当前位置:首页>正文

Defending the Digital Frontier: A Security Agenda 保卫数字前沿 pdf 115盘 kindle 下载 tct lit mobi 在线

免费下载书籍地址:PDF下载地址

精美图片

Defending the Digital Frontier: A Security Agenda 保卫数字前沿书籍详细信息

  • ISBN:9780471221449
  • 作者:暂无作者
  • 出版社:暂无出版社
  • 出版时间:2002-12
  • 页数:238
  • 价格:192.80
  • 纸张:胶版纸
  • 装帧:精装
  • 开本:暂无开本
  • 语言:未知
  • 丛书:暂无丛书
  • TAG:暂无
  • 豆瓣评分:暂无豆瓣评分

内容简介:

Like it or not, every company finds itself a pioneer in the digital frontier. And like all frontiers, this one involves exploration, potentially high returns……and high risks.

Consider this: according to Computer Economics, the worldwide economic impact of such recent attacks as Nimda, Code Red(s), and Sircam worms totaled $4.4 billion. The "Love Bug" virus in 2000 inflicted an estimated $8.75 billion in damage worldwide. The combined impact of the Melissa and Explorer attacks was $2.12 billion. Companies were hurt as much in terms of image and public confidence as they were financially. Protecting the "digital frontier" is perhaps the greatest challenge facing business organizations in this millennium. It is no longer a function of IT technologists; it is a risk management operation requiring sponsorship by management at the highest levels.

Written by leading experts at Ernst & Young, Defending the Digital Frontier: A Security Agenda deconstructs digital security for executive management and outlines a clear plan for creating world-class digital security to protect your organization’s assets and people. Achieving and defending security at the digital frontier requires more than just informed decision-making at the highest level. It requires a willingness to change your organization’s mindset regarding security. Step by step, Defending the Digital Frontier shows you how to accomplish that.

With detailed examples and real-world scenarios, the authors explain how to build in the six characteristics that a world-class digital security system must possess. You must make your system:

Aligned with the organization’s overall objectives

Enterprise-wide, taking a holistic view of security needs for the entire, extended organization

Continuous, maintaining constant, real-time monitoring and updating of policies, procedures, and processes

Proactive to effectively anticipate potential threats

Validated to confirm that appropriate risk management and mitigation measures are in place

Formal, so that policies, standards, and guidelines are communicated to every member of the organization

An intrusion is bound to occur to even the most strongly defended systems. Will your organization be prepared to react, or lapse into chaos? Defending the Digital Frontier introduces the Restrict, Run, and Recover® model that guides organizations in formulating and implementing a clear, enterprise-wide Agenda for Action to anticipate, detect, and react effectively to intrusions. You will learn how to roll out an effective Security Awareness and Training Program, establish Incident Response procedures, and set in place digital security teams to control damage and manage risk in even worst-case scenarios.

The digital threat knows no borders and honors no limits. But for the prepared organization, tremendous rewards await out on the digital frontier. By strengthening collective digital security knowledge from the top down and developing a rock-solid, comprehensive, on-going security agenda, every organization can build a secure future. Defending the Digital Frontier will get you there.

书籍目录:

List of Figures and Tables

Foreword

Preface

Acknowledgments

PART ONE THE CHALLENGE OF THE FRONTIER

Chapter 1:The Security Frontier

Identifying the Security Frontier

Environment

Responsibilities

Priorities

Challenges at the Frontier

Threats and Vulnerabilities

An Attack Scenario

Chapter 2:Security Characteristics

Aligned

Enterprise-Wide

Continuous

Proactive

Validated

Formal

Chapter 3:Organizational Components and Security Objectives

Organizational Components

People

Process

Technology

Security Objectives

Confidentiality, Integrity, and Availability

Access Control

PART Two THE AGENDA FOR ACTION

Chapter 4:The Security Agenda

Restrict, Run, and RecoverSM

Security Agenda Items

Planning, Architecture, Operations, and Monitoring Capabilities

Organizational Model

Capabilities

Chapter 5:The Three Rs of Digital Security

Restrict

Intrusion and Virus Detection

Incident Response

Privacy

Policies, Standards, and Guidelines

Physical Security

Run

Asset and Service Management

Vulnerability Management

Entitlement Management

Recover

Business Continuity Planning

PART THREE THE APPROACH FOR SAFETY

Chapter 6:The Security Culture

Chapter 7:The Risk Frontier

Chapter 8:Road Map for Success

Appendix A:Security-Related Laws and Regulations

Appendix B:Threat Vectors

Appendix C:Ernst & Young 2002 Digital Security Overview:An Executive Guide and Diagnostic

Endnotes

Glossary of Digital Security Terminology

Index

作者介绍:

ERNST & YOUNG is one of the nation’s leading professional services firms, providing tax, assurance, and advisory business services to thousands of individuals as well as domestic and global businesses.

