Weiter zum Inhalt
Bibliothekskatalog
  • Temporäre Merkliste: 0 temporär gemerkt (Ihre Merkliste ist voll)
  • Hilfe
    • Kontakt
    • Suchtipps
    • Erklärvideos
  • Weitere Angebote
    • Anschaffungswunsch
    • Semesterapparat
    • Suchhistorie
    • Fernleihe
  • English
  • Konto

    Konto

    • Ausgeliehen
    • Bestellt
    • Sperren / Gebühren
    • Persönliche Angaben
    • Suchhistorie
  • Log out
  • Login
  • Medien
  • Aufsätze
Erweitert
  • Enterprise Cybersecurity
  • Zitieren
  • Als E-Mail versenden
  • Drucken
  • Exportieren
    • Exportieren nach RefWorks
    • Exportieren nach EndNoteWeb
    • Exportieren nach EndNote
    • Exportieren nach BibTeX
    • Exportieren nach Citavi
  • dauerhaft merken
  • temporär merken Aus der Merkliste entfernen
  • Permalink
Export abgeschlossen — 
Buchumschlag
Gespeichert in:
Bibliographische Detailangaben
Titel:Enterprise Cybersecurity
How to Build a Successful Cyberdefense Program Against Advanced Threats
Von: by Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam
Person: Donaldson, Scott E.
Verfasser
aut
Siegel, Stanley G.
Williams, Chris K.
Aslam, Abdul
Hauptverfassende: Donaldson, Scott E. (VerfasserIn), Siegel, Stanley G. (VerfasserIn), Williams, Chris K. (VerfasserIn), Aslam, Abdul (VerfasserIn)
Format: Elektronisch E-Book
Sprache:Englisch
Veröffentlicht: Berkeley, CA Apress 2015
Schlagworte:
Chiffrierung
Informatik
Computersicherheit
Online-Zugang:https://doi.org/10.1007/978-1-4302-6083-7
https://doi.org/10.1007/978-1-4302-6083-7
https://doi.org/10.1007/978-1-4302-6083-7
https://doi.org/10.1007/978-1-4302-6083-7
https://doi.org/10.1007/978-1-4302-6083-7
https://doi.org/10.1007/978-1-4302-6083-7
https://doi.org/10.1007/978-1-4302-6083-7
http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028025227&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA
Beschreibung:1 Online-Ressource (XLII, 490 Seiten) Illustrationen
ISBN:9781430260837
DOI:10.1007/978-1-4302-6083-7
Internformat

MARC

LEADER 00000nam a2200000zc 4500
001 BV042592015
003 DE-604
005 20160721
007 cr|uuu---uuuuu
008 150602s2015 xx a||| o|||| 00||| eng d
020 |a 9781430260837  |c Online  |9 978-1-4302-6083-7 
024 7 |a 10.1007/978-1-4302-6083-7  |2 doi 
035 |a (OCoLC)910753627 
035 |a (DE-599)BVBBV042592015 
040 |a DE-604  |b ger  |e rda 
041 0 |a eng 
049 |a DE-898  |a DE-M347  |a DE-1049  |a DE-863  |a DE-92  |a DE-862 
082 0 |a 650 
084 |a ST 276  |0 (DE-625)143642:  |2 rvk 
084 |a ST 277  |0 (DE-625)143643:  |2 rvk 
100 1 |a Donaldson, Scott E.  |e Verfasser  |4 aut 
245 1 0 |a Enterprise Cybersecurity  |b How to Build a Successful Cyberdefense Program Against Advanced Threats  |c by Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam 
264 1 |a Berkeley, CA  |b Apress  |c 2015 
300 |a 1 Online-Ressource (XLII, 490 Seiten)  |b Illustrationen 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
650 0 7 |a Chiffrierung  |0 (DE-588)4352893-4  |2 gnd  |9 rswk-swf 
650 0 7 |a Informatik  |0 (DE-588)4026894-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Computersicherheit  |0 (DE-588)4274324-2  |2 gnd  |9 rswk-swf 
689 0 0 |a Informatik  |0 (DE-588)4026894-9  |D s 
689 0 1 |a Chiffrierung  |0 (DE-588)4352893-4  |D s 
689 0 2 |a Computersicherheit  |0 (DE-588)4274324-2  |D s 
689 0 |5 DE-604 
700 1 |a Siegel, Stanley G.  |e Verfasser  |4 aut 
700 1 |a Williams, Chris K.  |e Verfasser  |4 aut 
700 1 |a Aslam, Abdul  |e Verfasser  |4 aut 
776 0 8 |i Erscheint auch als  |n Druckausgabe  |z 978-1-4302-6082-0 
856 4 0 |u https://doi.org/10.1007/978-1-4302-6083-7  |x Verlag  |z URL des Erstveröffentlichers  |3 Volltext 
856 4 2 |m Springer Fremddatenuebernahme  |q application/pdf  |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028025227&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA  |3 Abstract 
912 |a ZDB-2-CWD 
940 1 |q ZDB-2-CWD_2015 
943 1 |a oai:aleph.bib-bvb.de:BVB01-028025227 
966 e |u https://doi.org/10.1007/978-1-4302-6083-7  |l DE-M347  |p ZDB-2-CWD  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-1-4302-6083-7  |l DE-92  |p ZDB-2-CWD  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-1-4302-6083-7  |l DE-898  |p ZDB-2-CWD  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-1-4302-6083-7  |l DE-1049  |p ZDB-2-CWD  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-1-4302-6083-7  |l DE-863  |p ZDB-2-CWD  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-1-4302-6083-7  |l DE-862  |p ZDB-2-CWD  |x Verlag  |3 Volltext 

