Muutke küpsiste eelistusi

E-raamat: NIST 2.0 Cybersecurity Framework: Practical Risk Management using Real-World Incidents

(DCT Associates)
  • Formaat: PDF+DRM
  • Ilmumisaeg: 20-Apr-2026
  • Kirjastus: Wiley
  • Keel: eng
  • ISBN-13: 9781394352203
  • Formaat - PDF+DRM
  • Hind: 96,33 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: PDF+DRM
  • Ilmumisaeg: 20-Apr-2026
  • Kirjastus: Wiley
  • Keel: eng
  • ISBN-13: 9781394352203

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

Learn to identify, protect, defend, and recover from cyber incidents The NIST 2.0 Cybersecurity Framework delivers clear guidance on applying the gold standard NIST framework in complex, real-world situations. Drawing on her extensive cybersecurity research and reporting, author Cynthia Brumfield explains how to identify risks, defend against threats, and recover from incidents using compelling case studies. The book examines high-profile incidents, including Microsoft s Midnight Blizzard attack, the Ticketmaster data breach, and the Columbus ransomware incident, to illustrate NIST functions, and inform readers on how to create asset inventories, implement protective measures, detect suspicious activity, respond to incidents, and establish governance policies. Each chapter provides implementation examples, references, and demystification of NIST framework controls for securing assets and managing risks. The book includes: Real-world case studies from Microsoft, Ticketmaster, MGM Resorts and Caeser s Entertainment, and other organizations that illustrate practical applications of the NIST framework Implementation guidance covering all six NIST functions: Identify, Protect, Detect, Respond, Recover, and Govern Chapter summaries and quizzes that reinforce learning objectives and help readers assess their understanding Clear and concise explanations of how to achieve the outcomes articulated across the NIST categories and subcategories Whether you re a student, organizational decision-maker, IT professional, public or private cybersecurity worker, or government contractor, this book provides the practical knowledge needed to implement the NIST 2.0 Framework effectively. You ll learn from real-world failures and successes to build a robust cybersecurity program.