出版社信息:

暂无出版社相关信息,正在全力查找中!

书籍摘录:

暂无相关书籍摘录,正在全力查找中!

在线阅读/听书/购买/PDF下载地址:

在线阅读地址:Defending the Digital Frontier: A Security Agenda 保卫数字前沿在线阅读

在线听书地址:Defending the Digital Frontier: A Security Agenda 保卫数字前沿在线收听

在线购买地址:Defending the Digital Frontier: A Security Agenda 保卫数字前沿在线购买

原文赏析:

暂无原文赏析,正在全力查找中!

其它内容:

暂无其它内容!

书籍真实打分

故事情节:9分

人物塑造:9分

主题深度:7分

文字风格:6分

语言运用:4分

文笔流畅:3分

思想传递:8分

知识深度:9分

知识广度:4分

实用性:9分

章节划分:9分

结构布局:9分

新颖与独特:6分

情感共鸣:3分

引人入胜:9分

现实相关:7分

沉浸感:5分

事实准确性:6分

文化贡献:6分

网站评分

书籍多样性:5分

书籍信息完全性:9分

网站更新速度:5分

使用便利性:5分

书籍清晰度:6分

书籍格式兼容性:8分

是否包含广告:4分

加载速度:7分

安全性:5分

稳定性:6分

搜索功能:4分

下载便捷性:3分

下载点评

  • 图文清晰(429+)
  • 内容完整(380+)
  • 情节曲折(233+)
  • 无盗版(333+)
  • 内涵好书(643+)
  • 超值(505+)
  • pdf(227+)
  • 好评(342+)
  • txt(634+)
  • 少量广告(559+)
  • 二星好评(178+)
  • 收费(497+)
  • 快捷(277+)

下载评价

网友 陈***秋:不错,图文清晰,无错版,可以入手。

网友 马***偲:好 很好 非常好 无比的好 史上最好的

网友 瞿***香:非常好就是加载有点儿慢。

网友 苍***如:什么格式都有的呀。

网友 康***溪:强烈推荐!!!

网友 曹***雯:为什么许多书都找不到?

网友 潘***丽:这里能在线转化,直接选择一款就可以了,用他这个转很方便的

网友 沈***松:挺好的,不错

网友 曾***玉:直接选择epub/azw3/mobi就可以了,然后导入微信读书,体验百分百!!!

网友 冯***卉:听说内置一千多万的书籍,不知道真假的

网友 訾***晴:挺好的,书籍丰富

网友 融***华:下载速度还可以

网友 辛***玮:页面不错 整体风格喜欢

网友 养***秋:我是新来的考古学家

版权声明

1本文:Defending the Digital Frontier: A Security Agenda 保卫数字前沿转载请注明出处。
2本站内容除签约编辑原创以外,部分来源网络由互联网用户自发投稿仅供学习参考。
3文章观点仅代表原作者本人不代表本站立场,并不完全代表本站赞同其观点和对其真实性负责。
4文章版权归原作者所有,部分转载文章仅为传播更多信息服务用户,如信息标记有误请联系管理员。
5本站一律禁止以任何方式发布或转载任何违法违规的相关信息,如发现本站上有涉嫌侵权/违规及任何不妥的内容,请第一时间联系我们申诉反馈,经核实立即修正或删除。


本站仅提供信息存储空间服务,部分内容不拥有所有权,不承担相关法律责任。

相关文章:

  • 中国分子细胞科学与技术2035发展战略 pdf 115盘 kindle 下载 tct lit mobi 在线
  • 【赠明信片 海报 书签】正版全套2册 old先画集 19天 十九天漫画夏达坛九呀呀Chiya绘本周边的幕星社天闻角川出品同名动漫画册书籍 pdf 115盘 kindle 下载 tct lit mobi 在线
  • 普通物理实验设计 pdf 115盘 kindle 下载 tct lit mobi 在线
  • 全国英语等级考试高分突破.第二版(二级模拟试题)(附光盘) pdf 115盘 kindle 下载 tct lit mobi 在线
  • 数字时代增长之道 pdf 115盘 kindle 下载 tct lit mobi 在线
  • 中西医结合骨伤科学(新世纪第三版)/全国中医药行业高等教育“十三五”规划教材 pdf 115盘 kindle 下载 tct lit mobi 在线
  • 微店这样玩就赚了!开店运营+营销推广+成功案例 pdf 115盘 kindle 下载 tct lit mobi 在线
  • 重庆旅游文史丛书·牡丹垫江 pdf 115盘 kindle 下载 tct lit mobi 在线
  • 武则天传——林语堂文集(21) pdf 115盘 kindle 下载 tct lit mobi 在线
  • 物理化学 pdf 115盘 kindle 下载 tct lit mobi 在线