36,95 €
36,95 €
inkl. MwSt.
Sofort per Download lieferbar
18 °P sammeln
36,95 €
Als Download kaufen
36,95 €
inkl. MwSt.
Sofort per Download lieferbar
18 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
36,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
18 °P sammeln
- Format: ePub
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
IT and cybersecurity teams have had a long-standing battle between functionality and security. To understand where the problem lies, this book will explore the different job functions, goals, relationships, and other factors that may impact how IT and cybersecurity teams interact.
- Geräte: eReader
- ohne Kopierschutz
- eBook Hilfe
- Größe: 3.37MB
Andere Kunden interessierten sich auch für
- Nikki RobinsonMind the Tech Gap (eBook, PDF)36,95 €
- Cybersecurity for Decision Makers (eBook, ePUB)47,95 €
- Peter FaganThe Business of Cyber (eBook, ePUB)47,95 €
- Valerie LyonsThe Privacy Leader Compass (eBook, ePUB)47,95 €
- Ken DunhamCyber CISO Marksmanship (eBook, ePUB)47,95 €
- Jim SeamanSecurity Risk Management - The Driving Force for Operational Resilience (eBook, ePUB)47,95 €
- Shimon BrathwaiteWhat To Do When You Get Hacked (eBook, ePUB)40,95 €
-
-
-
IT and cybersecurity teams have had a long-standing battle between functionality and security. To understand where the problem lies, this book will explore the different job functions, goals, relationships, and other factors that may impact how IT and cybersecurity teams interact.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis
- Seitenzahl: 214
- Erscheinungstermin: 5. Oktober 2022
- Englisch
- ISBN-13: 9781000647884
- Artikelnr.: 65249748
- Verlag: Taylor & Francis
- Seitenzahl: 214
- Erscheinungstermin: 5. Oktober 2022
- Englisch
- ISBN-13: 9781000647884
- Artikelnr.: 65249748
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Nikki Robinson is Cyber Woman Influencer of the Year 2023! She earned a DSc in Cybersecurity, several industry certifications including CISSP, and is a Security Architect by day, and an Adjunct Professor at night. She had more than 10 years of experience in IT operations before moving into the security field about 3 years ago. She studied vulnerability chaining concepts and completed her PhD in Human Factors to combine psychological and technical aspects to improve security programs. She has a passion for teaching and mentoring others on risk management, network defense strategies, and DFIR. She is currently a Security Architect and has technical experience in continuous monitoring, risk management, digital forensics, and incident response. She has spoken at several conferences on a variety of topics from human factors security engineering, malicious website graphing, and DevSecOps.
Chapter 1: Background of IT and Cybersecurity Fields
Chapter 2: Roles and Responsibilities in IT
Chapter 3: Roles and Responsibilities in Cybersecurity
Chapter 4: Where IT Meets Cybersecurity
Chapter 5: The Disconnect (IT vs Cybersecurity)
Chapter 6: Separation of Duties
Chapter 7: Management Interference
Chapter 8: Financial Issues and Responsibilities
Chapter 9: Education Gaps Between IT and Cybersecurity
Chapter 10: Bridging the Technology and Cybersecurity Gap
Chapter 11: Embracing Functionality and Security
Chapter 12: Creating New Roles
Chapter 13: Building Trust and New Relationships
Chapter 14: Path Forward
Chapter 2: Roles and Responsibilities in IT
Chapter 3: Roles and Responsibilities in Cybersecurity
Chapter 4: Where IT Meets Cybersecurity
Chapter 5: The Disconnect (IT vs Cybersecurity)
Chapter 6: Separation of Duties
Chapter 7: Management Interference
Chapter 8: Financial Issues and Responsibilities
Chapter 9: Education Gaps Between IT and Cybersecurity
