The Cybersecurity Handbook

The Cybersecurity Handbook

This easy-to-read book provides a high level introduction for non-technical executives of an organization to some of the issues surrounding cybersecurity. In particular, this book will convey why the organization should retain professional cybersecurity experts to advise on the particular requirements of the organization.

Companies must hire professional cybersecurity experts and rely solely on their professional advice. Cybersecurity involves a vast number of detailed and complicated issues. A detailed discussion would be many extremely thick books that would be almost unintelligible to a non-technical person. Cybersecurity is a profession that takes many years of study and hands-on experience. It continually evolves.

This book will help executives better understand: some of the key issues involved, why to hire cybersecurity professionals, what those professionals are recommending, and what questions to ask them. It is a non-technical introduction to the actual practice of cybersecurity.

要查看或添加评论,请登录

Bob Seeman的更多文章

  • Creaction

    Creaction

    Creaction is creativity plus action This book, available on Amazon, includes 100 famous quotations about the…

    1 条评论
  • Be silent and listen

    Be silent and listen

    Is it just a coincidence that the words "Silent" and "Listen" contain the same letters? The keys to success are: be…

    1 条评论
  • Money is Trust

    Money is Trust

    This easy-to-read book contains famous quotations and jokes about money and trust, including: “A nickel ain’t worth a…

  • Reward Risk

    Reward Risk

    A book of famous quotations, commentary and humor about risk, courage, bravery, and decision-making. "Opportunity is…

  • Brevity

    Brevity

    A brief book of famous quotations on brevity.

  • Artificial Intelligentsia

    Artificial Intelligentsia

    With the release of ChatGPT at the end of 2022, artificial intelligence – or AI – became all the rage. This book…

    1 条评论
  • WHO AM I NOT?

    WHO AM I NOT?

    The provision of most online services requires the user to have a unique digital identity. In order to receive such…

    1 条评论
  • An Introduction to Cybersecurity Law

    An Introduction to Cybersecurity Law

    Understanding “the law” helps business people know when to call in their lawyers, how to interpret their legal advice…

    2 条评论
  • Cybersecurity and Privacy

    Cybersecurity and Privacy

    Introduction In today’s world, private individual’s data are being collected, processed, and disseminated far and wide…

  • Cybersecurity Human Factors

    Cybersecurity Human Factors

    Introduction The principles for designing reliable cybersecurity are rooted in a knowledge of behavioral sciences -…

社区洞察

其他会员也浏览了