Cyber Security Policy Guidebook

Cyber Security Policy Guidebook
ISBN-10
1118027809
ISBN-13
9781118027806
Category
Computers
Pages
288
Language
English
Published
2012-04-24
Publisher
John Wiley & Sons
Authors
Joseph Weiss, Jennifer L. Bayuk, Jason Healey

Description

"Drawing upon a wealth of experience from academia, industry, and government service, this book details and dissects current organizational cybersecurity policy issues on a global scale. Using simple language, it includes a thorough description of each issue, lists pros and cons, documents policy alternatives for the sake of clarity with respect to policy alone, and dives into organizational implementation issues. It also equips the reader with descriptions of the impact of specific policy choices, both positive and negative. This book gives students, scholars, and technical decision-makers the necessary knowledge of cybersecurity policy in order to make more informed decisions"--Provided by publisher.

Other editions

Similar books

  • A Fierce Domain: Conflict in Cyberspace, 1986 to 2012
    By Jason Healey, Karl Grindal

    A two-year study, resulting in the new book -- A Fierce Domain: Cyber Conflict, 1986 to 2012 -- has made the following conclusions, which are very different from those that policymakers are usually told: Cyber conflict has changed only ...

  • Cyber Security Essentials
    By James Graham, Rick Howard, Ryan Olson

    Demystifying the complexity often associated with information assurance, Cyber Security Essentials provides a clear understanding of the concepts behind prevalent threats, tactics, and procedures.To accomplish

  • The Cybersecurity Self-Help Guide
    By Arun Soni

    His vast international exposure in cybersecurity and writing make this book special. This book will be a tremendous help to everybody and will be considered a bible on cybersecurity.

  • Cyber Security and IT Infrastructure Protection
    By John R. Vacca

    It is up to the policy of the application if it treats out-of-date certificates as invalid, or treats it as a warning case that can be overridden by the user. Applications may also treat certificates that are not yet valid differently ...

  • Cyber Privacy: Who Has Your Data and Why You Should Care
    By April Falcon Doss

    It's high time to rethink notions of privacy and what, if anything, limits the power of those who are constantly watching, listening, and learning about us. This book is for readers who want answers to three questions: Who has your data?

  • Security Operations Center Guidebook: A Practical Guide for a Successful SOC
    By Scott McCoy, Gregory Jarpey

    This comprehensive text also covers more advanced topics, such as the most common Underwriter Laboratory (UL) listings that can be acquired, how and why they can help a company, and what additional activities and services an SOC can provide ...

  • Data Analysis for Network Cyber-Security
    By Niall Adams, Nicholas Heard

    Sequential Analysis: Hypothesis Testing and Change-Point Detection, Statistics (Chapman & Hall/CRC, Boca Raton, FL). Tartakovsky, A. G., Pollak, M. and Polunchenko, A. S. (2012). Third-order asymptotic optimality of the generalized ...

  • Confronting Cyber Risk: An Embedded Endurance Strategy for Cybersecurity
    By Gregory J. Falco, Eric Rosenbach

    Using real world examples from SolarWinds to the Colonial Pipeline attack, Confronting Cyber Risk provides CEOs and cyber newcomers alike with a cutting-edge strategy to mitigate an organization's operational, reputational, and litigational ...

  • The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities
    By Domenic Antonucci

    Praise for The Cyber Risk Handbook "Domenic Antonucci and his outstanding collection of contributors have produced a most timely and comprehensive reference and teaching guide on one of the most potentially impactful and evolving risks ...

  • Cybersecurity for Commercial Vehicles
    By Gloria D'Anna

    This book provides a thorough view of cybersecurity to encourage those in the commercial vehicle industry to be fully aware and concerned that their fleet and cargo could be at risk to a cyber-attack.