Datensatz im Suchindex

DE-BY-OTHR_katkey 5580628
_version_ 1831257029837062144
adam_text ENTERPRISE CYBERSECURITY / DONALDSON, SCOTT E. : 2015 ABSTRACT / INHALTSTEXT ENTERPRISE CYBERSECURITY EMPOWERS ORGANIZATIONS OF ALL SIZES TO DEFEND THEMSELVES WITH NEXT-GENERATION CYBERSECURITY PROGRAMS AGAINST THE ESCALATING THREAT OF MODERN TARGETED CYBERATTACKS. THIS BOOK PRESENTS A COMPREHENSIVE FRAMEWORK FOR MANAGING ALL ASPECTS OF AN ENTERPRISE CYBERSECURITY PROGRAM. IT ENABLES AN ENTERPRISE TO ARCHITECT, DESIGN, IMPLEMENT, AND OPERATE A COHERENT CYBERSECURITY PROGRAM THAT IS SEAMLESSLY COORDINATED WITH POLICY, PROGRAMMATICS, IT LIFE CYCLE, AND ASSESSMENT. FAIL-SAFE CYBERDEFENSE IS A PIPE DREAM. GIVEN SUFFICIENT TIME, AN INTELLIGENT ATTACKER CAN EVENTUALLY DEFEAT DEFENSIVE MEASURES PROTECTING AN ENTERPRISE’S COMPUTER SYSTEMS AND IT NETWORKS. TO PREVAIL, AN ENTERPRISE CYBERSECURITY PROGRAM MUST MANAGE RISK BY DETECTING ATTACKS EARLY ENOUGH AND DELAYING THEM LONG ENOUGH THAT THE DEFENDERS HAVE TIME TO RESPOND EFFECTIVELY. ENTERPRISE CYBERSECURITY SHOWS PLAYERS AT ALL LEVELS OF RESPONSIBILITY HOW TO UNIFY THEIR ORGANIZATION’S PEOPLE, BUDGETS, TECHNOLOGIES, AND PROCESSES INTO A COST-EFFICIENT CYBERSECURITY PROGRAM CAPABLE OF COUNTERING ADVANCED CYBERATTACKS AND CONTAINING DAMAGE IN THE EVENT OF A BREACH. THE AUTHORS OF ENTERPRISE CYBERSECURITY EXPLAIN AT BOTH STRATEGIC AND TACTICAL LEVELS HOW TO ACCOMPLISH THE MISSION OF LEADING, DESIGNING, DEPLOYING, OPERATING, MANAGING, AND SUPPORTING CYBERSECURITY CAPABILITIES IN AN ENTERPRISE ENVIRONMENT. THE AUTHORS ARE RECOGNIZED EXPERTS AND THOUGHT LEADERS IN THIS RAPIDLY EVOLVING FIELD, DRAWING ON DECADES OF COLLECTIVE EXPERIENCE IN CYBERSECURITY AND IT. IN CAPACITIES RANGING FROM EXECUTIVE STRATEGIST TO SYSTEMS ARCHITECT TO CYBERCOMBATANT, SCOTT E. DONALDSON, STANLEY G. SIEGEL, CHRIS K. WILLIAMS, AND ABDUL ASLAM HAVE FOUGHT ON THE FRONT LINES OF CYBERSECURITY AGAINST ADVANCED PERSISTENT THREATS TO GOVERNMENT, MILITARY, AND BUSINESS ENTITIES DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
any_adam_object 1
author Donaldson, Scott E.
Siegel, Stanley G.
Williams, Chris K.
Aslam, Abdul
author_facet Donaldson, Scott E.
Siegel, Stanley G.
Williams, Chris K.
Aslam, Abdul
author_role aut
aut
aut
aut
author_sort Donaldson, Scott E.
author_variant s e d se sed
s g s sg sgs
c k w ck ckw
a a aa
building Verbundindex
bvnumber BV042592015
classification_rvk ST 276
ST 277
collection ZDB-2-CWD
ctrlnum (OCoLC)910753627
(DE-599)BVBBV042592015
dewey-full 650
dewey-hundreds 600 - Technology (Applied sciences)
dewey-ones 650 - Management and auxiliary services
dewey-raw 650
dewey-search 650
dewey-sort 3650
dewey-tens 650 - Management and auxiliary services
discipline Informatik
Wirtschaftswissenschaften
doi_str_mv 10.1007/978-1-4302-6083-7
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02647nam a2200553zc 4500</leader><controlfield tag="001">BV042592015</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20160721 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150602s2015 xx a||| o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781430260837</subfield><subfield code="c">Online</subfield><subfield code="9">978-1-4302-6083-7</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-1-4302-6083-7</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)910753627</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042592015</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-898</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-862</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">650</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Donaldson, Scott E.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Enterprise Cybersecurity</subfield><subfield code="b">How to Build a Successful Cyberdefense Program Against Advanced Threats</subfield><subfield code="c">by Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berkeley, CA</subfield><subfield code="b">Apress</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XLII, 490 Seiten)</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Chiffrierung</subfield><subfield code="0">(DE-588)4352893-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Chiffrierung</subfield><subfield code="0">(DE-588)4352893-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Siegel, Stanley G.