NLU Meghalaya Library

Online Public Access Catalogue (OPAC)

Cyber breach response that actually works : (Record no. 12714)

MARC details
000 -LEADER
fixed length control field 07588cam a2200661 a 4500
001 - CONTROL NUMBER
control field on1159165163
003 - CONTROL NUMBER IDENTIFIER
control field OCoLC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240523125542.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr un|---aucuu
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 200620s2020 inu o 001 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency EBLCP
Language of cataloging eng
Description conventions pn
Transcribing agency EBLCP
Modifying agency DG1
-- UKAHL
-- OCLCF
-- YDX
-- RECBK
-- OCLCQ
-- OCLCO
-- K6U
-- OCLCO
-- OCLCQ
-- OCLCO
-- SFB
-- IEEEE
-- OCLCQ
-- UPM
-- OCLCQ
-- OCLCO
-- OCLCL
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119679349
Qualifying information (electronic bk. ;
-- oBook)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1119679346
Qualifying information (electronic bk. ;
-- oBook)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119679318
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1119679311
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119679356
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1119679354
Qualifying information (electronic bk.)
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1002/9781119679349
Source of number or code doi
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier AU@
System control number 000067555882
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier CHNEW
System control number 001087404
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier CHVBK
System control number 598948120
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)1159165163
037 ## - SOURCE OF ACQUISITION
Stock number 9820878
Source of stock number/acquisition IEEE
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
049 ## - LOCAL HOLDINGS (OCLC)
Holding library MAIN
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Gorecki, Andrew.
245 10 - TITLE STATEMENT
Title Cyber breach response that actually works :
Remainder of title organizational approach to managing residual risk /
Statement of responsibility, etc. Andrew Gorecki.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Indianapolis :
Name of publisher, distributor, etc. Wiley,
Date of publication, distribution, etc. 2020.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (323 pages)
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
588 0# - SOURCE OF DESCRIPTION NOTE
Source of description note Print version record.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Cover -- Title Page -- Copyright Page -- About the Author -- About the Technical Editors -- Acknowledgments -- Contents at a Glance -- Contents -- Foreword -- Introduction -- Who Should Read This Book -- How This Book Is Organized -- How to Contact Wiley or the Author -- Notes -- Chapter 1 Understanding the Bigger Picture -- Evolving Threat Landscape -- Identifying Threat Actors -- Cyberattack Lifecycle -- Defining Cyber Breach Response -- Events, Alerts, Observations, Incidents, and Breaches -- What Is Cyber Breach Response? -- Identifying Drivers for Cyber Breach Response -- Risk Management
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Cyber Threat Intelligence -- Laws and Regulations -- Changing Business Objectives -- Incorporating Cyber Breach Response into a Cybersecurity Program -- Strategic Planning -- Designing a Program -- Implementing Program Components -- Program Operations -- Continual Improvement -- Strategy Development -- Strategic Assessment -- Strategy Definition -- Strategy Execution -- Roadmap Development -- Governance -- Establishing Policies -- Identifying Key Stakeholders -- Business Alignment -- Continual Improvement -- Summary -- Notes -- Chapter 2 Building a Cybersecurity Incident Response Team
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Defining a CSIRT -- CSIRT History -- Defining Incident Response Competencies and Functions -- Proactive Functions -- Reactive Functions -- Creating an Incident Response Team -- Creating an Incident Response Mission Statement -- Choosing a Team Model -- Organizing an Incident Response Team -- Hiring and Training Personnel -- Establishing Authority -- Introducing an Incident Response Team to the Enterprise -- Enacting a CSIRT -- Defining a Coordination Model -- Communication Flow -- Assigning Roles and Responsibilities -- Business Functions -- Legal and Compliance
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Information Technology Functions -- Senior Management -- Working with Outsourcing Partners -- Outsourcing Considerations -- Establishing Successful Relationships with Vendors -- Summary -- Notes -- Chapter 3 Technology Considerations in Cyber Breach Investigations -- Sourcing Technology -- Comparing Commercial vs. Open Source Tools -- Developing In-House Software Tools -- Procuring Hardware -- Acquiring Forensic Data -- Forensic Acquisition -- Live Response -- Incident Response Investigations in Virtualized Environments -- Traditional Virtualization -- Cloud Computing
