The Cyber Security Handbook

    Prepare for, respond to and recover from cyber attacks with the IT Governance Cyber Resilience Framework (CRF)

      99 ADA / 79 ADA*
       *for wallet holding The Gutenberg Bible

      Sold Out - Available On:

      This book is a comprehensive cyber security implementation manual which gives practical guidance on the individual activities identified in the IT Governance Cyber Resilience Framework (CRF) that can help organisations become cyber resilient and combat the cyber threat landscape.


      In the world as we know it, you can be attacked both physically and virtually. For today’s organisations, which rely so heavily on technology – particularly the Internet – to do business, the latter is the far more threatening of the two. The cyber threat landscape is complex and constantly changing. For every vulnerability fixed, another pops up, ripe for exploitation.

      Because virtually every organisation holds valuable information, often in huge quantities (even if you are a small business), everyone is a target. It should therefore not come as a surprise that 46% of UK businesses alone experienced at least one cyber attack or breach during 2019, which increased to as much as 75% for large businesses. More often than not, organisations cannot do business if they lose access to that information – making it one of their most important assets.

      Suitable for senior directors (CEO, CISO, CIO), compliance managers, privacy managers, IT managers, security analysts and others, the book is divided into six parts:

      Part 1: Introduction
      The world of cyber security and the approach taken in this book.

      Part 2: Threats and vulnerabilities
      A discussion of a range of threats organisations face, organised by threat category, to help you understand what you are defending yourself against before you start thinking about your actual defences.

      Part 3: The CRF processes
      Detailed discussions of each of the 24 CRF processes, explaining a wide range of security areas by process category and offering guidance on how to implement each.

      Part 4: Eight steps to implementing cyber security
      Our eight-step approach to implementing the cyber security processes you need and maintaining them.

      Part 5: Reference frameworks
      An explanation of how standards and frameworks work, along with their benefits. It also presents ten framework options, introducing you to some of the best-known standards and giving you an idea of the range available.

      Part 6: Conclusion and appendices. The appendices include a glossary of all the acronyms and abbreviations used in this book.

      Cyber security does not have to cost vast amounts of money or take years to implement, particularly if you take a strategic approach. It is a worthwhile investment: no matter the size of your organisation, improving cyber security helps protect your data and that of your clients, improving business relations and opening up new business opportunities.

      Whether you are just starting out on the road to cyber security or looking to enhance and improve your existing cyber resilience programme, it should be clear that cyber security is no longer optional in today’s information age; it is an essential component of business success.

      Numbered eBooks: 350

      Number of Unique Covers: 26

      Number of 1:1 Covers: 10

      The Security Locks

      14 Unique Designs
      x 22 Numbered eBooks
      = 308 NFT eBooks
      eBook Numbers 42 - 349
      (88.00% of Supply)

      The Cyber Bank Vault

      2 Unique Designs
      x 16 Numbered eBooks
      = 32 NFT eBooks
      eBook Numbers 10 - 41
      (9.14% of Supply)

      It’s Cyber Secure

      5 Unique Designs
      x 1 Numbered eBooks
      = 5 NFT eBooks
      eBook Numbers 5 - 9
      (1.43% of Supply)


      4 Unique Designs
      x 1 Numbered eBooks
      = 4 NFT eBooks
      eBook Numbers 1 - 4
      (1.14% of Supply)

      The Hacker

      1 Unique Designs
      x 1 Numbered eBooks
      = 1 NFT eBooks
      eBook Numbers 0 - 0
      (0.29% of Supply)


      Publisher : IT Governance Publishing

      Series : Living Author 2.0

      First Publication Date : 2020

      Author : Alan Calder

      Genres: Computer & Internet, Network Security, Security

      Language : English

      Word Count : 190,000

      Format : DEA (Decentralized Encrypted Asset)

      Read On : eReader dApp

      Cover Art : Includes 4K hi-resolution book cover

      Cardano Retail Price : 99 ADA

      Cardano Discount Price : 79 ADA, for wallet holding The Gutenberg Bible

      Purchase Limit: 3

      Cardano Policy ID : 9121c06bbb1ac1045e0f90ac92660711644a460af3eb0b1e856ef811

      Author Info

      Alan Calder

      Alan Calder is an acknowledged international cyber security guru and a leading author on information security and IT governance issues.

      Alan has been involved in the development of a wide range of information security management training courses that have been accredited by the International Board for IT Governance Qualifications (IBITGQ).
      Alan has consulted for clients in the UK and abroad, and is a regular media commentator and speaker.

      Read More

      You might also like

      What History’s Greatest Science and Technology Breakthroughs Teach Us About Future Technology
      “Dagogo has the uncanny ability to take fascinating topics and somehow make them even more interesting.” –Adam Sinicki, author and founder of The Bioneer
      #1 Best Seller in Cold Fusion Programming, General Technology & Reference, and Business & Management Technology History
      Embark on an exhilarating journey through the hidden history of technology and innovation and get a glimpse of our f… Read More

      Student Reader has partnered with Adanian Labs, Power Learn Project, and Crypsense teaching blockchain technology in Africa for this edition of Atala PRISM Foundations of Decentralized Identity. The tech behind self-sovereign identity (SSI) and decentralized identity has the potential to be revolutionary, but we need to demystify it. This book systematically covers existing identity models, the concepts and principles of SSI, moral and ethical considerations when developing emerging tech, and an… Read More

      A first-hand look at the extraordinary collapse of FTX, Alameda Research, and Sam Bankman-Fried
      In SBF: How the FTX Bankruptcy Unwound Crypto’s Very Bad Good Guy, accomplished crypto reporter Brady Dale presents an engrossing take on the spectacular and sudden implosion of FTX, Alameda Research, and their associated companies, as well as the criminal indictments of Sam Bankman-Fried and several of his associates.
      Read More

      Using the greatest material from his popular Blog Maverick, Mark Cuban has collected and updated his postings on business and life to provide a catalog of insider knowledge on what it takes to become a thriving entrepreneur. He tells his own rags-to-riches story of how he went from selling powdered milk and sleeping on friends’ couches to owning his own company and becoming a multi-billion dollar success story. His unconventional yet highly effective ideas on how to build a successful business… Read More