Creating an Information Security Program from Scratch
portes grátis
Creating an Information Security Program from Scratch
Williams, Walter
Taylor & Francis Ltd
09/2021
212
Mole
Inglês
9780367554651
15 a 20 dias
331
Descrição não disponível.
Preface. Chapter 1 Getting Started. Chapter 2 The Things You Must Do. Chapter 3 Asset Management. Chapter 4 Vulnerability Management. Chapter 5 Incident Management. Chapter 6 The Endpoint. Chapter 7 Email Security. Chapter 8 The Network. Chapter 9 Integrating Security Into Software Development. Chapter 10 Disasters. Chapter 11 Access Control. Chapter 12 Human Issues. Chapter 13 Maturity. Index.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
Information Security;Information Security Program;Pci DSS;Fair;Cloud Security Alliance;Vulnerability Management System;Critical Security Controls;Software Defined Network;Red Team Exercise;TCP;Application Firewalls;Web Application Firewalls;GDPR;NIST SP;SCAP;Clark Wilson Integrity Model;Business Continuity Plan;Business Process;Vulnerability Management;Mandatory Access Control;Information Security Incident;Host Based Intrusion Detection System;Security Awareness Campaigns;Pert Distribution;ICMP
Preface. Chapter 1 Getting Started. Chapter 2 The Things You Must Do. Chapter 3 Asset Management. Chapter 4 Vulnerability Management. Chapter 5 Incident Management. Chapter 6 The Endpoint. Chapter 7 Email Security. Chapter 8 The Network. Chapter 9 Integrating Security Into Software Development. Chapter 10 Disasters. Chapter 11 Access Control. Chapter 12 Human Issues. Chapter 13 Maturity. Index.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
Information Security;Information Security Program;Pci DSS;Fair;Cloud Security Alliance;Vulnerability Management System;Critical Security Controls;Software Defined Network;Red Team Exercise;TCP;Application Firewalls;Web Application Firewalls;GDPR;NIST SP;SCAP;Clark Wilson Integrity Model;Business Continuity Plan;Business Process;Vulnerability Management;Mandatory Access Control;Information Security Incident;Host Based Intrusion Detection System;Security Awareness Campaigns;Pert Distribution;ICMP