To see the other types of publications on this topic, follow the link: Cybersecurity frameworks.

Books on the topic 'Cybersecurity frameworks'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Cybersecurity frameworks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

United States. Congress. House. Committee on Homeland Security. Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies. Oversight of Executive Order 13636 and development of the cybersecurity framework: Hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Thirteenth Congress, first session, July 18, 2013. Washington: U.S. Government Printing Office, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Maksurov, Aleksey. Ensuring information security on the Internet. ru: INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1942595.

Full text
Abstract:
The monograph examines the features of legal relations in the field of information security in the global information space. The concept of "cybersecurity" is investigated, the institutional independence of the norms of law on ensuring security in the cyber environment is substantiated from the point of view of the subject and method of legal regulation. Considerable attention is paid to the characteristics of the sources of law on ensuring information security on the Internet. Substantial proposals have been made to improve legal regulation in this area both at the national (primarily Russian) and international levels. A technological approach has been applied to the consideration of security issues in the global information space, within the framework of which the organizational, technical and legal principles of ensuring information security in cyberspace, as well as ways and means of ensuring security in the global information space have been studied. It is given not only an assessment of the level of use of funds, their interrelation and mutual complement, but also the legal characteristics of security tools in the global information space, for example cryptographic. The resources allocated for the implementation of the type of legal technology under study that were not previously allocated in the legal literature, for example, scientific and economic. The features of the protection of personal information on the Internet are considered, as well as modern problems of legal security in the global information environment, including cybersecurity in banking, healthcare, and biometric data security. The problems of international cooperation in the field of information security are highlighted. For a wide range of readers interested in information security issues. It can be useful for students, postgraduates and teachers of law schools and faculties.
APA, Harvard, Vancouver, ISO, and other styles
3

Shah, Imdad Ali, Samina Rajper, and Noor Zaman. Cybersecurity Measures for e-Government Frameworks. IGI Global, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zaman, Noor, Imdad Ali Shah, and Samina Rajper, eds. Cybersecurity Measures for E-Government Frameworks. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-7998-9624-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Shah, Imdad Ali, Samina Rajper, and Noor Zaman. Cybersecurity Measures for e-Government Frameworks. IGI Global, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Shah, Imdad Ali, Samina Rajper, and Noor Zaman. Cybersecurity Measures for e-Government Frameworks. IGI Global, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Shah, Imdad Ali, Samina Rajper, and Noor Zaman. Cybersecurity Measures for e-Government Frameworks. IGI Global, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Shah, Imdad Ali, Samina Rajper, and Noor Zaman. Cybersecurity Measures for e-Government Frameworks. IGI Global, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Belli, Luca. CyberBRICS: Mapping Cybersecurity Frameworks in the BRICS. Springer International Publishing AG, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Quest to Cyber Superiority: Cybersecurity Regulations, Frameworks, and Strategies of Major Economies. Springer, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Kshetri, Nir. Quest to Cyber Superiority: Cybersecurity Regulations, Frameworks, and Strategies of Major Economies. Springer London, Limited, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Kshetri, Nir. The Quest to Cyber Superiority: Cybersecurity Regulations, Frameworks, and Strategies of Major Economies. Springer, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Osei-Bryson, Kweku-Muata, Corlane Barclay, and Charlette Donalds. Cybercrime and Cybersecurity in the Global South: Concepts, Strategies, and Frameworks for Greater Resilience. CRC Press LLC, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Cybercrime and Cybersecurity in the Global South: Concepts, Strategies, and Frameworks for Greater Resilience. CRC Press LLC, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Osei-Bryson, Kweku-Muata, Corlane Barclay, and Charlette Donalds. Cybercrime and Cybersecurity in the Global South: Concepts, Strategies, and Frameworks for Greater Resilience. CRC Press LLC, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Osei-Bryson, Kweku-Muata, Corlane Barclay, and Charlette Donalds. Cybercrime and Cybersecurity in the Global South: Concepts, Strategies, and Frameworks for Greater Resilience. CRC Press LLC, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Dambrino, Roddy. Cybersecurity 104: Deploying a Framework. Independently Published, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Isaca. Implementing the NIST Cybersecurity Framework. Information Systems Audit and Control Association, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

MARK A RUSSO CISSP-ISSAP CISO. National Cybersecurity Framework : a Solution for Agile Cybersecurity: Blueprint for Rapid Cybersecurity Implementation. Independently Published, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Snyder, Don, Ryan Henry, Stacie L. Pettyjohn, Sina Beaghley, and Igor Mikolic Torreira. Framework for Exploring Cybersecurity Policy Options. RAND Corporation, The, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Framework for improving critical infrastructure cybersecurity. [Gaithersburg, Md.]: National Institute of Standards and Technology, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Cybersecurity Measures for Logistics Industry Framework. IGI Global, 2023.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

William Birch (Male Synthesized Voice). NIST Cybersecurity Framework: A Pocket Guide. de Gruyter GmbH, Walter, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Governance, I. T. NIST Cybersecurity Framework: A Pocket Guide. BCS Learning & Development Limited, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Cybersecurity Measures for Logistics Industry Framework. IGI Global, 2024.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Cybersecurity Measures for Logistics Industry Framework. IGI Global, 2023.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Vishwanath, Arun. The Weakest Link. The MIT Press, 2022. http://dx.doi.org/10.7551/mitpress/14653.001.0001.

