|刊登類別:
有類似物品要出售?

Solving Cyber Risk: Protecting Your Company and Society by Woo, Gordon Hardback

FREE US DELIVERY | ISBN: 1119490936 | Quality Books
狀況:
很好
庫存 2 件 / 賣出 1 件
價格:
US $7.78
大約HK$ 60.76
運費:
免費 標準運送方式. 查看詳情— 運送
所在地:Florida, 美國
送達日期:
估計於 6月21日, 五6月25日, 二之間送達 運送地點 43230
估計送達日期 — 會在新視窗或分頁中開啟考慮到賣家的處理時間、寄出地郵遞區碼、目的地郵遞區碼、接收包裹時間,並取決於所選的運送方式以及收到全部款項全部款項 — 會在新視窗或分頁中開啟的時間。送達時間會因時而異,尤其是節日。
退貨:
30 日退貨. 由買家支付退貨運費. 查看詳情- 更多退貨相關資訊
保障:
請參閱物品說明或聯絡賣家以取得詳細資料。閱覽全部詳情查看保障詳情
(不符合「eBay 買家保障方案」資格)

賣家資料

註冊為商業賣家
賣家必須承擔此刊登物品的所有責任。
eBay 物品編號:304978728665
上次更新時間: 2024-05-21 21:52:41查看所有版本查看所有版本

物品細節

物品狀況
很好: ...
ISBN
1119490936
EAN
9781119490937
Release Title
Solving Cyber Risk: Protecting Your Company and Society
Artist
Woo, Gordon
Brand
N/A
Colour
N/A
Book Title
Solving Cyber Risk: Protecting Your Company and Society
Subject Area
Computers, Business & Economics
Publication Name
Solving Cyber Risk : Protecting Your Company and Society
Item Length
9.1 in
Publisher
Wiley & Sons, Incorporated, John
Subject
Security / General, Insurance / Risk Assessment & Management
Publication Year
2018
Type
Textbook
Format
Hardcover
Language
English
Item Height
1.6 in
Author
Eireann Leverett, Gordon Woo, Andrew Coburn
Item Width
6.1 in
Item Weight
20 Oz
Number of Pages
384 Pages

關於產品

Product Information

The non-technical handbook for cyber security in the insurance industry Solving Cyber Risk distills a decade of research into a practical framework for cyber security.

Product Identifiers

Publisher
Wiley & Sons, Incorporated, John
ISBN-10
1119490936
ISBN-13
9781119490937
eBay Product ID (ePID)
245104801

Product Key Features

Author
Eireann Leverett, Gordon Woo, Andrew Coburn
Publication Name
Solving Cyber Risk : Protecting Your Company and Society
Format
Hardcover
Language
English
Subject
Security / General, Insurance / Risk Assessment & Management
Publication Year
2018
Type
Textbook
Subject Area
Computers, Business & Economics
Number of Pages
384 Pages

