The computer incident response planning handbook : executable plans for protecting information at risk / N.K. McCarthy.
نوع المادة : نصالناشر:New York : McGraw-Hill, [2012]وصف:xxviii, 209 pages ; 23 cmنوع المحتوى:- text
- unmediated
- volume
- 007179039X (pbk)
- 9780071790390 (pbk)
- Information technology -- Security measures -- Handbooks, manuals, etc
- Database security -- Planning -- Handbooks, manuals, etc
- Computer crimes -- Investigation -- Handbooks, manuals, etc
- Computer crimes -- Prevention -- Handbooks, manuals, etc
- Computer security -- Planning -- Handbooks, manuals, etc
- QA76.9.D314 M36 2012
نوع المادة | المكتبة الحالية | رقم الطلب | رقم النسخة | حالة | تاريخ الإستحقاق | الباركود | |
---|---|---|---|---|---|---|---|
كتاب | UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة | QA76.9.D314 M36 2012 (إستعراض الرف(يفتح أدناه)) | C.1 | Library Use Only | داخل المكتبة فقط | 30010011073014 | ||
كتاب | UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة | QA76.9.D314 M36 2012 (إستعراض الرف(يفتح أدناه)) | C.2 | المتاح | 30010011072950 | ||
كتاب | UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة | QA76.9.D314 M36 2012 (إستعراض الرف(يفتح أدناه)) | C.3 | المتاح | 30010011073640 |
Browsing UAE Federation Library | مكتبة اتحاد الإمارات shelves, Shelving location: General Collection | المجموعات العامة إغلاق مستعرض الرف(يخفي مستعرض الرف)
Includes index.
Introduction to planning and crisis -- Cyber due diligence in an era of information risk -- Getting more out of your plans -- Writing your computer incident response plan -- Your data breach CIRP : incident preparation -- Your data breach CIRP : plan execution -- Your data breach CIRP : post incident planning and maintenance -- Your malware outbreak CIRP : incident preparation -- Your malware outbreak CIRP : plan execution -- Your malware outbreak CIRP: post incident planning and maintenance -- Closing thoughts.
Based on proven, rock-solid computer incident response plans, this handbook is derived from real-world incident response plans that work and have survived audits and repeated execution during data breaches and due diligence. The book provides an overview of attack and breach types, strategies for assessing an organization, and more.