Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Building a comprehensive IT security...
~
SpringerLink (Online service)
Building a comprehensive IT security programbpractical guidelines and best practices /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Building a comprehensive IT security programby Jeremy Wittkop.
Reminder of title:
bpractical guidelines and best practices /
Author:
Wittkop, Jeremy.
Published:
Berkeley, CA :Apress :2016.
Description:
xix, 195 p. :ill. (some col.), digital ;24 cm.
Contained By:
Springer eBooks
Subject:
Information technologySecurity measures
Online resource:
https://doi.org/10.1007/978-1-4842-2053-5
ISBN:
9781484220535$q(electronic bk.)
Building a comprehensive IT security programbpractical guidelines and best practices /
Wittkop, Jeremy.
Building a comprehensive IT security program
bpractical guidelines and best practices /[electronic resource] :by Jeremy Wittkop. - Berkeley, CA :Apress :2016. - xix, 195 p. :ill. (some col.), digital ;24 cm.
Chapter 1: The Problem We Are Facing -- Chapter 2 : Protecting Critical Assets -- Chapter 3: Monetizing Risk -- Chapter 4: Security Intelligence Model -- Chapter 5: Incident Response Planning -- Chapter 6: The People Problem -- Chapter 7: Assigning Accountability -- Chapter 8: Shifting the Paradigm -- Chapter 9: The Definition of Insanity -- Chapter 10: Deja Vu -- Chapter 11: The Information Security Community -- Chapter 12: Partnering with Governments.
ISBN: 9781484220535$q(electronic bk.)
Standard No.: 10.1007/978-1-4842-2053-5doiSubjects--Topical Terms:
760526
Information technology
--Security measures
LC Class. No.: HD30.2
Dewey Class. No.: 005.8
Building a comprehensive IT security programbpractical guidelines and best practices /
LDR
:01457nmm a2200313 a 4500
001
548974
003
DE-He213
005
20190729104109.0
006
m d
007
cr nn 008maaau
008
190822s2016 cau s 0 eng d
020
$a
9781484220535$q(electronic bk.)
020
$a
9781484220528$q(paper)
024
7
$a
10.1007/978-1-4842-2053-5
$2
doi
035
$a
978-1-4842-2053-5
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
HD30.2
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
HD30.2
$b
.W832 2016
100
1
$a
Wittkop, Jeremy.
$3
828592
245
1 0
$a
Building a comprehensive IT security program
$h
[electronic resource] :
$b
bpractical guidelines and best practices /
$c
by Jeremy Wittkop.
260
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2016.
300
$a
xix, 195 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
505
0
$a
Chapter 1: The Problem We Are Facing -- Chapter 2 : Protecting Critical Assets -- Chapter 3: Monetizing Risk -- Chapter 4: Security Intelligence Model -- Chapter 5: Incident Response Planning -- Chapter 6: The People Problem -- Chapter 7: Assigning Accountability -- Chapter 8: Shifting the Paradigm -- Chapter 9: The Definition of Insanity -- Chapter 10: Deja Vu -- Chapter 11: The Information Security Community -- Chapter 12: Partnering with Governments.
650
0
$a
Information technology
$x
Security measures
$x
Management.
$3
760526
650
0
$a
Computer security
$x
Management.
$3
230939
650
1 4
$a
Security.
$3
760527
650
2 4
$a
Systems and Data Security.
$3
274481
650
2 4
$a
Data Structures and Information Theory.
$3
825714
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer eBooks
856
4 0
$u
https://doi.org/10.1007/978-1-4842-2053-5
950
$a
Professional and Applied Computing (Springer-12059)
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000164147
電子館藏
1圖書
電子書
EB HD30.2 W832 2016 2016
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
https://doi.org/10.1007/978-1-4842-2053-5
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login