Computer security + Management
Label
Computer security + Management
Name
Computer security + Management
Sub focus
Actions
Incoming Resources
- Subject of31
- ISO 27001 controls, a guide to implementing and auditing, Bridget Kenyon
- BUILDING A CYBER RISK MANAGEMENT PROGRAM, evolving security for the digital age /, Brian Allen and Brandon Bapst, with Terry Allan Hicks
- Investigating the Cyber Breach, the digital forensics guide for the network engineer, Joseph Muniz, Aamir Lakhani
- Project zero trust, a story about a strategy for aligning security and the business, George Finney
- Writing Information Security Policies
- Cyber guardians, empowering board members for effective cybersecurity, Bart R. McDonough
- Proactive early threat detection and securing Oracle Database with IBM QRadar, IBM Security Guardium Database Protection, and IBM Copy Services Manager by using IBM FlashSystem Safeguarded Copy, Shashank Shingornikar, Raninder Ravi Bhandari
- Disruptive possibilities, how big data changes everything, Jeffrey Needham
- Mapping security, the corporate security sourcebook for today's global economy, Tom Patterson, Scott Gleeson Blue ; [edited by] Jessica Soldstein, Christy Hackerd, Gina Kanouse
- The Antideficiency Act Answer Book, Arnold, William
- Implementing an information security management system, security management based on ISO 27001 guidelines, Abhishek Chopra, Mukund Chaudhary
- Infosec strategies and best practices, gain proficiency in information security using expert-level strategies and best practices, Joseph MacMillan
- IT-Sicherheit im Unternehmen, Thomas W. Harich
- IBM QRadar Version 7.3, planning and installation guide, Elias Carabaguiaz [and five others]
- Microsoft 365 security, compliance, and identity administration, plan and implement security and compliance strategies for Microsoft 365 and hybrid environments, Peter Rising
- Security strategy, from requirements to reality, Bill Stackpole and Eric Oksendahl
- The Prompt Payment Act Answer Book, Arnold, William
- Understanding PKI, Concepts, Standards, and Deployment Considerations, Second Edition, Adams, Carlisle
- Managing information security, edited by John R. Vacca
- Docker security, using containers safely in production, Adrian Mouat
- CISSP Exam Cram, Second Edition, Michael Gregg
- How to cheat at managing information security, Mark Osborne ; Paul M. Summitt, technical editor
- Early threat detection and safeguarding data with IBM QRadar and IBM Copy Services Manager on IBM DS8000, IBM
- Technische IT-Security für IT Security Manager, Von Cloud Computing über WLAN bis zu Penetrationstests, Thomas W. Harich
- Solving the Enigma, History of Cryptanalytic Bombe, Jennifer Wilcox
- CISA Exam Prep, Gregg, Michael
- Surviving the Top Ten Challenges of Software Testing, a People-Oriented Approach, William E. Perry. Randall W. Rice
- Preparing for a network incident, with Ric Messier
- Guide:, Reporting on an Entity's Cyberse
- Inside the Security Mind, Making the Tough Decisions
- Integrated Security Systems Design, 2nd Edition, Norman, Thomas
- Secure operations and protections, Aamir Lakhani
- IT-Sicherheitsmanagement - Praxiswissen für IT Security Manager, 2. Auflage, Thomas W. Harich
- Neuf étapes vers le succès, un aperçu de la mise en oeuvre de la norme ISO 27001:2013, Alan Calder
- Transitioning to quantum-safe cryptography on IBM Z, Bill White, Didier Andre, Gregg Arquero, Ritu Bajaj, Joe Cronin, Anne Dames, Henrik Lyksborg, Alexandra Miranda, Maxwell Weiss
- AVIEN malware defense guide for the Enterprise, David Harley [and others] ; foreword by Robert S. Vibert
- Privileged attack vectors, building effective cyber-defense strategies to protect organizations, Morey J. Haber, Brad Hibbert
- CISSP Exam Cram, Third Edition, Gregg, Michael
- Computational intelligence for cybersecurity management and applications, edited by Yassine Maleh, Mamoun Alazab, and Soufyane Mounir
- Building a cyber risk management program evolving security for the digital age, Brian Allen and Brandon Bapst, with Terry Allan Hicks
- Adding cybersecurity expertise to your board, by Chon Abraham, Sasha Cohen O'Connell, Iria Giuffrida, Ronald R. Sims
Outgoing Resources
- Focus1
- Sub focus2