Ciberresiliencia

    Defence-in-depth principles

    Ver opciones de compra
    95 ADAPlus network fees
    32.00 USDPlus network fees

    ¡Ganador del "Mejor libro cibernético del año" en los premios The Real Cyber Awards 2023!

    El libro le proporcionará una buena comprensión de los fundamentos de la ciberseguridad y la resistencia, sin vincularlos a normas, marcos o soluciones específicas, y constituirá un excelente punto de partida para cualquier proyecto de implantación de ciberresiliencia.

    Descripción


    We live in a world where technology and vast quantities of data play a considerable role in everyday life, both personal and professional.

    For the foreseeable future (and perhaps beyond), the growth and prominence of data in business shows no signs of slowing down, even if the technology in question will likely change in ways perhaps unimaginable today. Naturally, all this innovation brings huge opportunities and benefits to organizations and people alike. However, these come at more than just a financial cost.

    In the world as we know it, you can be attacked both physically and virtually. For today’s organizations, which rely so heavily on technology – particularly the Internet – to do business, being attacked virtually is the far more threatening of the two. The cyber threat landscape is complex and constantly changing. For every vulnerability fixed, another pops up, ripe for exploitation. Worse, when a vulnerability is identified, a tool that can exploit it is often developed and used within hours – faster than the time it normally takes for the vendor to release a patch, and certainly quicker than the time many organisations take to install that patch.

    This book is divided into two parts:

    • Part 1: Security principles
    • Part 2: Reference controls

    Part 1 is designed to give you a concise but solid grounding in the principles of good security, covering key terms, risk management, different aspects of security, defense in depth, implementation tips, and more. This part is best read from beginning to end.

    Part 2 is intended as a useful reference, discussing a wide range of good-practice controls (in alphabetical order) you may want to consider implementing. Each control is discussed at a high level, focusing on the broader principles, concepts, and points to consider, rather than specific solutions. Each control has also been written as a standalone chapter, so you can just read the controls that interest you, in an order that suits you.

    Numbered eBooks: 300

    Number of Unique Covers: 10

    Number of 1:1 Covers: 5

    The Defence

    5 diseños únicos
    x 59 Numbered eBooks
    = 295 NFT eBooks
    eBook Numbers 5 - 299
    (98.33% of Supply)

    The Resilience

    5 diseños únicos
    x 1 eBooks numerados
    = 5 NFT eBooks
    eBook Numbers 0 - 4
    (1.67% of Supply)

    Detalles

    Editor : IT Governance Publishing

    First Publication Date : 2023

    Autor : Alan Calder

    Word Count : 40,000

    Formato : DEA (Activo Cifrado Descentralizado)

    Siga leyendo : Book.io eReader dApp

    Portada : Incluye portada del libro en 4K de alta resolución

    Cardano Retail Price : 95 ADA

    Cardano Policy ID : 9e9ea27ecedff4e904c3ab1f8e9b544cf476335104bef148a2191dd3

    Información del autor

    Alan Calder

    Alan Calder is an acknowledged international cyber security guru and a leading author on information security and IT governance issues.

    Alan has been involved in the development of a wide range of information security management training courses that have been accredited by the International Board for IT Governance Qualifications (IBITGQ).
    Alan ha asesorado a clientes en el Reino Unido y en el extranjero, y es comentarista habitual en los medios de comunicación y conferenciante.

    ... Seguir leyendo

    es_MXSpanish