reiber show CISOs, security directors, and security managers how to transform security from an artform to a science, with evidence-based solutions leading the way. You'll learn how to operationalize the MITRE ATTU&CK framework and enable your team to produce actionable results and meaningful metrics, and measurably improve your security posture. 
650 0 |a Computer security 
650 0 |a Computer networks  |x Security measures 
650 0 |a Computer crimes  |x Prevention 
650 4 |a Sécurité informatique 
650 4 |a Réseaux d'ordinateurs ; Sécurité ; Mesures 
650 4 |a Computer crimes ; Prevention 
650 4 |a Computer networks ; Security measures 
650 4 |a Computer security 
700 1 |a Reiber, Jonathan  |e VerfasserIn  |4 aut 
856 4 0 |l TUM01  |p ZDB-30-ORH  |q TUM_PDA_ORH  |u https://learning.oreilly.com/library/view/-/9781098148942/?ar  |m X:ORHE  |x Aggregator  |z lizenzpflichtig  |3 Volltext 
912 |a ZDB-30-ORH 
951 |a BO 
912 |a ZDB-30-ORH 
049 |a DE-91 

Datensatz im Suchindex

DE-BY-TUM_katkey ZDB-30-ORH-092808573
_version_ 1818767380417871873
adam_text
any_adam_object
author Frenz, Christopher
Reiber, Jonathan
author_facet Frenz, Christopher
Reiber, Jonathan
author_role aut
aut
author_sort Frenz, Christopher
author_variant c f cf
j r jr
building Verbundindex
bvnumber localTUM
collection ZDB-30-ORH
ctrlnum (DE-627-1)092808573
(DE-599)KEP092808573
(ORHE)9781098148942
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
edition First edition.
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02308cam a22004332 4500</leader><controlfield tag="001">ZDB-30-ORH-092808573</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121959.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">230530s2023 xx |||||o 00| ||eng c</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)092808573</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP092808573</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781098148942</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)092808573</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20230516</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Frenz, Christopher</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Evidence-based security</subfield><subfield code="c">Christopher Frenz &amp; Jonathan Reiber</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">First edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Sebastopol, CA</subfield><subfield code="b">O'Reilly Media, Inc.</subfield><subfield code="c">2023</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (43 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The business world faces an interesting paradox: although companies spend more money than ever on security solutions and protective technologies, breaches and other attacks continue to escalate. This raises the question: are we, as an industry, doing something wrong? With the increase in targeted cyberattacks, rising risk levels, and high-impact consequences, it's more important than ever to be able to answer that question. In this report, Christopher Frenz and Jonathan Reiber show CISOs, security directors, and security managers how to transform security from an artform to a science, with evidence-based solutions leading the way. You'll learn how to operationalize the MITRE ATTU&amp;CK framework and enable your team to produce actionable results and meaningful metrics, and measurably improve your security posture.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes ; Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Reiber, Jonathan</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781098148942/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection>
id ZDB-30-ORH-092808573
illustrated Illustrated
indexdate 2024-12-18T08:48:58Z
institution BVB
language English
open_access_boolean
owner DE-91
DE-BY-TUM
owner_facet DE-91
DE-BY-TUM
physical 1 online resource (43 pages) illustrations
psigel ZDB-30-ORH
publishDate 2023
publishDateSearch 2023
publishDateSort 2023
publisher O'Reilly Media, Inc.
record_format marc
spelling Frenz, Christopher VerfasserIn aut
Evidence-based security Christopher Frenz & Jonathan Reiber
First edition.
Sebastopol, CA O'Reilly Media, Inc. 2023
1 online resource (43 pages) illustrations
Text txt rdacontent
Computermedien c rdamedia
Online-Ressource cr rdacarrier
Includes bibliographical references
The business world faces an interesting paradox: although companies spend more money than ever on security solutions and protective technologies, breaches and other attacks continue to escalate. This raises the question: are we, as an industry, doing something wrong? With the increase in targeted cyberattacks, rising risk levels, and high-impact consequences, it's more important than ever to be able to answer that question. In this report, Christopher Frenz and Jonathan Reiber show CISOs, security directors, and security managers how to transform security from an artform to a science, with evidence-based solutions leading the way. You'll learn how to operationalize the MITRE ATTU&CK framework and enable your team to produce actionable results and meaningful metrics, and measurably improve your security posture.
Computer security
Computer networks Security measures
Computer crimes Prevention
Sécurité informatique
Réseaux d'ordinateurs ; Sécurité ; Mesures
Computer crimes ; Prevention
Computer networks ; Security measures
Reiber, Jonathan VerfasserIn aut
TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9781098148942/?ar X:ORHE Aggregator lizenzpflichtig Volltext
spellingShingle Frenz, Christopher
Reiber, Jonathan
Evidence-based security
Computer security
Computer networks Security measures
Computer crimes Prevention
Sécurité informatique
Réseaux d'ordinateurs ; Sécurité ; Mesures
Computer crimes ; Prevention
Computer networks ; Security measures
title Evidence-based security
title_auth Evidence-based security
title_exact_search Evidence-based security
title_full Evidence-based security Christopher Frenz & Jonathan Reiber
title_fullStr Evidence-based security Christopher Frenz & Jonathan Reiber
title_full_unstemmed Evidence-based security Christopher Frenz & Jonathan Reiber
title_short Evidence-based security
title_sort evidence based security
topic Computer security
Computer networks Security measures
Computer crimes Prevention
Sécurité informatique
Réseaux d'ordinateurs ; Sécurité ; Mesures
Computer crimes ; Prevention
Computer networks ; Security measures
topic_facet Computer security
Computer networks Security measures
Computer crimes Prevention
Sécurité informatique
Réseaux d'ordinateurs ; Sécurité ; Mesures
Computer crimes ; Prevention
Computer networks ; Security measures
url https://learning.oreilly.com/library/view/-/9781098148942/?ar
work_keys_str_mv AT frenzchristopher evidencebasedsecurity
AT reiberjonathan evidencebasedsecurity