000 | 01813nam a22003618i 4500 | ||
---|---|---|---|
001 | 019345655 | ||
003 | pcn | ||
005 | 20211005193948.0 | ||
008 | 190201s2019 enk 000|0|eng|d | ||
015 |
_aGBB960843 _2bnb |
||
016 | 7 |
_a019345655 _2Uk |
|
020 |
_a9780749498788 (hardback) : _cRM189.99 |
||
020 | _a9780749484125 (pbk.) : | ||
020 | _z9780749484132 (PDF ebook) : | ||
040 |
_aStDuBDS _beng _cStDuBDS _erda |
||
082 | 0 | 4 |
_a005.8 _223 |
100 | 1 |
_aHodson, Christopher, _eauthor. |
|
245 | 1 | 0 |
_aCYBER RISK MANAGEMENT : _bPrioritize threats, identify vulnerabilities and apply controls / _cChristopher J Hodson. |
250 | _a1st Edition | ||
263 | _a201906 | ||
264 | 1 |
_aLondon : _bKoganPage, _c2019. |
|
264 | 4 | _c©2019 | |
300 |
_aix, 394 pages : _billustrations. _c24 cm |
||
336 |
_atext _2rdacontent |
||
337 |
_aunmediated _2rdamedia |
||
338 |
_avolume _2rdacarrier |
||
505 | 0 | _aSection - ONE: Contextualizing cybersecurity risk;Chapter - 01: Why now? The only constant is change;Chapter - 02: Technologies and security challenges;Chapter - 03: Data breaches;Section - TWO: Cybersecurity programme management;Chapter - 04: What are cybersecurity and cybercrime?;Chapter - 05: Establishing a cybersecurity programme;Section - THREE: Actors, events and vulnerabilities;Chapter - 06: Threat actors;Chapter - 07: Threat events;Chapter - 08: Vulnerabilities;Chapter - 09: Controls;Section - FOUR: Conclusion - The cybersecurity risk equation explained;Chapter - 10: Cyber risk management - A conclusion | |
520 | _aLearn how to prioritize threats, implement a cyber security programme and effectively communicate risks. | ||
650 | 0 |
_aComputer networks _xSecurity measures. |
|
650 | 0 | _aRisk management. | |
776 | 0 | 8 |
_iebook version : _z9780749484132 |
942 |
_2ddc _cOPEN SHELF |
||
999 |
_c463 _d463 |