Evidence-based security
The business world faces an interesting paradox: although companies spend more money than ever on security solutions and protective technologies, breaches and other attacks continue to escalate. This raises the question: are we, as an industry, doing something wrong? With the increase in targeted cy...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Sebastopol, CA
O'Reilly Media, Inc.
2023
|
Ausgabe: | First edition. |
Schlagworte: | |
Online-Zugang: | lizenzpflichtig |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-092808573 | ||
003 | DE-627-1 | ||
005 | 20240228121959.0 | ||
007 | cr uuu---uuuuu | ||
008 | 230530s2023 xx |||||o 00| ||eng c | ||
035 | |a (DE-627-1)092808573 | ||
035 | |a (DE-599)KEP092808573 | ||
035 | |a (ORHE)9781098148942 | ||
035 | |a (DE-627-1)092808573 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 23/eng/20230516 | |
100 | 1 | |a Frenz, Christopher |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Evidence-based security |c Christopher Frenz & Jonathan Reiber |
250 | |a First edition. | ||
264 | 1 | |a Sebastopol, CA |b O'Reilly Media, Inc. |c 2023 | |
300 | |a 1 online resource (43 pages) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references | ||
520 | |a The business world faces an interesting paradox: although companies spend more money than ever on security solutions and protective technologies, breaches and other attacks continue to escalate. This raises the question: are we, as an industry, doing something wrong? With the increase in targeted cyberattacks, rising risk levels, and high-impact consequences, it's more important than ever to be able to answer that question. In this report, Christopher Frenz and Jonathan Reiber show CISOs, security directors, and security managers how to transform security from an artform to a science, with evidence-based solutions leading the way. You'll learn how to operationalize the MITRE ATTU&CK framework and enable your team to produce actionable results and meaningful metrics, and measurably improve your security posture. | ||
650 | 0 | |a Computer security | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Computer crimes |x Prevention | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Computer crimes ; Prevention | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Computer security | |
700 | 1 | |a Reiber, Jonathan |e VerfasserIn |4 aut | |
856 | 4 | 0 | |l TUM01 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781098148942/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-092808573 |
---|---|
_version_ | 1818767380417871873 |
adam_text | |
any_adam_object | |
author | Frenz, Christopher Reiber, Jonathan |
author_facet | Frenz, Christopher Reiber, Jonathan |
author_role | aut aut |
author_sort | Frenz, Christopher |
author_variant | c f cf j r jr |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)092808573 (DE-599)KEP092808573 (ORHE)9781098148942 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | First edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02308cam a22004332 4500</leader><controlfield tag="001">ZDB-30-ORH-092808573</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121959.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">230530s2023 xx |||||o 00| ||eng c</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)092808573</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP092808573</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781098148942</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)092808573</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20230516</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Frenz, Christopher</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Evidence-based security</subfield><subfield code="c">Christopher Frenz & Jonathan Reiber</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">First edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Sebastopol, CA</subfield><subfield code="b">O'Reilly Media, Inc.</subfield><subfield code="c">2023</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (43 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The business world faces an interesting paradox: although companies spend more money than ever on security solutions and protective technologies, breaches and other attacks continue to escalate. This raises the question: are we, as an industry, doing something wrong? With the increase in targeted cyberattacks, rising risk levels, and high-impact consequences, it's more important than ever to be able to answer that question. In this report, Christopher Frenz and Jonathan Reiber show CISOs, security directors, and security managers how to transform security from an artform to a science, with evidence-based solutions leading the way. You'll learn how to operationalize the MITRE ATTU&CK framework and enable your team to produce actionable results and meaningful metrics, and measurably improve your security posture.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes ; Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Reiber, Jonathan</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781098148942/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-092808573 |
illustrated | Illustrated |
indexdate | 2024-12-18T08:48:58Z |
institution | BVB |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 online resource (43 pages) illustrations |
psigel | ZDB-30-ORH |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | O'Reilly Media, Inc. |
record_format | marc |
spelling | Frenz, Christopher VerfasserIn aut Evidence-based security Christopher Frenz & Jonathan Reiber First edition. Sebastopol, CA O'Reilly Media, Inc. 2023 1 online resource (43 pages) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references The business world faces an interesting paradox: although companies spend more money than ever on security solutions and protective technologies, breaches and other attacks continue to escalate. This raises the question: are we, as an industry, doing something wrong? With the increase in targeted cyberattacks, rising risk levels, and high-impact consequences, it's more important than ever to be able to answer that question. In this report, Christopher Frenz and Jonathan Reiber show CISOs, security directors, and security managers how to transform security from an artform to a science, with evidence-based solutions leading the way. You'll learn how to operationalize the MITRE ATTU&CK framework and enable your team to produce actionable results and meaningful metrics, and measurably improve your security posture. Computer security Computer networks Security measures Computer crimes Prevention Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Computer crimes ; Prevention Computer networks ; Security measures Reiber, Jonathan VerfasserIn aut TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9781098148942/?ar X:ORHE Aggregator lizenzpflichtig Volltext |
spellingShingle | Frenz, Christopher Reiber, Jonathan Evidence-based security Computer security Computer networks Security measures Computer crimes Prevention Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Computer crimes ; Prevention Computer networks ; Security measures |
title | Evidence-based security |
title_auth | Evidence-based security |
title_exact_search | Evidence-based security |
title_full | Evidence-based security Christopher Frenz & Jonathan Reiber |
title_fullStr | Evidence-based security Christopher Frenz & Jonathan Reiber |
title_full_unstemmed | Evidence-based security Christopher Frenz & Jonathan Reiber |
title_short | Evidence-based security |
title_sort | evidence based security |
topic | Computer security Computer networks Security measures Computer crimes Prevention Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Computer crimes ; Prevention Computer networks ; Security measures |
topic_facet | Computer security Computer networks Security measures Computer crimes Prevention Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Computer crimes ; Prevention Computer networks ; Security measures |
url | https://learning.oreilly.com/library/view/-/9781098148942/?ar |
work_keys_str_mv | AT frenzchristopher evidencebasedsecurity AT reiberjonathan evidencebasedsecurity |