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Leveraging Network Data in Investigations -- Identifying Forensic Evidence in Enterprise Technology Services -- Domain Name System -- Dynamic Host Configuration Protocol -- Web Servers -- Databases -- Security Tools -- Log Management -- What Is Logging? -- What Is Log Management? -- Log Management Lifecycle -- Collection and Storage -- Managing Logs with a SIEM -- Summary -- Notes -- Chapter 4 Crafting an Incident Response Plan -- Incident Response Lifecycle -- Preparing for an Incident -- Detecting and Analyzing Incidents -- Containment, Eradication, and Recovery -- Post-Incident Activities
500 ## - GENERAL NOTE
General note Understanding Incident Management
500 ## - GENERAL NOTE
General note Includes index.
520 ## - SUMMARY, ETC.
Summary, etc. You will be breached'the only question is whether you'll be ready'''' A cyber breach could cost your organization millions of dollars'in 2019, the average cost of a cyber breach for companies was $3.9M, a figure that is increasing 20-30% annually. But effective planning can lessen the impact and duration of an inevitable cyberattack. Cyber Breach Response That Actually Works provides a business-focused methodology that will allow you to address the aftermath of a cyber breach and reduce its impact to your enterprise. This book goes beyond step-by-step instructions for technical staff, focusing on big-picture planning and strategy that makes the most business impact. Inside, you'll learn what drives cyber incident response and how to build effective incident response capabilities. Expert author Andrew Gorecki delivers a vendor-agnostic approach based on his experience with Fortune 500 organizations.-Understand the evolving threat landscape and learn how to address tactical and strategic challenges to build a comprehensive and cohesive cyber breach response program -Discover how incident response fits within your overall information security program, including a look at risk management -Build a capable incident response team and create an actionable incident response plan to prepare for cyberattacks and minimize their impact to your organization -Effectively investigate small and large-scale incidents and recover faster by leveraging proven industry practices -Navigate legal issues impacting incident response, including laws and regulations, criminal cases and civil litigation, and types of evidence and their admissibility in court In addition to its valuable breadth of discussion on incident response from a business strategy perspective, Cyber Breach Response That Actually Works offers information on key technology considerations to aid you in building an effective capability and accelerating investigations to ensure your organization can continue business operations during significant cyber events.
590 ## - LOCAL NOTE (RLIN)
Local note John Wiley and Sons
Provenance (VM) [OBSOLETE] Wiley Online Library: Complete oBooks
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security
General subdivision Management.
650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element S�ecurit�e informatique
General subdivision Gestion.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTERS
General subdivision Security
-- General.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security
General subdivision Management
Source of heading or term fast
758 ## - RESOURCE IDENTIFIER
Relationship information has work:
Label Cyber breach response that actually works (Work)
Real World Object URI https://id.oclc.org/worldcat/entity/E39PCXhd8GtcwXhtKcVFKwYbHP
Relationship https://id.oclc.org/worldcat/ontology/hasWork
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
Main entry heading Gorecki, Andrew.
Title Cyber Breach Response That Actually Works : Organizational Approach to Managing Residual Risk.
Place, publisher, and date of publication Newark : John Wiley & Sons, Incorporated, �2020
International Standard Book Number 9781119679325
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119679349">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119679349</a>
938 ## -
-- Askews and Holts Library Services
-- ASKH
-- AH36884300
938 ## -
-- Askews and Holts Library Services
-- ASKH
-- AH36884299
938 ## -
-- ProQuest Ebook Central
-- EBLB
-- EBL6225840
938 ## -
-- Recorded Books, LLC
-- RECE
-- rbeEB00831155
938 ## -
-- YBP Library Services
-- YANK
-- 301328845
994 ## -
-- 92
-- INLUM

No items available.

© 2022- NLU Meghalaya. All Rights Reserved. || Implemented and Customized by
OPAC Visitors

Powered by Koha