Chapter 10: Bridging the Technology and Cybersecurity Gap
Chapter 11: Embracing Functionality and Security
Chapter 12: Creating New Roles
Chapter 13: Building Trust and New Relationships
Chapter 14: Path Forward
Chapter 1: Background of IT and Cybersecurity Fields
Chapter 2: Roles and Responsibilities in IT
Chapter 3: Roles and Responsibilities in Cybersecurity
Chapter 4: Where IT Meets Cybersecurity
Chapter 5: The Disconnect (IT vs Cybersecurity)
Chapter 6: Separation of Duties
Chapter 7: Management Interference
Chapter 8: Financial Issues and Responsibilities
Chapter 9: Education Gaps Between IT and Cybersecurity
Chapter 10: Bridging the Technology and Cybersecurity Gap
Chapter 11: Embracing Functionality and Security
Chapter 12: Creating New Roles
Chapter 13: Building Trust and New Relationships
Chapter 14: Path Forward
Chapter 2: Roles and Responsibilities in IT
Chapter 3: Roles and Responsibilities in Cybersecurity
Chapter 4: Where IT Meets Cybersecurity
Chapter 5: The Disconnect (IT vs Cybersecurity)
Chapter 6: Separation of Duties
Chapter 7: Management Interference
Chapter 8: Financial Issues and Responsibilities
Chapter 9: Education Gaps Between IT and Cybersecurity
Chapter 10: Bridging the Technology and Cybersecurity Gap
Chapter 11: Embracing Functionality and Security
Chapter 12: Creating New Roles
Chapter 13: Building Trust and New Relationships
Chapter 14: Path Forward
Chapter 1: Background of IT and Cybersecurity Fields
Chapter 2: Roles and Responsibilities in IT
Chapter 3: Roles and Responsibilities in Cybersecurity
Chapter 4: Where IT Meets Cybersecurity
Chapter 5: The Disconnect (IT vs Cybersecurity)
Chapter 6: Separation of Duties
Chapter 7: Management Interference
Chapter 8: Financial Issues and Responsibilities
Chapter 9: Education Gaps Between IT and Cybersecurity
Chapter 10: Bridging the Technology and Cybersecurity Gap
Chapter 11: Embracing Functionality and Security
Chapter 12: Creating New Roles
Chapter 13: Building Trust and New Relationships
Chapter 14: Path Forward
Chapter 2: Roles and Responsibilities in IT
Chapter 3: Roles and Responsibilities in Cybersecurity
Chapter 4: Where IT Meets Cybersecurity
Chapter 5: The Disconnect (IT vs Cybersecurity)
Chapter 6: Separation of Duties
Chapter 7: Management Interference
Chapter 8: Financial Issues and Responsibilities
Chapter 9: Education Gaps Between IT and Cybersecurity
Chapter 10: Bridging the Technology and Cybersecurity Gap
Chapter 11: Embracing Functionality and Security
Chapter 12: Creating New Roles
Chapter 13: Building Trust and New Relationships
Chapter 14: Path Forward
Chapter 1: Background of IT and Cybersecurity Fields
Chapter 2: Roles and Responsibilities in IT
Chapter 3: Roles and Responsibilities in Cybersecurity
Chapter 4: Where IT Meets Cybersecurity
Chapter 5: The Disconnect (IT vs Cybersecurity)
Chapter 6: Separation of Duties
Chapter 7: Management Interference
Chapter 8: Financial Issues and Responsibilities
Chapter 9: Education Gaps Between IT and Cybersecurity
Chapter 10: Bridging the Technology and Cybersecurity Gap
Chapter 11: Embracing Functionality and Security
Chapter 12: Creating New Roles
Chapter 13: Building Trust and New Relationships
Chapter 14: Path Forward
Chapter 2: Roles and Responsibilities in IT
Chapter 3: Roles and Responsibilities in Cybersecurity
Chapter 4: Where IT Meets Cybersecurity
Chapter 5: The Disconnect (IT vs Cybersecurity)
Chapter 6: Separation of Duties
Chapter 7: Management Interference
Chapter 8: Financial Issues and Responsibilities
Chapter 9: Education Gaps Between IT and Cybersecurity
Chapter 10: Bridging the Technology and Cybersecurity Gap
Chapter 11: Embracing Functionality and Security
Chapter 12: Creating New Roles
Chapter 13: Building Trust and New Relationships
Chapter 14: Path Forward