Um die anderen Arten von Veröffentlichungen zu diesem Thema anzuzeigen, folgen Sie diesem Link: Cybersecurity frameworks.

Bücher zum Thema „Cybersecurity frameworks“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit Top-50 Bücher für die Forschung zum Thema "Cybersecurity frameworks" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Sehen Sie die Bücher für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.

1

United States. Congress. House. Committee on Homeland Security. Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies. Oversight of Executive Order 13636 and development of the cybersecurity framework: Hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Thirteenth Congress, first session, July 18, 2013. Washington: U.S. Government Printing Office, 2014.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Maksurov, Aleksey. Ensuring information security on the Internet. ru: INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1942595.

Der volle Inhalt der Quelle
Annotation:
The monograph examines the features of legal relations in the field of information security in the global information space. The concept of "cybersecurity" is investigated, the institutional independence of the norms of law on ensuring security in the cyber environment is substantiated from the point of view of the subject and method of legal regulation. Considerable attention is paid to the characteristics of the sources of law on ensuring information security on the Internet. Substantial proposals have been made to improve legal regulation in this area both at the national (primarily Russian) and international levels. A technological approach has been applied to the consideration of security issues in the global information space, within the framework of which the organizational, technical and legal principles of ensuring information security in cyberspace, as well as ways and means of ensuring security in the global information space have been studied. It is given not only an assessment of the level of use of funds, their interrelation and mutual complement, but also the legal characteristics of security tools in the global information space, for example cryptographic. The resources allocated for the implementation of the type of legal technology under study that were not previously allocated in the legal literature, for example, scientific and economic. The features of the protection of personal information on the Internet are considered, as well as modern problems of legal security in the global information environment, including cybersecurity in banking, healthcare, and biometric data security. The problems of international cooperation in the field of information security are highlighted. For a wide range of readers interested in information security issues. It can be useful for students, postgraduates and teachers of law schools and faculties.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Shah, Imdad Ali, Samina Rajper und Noor Zaman. Cybersecurity Measures for e-Government Frameworks. IGI Global, 2021.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Zaman, Noor, Imdad Ali Shah und Samina Rajper, Hrsg. Cybersecurity Measures for E-Government Frameworks. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-7998-9624-1.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Shah, Imdad Ali, Samina Rajper und Noor Zaman. Cybersecurity Measures for e-Government Frameworks. IGI Global, 2022.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Shah, Imdad Ali, Samina Rajper und Noor Zaman. Cybersecurity Measures for e-Government Frameworks. IGI Global, 2022.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Shah, Imdad Ali, Samina Rajper und Noor Zaman. Cybersecurity Measures for e-Government Frameworks. IGI Global, 2022.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Shah, Imdad Ali, Samina Rajper und Noor Zaman. Cybersecurity Measures for e-Government Frameworks. IGI Global, 2022.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Belli, Luca. CyberBRICS: Mapping Cybersecurity Frameworks in the BRICS. Springer International Publishing AG, 2021.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Quest to Cyber Superiority: Cybersecurity Regulations, Frameworks, and Strategies of Major Economies. Springer, 2016.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
11

Kshetri, Nir. Quest to Cyber Superiority: Cybersecurity Regulations, Frameworks, and Strategies of Major Economies. Springer London, Limited, 2016.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
12

Kshetri, Nir. The Quest to Cyber Superiority: Cybersecurity Regulations, Frameworks, and Strategies of Major Economies. Springer, 2018.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
13

Osei-Bryson, Kweku-Muata, Corlane Barclay und Charlette Donalds. Cybercrime and Cybersecurity in the Global South: Concepts, Strategies, and Frameworks for Greater Resilience. CRC Press LLC, 2022.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
14

Cybercrime and Cybersecurity in the Global South: Concepts, Strategies, and Frameworks for Greater Resilience. CRC Press LLC, 2022.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
15

Osei-Bryson, Kweku-Muata, Corlane Barclay und Charlette Donalds. Cybercrime and Cybersecurity in the Global South: Concepts, Strategies, and Frameworks for Greater Resilience. CRC Press LLC, 2022.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
16

Osei-Bryson, Kweku-Muata, Corlane Barclay und Charlette Donalds. Cybercrime and Cybersecurity in the Global South: Concepts, Strategies, and Frameworks for Greater Resilience. CRC Press LLC, 2022.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
17

Dambrino, Roddy. Cybersecurity 104: Deploying a Framework. Independently Published, 2019.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
18

Isaca. Implementing the NIST Cybersecurity Framework. Information Systems Audit and Control Association, 2014.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
19

MARK A RUSSO CISSP-ISSAP CISO. National Cybersecurity Framework : a Solution for Agile Cybersecurity: Blueprint for Rapid Cybersecurity Implementation. Independently Published, 2018.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
20

Snyder, Don, Ryan Henry, Stacie L. Pettyjohn, Sina Beaghley und Igor Mikolic Torreira. Framework for Exploring Cybersecurity Policy Options. RAND Corporation, The, 2016.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
21

Framework for improving critical infrastructure cybersecurity. [Gaithersburg, Md.]: National Institute of Standards and Technology, 2014.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
22

Cybersecurity Measures for Logistics Industry Framework. IGI Global, 2023.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
23

William Birch (Male Synthesized Voice). NIST Cybersecurity Framework: A Pocket Guide. de Gruyter GmbH, Walter, 2018.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
24

Governance, I. T. NIST Cybersecurity Framework: A Pocket Guide. BCS Learning & Development Limited, 2018.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
25

Cybersecurity Measures for Logistics Industry Framework. IGI Global, 2024.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
26

Cybersecurity Measures for Logistics Industry Framework. IGI Global, 2023.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
27

Vishwanath, Arun. The Weakest Link. The MIT Press, 2022. http://dx.doi.org/10.7551/mitpress/14653.001.0001.

