We found 6 results
indigoBooksanne kohnke

Your Store:

Sort By:

Sorted By: Top Matches
Filtered By:
Books
1 - 6 of 6 Results
Top Matches
Implementing Cybersecurity: A Guide To The National Institute Of Standards And Technology Risk…
Out of stock online
Not available in stores
The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of the RMF in corporate training situations, as well as for any…
The Complete Guide To Cybersecurity Risks And Controls
Hardcover

|April 4, 2016

$104.87 online

$119.95list price

Out of stock online
Not available in stores
The Complete Guide to Cybersecurity Risks and Controls presents the fundamental concepts of information and communication technology (ICT) governance and control. In this book, you will learn how to create a working, practical control structure that will…
A Guide To The National Initiative For Cybersecurity Education (nice) Cybersecurity Workforce…
Out of stock online
Not available in stores
A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) presents a comprehensive discussion of the tasks, knowledge, skill, and ability (KSA) requirements of the NICE Cybersecurity Workforce Framework 2.0. It…
How To Build A Cyber-resilient Organization
Out of stock online
Not available in stores
This book presents a standard methodology approach to cyber-resilience. Readers will learn how to design a cyber-resilient architecture for a given organization as well as how to maintain a state of cyber-resilience in its day-to-day operation. Readers will know…
Supply Chain Risk Management: Applying Secure Acquisition Principles To Ensure A Trusted Technology…
Out of stock online
Not available in stores
The book presents the concepts of ICT supply chain risk management from the perspective of NIST IR 800-161. It covers how to create a verifiable audit-based control structure to ensure comprehensive security for acquired products. It explains how to establish…