Этот модуль является ресурсом для лекторов
Список дополнительной литературы
- Antonucci, Domenic. (2017). The Cyber Risk handbook: Creating and Measuring Effective Cybersecurity Capabilities. Wiley.
- Brown, Moira West, Don Stikvoort, Klaus-Peter Kossakowski, Gerogia Killcrece, Robin Ruefle, and Mark Zajicek. (2003). Handbook for Computer Security Incident Response Teams (CSIRTS).
- Garfinkel, Simson and Lorrie Cranor. (2008). Security and Usability: Designing Secure Systems That People Can Use. O'Reilly Media.
- Householder, Allen, Garret Wassermann, Art Manion, Chris King. (2017). The CERT Guide to Coordinated Vulnerability Disclosure . Carnegie Mellon University.
- Le Conseil général de l'économie, de l'industrie, de l'énergie et des technologies (CGEIET). (2018). La cyber resilience: Thème d'approfondissement 2017 de la section sécurité et risques . 30 janvier 2018, n° 2017/02/CGE/SR.
- Luttgens, Jason, Matthew Pepe, and Kevin Mandia (2014). Incident Response & Computer Forensics, Third Edition. McGraw-Hill.
- Sanders, Chris and Jason Smith. (2013). Applied Network Security Monitoring: Collection, Detection and Analysis, 1st edition. Syngress.
- Schaake, Marietje, Lorenzo Pupillo, Afonso Ferreira, and Gianluca Varisco. (2018). Software Vulnerability Disclosure in Europe Technology, Policies and Legal Challenges. Report of a CEPS Task Force. Centre for European Policy Studies (CEPS) Brussels.
- Security.org. A Guide to Securing Confidential Personal Data Both Online and Offline.
Далее: Оценка учащихся
Наверх