Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk

Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk

Klaben, Jeff; McCarthy, N.K.; Todd, Matthew

McGraw-Hill Education - Europe

09/2012

240

Mole

Inglês

9780071790390

15 a 20 dias

396

Descrição não disponível.
Introduction: The Latest Cyber Attacks: Business Killers

Part 1: The Threat Landscape
Ch 1Introduction to Planning & Crisis
Ch 2The Nebulous Standard of Cyber Due Diligence & The New Era of Information Risk

Part 2: Planning for Crisis
Ch 3A Plan is Preparation Manifested
Ch 4 Writing Your Computer Incident Response Plan

Part 3: Plan Development - Data Breach
Ch 5Your Data Breach CIRP - Incident Preparation
Ch 6Developing a Data Breach CIRP - Plan Execution
Ch 7Your Data Breach CIRP - Post Incident Planning & Maintenance

Part 4: Plan Development - Malware
Ch 8Your Malware Outbreak CIRP - Incident Preparation
Ch 9Your Malware Outbreak CIRP - Plan Execution
Ch 10Your Malware Outbreak CIRP - Post Incident Planning
Ch 11Closing Thoughts
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
Neal McCarthy, Computer Incident Response Planning, CISSP, IT professionals, information security, operations, book, guide, how to, threats, vulnerability management, Safeway, systems programming, technical management, U.S. Cyber Command, Information Warfare Officer, Pentagon, NSA, FEMA, Incident Command System, National Incident Management System, San Francisco Bay Area, Silicon Valley, FBI, FBI Infragard, incident response, CISA, CISM, CIRP, data breaches, due diligence, government, U.S. Government, network security, Wikileaks, corporate networks, cyber attacks, response planning, malware, malware incidents, Incident Response & Computer Forensics, information security professionals, analysis, breaches, hacking, data theft, computer security incident responders, incident managers, incident analysts, security analysts, information security managers, CIO, data security, CERT Certified Computer Security Incident Handler exam, GCIH, incident response plans, brand impact, cyber attacks, nebulous standards, Cyber Due Diligence, incident planning, malware outbreak, InfoSec, Security, networking, Hacking Exposed, Hacking Exposed Web 2.0, Hacking Exposed VoIP, Hacking Exposed Windows, Hacking Exposed Web Applications, Hacking Exposed Cisco Networks, Gray Hat Hacking, Hacking Exposed Wireless, Hacking Exposed Computer Forensics, 19 Deadly Sins of Software Security, 24 Deadly Sins of Software Security, CCNA Cisco Certified Network Associate Study Guide, CCENT Cisco Certified Entry Networking Technician Study Guide, CCNA Cisco Certified Network Associate Wireless Study Guide, CISSP All-in-One Exam Guide, Mobile Application Security, Hacking Exposed Malware and Rootkits, Hacking Exposed Computer Forensics, Hacking Exposed Virtualization & Cloud Computing, IT Security Metrics, Security Information and Event Management (SIEM) Implementation, IT Auditing, CISSP Boxed Set