Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Cybersecurity incident response : how to contain, eradicate, and recover from incidents
by
Thompson, Eric C. (Cyber security professional), author
in
Computer security Management.
/ Data protection.
/ Computer networks Security measures.
/ Computer crimes.
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Cybersecurity incident response : how to contain, eradicate, and recover from incidents
by
Thompson, Eric C. (Cyber security professional), author
in
Computer security Management.
/ Data protection.
/ Computer networks Security measures.
/ Computer crimes.
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Cybersecurity incident response : how to contain, eradicate, and recover from incidents
Book
Cybersecurity incident response : how to contain, eradicate, and recover from incidents
Available to read in the library!
Request Book From Autostore
and Choose the Collection Method
Overview
Create, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in this book. Don't allow your cybersecurity incident responses (IR) to fall short of the mark due to lack of planning, preparation, leadership, and management support. Surviving an incident, or a breach, requires the best response possible. This book provides practical guidance for the containment, eradication, and recovery from cybersecurity events and incidents. The book takes the approach that incident response should be a continual program. Leaders must understand the organizational environment, the strengths and weaknesses of the program and team, and how to strategically respond. Successful behaviors and actions required for each phase of incident response are explored in the book. Straight from NIST 800-61, these actions include: Planning and practicing ; Detection ; Containment ; Eradication ; Post-incident actions. What you'll learn: Know the sub-categories of the NIST Cybersecurity Framework ; Understand the components of incident response ; Go beyond the incident response plan ; Turn the plan into a program that needs vision, leadership, and culture to make it successful ; Be effective in your role on the incident response team.
Publisher
Apress
Subject
ISBN
1484238699, 9781484238691
Item info:
1
item available
1
item total in all locations
| Call Number | Copies | Material | Location |
|---|---|---|---|
| QA76.9.A25 T566 2018 | 1 | BOOK | AUTOSTORE |
This website uses cookies to ensure you get the best experience on our website.