Dimensions

Item Length
9.1 in
Item Height
1.6 in
Item Width
6.1 in
Item Weight
20 Oz

Additional Product Features

LCCN
2018-035611
Intended Audience
Trade
Lc Classification Number
Qa76.9.A25c577 2019
Table of Content
About the Authors ix Acknowledgments xi CHAPTER 1 Counting the Costs of Cyber Attacks 1 1.1 Anatomy of a Data Exfiltration Attack 1 1.2 A Modern Scourge 7 1.3 Cyber Catastrophes 12 1.4 Societal Cyber Threats 19 1.5 Cyber Risk 21 1.6 How Much Does Cyber Risk Cost Our Society? 24 Endnotes 30 CHAPTER 2 Preparing for Cyber Attacks 33 2.1 Cyber Loss Processes 33 2.2 Data Exfiltration 34 2.3 Contagious Malware Infection 41 2.4 Denial of Service Attacks 56 2.5 Financial Theft 63 2.6 Failures of Counterparties or Suppliers 68 Endnotes 78 CHAPTER 3 Cyber Enters the Physical World 81 3.1 A Brief History of Cyber-physical Interactions 81 3.2 Hacking Attacks on Cyber-physical Systems 83 3.3 Components of Cyber-physical Systems 86 3.4 How to Subvert Cyber-physical Systems 88 3.5 How to Cause Damage Remotely 91 3.6 Using Compromises to Take Control 92 3.7 Operating Compromised Systems 93 3.8 Expect the Unexpected 95 3.9 Smart Devices and the Internet of Things 99 Endnotes 101 CHAPTER 4 Ghosts in the Code 103 4.1 All Software Has Errors 103 4.2 Vulnerabilities, Exploits, and Zero Days 104 4.3 Counting Vulnerabilities 108 4.4 Vulnerability Management 113 4.5 International Cyber Response and Defense 118 Endnotes 122 CHAPTER 5 Know Your Enemy 125 5.1 Hackers 125 5.2 Taxonomy of Threat Actors 127 5.3 The Insider Threat 143 5.4 Threat Actors and Cyber Risk 145 5.5 Hackonomics 147 Endnotes 151 CHAPTER 6 Measuring the Cyber Threat 153 6.1 Measurement and Management 153 6.2 Cyber Threat Metrics 158 6.3 Measuring the Threat for an Organization 162 6.4 The Likelihood of Major Cyber Attacks 170 Endnotes 182 CHAPTER 7 Rules, Regulations, and Law Enforcement 183 7.1 Cyber Laws 183 7.2 US Cyber Laws 186 7.3 EU General Data Protection Regulation (GDPR) 190 7.4 Regulation of Cyber Insurance 192 7.5 A Changing Legal Landscape 194 7.6 Compliance and Law Enforcement 196 7.7 Law Enforcement and Cyber Crime 199 Endnotes 205 CHAPTER 8 The Cyber-Resilient Organization 207 8.1 Changing Approaches to Risk Management 207 8.2 Incident Response and Crisis Management 208 8.3 Resilience Engineering 212 8.4 Attributes of a Cyber-resilient Organization 214 8.5 Incident Response Planning 218 8.6 Resilient Security Solutions 219 8.7 Financial Resilience 225 Endnotes 234 CHAPTER 9 Cyber Insurance 235 9.1 Buying Cyber Insurance 235 9.2 The Cyber Insurance Market 244 9.3 Cyber Catastrophe Risk 248 9.4 Managing Portfolios of Cyber Insurance 251 9.5 Cyber Insurance Underwriting 258 9.6 Cyber Insurance and Risk Management 263 Endnotes 264 CHAPTER 10 Security Economics and Strategies 267 10.1 Cost-Effectiveness of Security Enhancements 267 10.2 Cyber Security Budgets 271 10.3 Security Strategies for Society 276 10.4 Strategies of Cyber Attack 283 10.5 Strategies of National Cyber Defense 289 Endnotes 294 CHAPTER 11 Ten Cyber Problems 295 11.1 Setting Problems 295 1 The Canal Safety Decision Problem 298 2 The Software Dependency Problem 300 3 The Vulnerability Inheritance Problem 301 4 The Vulnerability Count Problem 302 5 The Malware Overlap Problem 303 6 The Vulnerability Lifespan Problem 304 7 The Binary Similarity Problem 304 8 The Virus Modification Problem 306 9 The Cyber Criminal''s Dilemma Problem 306 10 The Security Verification Problem 307 Endnotes 308 CHAPTER 12 Cyber Future 309 12.1 Cybergeddon 309 12.2 Cybertopia 315 12.3 Future Technology Trends 321 12.4 Getting the Cyber Risk Future We Want 328 Endnotes 331 References 333 Index 355
Copyright Date
2019
Dewey Decimal
005.8
Dewey Edition
23
Illustrated
Yes

賣家提供的物品說明

商業賣家資料

增值稅識別編號:
  • GB 922696893
World of Books USA

World of Books USA

94.9% 正面信用評價
已賣出 464.5 萬 件物品
瀏覽商店聯絡
通常在 24 小時內回覆

詳盡賣家評級

過去 12 個月的平均評級

說明準確
4.8
運費合理
5.0
運送速度
4.5
溝通
4.9

賣家信用評價 (1,413,833)

6***3 (49)- 買家留下的信用評價。
過去 1 個月
購買已獲認證
Amazing! I am very happy. I recommend this seller.
查看所有信用評價