Catalogue

Record Details

Catalogue Search


Back To Results
Showing Item 10 of 89

The cybersecurity playbook for modern enterprises : an end-to-end guide to preventing data breaches and cyber attacks  Cover Image E-book E-book

The cybersecurity playbook for modern enterprises : an end-to-end guide to preventing data breaches and cyber attacks

Wittkop, Jeremy. (Author).

Summary: Learn how to build a cybersecurity program for a changing world with the help of proven best practices and emerging techniques. Security is everyone's responsibility and for any organization, the focus should be to educate their employees about the different types of security attacks and how to ensure that security is not compromised. This cybersecurity book starts by defining the modern security and regulatory landscape, helping you understand the challenges related to human behavior and how attacks take place. You'll then see how to build effective cybersecurity awareness and modern information security programs. Once you've learned about the challenges in securing a modern enterprise, the book will take you through solutions or alternative approaches to overcome those issues and explain the importance of technologies such as cloud access security brokers, identity and access management solutions, and endpoint security platforms. As you advance, you'll discover how automation plays an important role in solving some key challenges and controlling long-term costs while building a maturing program. Toward the end, you'll also find tips and tricks to keep yourself and your loved ones safe from an increasingly dangerous digital world. By the end of this book, you'll have gained a holistic understanding of cybersecurity and how it evolves to meet the challenges of today and tomorrow.

Record details

  • ISBN: 9781803237558
  • ISBN: 1803237554
  • Physical Description: 1 online resource (280 p.)
    remote
    Computer data.
  • Publisher: Birmingham : Packt Publishing, Limited, 2023.

Content descriptions

General Note:
CatMonthString.july.24
Description based upon print version of record.
Multi-User.
Formatted Contents Note: Table of Contents Protecting People, Information, and Systems – a Growing Problem The Human Side of Cybersecurity Anatomy of an Attack Protecting People, Information, and Systems with Timeless Best Practices Protecting against Common Attacks by Partnering with End Users Information Security for a Changing World Difficulty Securing the Modern Enterprise (with Solutions!) Harnessing Automation Opportunities Cybersecurity at Home.
Type of Computer File or Data Note:
Text (HTML), electronic book.
System Details Note:
Mode of access: Internet.
Terms Governing Use and Reproduction Note:
Access requires VIU IP addresses and is restricted to VIU students, faculty and staff.
Access restricted by subscription.
Issuing Body Note:
Made available online by EBSCO.
Subject: Business -- Data processing -- Security measures
Computer crimes -- Prevention
Computer security
Computer Security
Gestion -- Informatique -- Sécurité -- Mesures
Sécurité informatique
Business -- Data processing -- Security measures
Computer crimes -- Prevention
Computer security
Multi-User.

Back To Results
Showing Item 10 of 89

Additional Resources