Der volle Inhalt der Quelle
Annotation:
An expert in cybersecurity lays out an evidence-based approach for assessing user cyber risk and achieving organizational cyber resilience. Phishing is the single biggest threat to cybersecurity, persuading even experienced users to click on hyperlinks and attachments in emails that conceal malware. Phishing has been responsible for every major cyber breach, from the infamous Sony hack in 2014 to the 2017 hack of the Democratic National Committee and the more recent Colonial Pipleline breach. The cybersecurity community's response has been intensive user training (often followed by user blaming), which has proven completely ineffective: the hacks keep coming. In The Weakest Link, cybersecurity expert Arun Vishwanath offers a new, evidence-based approach for detecting and defending against phishing—an approach that doesn't rely on continual training and retraining but provides a way to diagnose user vulnerability. Vishwanath explains how organizations can build a culture of cyber safety. He presents a Cyber Risk Survey (CRS) to help managers understand which users are at risk and why. Underlying CRS is the Suspicion, Cognition, Automaticity Model (SCAM), which specifies the user thoughts and actions that lead to either deception by or detection of phishing come-ons. He describes in detail how to implement these frameworks, discussing relevant insights from cognitive and behavioral science, and then presents case studies of organizations that have successfully deployed the CRS to achieve cyber resilience. These range from a growing wealth management company with twenty regional offices to a small Pennsylvania nonprofit with forty-five employees. The Weakest Link will revolutionize the way managers approach cyber security, replacing the current one-size-fits-all methodology with a strategy that targets specific user vulnerabilities.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
28

Brumfield, Cynthia, und Brian Haugli. Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework. Wiley & Sons, Incorporated, John, 2021.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
29

Brumfield, Cynthia, und Brian Haugli. Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework. Wiley & Sons, Incorporated, John, 2021.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
30

Brumfield, Cynthia, und Brian Haugli. Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework. Wiley & Sons, Incorporated, John, 2021.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
31

Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework. Wiley & Sons, Limited, John, 2022.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
32

MARK A RUSSO CISSP-ISSAP CISO. National Cybersecurity Framework 1. 1: For Businesses. Independently Published, 2018.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
33

Ransomware Risk Management : : A Cybersecurity Framework Profile. Independently Published, 2022.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
34

MARK A RUSSO CISSP-ISSAP CISO. National Cybersecurity Framework for Cybersecurity Professionals: A Roadmap for 21st Century Security Sentinels. Independently Published, 2018.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
35

Institute, DVMS. Practitioner's Guide to Adapting the NIST Cybersecurity Framework. Stationery Office, The, 2022.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
36

Blokdyk, Gerardus. NIST Cybersecurity Framework A Complete Guide - 2019 Edition. 5starcooks, 2021.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
37

A Framework for Programming and Budgeting for Cybersecurity. RAND Corporation, 2016.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
38

Shoemaker, Dan. A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0). Auerbach Publications, 2016. http://dx.doi.org/10.1201/b19962.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
39

Shoemaker, Dan, Anne Kohnke und Ken Sigler. Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2. 0). Auerbach Publishers, Incorporated, 2018.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
40

Shoemaker, Dan, Anne Kohnke und Ken Sigler. Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2. 0). Auerbach Publishers, Incorporated, 2018.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
41

Shoemaker, Dan, Kenneth Sigler und Anne Kohnke. Guide to the National Initiative for Cybersecurity Education (nice) Cybersecurity Workforce Framework (2. 0). Taylor & Francis Group, 2020.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
42

Shoemaker, Dan, Anne Kohnke und Ken Sigler. Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2. 0). Auerbach Publishers, Incorporated, 2018.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
43

Shoemaker, Dan, Anne Kohnke und Ken Sigler. Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2. 0). Auerbach Publishers, Incorporated, 2018.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
44

Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2. 0). Taylor & Francis Group, 2016.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
45

TREKS Companion: A Guidebook to the TREKS Cybersecurity Framework. Admittedly Bad Publishing, 2023.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
46

D'Ambrosio, Anastacia. Cybersecurity: Executive Order 13636 and the Critical Infrastructure Framework. Nova Science Publishers, Incorporated, 2014.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
47

National Institute of Standards and Tech. Cybersecurity Framework Smart Grid Profile: NIST Technical Note 2051. Independently Published, 2019.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
48

Brown, Bruce. RMF ISSO : Foundations: NIST 800 Risk Management Framework for Cybersecurity Professionals. Independently Published, 2022.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
49

Cybersecurity for Beginners: How to Apply the NIST Risk Management Framework. Independently Published, 2020.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
50

Mihai, Ioan-Cosmin, Costel Ciuchi und Gabriel Petrica. Cybersecurity - Challenges and Perspectives in Education. Romanian Association for Information Security Assurance, 2020. http://dx.doi.org/10.19107/cybersec-edu.2020.en.

Der volle Inhalt der Quelle
Annotation:
The book emphasises the importance of implementing cybersecurity curricula in the university environment, in order to prepare future experts in the field. The book brings together the contributions of professors, PhD students, researchers, experts and trainers, for the development of a reference framework for education, research and cooperation in the field of cybersecurity.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!

Zur Bibliographie