• Contact

  • Newsletter

  • About us

  • Delivery options

  • Prospero Book Market Podcast

  • The Computer Incident Response Planning Handbook:  Executable Plans for Protecting Information at Risk

    The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk by McCarthy, N.K.; Todd, Matthew; Klaben, Jeff;

    Series: NETWORKING & COMM - OMG;

      • GET 10% OFF

      • The discount is only available for 'Alert of Favourite Topics' newsletter recipients.
      • Publisher's listprice GBP 65.99
      • The price is estimated because at the time of ordering we do not know what conversion rates will apply to HUF / product currency when the book arrives. In case HUF is weaker, the price increases slightly, in case HUF is stronger, the price goes lower slightly.

        32 566 Ft (31 015 Ft + 5% VAT)
      • Discount 10% (cc. 3 257 Ft off)
      • Discounted price 29 309 Ft (27 914 Ft + 5% VAT)

    32 566 Ft

    db

    Availability

    printed on demand

    Why don't you give exact delivery time?

    Delivery time is estimated on our previous experiences. We give estimations only, because we order from outside Hungary, and the delivery time mainly depends on how quickly the publisher supplies the book. Faster or slower deliveries both happen, but we do our best to supply as quickly as possible.

    Product details:

    • Publisher McGraw Hill
    • Date of Publication 16 September 2012

    • ISBN 9780071790390
    • Binding Paperback
    • No. of pages240 pages
    • Size 231x188x12 mm
    • Weight 396 g
    • Language English
    • 0

    Categories

    Short description:

    Based on real-world incident response plans that work and have survived audits and repeated execution during data breaches and due diligence

    More

    Long description:

    Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality,  authenticity, or access to any online entitlements included with the product.



    Uncertainty and risk, meet planning and action.

    Reinforce your organization?s security posture using the expert information contained in this tactical guide. The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk shows you how to build and manage successful response plans for the cyber incidents that have become inevitable for organizations of any size. Find out why these plans work. Learn the step-by-step process for developing and managing plans built to address the wide range of issues organizations face in times of crisis.

    • Contains the essentials for developing both data breach and malware outbreak response plans?and best practices for maintaining those plans
    • Features ready-to-implement CIRPs?derived from living incident response plans that have survived the rigors of repeated execution and numerous audits
    • Clearly explains how to minimize the risk of post-event litigation, brand impact, fines and penalties?and how to protect shareholder value
    • Supports corporate compliance with industry standards and requirements, including PCI, HIPAA, SOX, and CA SB-24


    Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality,  authenticity, or access to any online entitlements included with the product.



    Uncertainty and risk, meet planning and action.

    Reinforce your organization?s security posture using the expert information contained in this tactical guide. The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk shows you how to build and manage successful response plans for the cyber incidents that have become inevitable for organizations of any size. Find out why these plans work. Learn the step-by-step process for developing and managing plans built to address the wide range of issues organizations face in times of crisis.

    • Contains the essentials for developing both data breach and malware outbreak response plans?and best practices for maintaining those plans
    • Features ready-to-implement CIRPs?derived from living incident response plans that have survived the rigors of repeated execution and numerous audits
    • Clearly explains how to minimize the risk of post-event litigation, brand impact, fines and penalties?and how to protect shareholder value
    • Supports corporate compliance with industry standards and requirements, including PCI, HIPAA, SOX, and CA SB-24

    More

    Table of Contents:

    Introduction: The Latest Cyber Attacks: Business Killers

    Part 1: The Threat Landscape
    Ch 1Introduction to Planning & Crisis
    Ch 2The Nebulous Standard of Cyber Due Diligence & The New Era of Information Risk

    Part 2: Planning for Crisis
    Ch 3A Plan is Preparation Manifested
    Ch 4 Writing Your Computer Incident Response Plan

    Part 3: Plan Development - Data Breach
    Ch 5Your Data Breach CIRP - Incident Preparation
    Ch 6Developing a Data Breach CIRP - Plan Execution
    Ch 7Your Data Breach CIRP - Post Incident Planning & Maintenance

    Part 4: Plan Development - Malware
    Ch 8Your Malware Outbreak CIRP - Incident Preparation
    Ch 9Your Malware Outbreak CIRP - Plan Execution
    Ch 10Your Malware Outbreak CIRP - Post Incident Planning
    Ch 11Closing Thoughts

    More