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Williams, Chris K.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Aslam, Abdul</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-1-4302-6082-0</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-1-4302-6083-7</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&amp;doc_library=BVB01&amp;local_base=BVB01&amp;doc_number=028025227&amp;sequence=000001&amp;line_number=0001&amp;func_code=DB_RECORDS&amp;service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-CWD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-CWD_2015</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028025227</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4302-6083-7</subfield><subfield code="l">DE-M347</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4302-6083-7</subfield><subfield code="l">DE-92</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4302-6083-7</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4302-6083-7</subfield><subfield code="l">DE-1049</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4302-6083-7</subfield><subfield code="l">DE-863</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4302-6083-7</subfield><subfield code="l">DE-862</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
id DE-604.BV042592015
illustrated Illustrated
indexdate 2024-12-20T17:15:19Z
institution BVB
isbn 9781430260837
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-028025227
oclc_num 910753627
open_access_boolean
owner DE-898
DE-BY-UBR
DE-M347
DE-1049
DE-863
DE-BY-FWS
DE-92
DE-862
DE-BY-FWS
owner_facet DE-898
DE-BY-UBR
DE-M347
DE-1049
DE-863
DE-BY-FWS
DE-92
DE-862
DE-BY-FWS
physical 1 Online-Ressource (XLII, 490 Seiten) Illustrationen
psigel ZDB-2-CWD
ZDB-2-CWD_2015
publishDate 2015
publishDateSearch 2015
publishDateSort 2015
publisher Apress
record_format marc
spellingShingle Donaldson, Scott E.
Siegel, Stanley G.
Williams, Chris K.
Aslam, Abdul
Enterprise Cybersecurity How to Build a Successful Cyberdefense Program Against Advanced Threats
Chiffrierung (DE-588)4352893-4 gnd
Informatik (DE-588)4026894-9 gnd
Computersicherheit (DE-588)4274324-2 gnd
subject_GND (DE-588)4352893-4
(DE-588)4026894-9
(DE-588)4274324-2
title Enterprise Cybersecurity How to Build a Successful Cyberdefense Program Against Advanced Threats
title_auth Enterprise Cybersecurity How to Build a Successful Cyberdefense Program Against Advanced Threats
title_exact_search Enterprise Cybersecurity How to Build a Successful Cyberdefense Program Against Advanced Threats
title_full Enterprise Cybersecurity How to Build a Successful Cyberdefense Program Against Advanced Threats by Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam
title_fullStr Enterprise Cybersecurity How to Build a Successful Cyberdefense Program Against Advanced Threats by Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam
title_full_unstemmed Enterprise Cybersecurity How to Build a Successful Cyberdefense Program Against Advanced Threats by Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam
title_short Enterprise Cybersecurity
title_sort enterprise cybersecurity how to build a successful cyberdefense program against advanced threats
title_sub How to Build a Successful Cyberdefense Program Against Advanced Threats
topic Chiffrierung (DE-588)4352893-4 gnd
Informatik (DE-588)4026894-9 gnd
Computersicherheit (DE-588)4274324-2 gnd
topic_facet Chiffrierung
Informatik
Computersicherheit
url https://doi.org/10.1007/978-1-4302-6083-7
http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028025227&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA
work_keys_str_mv AT donaldsonscotte enterprisecybersecurityhowtobuildasuccessfulcyberdefenseprogramagainstadvancedthreats
AT siegelstanleyg enterprisecybersecurityhowtobuildasuccessfulcyberdefenseprogramagainstadvancedthreats
AT williamschrisk enterprisecybersecurityhowtobuildasuccessfulcyberdefenseprogramagainstadvancedthreats
AT aslamabdul enterprisecybersecurityhowtobuildasuccessfulcyberdefenseprogramagainstadvancedthreats
  • Verfügbarkeit
Volltext
  • Impressum
  • Datenschutz
  • Barrierefreiheit
  • Kontakt