Amazon cover image
Image from Amazon.com

Implementing Cybersecurity

By: Contributor(s): Publication details: CRC Press 2022 LondonDescription: 338ISBN:
  • 9781032605197
DDC classification:
  • 001.64 KOH
Summary: The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of the RMF in corporate training situations, as well as for any individual who wants to obtain specialized knowledge in organizational risk management. It is an all-purpose roadmap of sorts aimed at the practical understanding and implementation of the risk management process as a standard entity. It will enable an "application" of the risk management process as well as the fundamental elements of control formulation within an applied context. Source: https://www.amazon.in/Implementing-Cybersecurity-Sigler-Shoemaker-Kohnke/dp/1032605197/ref=sr_1_1?crid=3A2IFOF5798MD&dib=eyJ2IjoiMSJ9.m_2-W2p7Ye6dfe6Q2oPsLg.H21KBBDm0gx3F7m5UdT2uqmKeeKcgWUmSyv47ulZKAM&dib_tag=se&keywords=9781032605197&qid=1709534824&sprefix=%2Caps%2C411&sr=8-1
List(s) this item appears in: New Arrivals March 2024
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode
Book Book Main Library Information Technology Reference book 001.64 KOH (Browse shelf(Opens below)) Available 119246

The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of the RMF in corporate training situations, as well as for any individual who wants to obtain specialized knowledge in organizational risk management. It is an all-purpose roadmap of sorts aimed at the practical understanding and implementation of the risk management process as a standard entity. It will enable an "application" of the risk management process as well as the fundamental elements of control formulation within an applied context.

Source: https://www.amazon.in/Implementing-Cybersecurity-Sigler-Shoemaker-Kohnke/dp/1032605197/ref=sr_1_1?crid=3A2IFOF5798MD&dib=eyJ2IjoiMSJ9.m_2-W2p7Ye6dfe6Q2oPsLg.H21KBBDm0gx3F7m5UdT2uqmKeeKcgWUmSyv47ulZKAM&dib_tag=se&keywords=9781032605197&qid=1709534824&sprefix=%2Caps%2C411&sr=8-1

There are no comments on this title.

to post a comment.

Powered by Koha