LEADER 00770nam0-22002651i-450- 001 990003610590403321 005 20001010 035 $a000361059 035 $aFED01000361059 035 $a(Aleph)000361059FED01 035 $a000361059 100 $a20000920d1961----km-y0itay50------ba 101 0 $aita 105 $ay-------001yy 200 1 $a<>short introduction to the economy of lat in America.$fBenham, Holly 210 $aLondon$cs.e.$d1961 700 1$aBenham,$bFrederic Charles$f<1900-1962>$0130997 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990003610590403321 952 $aSE 06.07.019-$bS.I.$fDECSE 959 $aDECSE 996 $aShort introduction to the economy of lat in America$9502409 997 $aUNINA DB $aING01 LEADER 03170nam 22005533 450 001 9911007013903321 005 20230809080255.0 010 $a9781787784406 010 $a1787784401 010 $a9781787784390 010 $a1787784398 024 7 $a10.2307/jj.5806810 035 $a(MiAaPQ)EBC30676962 035 $a(Au-PeEL)EBL30676962 035 $a(NjHacI)9927938434500041 035 $a(CaSebORM)9781787784406 035 $a(CKB)27938434500041 035 $a(OCoLC)1393307471 035 $a(OCoLC-P)1393307471 035 $a(EXLCZ)9927938434500041 100 $a20230809d2023 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCyber Resilience $eDefence-In-depth Principles 205 $a1st ed. 210 1$aEly :$cIT Governance Ltd,$d2023. 210 4$dİ2023. 215 $a1 online resource (142 pages) 300 $aDescription based upon print version of record. 311 08$a9781787784383 311 08$a178778438X 327 $aCover -- Title -- Copyright -- About the Author -- Acknowledgments -- Contents -- Introduction -- Part 1: Security principles -- Chapter 1: The cyber threat landscape -- Chapter 2: Legal and contractual requirements -- Chapter 3: Key terms and concepts -- Chapter 4: Managing the risks -- Chapter 5: Three security pillars -- Chapter 6: Layers of defence in depth -- Chapter 7: Mapping the layers against the Part 2 reference controls -- Chapter 8: Implementation tips -- Part 2: Reference controls -- Chapter 9: Asset management -- Chapter 10: Board-level commitment and involvement -- Chapter 11: Business continuity management -- Chapter 12: Configuration and patch management -- Chapter 13: Continual improvement process -- Chapter 14: Encryption -- Chapter 15: External certification/validation -- Chapter 16: Identity and access control -- Chapter 17: Incident response management -- Chapter 18: Internal audits -- Chapter 19: Malware protection -- Chapter 20: Network and communications security -- Chapter 21: Physical and environmental security -- Chapter 22: Security monitoring -- Chapter 23: Security policies -- Chapter 24: Staff training and awareness -- Chapter 25: Supply chain security -- Chapter 26: System security -- Chapter 27: Vulnerability scanning and penetration testing -- GRC International Group PLC resources. 330 $aThis book will give you a good understanding of the fundamentals of cyber security and resilience, without tying them to specific standards, frameworks or solutions, and provide an excellent starting point for any cyber resilience implementation project. 606 $aComputer security$vHandbooks, manuals, etc 606 $aBusiness enterprises$xComputer networks$xSecurity measures 615 0$aComputer security 615 0$aBusiness enterprises$xComputer networks$xSecurity measures. 676 $a658.478 700 $aCalder$b Alan$01611549 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9911007013903321 996 $aCyber Resilience$94392540 997 $aUNINA