Information security handbook : develop a threat model and incident response strategy to build a strong information security framework / Darren Death
Tipo de material:
- texto
- no mediado
- volumen
- 9781788478830
- 1788478835
- 005.8 D285in 2017
Contenidos:
Information and data security fundamentals – Defining the treat landscape – Preparing for information and data security – Information security risk management – Developing your information and data security plan – Continuous testing and monitoring – Business continuity/Disaster recovery planning – Incident response planning – Developing a security operations center – Developing an information security architecture program – Cloud security consideration – Information and data security best practice.
Tipo de ítem | Biblioteca actual | Signatura | Copia número | Estado | Fecha de vencimiento | Código de barras | |
---|---|---|---|---|---|---|---|
![]() |
Miguel de Cervantes Sala general | 005.8 D285in 2017 (Navegar estantería(Abre debajo)) | Ej.1 | Disponible | 00015722 |
Navegando Miguel de Cervantes estanterías, Ubicación en estantería: Sala general Cerrar el navegador de estanterías (Oculta el navegador de estanterías)
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
005.8 C658s 2019 Solving cyber risk : protecting your company and society / | 005.8 C838s 2011 Seguridad y alta disponibilidad / | 005.8 C838s 2011 Seguridad informàtica / | 005.8 D285in 2017 Information security handbook : | 005.8 D533c 2004 Claves hackers en Linux y Unix / | 005.8 F889m 2015 Measuring and managing information risk : | 005.8 G215h 2013 Hacking y seguridad en internet / |
Information and data security fundamentals – Defining the treat landscape – Preparing for information and data security – Information security risk management – Developing your information and data security plan – Continuous testing and monitoring – Business continuity/Disaster recovery planning – Incident response planning – Developing a security operations center – Developing an information security architecture program – Cloud security consideration – Information and data security best practice.
M. Ciberseguridad
No hay comentarios en este titulo.
Ingresar a su cuenta para colocar un comentario.