Couverture de Cyber Resilience

Cyber Resilience

Defense-in-Depth Principles

Aperçu

Offre à durée limitée

3 mois gratuits
Essayez pour 0,00 €.
L'offre prend fin le 28 janvier 2025 à 23 h 59.
Choisissez 1 livre audio par mois dans notre collection inégalée.
Écoutez à volonté des milliers de livres audio, de titres originaux et de podcasts.
Accédez à des promotions et à des soldes exclusives
Après 3 mois, votre abonnement se renouvelle automatiquement au tarif de 9,95 €/mois.

Cyber Resilience

De : Alan Calder
Lu par : Alan Medcroft
Essayez pour 0,00 €.

Après 3 mois, 9,95 €/mois. L'offre prend fin le 28 janvier 2025 à 23 h 59.

Acheter pour 13,42 €

Acheter pour 13,42 €

Confirmer l'achat
Utiliser la carte qui se termine par
En finalisant votre achat, vous acceptez les Conditions d'Utilisation. Veuillez prendre connaissance de notre Politique de Confidentialité et de notre Politique sur la Publicité et les Cookies.
Annuler

À propos de cette écoute

We live in a world where technology and vast quantities of data play a considerable role in everyday life, both personal and professional.

For the foreseeable future (and perhaps beyond), the growth and prominence of data in business shows no signs of slowing down, even if the technology in question will likely change in ways perhaps unimaginable today. Naturally, all this innovation brings huge opportunities and benefits to organizations and people alike. However, these come at more than just a financial cost.

In the world as we know it, you can be attacked both physically and virtually. For today’s organizations, which rely so heavily on technology – particularly the Internet – to do business, the latter attack is the far more threatening of the two. The cyber threat landscape is complex and constantly changing. For every vulnerability fixed, another pops up, ripe for exploitation. Worse, when a vulnerability is identified, a tool that can exploit it is often developed and used within hours – faster than the time it normally takes for the vendor to release a patch, and certainly quicker than the time many organizations take to install that patch.

This book has been divided into two parts:

  • Part 1: Security principles.
  • Part 2: Reference controls.

Part 1 is designed to give you a concise but solid grounding in the principles of good security, covering key terms, risk management, different aspects of security, defence in depth, implementation tips, and more. This part is best read from beginning to end.

Part 2 is intended as a useful reference, discussing a wide range of good-practice controls (in alphabetical order) you may want to consider implementing. Each control is discussed at a high level, focusing on the broader principles, concepts and points to consider, rather than specific solutions. Each control has also been written as a stand-alone chapter, so you can just read the controls that interest you, in an order that suits you.

PLEASE NOTE: When you purchase this title, the accompanying PDF will be available in your Audible Library along with the audio.

©2023 IT Governance Publishing Ltd (P)2023 IT Governance Publishing Ltd
Sécurité et cryptage
Les membres Amazon Prime bénéficient automatiquement de 2 livres audio offerts chez Audible.

Vous êtes membre Amazon Prime ?

Bénéficiez automatiquement de 2 livres audio offerts.
Bonne écoute !

    Ce que les auditeurs disent de Cyber Resilience

    Moyenne des évaluations utilisateurs. Seuls les utilisateurs ayant écouté le titre peuvent laisser une évaluation.

    Commentaires - Veuillez sélectionner les onglets ci-dessous pour changer la provenance des commentaires.

    Il n'y a pas encore de critique disponible pour ce titre.