Cyber Intelligence-Driven Risk. Richard O. Moore, III

Cyber Intelligence-Driven Risk - Richard O. Moore, III


Скачать книгу
href="#ulink_4ad70acf-36eb-5bc0-b975-0416d914d3e9">105

      118  106

      119  107

      120  108

      121  109

      122  110

      123  111

      124  112

      125  113

      126  114

      127  115

      128  116

      129  117

      130  118

      131  119

      132  120

      133  121

      134  122

      135  123

      136 124

      137  125

      138 126

      139  127

      140  128

      141  129

      142  130

      143  131

      144  132

      145 133

      146  135

      147  136

      148  137

      149  139

      150  140

      151  141

      152  142

      153  143

      154  144

      155  145

      156  146

      157  147

      158  149

      159 150

      160 151

      161 152

      162 153

      163 154

      164 155

      165 156

      166 157

      167 158

      168 159

      169 160

      170 161

      171  162

       How to Build and Use Cyber Intelligence for Business Risk Decisions

       RICHARD O. MOORE III, MSIA, CISSP, CISM

      Published by John Wiley & Sons, Inc., Hoboken, New Jersey.

      Published simultaneously in Canada.

      No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600, or on the Web at www.copyright.com. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at www.wiley.com/go/permissions.

      Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this book, they make no representations or warranties with respect to the accuracy or completeness of the contents of this book and specifically disclaim any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives or written sales materials. The advice and strategies contained herein may not be suitable for your situation. You should consult with a professional where appropriate. Neither the publisher nor author shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages.

      For general information on our other products and services or for technical support, please contact our Customer Care Department within the United States at (800) 762-2974, outside the United States at (317) 572-3993, or fax (317) 572-4002.

      Wiley publishes in a variety of print and electronic formats and by print-on-demand. Some material included with standard print versions of this book may not be included in e-books or in print-on-demand. If this book refers to media such as a CD or DVD that is not included in the version you purchased, you may download this material at http://booksupport.wiley.com. For more information about Wiley products, visit www.wiley.com.

      Library of Congress Cataloging-in-Publication Data

      Names: Moore, Richard O., III, 1971- author.

      Title: Cyber intelligence-driven risk : how to build and use cyber intelligence for business risk decisions / by Richard O. Moore III, MSIA, CISSP, CISM.

      Description: Hoboken, New Jersey : John Wiley & Sons, [2021] | Includes bibliographical references and index.

      Identifiers: LCCN 2020035540 (print) | LCCN 2020035541 (ebook) | ISBN 9781119676843 (cloth) | ISBN 9781119676911 (adobe pdf) | ISBN 9781119676898 (epub)

      Subjects: LCSH: Business enterprises—Security measures. | Data protection. | Cyber intelligence (Computer security) | Risk management.

      Classification: LCC HD61.5 .M66 2021 (print) | LCC HD61.5 (ebook) | DDC 658.15/5–dc23

      LC record available at https://lccn.loc.gov/2020035540

      LC ebook record available at https://lccn.loc.gov/2020035541

      Cover Design: Wiley

      Cover Image: © whiteMocca/Getty Images

      Knowing is different from doing, and therefore theory must never be used as norms for a standard, but merely as aids to judgment.

      


Скачать книгу