Description

Chapter 1. Control 1: Inventory and Control of Enterprise (Hardware) Assets.- Chapter 2. Control 2: Inventory and Control of Software Assets.- Chapter 3. Control 3: Data Protection.- Chapter 4. Control 4: Secure Configuration of Enterprise Assets and software.- Chapter 5. Control 5: Account Management.- Chapter 6. Control 6: Access Control Management.- Chapter 7. Control 7: Continuous Vulnerability Management.- Chapter 8. Control 8: Audit Log Management.- Chapter 9. Control 9: Email and Web Browser Protections.- Chapter 10. Control 10: Malware Defenses.- Chapter 11. Control 11: Data Recovery.- Chapter 12. Control 12: Network Infrastructure Management.- Chapter 13. Control 13: Network Monitoring and Defense.- Chapter 14. Control 14: Security Awareness and Skills Training.- Chapter 15. Control 15: Service Provider Management.- Chapter 16. Control 16: Application Software Security.- Chapter 17. Control 17: Incident R

Critical Security Controls for Effective Cyber Defense

Product form

£56.57

Includes FREE delivery
Usually despatched within days
Paperback by Dr. Jason Edwards

2 in stock

Short Description:

Chapter 1. Control 1: Inventory and Control of Enterprise (Hardware) Assets.- Chapter 2. Control 2: Inventory and Control of Software Assets.- Chapter... Read more

    Publisher: Apress
    Publication Date: 10/13/2024
    ISBN13: 9798868805059, 979-8868805059
    ISBN10: 9798868805059

    Non Fiction , Computing

    Description

    Chapter 1. Control 1: Inventory and Control of Enterprise (Hardware) Assets.- Chapter 2. Control 2: Inventory and Control of Software Assets.- Chapter 3. Control 3: Data Protection.- Chapter 4. Control 4: Secure Configuration of Enterprise Assets and software.- Chapter 5. Control 5: Account Management.- Chapter 6. Control 6: Access Control Management.- Chapter 7. Control 7: Continuous Vulnerability Management.- Chapter 8. Control 8: Audit Log Management.- Chapter 9. Control 9: Email and Web Browser Protections.- Chapter 10. Control 10: Malware Defenses.- Chapter 11. Control 11: Data Recovery.- Chapter 12. Control 12: Network Infrastructure Management.- Chapter 13. Control 13: Network Monitoring and Defense.- Chapter 14. Control 14: Security Awareness and Skills Training.- Chapter 15. Control 15: Service Provider Management.- Chapter 16. Control 16: Application Software Security.- Chapter 17. Control 17: Incident R

    Customer Reviews

    Be the first to write a review
    0%
    (0)
    0%
    (0)
    0%
    (0)
    0%
    (0)
    0%
    (0)

    Recently viewed products

    © 2024 Book Curl,

      • American Express
      • Apple Pay
      • Diners Club
      • Discover
      • Google Pay
      • Maestro
      • Mastercard
      • PayPal
      • Shop Pay
      • Union Pay
      • Visa

      Login

      Forgot your password?

      Don't have an account yet?
      Create account