000 01813nam a22003618i 4500
001 019345655
003 pcn
005 20211005193948.0
008 190201s2019 enk 000|0|eng|d
015 _aGBB960843
_2bnb
016 7 _a019345655
_2Uk
020 _a9780749498788 (hardback) :
_cRM189.99
020 _a9780749484125 (pbk.) :
020 _z9780749484132 (PDF ebook) :
040 _aStDuBDS
_beng
_cStDuBDS
_erda
082 0 4 _a005.8
_223
100 1 _aHodson, Christopher,
_eauthor.
245 1 0 _aCYBER RISK MANAGEMENT :
_bPrioritize threats, identify vulnerabilities and apply controls /
_cChristopher J Hodson.
250 _a1st Edition
263 _a201906
264 1 _aLondon :
_bKoganPage,
_c2019.
264 4 _c©2019
300 _aix, 394 pages :
_billustrations.
_c24 cm
336 _atext
_2rdacontent
337 _aunmediated
_2rdamedia
338 _avolume
_2rdacarrier
505 0 _aSection - ONE: Contextualizing cybersecurity risk;Chapter - 01: Why now? The only constant is change;Chapter - 02: Technologies and security challenges;Chapter - 03: Data breaches;Section - TWO: Cybersecurity programme management;Chapter - 04: What are cybersecurity and cybercrime?;Chapter - 05: Establishing a cybersecurity programme;Section - THREE: Actors, events and vulnerabilities;Chapter - 06: Threat actors;Chapter - 07: Threat events;Chapter - 08: Vulnerabilities;Chapter - 09: Controls;Section - FOUR: Conclusion - The cybersecurity risk equation explained;Chapter - 10: Cyber risk management - A conclusion
520 _aLearn how to prioritize threats, implement a cyber security programme and effectively communicate risks.
650 0 _aComputer networks
_xSecurity measures.
650 0 _aRisk management.
776 0 8 _iebook version :
_z9780749484132
942 _2ddc
_cOPEN SHELF
999 _c463
_d463