000 | 03408nam a22005775i 4500 | ||
---|---|---|---|
001 | 978-3-031-52064-8 | ||
003 | DE-He213 | ||
005 | 20250516160009.0 | ||
007 | cr nn 008mamaa | ||
008 | 240314s2024 sz | s |||| 0|eng d | ||
020 |
_a9783031520648 _9978-3-031-52064-8 |
||
050 | 4 | _aTH9701-9745 | |
072 | 7 |
_aTNKS _2bicssc |
|
072 | 7 |
_aSCI055000 _2bisacsh |
|
072 | 7 |
_aTNKS _2thema |
|
082 | 0 | 4 |
_a621 _223 |
100 | 1 |
_aTjoa, Simon. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
245 | 1 | 0 |
_aCyber Resilience Fundamentals _h[electronic resource] / _cby Simon Tjoa, Melisa Gafić, Peter Kieseberg. |
250 | _a1st ed. 2024. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2024. |
|
300 |
_aXVIII, 126 p. 24 illus., 21 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aStudies in Systems, Decision and Control, _x2198-4190 ; _v520 |
|
505 | 0 | _aIntroduction -- Cyber Resilience Foundations -- Cyber Resilience Organization -- Analyzing the Organization -- Reducing the Attack Surface -- Building Cyber Resilience Readiness -- Reacting to Cyber Incidents -- Improving Cyber Resilience. | |
520 | _aThis book provides readers with the necessary capabilities to meet the challenge of building and testing resilient IT services. Upon introducing the fundamentals of cyber resilience with important international standards and best practices, and the risk management process, the book covers in detail the cyber resilience management process. Here, it gives insights into the principles and design criteria to build cyber resilience in organizations, and to integrate it into operations to contribute to incident preparedness. Further, it describes measures for incident handling, including detection, containment, and post-incident handling, and analyses the most critical aspects of cyber resilience testing, such as auditing, exercising, and testing. Written for advanced undergraduate students attending information security and business continuity management courses, this book also addresses researchers and professionals in the broad field of IT Security and cyber resilience. | ||
541 |
_fUABC ; _cPerpetuidad |
||
650 | 0 | _aSecurity systems. | |
650 | 0 | _aData protection. | |
650 | 0 | _aRisk management. | |
650 | 1 | 4 | _aSecurity Science and Technology. |
650 | 2 | 4 | _aData and Information Security. |
650 | 2 | 4 | _aIT Risk Management. |
700 | 1 |
_aGafić, Melisa. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
700 | 1 |
_aKieseberg, Peter. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031520631 |
776 | 0 | 8 |
_iPrinted edition: _z9783031520655 |
776 | 0 | 8 |
_iPrinted edition: _z9783031526404 |
830 | 0 |
_aStudies in Systems, Decision and Control, _x2198-4190 ; _v520 |
|
856 | 4 | 0 |
_zLibro electrónico _uhttp://libcon.rec.uabc.mx:2048/login?url=https://doi.org/10.1007/978-3-031-52064-8 |
912 | _aZDB-2-ENG | ||
912 | _aZDB-2-SXE | ||
942 | _cLIBRO_ELEC | ||
999 |
_c274470 _d274469 |