The cyber risk handbook : creating and measuring effective cybersecurity capabilities
"The Cyber Risk Handbook is the practitioner's guide to implementing, measuring and improving the counter-cyber capabilities of the modern enterprise. The first resource of its kind, this book provides authoritative guidance for real-world situations, and cross-functional solutions for ent...
Saved in:
| Main Author | |
|---|---|
| Format | Electronic eBook |
| Language | English |
| Published |
Hoboken, New Jersey :
John Wiley and Sons, Inc.,
2017.
|
| Series | Wiley finance series
|
| Subjects | |
| Online Access | Full text |
| ISBN | 9781119308959 9781119309741 9781119309727 9781119308805 |
| Physical Description | 1 online resource |
Cover
| LEADER | 00000cam a2200000 i 4500 | ||
|---|---|---|---|
| 001 | 97069 | ||
| 003 | CZ-ZlUTB | ||
| 005 | 20251008101046.0 | ||
| 006 | m o d | ||
| 007 | cr cnu|||unuuu | ||
| 008 | 170407s2017 nyu fof 001 0 eng d | ||
| 999 | |c 97069 |d 97069 | ||
| 020 | |a 9781119308959 |q (electronic bk.) | ||
| 020 | |a 9781119309741 |q (electronic bk.) | ||
| 020 | |a 9781119309727 | ||
| 020 | |z 9781119308805 | ||
| 035 | |a (OCoLC)981912077 |z (OCoLC)982105017 |z (OCoLC)982141719 |z (OCoLC)982231336 |z (OCoLC)982325754 |z (OCoLC)982394588 |z (OCoLC)985460556 |z (OCoLC)1017889470 |z (OCoLC)1066582378 |z (OCoLC)1103274729 |z (OCoLC)1111151093 |z (OCoLC)1129361278 |z (OCoLC)1152978796 |z (OCoLC)1192340581 | ||
| 040 | |a N$T |b eng |e rda |e pn |c N$T |d N$T |d YDX |d EBLCP |d DG1 |d IDEBK |d UMI |d CNCGM |d STF |d TOH |d COO |d OTZ |d OCLCQ |d VT2 |d OCLCO |d DEBSZ |d UCO |d OCLCQ |d OCLCO |d MERUC |d OCLCF |d CEF |d KSU |d OCLCQ |d Z@L |d BRX |d UKMGB |d OCLCQ |d WYU |d RECBK |d LVT |d U3W |d OCLCQ |d UAB |d UKAHL |d OL$ |d OCLCQ | ||
| 072 | 7 | |a 005 |x Management. Řízení |2 Konspekt |9 4 | |
| 080 | |a 343.3/.7:004 |2 MRF | ||
| 080 | |a 334.72 |2 MRF | ||
| 080 | |a 004.7.056 |2 MRF | ||
| 080 | |a 351.78:004.7 |2 MRF | ||
| 080 | |a 005.334:005.332.3 |2 MRF | ||
| 080 | |a (0.034.2:08) |2 MRF | ||
| 080 | |a (035) |2 MRF | ||
| 100 | 1 | |a Antonucci, Domenic, |e author. | |
| 245 | 1 | 4 | |a The cyber risk handbook : |b creating and measuring effective cybersecurity capabilities / |c Domenic Antonucci. |
| 264 | 1 | |a Hoboken, New Jersey : |b John Wiley and Sons, Inc., |c 2017. | |
| 264 | 4 | |c ©2017 | |
| 300 | |a 1 online resource | ||
| 336 | |a text |b txt |2 rdacontent | ||
| 337 | |a počítač |b c |2 rdamedia | ||
| 338 | |a online zdroj |b cr |2 rdacarrier | ||
| 490 | 0 | |a Wiley finance series | |
| 500 | |a Includes index. | ||
| 504 | |a Includes bibliographical references and index. | ||
| 506 | |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty | ||
| 520 | |a "The Cyber Risk Handbook is the practitioner's guide to implementing, measuring and improving the counter-cyber capabilities of the modern enterprise. The first resource of its kind, this book provides authoritative guidance for real-world situations, and cross-functional solutions for enterprise-wide improvement. Beginning with an overview of counter-cyber evolution, the discussion quickly turns practical with design and implementation guidance for the range of capabilities expected of a robust cyber risk management system that is integrated with the enterprise risk management (ERM) system. Expert contributors from around the globe weigh in on specialized topics with tools and techniques to help any type or size of organization create a robust system tailored to its needs. Chapter summaries of required capabilities are aggregated to provide a new cyber risk maturity model used to benchmark capabilities and to road-map gap-improvement. Cyber risk is a fast-growing enterprise risk, not just an IT risk. Yet seldom is guidance provided as to what this means. This book is the first to tackle in detail those enterprise-wide capabilities expected by Board, CEO and Internal Audit, of the diverse executive management functions that need to team up with the Information Security function in order to provide integrated solutions."- Resumé vydavatel | ||
| 590 | |a John Wiley and Sons |b Wiley Online Library All Obooks | ||
| 650 | 0 | 7 | |a počítačová kriminalita |2 czenas |7 ph124505 |
| 650 | 0 | 7 | |a podniky |2 czenas |7 ph115764 |
| 650 | 0 | 7 | |a zabezpečení počítačových sítí |2 czenas |7 ph127513 |
| 650 | 0 | 7 | |a kybernetická bezpečnost |2 czenas |7 ph716242 |
| 650 | 0 | 7 | |a rizikový management |2 czenas |7 ph116047 |
| 650 | 0 | 9 | |a computer crimes |2 eczenas |
| 650 | 0 | 9 | |a business enterprises |2 eczenas |
| 650 | 0 | 9 | |a computer network security |2 eczenas |
| 650 | 0 | 9 | |a cyber security |2 eczenas |
| 650 | 0 | 9 | |a risk management |2 eczenas |
| 655 | 7 | |a elektronické knihy |7 fd186907 |2 czenas | |
| 655 | 7 | |a příručky |7 fd133209 |2 czenas | |
| 655 | 9 | |a electronic books |2 eczenas | |
| 655 | 9 | |a handbooks and manuals |2 eczenas | |
| 776 | 0 | 8 | |i Print version: |a Antonucci, Domenic. |t Cyber risk handbook. |d Hoboken, New Jersey : John Wiley & Sons, [2017] |z 1119308801 |w (DLC) 2017302691 |w (OCoLC)958097666 |
| 856 | 4 | 0 | |u https://proxy.k.utb.cz/login?url=https://onlinelibrary.wiley.com/doi/book/10.1002/9781119309741 |
| 942 | |2 udc | ||
| 992 | |c NTK-Wiley | ||
| 993 | |x NEPOSILAT |y EIZ | ||