Welcome to Francis Light Library | francislightlibrary@peninsulamalaysia.edu.my | +604-545 600 EXt:8004
Image from Google Jackets

CYBER RISK MANAGEMENT : Prioritize threats, identify vulnerabilities and apply controls / Christopher J Hodson.

By: Publisher: London : KoganPage, 2019Copyright date: ©2019Edition: 1st EditionDescription: ix, 394 pages : illustrations. 24 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9780749498788 (hardback) :
  • 9780749484125 (pbk.) :
Subject(s): Additional physical formats: ebook version :: No titleDDC classification:
  • 005.8 23
Contents:
Section - ONE: Contextualizing cybersecurity risk;Chapter - 01: Why now? The only constant is change;Chapter - 02: Technologies and security challenges;Chapter - 03: Data breaches;Section - TWO: Cybersecurity programme management;Chapter - 04: What are cybersecurity and cybercrime?;Chapter - 05: Establishing a cybersecurity programme;Section - THREE: Actors, events and vulnerabilities;Chapter - 06: Threat actors;Chapter - 07: Threat events;Chapter - 08: Vulnerabilities;Chapter - 09: Controls;Section - FOUR: Conclusion - The cybersecurity risk equation explained;Chapter - 10: Cyber risk management - A conclusion
Summary: Learn how to prioritize threats, implement a cyber security programme and effectively communicate risks.
List(s) this item appears in: Newest Publication | Diploma in Computer Science
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Shelving location Call number URL Status Notes Date due Barcode Course reserves
BOOK GPS BOOK GPS FRANCIS LIGHT LIBRARY Link to resource Not for loan
ACADEMIC ACADEMIC FRANCIS LIGHT LIBRARY SHELVES 1 005.8 HOD (Browse shelf(Opens below)) Available DCS2323 (Cyber Risk Management (elective)) 00000574

Diploma in Computer Science

Section - ONE: Contextualizing cybersecurity risk;Chapter - 01: Why now? The only constant is change;Chapter - 02: Technologies and security challenges;Chapter - 03: Data breaches;Section - TWO: Cybersecurity programme management;Chapter - 04: What are cybersecurity and cybercrime?;Chapter - 05: Establishing a cybersecurity programme;Section - THREE: Actors, events and vulnerabilities;Chapter - 06: Threat actors;Chapter - 07: Threat events;Chapter - 08: Vulnerabilities;Chapter - 09: Controls;Section - FOUR: Conclusion - The cybersecurity risk equation explained;Chapter - 10: Cyber risk management - A conclusion

Learn how to prioritize threats, implement a cyber security programme and effectively communicate risks.

There are no comments on this title.

to post a comment.

The Ship Campus, No.1 Education Boulevard,One Auto Hub, Batu Kawan Industrial Park,14110, Bandar Cassia, Penang,Malaysia.Phone: +604 585 5000 Fax: +604 585 5009 | Email: noorshahidah@penisulacollege.edu.my 

Powered by KOHA |© Maintained by WISERF