Cargando…
Building an effective cybersecurity program: a security manager's handbook
You know by now that your company could not survive without the Internet. Not in today's market. You are either part of the digital economy or reliant upon it. With critical information assets at risk, your company requires a state-of-the-art cybersecurity program. But how do you achieve the be...
Autor principal: | |
---|---|
Lenguaje: | eng |
Publicado: |
Rothstein Associates
2019
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/2705177 |
_version_ | 1780964782802731008 |
---|---|
author | Schreider, Tari |
author_facet | Schreider, Tari |
author_sort | Schreider, Tari |
collection | CERN |
description | You know by now that your company could not survive without the Internet. Not in today's market. You are either part of the digital economy or reliant upon it. With critical information assets at risk, your company requires a state-of-the-art cybersecurity program. But how do you achieve the best possible program?. |
id | cern-2705177 |
institution | Organización Europea para la Investigación Nuclear |
language | eng |
publishDate | 2019 |
publisher | Rothstein Associates |
record_format | invenio |
spelling | cern-27051772021-04-21T18:12:30Zhttp://cds.cern.ch/record/2705177engSchreider, TariBuilding an effective cybersecurity program: a security manager's handbookComputing and ComputersYou know by now that your company could not survive without the Internet. Not in today's market. You are either part of the digital economy or reliant upon it. With critical information assets at risk, your company requires a state-of-the-art cybersecurity program. But how do you achieve the best possible program?.Rothstein Associatesoai:cds.cern.ch:27051772019 |
spellingShingle | Computing and Computers Schreider, Tari Building an effective cybersecurity program: a security manager's handbook |
title | Building an effective cybersecurity program: a security manager's handbook |
title_full | Building an effective cybersecurity program: a security manager's handbook |
title_fullStr | Building an effective cybersecurity program: a security manager's handbook |
title_full_unstemmed | Building an effective cybersecurity program: a security manager's handbook |
title_short | Building an effective cybersecurity program: a security manager's handbook |
title_sort | building an effective cybersecurity program: a security manager's handbook |
topic | Computing and Computers |
url | http://cds.cern.ch/record/2705177 |
work_keys_str_mv | AT schreidertari buildinganeffectivecybersecurityprogramasecuritymanagershandbook |