Normal view MARC view ISBD view

Business Continuity in a Cyber World : Surviving Cyberattacks.

By: Sutton, David.
Material type: TextTextSeries: eBooks on Demand.Publisher: New York : Business Expert Press, 2018Copyright date: ©2018Description: 1 online resource (205 pages).Content type: text Media type: computer Carrier type: online resourceISBN: 9781947441477.Subject(s): Cyberspace-Security measuresGenre/Form: Electronic books.Additional physical formats: Print version:: Business Continuity in a Cyber World : Surviving CyberattacksDDC classification: 005.82 Online resources: Click here to view this ebook.
Contents:
Cover -- Business Continuity in a Cyber World: Surviving Cyber-Attacks -- Contents -- Acknowledgments -- Introduction -- CHAPTER 1: The Practice of Business Continuity Management -- CHAPTER 2: A Brief Overview of the Risk Management Process -- CHAPTER 3: The Main Cybersecurity Issues -- CHAPTER 4: Information Assets and Impacts -- CHAPTER 5: Vulnerabilities and Threats -- CHAPTER 6: Selecting Strategic, Tactical, and Operational Solutions -- CHAPTER 7: Business Continuity Activities and Solutions -- CHAPTER 8: Testing, Exercising, and Maintaining Plans -- CHAPTER 9: Embedding Cybersecurity and Business Continuity -- APPENDIX A: Information on Cybersecurity Controls -- APPENDIX B: Standards and Good Practice Guidelines -- Glossary and Definitions -- Bibliography -- About the Author -- Index -- Ad Page -- Back Cover.
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Call number URL Status Date due Barcode
Electronic Book UT Tyler Online
Online
KF27 .S888 2018 (Browse shelf) https://ebookcentral.proquest.com/lib/uttyler/detail.action?docID=5435587 Available EBC5435587

Cover -- Business Continuity in a Cyber World: Surviving Cyber-Attacks -- Contents -- Acknowledgments -- Introduction -- CHAPTER 1: The Practice of Business Continuity Management -- CHAPTER 2: A Brief Overview of the Risk Management Process -- CHAPTER 3: The Main Cybersecurity Issues -- CHAPTER 4: Information Assets and Impacts -- CHAPTER 5: Vulnerabilities and Threats -- CHAPTER 6: Selecting Strategic, Tactical, and Operational Solutions -- CHAPTER 7: Business Continuity Activities and Solutions -- CHAPTER 8: Testing, Exercising, and Maintaining Plans -- CHAPTER 9: Embedding Cybersecurity and Business Continuity -- APPENDIX A: Information on Cybersecurity Controls -- APPENDIX B: Standards and Good Practice Guidelines -- Glossary and Definitions -- Bibliography -- About the Author -- Index -- Ad Page -- Back Cover.

Description based on publisher supplied metadata and other sources.

There are no comments for this item.

Log in to your account to post a comment.