Developing Cybersecurity Programs and Policies in an Ai-Driven World
Santos, Omar
- 出版商: Pearson IT Certifica
- 出版日期: 2024-06-15
- 定價: $3,150
- 售價: 8.5 折 $2,678
- 語言: 英文
- 裝訂: Quality Paper - also called trade paper
- ISBN: 0138074100
- ISBN-13: 9780138074104
-
相關分類:
資訊安全
立即出貨 (庫存 < 3)
資訊安全書展 詳見活動內容 »
-
VIP 95折
Quantum Ready: The Enterprise Guide to Post-Quantum Cryptographic Readiness (Paperback)$2,550$2,422 -
VIP 95折
Becoming Quantum Safe: Protect Your Business and Mitigate Risks with Post-Quantum Cryptography and Crypto-Agility$1,900$1,805 -
85折
$1,785Certificate of Cloud Security Knowledge (Ccsk V5) Study Guide: In-Depth Guidance and Practice -
VIP 95折
Data-Driven Cybersecurity: Reducing Risk with Proven Metrics$2,160$2,052 -
VIP 95折
Palo Alto Networks from Policy to Code: Automate PAN-OS security policies with Python precision (Paperback)$1,690$1,605 -
85折
$1,573Microsoft Security Copilot: Master strategies for AI-driven cyber defense -
95折
$2,565Intelligent Continuous Security: Ai-Enabled Transformation for Seamless Protection -
VIP 95折
Privileged Access Management: Strategies for Zero Trust in the Enterprise$1,860$1,767 -
95折
$1,995Identity Security for Software Development: Best Practices That Every Developer Must Know (Paperback) -
VIP 95折
Mastering Palo Alto Networks : The complete journey to firewall mastery from setup to advanced security, 3/e (Paperback)$1,850$1,757 -
VIP 95折
電腦安全:原理與實踐(原書第5版)*此書為英文原文書*$774$735 -
CISSP Study Guide 2025-2026: All in One CISSP Exam Prep for the ICS2 Certified Information Systems Security Professional Certification. With Exam Review Material & 774 CISSP Practice Test Questions (Paperback)$1,800$1,764 -
VIP 95折
IAPP CIPP / US Certified Information Privacy Professional Study Guide (Sybex Study Guide)$2,080$1,976 -
85折
$1,530Microsoft Cybersecurity Architect Exam Ref SC-100 - Second Edition: Ace the SC-100 exam and develop cutting-edge cybersecurity strategies -
VIP 95折
Cryptography (Paperback)$850$807 -
VIP 95折
Serious Cryptography, 2nd Edition: A Practical Introduction to Modern Encryption$2,100$1,995 -
VIP 95折
Open-Source Security Operations Center (Soc): A Complete Guide to Establishing, Managing, and Maintaining a Modern Soc (美國原版)$3,300$3,135 -
85折
$3,383A Comprehensive Guide to the Nist Cybersecurity Framework 2.0: Strategies, Implementation, and Best Practice -
85折
$1,785Security Architecture for Hybrid Cloud: A Practical Method for Designing Security Using Zero Trust Principles (Paperback) -
VIP 95折
Cryptography Algorithms - Second Edition: Get to grips with new algorithms in blockchain, zero-knowledge, homomorphic encryption, and quantum$1,840$1,748 -
95折
$2,517Hands-On Differential Privacy: Introduction to the Theory and Practice Using Opendp -
85折
$2,678Developing Cybersecurity Programs and Policies in an Ai-Driven World -
VIP 95折
Implementing Palo Alto Networks Prisma(R) Access: Learn real-world network protection (Paperback)$1,990$1,890 -
VIP 95折
Understanding Cryptography: From Established Symmetric and Asymmetric Ciphers to Post-Quantum Algorithms (Hardcover) 2/e$2,800$2,660 -
85折
$1,530Microsoft 365 Security and Compliance for Administrators: A definitive guide to planning, implementing, and maintaining Microsoft 365 security posture
商品描述
Developing Cybersecurity Programs and Policies is a complete guide to establishing a cyber security program and governance in your organization. In this book, you will learn how to create cyber security policies, standards, procedures, guidelines, and plans-and the differences among them. You will also learn how threat actors are launching attacks against their victims-compromising confidentiality, integrity, and availability of systems and networks.
Santos starts by providing an overview of cybersecurity policy and governance, and how to create cybersecurity policies and develop a cybersecurity framework. He then provides details about governance, risk management, asset management, and data loss prevention.
Learn how to:
- Respond to incidents and ensure continuity of operations
- Comply with laws and regulations, including GLBA, HIPAA/HITECH, FISMA, state data security and notification rules, and PCI DSS
- Systematically identify, prioritize, and manage cyber security risks and reduce social engineering (human) risks with role-based Security Education, Awareness, and Training (SETA)
- Incorporate human resources, physical, and environmental security as important elements of your cybersecurity program.
- Implement appropriate security controls in the cloud, often using automation
- Understand Identity and Access Management (IAM)
This book includes:
- Practical, hands-on exercises related to several key topics to defend various cloud workloads operating in the different CSP models: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Software as a Service (SaaS), and Functions as a Service (FaaS)
- Covers NIST Cyber Security Framework and ISO/IEC 27000-series standards