Full text
Abstract:
An expert in cybersecurity lays out an evidence-based approach for assessing user cyber risk and achieving organizational cyber resilience. Phishing is the single biggest threat to cybersecurity, persuading even experienced users to click on hyperlinks and attachments in emails that conceal malware. Phishing has been responsible for every major cyber breach, from the infamous Sony hack in 2014 to the 2017 hack of the Democratic National Committee and the more recent Colonial Pipleline breach. The cybersecurity community's response has been intensive user training (often followed by user blaming), which has proven completely ineffective: the hacks keep coming. In The Weakest Link, cybersecurity expert Arun Vishwanath offers a new, evidence-based approach for detecting and defending against phishing—an approach that doesn't rely on continual training and retraining but provides a way to diagnose user vulnerability. Vishwanath explains how organizations can build a culture of cyber safety. He presents a Cyber Risk Survey (CRS) to help managers understand which users are at risk and why. Underlying CRS is the Suspicion, Cognition, Automaticity Model (SCAM), which specifies the user thoughts and actions that lead to either deception by or detection of phishing come-ons. He describes in detail how to implement these frameworks, discussing relevant insights from cognitive and behavioral science, and then presents case studies of organizations that have successfully deployed the CRS to achieve cyber resilience. These range from a growing wealth management company with twenty regional offices to a small Pennsylvania nonprofit with forty-five employees. The Weakest Link will revolutionize the way managers approach cyber security, replacing the current one-size-fits-all methodology with a strategy that targets specific user vulnerabilities.
APA, Harvard, Vancouver, ISO, and other styles
28

Brumfield, Cynthia, and Brian Haugli. Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework. Wiley & Sons, Incorporated, John, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Brumfield, Cynthia, and Brian Haugli. Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework. Wiley & Sons, Incorporated, John, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Brumfield, Cynthia, and Brian Haugli. Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework. Wiley & Sons, Incorporated, John, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework. Wiley & Sons, Limited, John, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

MARK A RUSSO CISSP-ISSAP CISO. National Cybersecurity Framework 1. 1: For Businesses. Independently Published, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Ransomware Risk Management : : A Cybersecurity Framework Profile. Independently Published, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

MARK A RUSSO CISSP-ISSAP CISO. National Cybersecurity Framework for Cybersecurity Professionals: A Roadmap for 21st Century Security Sentinels. Independently Published, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Institute, DVMS. Practitioner's Guide to Adapting the NIST Cybersecurity Framework. Stationery Office, The, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Blokdyk, Gerardus. NIST Cybersecurity Framework A Complete Guide - 2019 Edition. 5starcooks, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

A Framework for Programming and Budgeting for Cybersecurity. RAND Corporation, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Shoemaker, Dan. A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0). Auerbach Publications, 2016. http://dx.doi.org/10.1201/b19962.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Shoemaker, Dan, Anne Kohnke, and Ken Sigler. Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2. 0). Auerbach Publishers, Incorporated, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Shoemaker, Dan, Anne Kohnke, and Ken Sigler. Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2. 0). Auerbach Publishers, Incorporated, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Shoemaker, Dan, Kenneth Sigler, and Anne Kohnke. Guide to the National Initiative for Cybersecurity Education (nice) Cybersecurity Workforce Framework (2. 0). Taylor & Francis Group, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Shoemaker, Dan, Anne Kohnke, and Ken Sigler. Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2. 0). Auerbach Publishers, Incorporated, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Shoemaker, Dan, Anne Kohnke, and Ken Sigler. Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2. 0). Auerbach Publishers, Incorporated, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2. 0). Taylor & Francis Group, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

TREKS Companion: A Guidebook to the TREKS Cybersecurity Framework. Admittedly Bad Publishing, 2023.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

D'Ambrosio, Anastacia. Cybersecurity: Executive Order 13636 and the Critical Infrastructure Framework. Nova Science Publishers, Incorporated, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

National Institute of Standards and Tech. Cybersecurity Framework Smart Grid Profile: NIST Technical Note 2051. Independently Published, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Brown, Bruce. RMF ISSO : Foundations: NIST 800 Risk Management Framework for Cybersecurity Professionals. Independently Published, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Cybersecurity for Beginners: How to Apply the NIST Risk Management Framework. Independently Published, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Mihai, Ioan-Cosmin, Costel Ciuchi, and Gabriel Petrica. Cybersecurity - Challenges and Perspectives in Education. Romanian Association for Information Security Assurance, 2020. http://dx.doi.org/10.19107/cybersec-edu.2020.en.

Full text
Abstract:
The book emphasises the importance of implementing cybersecurity curricula in the university environment, in order to prepare future experts in the field. The book brings together the contributions of professors, PhD students, researchers, experts and trainers, for the development of a reference framework for education, research and cooperation in the field of cybersecurity.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography