48,95 €
48,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
24 °P sammeln
48,95 €
48,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
24 °P sammeln
Als Download kaufen
48,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
24 °P sammeln
Jetzt verschenken
48,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
24 °P sammeln
  • Format: ePub

Covering the diverse realms that chief officers need to know and the specifics applicable to singular areas of departmental responsibility, this book provides both the strategic vision and action steps needed to prevent the exploitation of IT security gaps

Produktbeschreibung
Covering the diverse realms that chief officers need to know and the specifics applicable to singular areas of departmental responsibility, this book provides both the strategic vision and action steps needed to prevent the exploitation of IT security gaps


Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.

Autorenporträt
Park Foreman is a Security and Compliance Architect at IBM Cloud Brokerage Services where he designs security controls supporting customers in their migration journey to cloud services. He is a recognized expert in vulnerability management, incident management and cyber security strategy. Park holds a Master of Science degree in information security and assurance and CISSP-ISSAP certification among others. Originally starting his information security experience in college working on operating system kernel security design, he went on to work in application security at Bell Labs and network security in the banking and telecommunications industries. In addition to first and second edition of this book, Park has also published articles in the ISSA Journal and presented at security conferences. At IBM, Park continues to work across business units on developing new technologies and methods to secure cloud services and applications.