Abstract
The cybersecurity program utilizes the following management tools
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
See Chapter 4.
- 2.
See Chapter 4.
- 3.
Adapted from Successful Software Development, 2nd Edition, by Scott E. Donaldson and Stanley G. Siegel (Prentice Hall, 2001).
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2018 Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam
About this chapter
Cite this chapter
Donaldson, S.E., Siegel, S.G., Williams, C.K., Aslam, A. (2018). Managing an Enterprise Cybersecurity Program. In: Enterprise Cybersecurity Study Guide. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-3258-3_14
Download citation
DOI: https://doi.org/10.1007/978-1-4842-3258-3_14
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-3257-6
Online ISBN: 978-1-4842-3258-3
eBook Packages: Professional and Applied ComputingApress Access BooksProfessional and Applied Computing (R0)