
The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk
Series: NETWORKING & COMM - OMG;
- Publisher's listprice GBP 65.99
-
The price is estimated because at the time of ordering we do not know what conversion rates will apply to HUF / product currency when the book arrives. In case HUF is weaker, the price increases slightly, in case HUF is stronger, the price goes lower slightly.
- Discount 10% (cc. 3 257 Ft off)
- Discounted price 29 309 Ft (27 914 Ft + 5% VAT)
Subcribe now and take benefit of a favourable price.
Subscribe
32 566 Ft
Availability
printed on demand
Why don't you give exact delivery time?
Delivery time is estimated on our previous experiences. We give estimations only, because we order from outside Hungary, and the delivery time mainly depends on how quickly the publisher supplies the book. Faster or slower deliveries both happen, but we do our best to supply as quickly as possible.
Product details:
- Publisher McGraw Hill
- Date of Publication 16 September 2012
- ISBN 9780071790390
- Binding Paperback
- No. of pages240 pages
- Size 231x188x12 mm
- Weight 396 g
- Language English 0
Categories
Short description:
Based on real-world incident response plans that work and have survived audits and repeated execution during data breaches and due diligence
MoreLong description:
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
Uncertainty and risk, meet planning and action.
Reinforce your organization?s security posture using the expert information contained in this tactical guide. The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk shows you how to build and manage successful response plans for the cyber incidents that have become inevitable for organizations of any size. Find out why these plans work. Learn the step-by-step process for developing and managing plans built to address the wide range of issues organizations face in times of crisis.
- Contains the essentials for developing both data breach and malware outbreak response plans?and best practices for maintaining those plans
- Features ready-to-implement CIRPs?derived from living incident response plans that have survived the rigors of repeated execution and numerous audits
- Clearly explains how to minimize the risk of post-event litigation, brand impact, fines and penalties?and how to protect shareholder value
- Supports corporate compliance with industry standards and requirements, including PCI, HIPAA, SOX, and CA SB-24
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
Uncertainty and risk, meet planning and action.
Reinforce your organization?s security posture using the expert information contained in this tactical guide. The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk shows you how to build and manage successful response plans for the cyber incidents that have become inevitable for organizations of any size. Find out why these plans work. Learn the step-by-step process for developing and managing plans built to address the wide range of issues organizations face in times of crisis.
- Contains the essentials for developing both data breach and malware outbreak response plans?and best practices for maintaining those plans
- Features ready-to-implement CIRPs?derived from living incident response plans that have survived the rigors of repeated execution and numerous audits
- Clearly explains how to minimize the risk of post-event litigation, brand impact, fines and penalties?and how to protect shareholder value
- Supports corporate compliance with industry standards and requirements, including PCI, HIPAA, SOX, and CA SB-24
Table of Contents:
Introduction: The Latest Cyber Attacks: Business Killers
Part 1: The Threat Landscape
Ch 1Introduction to Planning & Crisis
Ch 2The Nebulous Standard of Cyber Due Diligence & The New Era of Information Risk
Part 2: Planning for Crisis
Ch 3A Plan is Preparation Manifested
Ch 4 Writing Your Computer Incident Response Plan
Part 3: Plan Development - Data Breach
Ch 5Your Data Breach CIRP - Incident Preparation
Ch 6Developing a Data Breach CIRP - Plan Execution
Ch 7Your Data Breach CIRP - Post Incident Planning & Maintenance
Part 4: Plan Development - Malware
Ch 8Your Malware Outbreak CIRP - Incident Preparation
Ch 9Your Malware Outbreak CIRP - Plan Execution
Ch 10Your Malware Outbreak CIRP - Post Incident Planning
Ch 11Closing Thoughts