ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
2
views
0
references
Top references
cited by
1
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
4,076
similar
All similar
Record
: found
Abstract
: not found
Book
: not found
Enterprise Cybersecurity Study Guide
other
Author(s):
Scott E. Donaldson
,
Stanley G. Siegel
,
Chris K. Williams
,
Abdul Aslam
Publication date
(Print):
2018
Publisher:
Apress
Read this book at
Publisher
Further versions
oa repository (via OAI-PMH doi match)
Powered by
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
NTT Journal for Theology and the Study of Religion
Author and book information
Book
ISBN (Print):
978-1-4842-3257-6
ISBN (Electronic):
978-1-4842-3258-3
Publication date (Print):
2018
DOI:
10.1007/978-1-4842-3258-3
SO-VID:
5ea6ec0d-bc6d-4ab8-91fc-dca88905c043
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 3
Defining the Cybersecurity Challenge
pp. 53
Meeting the Cybersecurity Challenge
pp. 95
Enterprise Cybersecurity Architecture
pp. 135
Implementing Enterprise Cybersecurity
pp. 173
Operating Enterprise Cybersecurity
pp. 219
Enterprise Cybersecurity and the Cloud
pp. 249
Enterprise Cybersecurity for Mobile and BYOD
pp. 277
Building an Effective Defense
pp. 313
Responding to Incidents
pp. 333
Managing a Cybersecurity Crisis
pp. 379
Assessing Enterprise Cybersecurity
pp. 407
Measuring a Cybersecurity Program
pp. 429
Mapping Against Cybersecurity Frameworks
pp. 451
Managing an Enterprise Cybersecurity Program
pp. 487
Looking to the Future
pp. 515
Sample Cybersecurity Policy
pp. 545
Cybersecurity Operational Processes
pp. 565
Object Measurement
pp. 603
Cybersecurity Sample Assessment
pp. 663
Cybersecurity Capability Value Scales
Similar content
4,076
Is cybersecurity in rail more important now than ever?
Authors:
I.G. Macola
Process Operational Safety and Cybersecurity
Authors:
Z Wu
,
P. D. Christofides
Metamorphic Testing for Cybersecurity
Authors:
Tsong Yueh Chen
,
Fei-Ching Kuo
,
Wenjuan Ma
…
See all similar
Cited by
1
Low-Cost Architecture of the Universal Security Threat Detection System for Industrial IoT
Authors:
M. Hajder
,
P. Hajder
,
M. Nycz
See all cited by