Skip to content
You are not logged in |Login  

LEADER 00000nam a2200457Ii 4500 
001    on1098174236 
003    OCoLC 
005    20190423100419.0 
008    190423t20182018xxua          001 0 eng d 
020    9781549836534 
020    1549836536 
035    (OCoLC)1098174236 
040    RID|beng|erda|cRID 
049    RIDM 
050 14 QA76.9.A25|bG757 2018 
082 04 005.8|223 
090    QA76.9.A25|bG757 2018 
100 1  Grimes, Roger A.,|0https://id.loc.gov/authorities/names/
       n2001000539|eauthor. 
245 12 A data-driven computer security defense :|bTHE computer 
       security defense you should be using /|cRoger A. Grimes. 
250    Edition 1.1. 
264  1 [United States?] :|b[publisher not identified]|c[2018] 
264  4 |c©2018 
300    xvi, 224 pages ;|c23 cm 
336    text|btxt|2rdacontent 
337    unmediated|bn|2rdamedia 
338    volume|bnc|2rdacarrier 
500    "Foreward [sic] by Dr. Dorothy E. Denning, Emeritus 
       Distinguished Professor, Department of Defense Analysis 
       Naval Postgraduate School"--Cover. 
500    Includes index. 
500    "Recommended Related Reading" : pages 216-217. 
505 0  Introduction -- How and why hackers hack -- Broken 
       defenses -- How to fix broken defenses -- Getting better 
       data -- Benefits of a data-driven defense -- The data-
       driven computer security lifecycle-- Implementation 
       examples -- Getting from here to there -- Answers to 
       common questions. 
520    Today, most companies are either completely hacked or 
       could easily be hacked. Things are so bad that traditional
       defenses are operating under an assumption of "Assume 
       Breach." The truth is that most companies are not doing 
       the right things in the right places, making it easier for
       hackers and malware to infiltrate an organization than it 
       needs to be. Most companies are highly inefficient at 
       computer security defense, and wonder why they are still 
       so easily hackable while at the same time throwing ever 
       growing amounts of capital, resources, and people at the 
       problem. It doesn't have to be this way. [This book] 
       describes what's wrong with the current defenses and how 
       they got this way. It then tells how to create a better, 
       more efficient defense where remediations are right-
       aligned against the biggest threats they are supposed to 
       defeat, with prescriptive guidance. The guidance is then 
       followed by real-life examples of what other companies 
       have done to get a better, data-driven defense. After you 
       read [this book] you'll never think about computer 
       security the same way again"--Page [4] of cover. 
650  0 Computer security.|0https://id.loc.gov/authorities/
       subjects/sh90001862 
650  0 Computer networks|xSecurity measures.|0https://id.loc.gov/
       authorities/subjects/sh94001277 
650  7 Computer security.|2fast|0https://id.worldcat.org/fast/
       872484 
650  7 Computer networks|xSecurity measures.|2fast|0https://
       id.worldcat.org/fast/872341 
901    MARCIVE 20231220 
948    |d20190423|cMH|tconsult orig|lridm 
994    C0|bRID 
Location Call No. Status OPAC Message Public Note Gift Note
 Moore Stacks  QA76.9.A25 G757 2018    Available  ---