The Cyber Security Handbook最新文献

筛选
英文 中文
STEP 5 – ESTABLISH A CONTINUAL IMPROVEMENT MODEL 第五步-建立持续改进模型
The Cyber Security Handbook Pub Date : 2020-12-10 DOI: 10.2307/j.ctv19shhms.25
{"title":"STEP 5 – ESTABLISH A CONTINUAL IMPROVEMENT MODEL","authors":"","doi":"10.2307/j.ctv19shhms.25","DOIUrl":"https://doi.org/10.2307/j.ctv19shhms.25","url":null,"abstract":"","PeriodicalId":314085,"journal":{"name":"The Cyber Security Handbook","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123912095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
STEP 8 – MEASURE AND REVIEW PERFORMANCE 步骤8 -衡量和回顾绩效
The Cyber Security Handbook Pub Date : 2020-12-10 DOI: 10.2307/j.ctv19shhms.28
{"title":"STEP 8 – MEASURE AND REVIEW PERFORMANCE","authors":"","doi":"10.2307/j.ctv19shhms.28","DOIUrl":"https://doi.org/10.2307/j.ctv19shhms.28","url":null,"abstract":"","PeriodicalId":314085,"journal":{"name":"The Cyber Security Handbook","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116266235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
STEP 7 – SELECT AND IMPLEMENT CONTROLS 步骤7 -选择和实现控件
The Cyber Security Handbook Pub Date : 2020-12-10 DOI: 10.2307/j.ctv19shhms.27
{"title":"STEP 7 – SELECT AND IMPLEMENT CONTROLS","authors":"","doi":"10.2307/j.ctv19shhms.27","DOIUrl":"https://doi.org/10.2307/j.ctv19shhms.27","url":null,"abstract":"","PeriodicalId":314085,"journal":{"name":"The Cyber Security Handbook","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134123619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TECHNICAL THREATS 技术威胁
The Cyber Security Handbook Pub Date : 2020-12-10 DOI: 10.2307/j.ctv19shhms.10
{"title":"TECHNICAL THREATS","authors":"","doi":"10.2307/j.ctv19shhms.10","DOIUrl":"https://doi.org/10.2307/j.ctv19shhms.10","url":null,"abstract":"","PeriodicalId":314085,"journal":{"name":"The Cyber Security Handbook","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131460427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MANAGE AND PROTECT 管理和保护
The Cyber Security Handbook Pub Date : 2020-12-10 DOI: 10.2307/j.ctv19shhms.15
{"title":"MANAGE AND PROTECT","authors":"","doi":"10.2307/j.ctv19shhms.15","DOIUrl":"https://doi.org/10.2307/j.ctv19shhms.15","url":null,"abstract":"","PeriodicalId":314085,"journal":{"name":"The Cyber Security Handbook","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132389088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
STEP 4 – DEFINE CURRENT AND IDEAL TARGET STATES 步骤4 -定义当前和理想的目标状态
The Cyber Security Handbook Pub Date : 2020-12-10 DOI: 10.2307/j.ctv19shhms.24
{"title":"STEP 4 – DEFINE CURRENT AND IDEAL TARGET STATES","authors":"","doi":"10.2307/j.ctv19shhms.24","DOIUrl":"https://doi.org/10.2307/j.ctv19shhms.24","url":null,"abstract":"","PeriodicalId":314085,"journal":{"name":"The Cyber Security Handbook","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125499860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GRC INTERNATIONAL GROUP RESOURCES GRC国际集团资源
The Cyber Security Handbook Pub Date : 2020-12-10 DOI: 10.2307/j.ctv19shhms.38
{"title":"GRC INTERNATIONAL GROUP RESOURCES","authors":"","doi":"10.2307/j.ctv19shhms.38","DOIUrl":"https://doi.org/10.2307/j.ctv19shhms.38","url":null,"abstract":"","PeriodicalId":314085,"journal":{"name":"The Cyber Security Handbook","volume":"46 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121256580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
THE THREAT LANDSCAPE 威胁形势
The Cyber Security Handbook Pub Date : 2020-12-10 DOI: 10.2307/j.ctv19shhms.4
{"title":"THE THREAT LANDSCAPE","authors":"","doi":"10.2307/j.ctv19shhms.4","DOIUrl":"https://doi.org/10.2307/j.ctv19shhms.4","url":null,"abstract":"","PeriodicalId":314085,"journal":{"name":"The Cyber Security Handbook","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125360832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
IDENTIFY AND DETECT 识别和检测
The Cyber Security Handbook Pub Date : 2020-12-10 DOI: 10.2307/j.ctv19shhms.16
{"title":"IDENTIFY AND DETECT","authors":"","doi":"10.2307/j.ctv19shhms.16","DOIUrl":"https://doi.org/10.2307/j.ctv19shhms.16","url":null,"abstract":"","PeriodicalId":314085,"journal":{"name":"The Cyber Security Handbook","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123249255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
STEP 2 – DETERMINE REQUIREMENTS AND OBJECTIVES 步骤2 -确定需求和目标
The Cyber Security Handbook Pub Date : 2020-12-10 DOI: 10.2307/j.ctv19shhms.22
{"title":"STEP 2 – DETERMINE REQUIREMENTS AND OBJECTIVES","authors":"","doi":"10.2307/j.ctv19shhms.22","DOIUrl":"https://doi.org/10.2307/j.ctv19shhms.22","url":null,"abstract":"","PeriodicalId":314085,"journal":{"name":"The Cyber Security Handbook","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123581552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信