Easy Steps to Managing Cybersecurity.
By: Reuvid, Jonathan.
©2018Description: 225 pages.Content type: text Media type: unmediated Carrier type: volumeISBN: 9781787197961.Subject(s): Internet of things-Security measuresGenre/Form: Print books.Current location | Call number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|
On Shelf | TK5105.8857 .E279 2018 (Browse shelf) | Available | AU00000000015665 |
Browsing Alfaisal University Shelves , Shelving location: On Shelf Close shelf browser
TK5105.8857 .C55 2019 Internet of things : architectures, protocols and standards / | TK5105.8857 .C58 2020 Demystifying Internet of Things security : successful IoT device/edge and platform security deployment / | TK5105.8857 .D47 2023 Building Enterprise IoT Solutions with Eclipse IoT Technologies An Open Source Approach to Edge Computing | TK5105.8857 .E279 2018 Easy Steps to Managing Cybersecurity. | TK5105.8857 .F76 2018 From internet of things to smart cities : enabling technologies / | TK5105.8857 .G86 2019 The Iot hacker's handbook : a practical guide to hacking the internet of things / | TK5105.8857 .H34 2019 Handbook of IoT and big data / |
Cover; Title; Copyright; Contents; Foreword; Part One: Cyber Security -- No Longer an Option; 1.1 Introduction to Cyber security Risk; 1.2 The Cost of Cyber Crime; 1.3 The Cyber security Threat; Part Two: International Action in Cyber Security; 2.1 International Cooperation from the Banking Sector; 2.2 Framework -- adopted by US Financial Services; 2.3 Support Services for UK Public and Private Sectors; 2.4 EU and UK Cyber security Developments; Part Three: Preparation; 3.1 How Much Will It Cost?; 3.2 A Framework for Cyber security; 3.3 Security Framework: A Map for Resilience.
3.4 Protecting Financial Data from InsidersPart Four: Prevention; 4.1 Turning Your People into Your Most Effective Defence; 4.2 Making Your Business Cyber Resilient; 4.3 Countermeasures to Advanced Threats; Part Five: Protection and Response; 5.1 Managing Incidents and Internal Security Breaches; 5.2 Everyone Thinks They Have a Plan; 5.3 Managing Cyber Incident; 5.4 Turbulence and Further Threats; 5.5 Reviewing and Updating Contingency Plans; Book Summary; Acknowledgements; Appendix: Contributors contacts; References.
An introductory guide to managing cybersecurity for businesses. How to prevent, protect and respond to threats.
PASCAL EBSCO 20200110.
PROQUEST 20180813.
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2018. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.