The cybersecurity control playbook : from fundamentals to advanced strategies
"This book is an essential resource for anyone looking to protect their organization in the digital age; whether running a small business, managing a medium-sized company, or leading a large corporation, this book contains strategies that will fit all needs. Written in a highly accessible, jarg...
Saved in:
| Main Author | |
|---|---|
| Format | Electronic eBook |
| Language | English |
| Published |
Hoboken, NJ :
Wiley,
2025.
|
| Subjects | |
| Online Access | Full text |
| ISBN | 9781394331888 9781394331864 9781394331871 9781394331857 |
| Physical Description | 1 online zdroj (xxvii, 510 stran) : ilustrace |
Cover
| LEADER | 00000cam a2200000 i 4500 | ||
|---|---|---|---|
| 001 | 115234 | ||
| 003 | CZ-ZlUTB | ||
| 005 | 20260227141626.0 | ||
| 006 | m o d | ||
| 007 | cr cnu---unuuu | ||
| 008 | 250225t20252025njua o 001 0 eng | ||
| 040 | |a DLC |b eng |e rda |c DLC |d YDX |d OCLCO |d DG1 |d N$T |d ORMDA |d CLOUD |d UKAHL |d UKMGB |d HOPLA | ||
| 020 | |a 9781394331888 |q (electronic book) | ||
| 020 | |a 9781394331864 |q (electronic book) | ||
| 020 | |a 9781394331871 |q (electronic bk.) | ||
| 020 | |z 9781394331857 |q (hardcover) | ||
| 024 | 8 | |a CIPO000218335 | |
| 035 | |a (OCoLC)1507733709 |z (OCoLC)1518927920 | ||
| 042 | |a pcc | ||
| 100 | 1 | |a Edwards, Jason |c (Cybersecurity expert), |e author. |4 aut | |
| 245 | 1 | 4 | |a The cybersecurity control playbook : |b from fundamentals to advanced strategies / |c Jason Edwards, Amazon, Cibolo, TX, US. |
| 264 | 1 | |a Hoboken, NJ : |b Wiley, |c 2025. | |
| 264 | 4 | |c ©2025 | |
| 300 | |a 1 online zdroj (xxvii, 510 stran) : |b ilustrace | ||
| 336 | |a text |b txt |2 rdacontent | ||
| 337 | |a počítač |b c |2 rdamedia | ||
| 338 | |a online zdroj |b cr |2 rdacarrier | ||
| 500 | |a Includes index. | ||
| 505 | 0 | |a Understanding Cybersecurity Controls -- The Risk-Based Approach -- Small Business Implentation -- Medium-Sized Enterprises -- Large Corporations -- Introduction to MITRE ATTACK -- Mapping Threats to Controls using MITRE ATTACK -- Enhancing Defenses with MITRE DEFEND -- Cybersecurity Frameworks Overview -- NIST 800- -- Center for Internet Security 18 Controls -- Agile Implementation of Controls and Control Frameworks -- Adaptive Control Testing & Continuous Improvement -- Testing Controls in Small and Medium Enterprises -- Control Testing in Larger and Complex Enterprises -- Control Failures Identification, Management, and Reporting -- Control Testing for Regulated Companies -- Emerging Threats and Technologies -- Appendix A -- Glossary of Terms -- Appendix B -- Risk Register Example -- Appendix C -- Risk Taxonomy -- Appendix D -- SME Security Team Structure -- Appendix E -- Developing Process Maps -- Appendix F -- Establishing a Regulatory Change Management Program -- Appendix G -- Recommended Metrics for MITRE ATTACK Techniques. | |
| 506 | |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty | ||
| 520 | |a "This book is an essential resource for anyone looking to protect their organization in the digital age; whether running a small business, managing a medium-sized company, or leading a large corporation, this book contains strategies that will fit all needs. Written in a highly accessible, jargon-free style, the highly experienced author shares his advice for effective cybersecurity controls which are crucial for protecting sensitive data, maintaining system integrity, and ensuring privacy. They help prevent data breaches, reduce financial risks, and build trust. Additionally, they are vital for meeting regulatory requirements in various industries. As technology advances, these controls will become increasingly important in securing our digital world. Each chapter provides clear explanations of foundational concepts before delving into more advanced topics, ensuring that readers understand the basics. Additionally, the book includes appendices and links to online resources for those who need to brush up on specific skills. By incorporating these supportive elements, the book ensures that all readers can fully grasp and apply the cybersecurity strategies discussed regardless of their starting point"-- Provided by publisher. | ||
| 588 | |a Description based on online resource; title from digital title page (viewed on March 21, 2025). | ||
| 650 | 0 | |a Computer security. | |
| 650 | 0 | |a Data protection. | |
| 650 | 0 | |a Business enterprises |x Data processing |x Security measures. | |
| 655 | 7 | |a elektronické knihy |7 fd186907 |2 czenas | |
| 655 | 9 | |a electronic books |2 eczenas | |
| 710 | 2 | |a John Wiley & Sons, |e publisher. | |
| 776 | 0 | 8 | |i Print version: |a Edwards, Jason |t Cybersecurity control playbook |d Hoboken, NJ : Wiley, 2025 |z 9781394331857 |w (DLC) 2025001243 |
| 776 | 0 | 8 | |i Print version : |z 9781394331857 |
| 856 | 4 | 0 | |u https://proxy.k.utb.cz/login?url=https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888 |
| 992 | |c EBOOK-TN |c WILEY | ||
| 993 | |x NEPOSILAT |y EIZ | ||
| 999 | |c 115234 |d 115234 | ||