---
product_id: 18086506
title: "Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats"
price: "332 zł"
currency: PLN
in_stock: true
reviews_count: 12
url: https://www.desertcart.pl/products/18086506-enterprise-cybersecurity-how-to-build-a-successful-cyberdefense-program-against
store_origin: PL
region: Poland
---

# Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats

**Price:** 332 zł
**Availability:** ✅ In Stock

## Quick Answers

- **What is this?** Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats
- **How much does it cost?** 332 zł with free shipping
- **Is it available?** Yes, in stock and ready to ship
- **Where can I buy it?** [www.desertcart.pl](https://www.desertcart.pl/products/18086506-enterprise-cybersecurity-how-to-build-a-successful-cyberdefense-program-against)

## Best For

- Customers looking for quality international products

## Why This Product

- Free international shipping included
- Worldwide delivery with tracking
- 15-day hassle-free returns

## Description

Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats [Donaldson, Scott, Siegel, Stanley, Williams, Chris K., Aslam, Abdul] on desertcart.com. *FREE* shipping on qualifying offers. Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats

Review: Extremely Useful Guide - This book is extremely useful as a "how-to" guide for creating or improving your corporate information security program. There are plenty of books out there covering various technical aspects of cybersecurity but very few that describe the best overall approach to using your people, processes and technologies to defend your IT assets. "Enterprise Cybersecurity" does that job well - both as a step by step guide and as a very well organized general reference. If you're engaged in managing cybersecurity programs and you're in need of a "playbook" to get the job done - this is your book. If your CIO or Board doesn't already "get it" when it comes to cyber security - give them this book. If you're looking for help selecting the right security technologies, controls framework, policy framework, performance metrics, project priorities, crisis plan or action plans - get this book. If you're about to engage a cybersecurity consultant - read this book first, you'll get better bang for your buck. I especially appreciated the authors practical approach to problems. They share real world experience and tips on how to solve the difficult 'real world' decisions that cybersecurity managers actually face. For example, in Chapter 10 "Managing a Cybersecurity Crisis" the authors go beyond the well worn principles of managing an incident and what to do when the incident threatens the entire enterprise. The book covers crisis mode communications, applying the OODA (Observe Orient Decide Act) loop, how to take care of your people and establish proper operational tempo and the differences between restoring security and restoring IT operations. I've only had this book a week and it's already becoming a bit dog-eared from use - I strongly recommend adding it to your library.
Review: It explains concepts in simple terms with excellent graphics. It subsequently dives into how to build ... - As a consultant (and for sales), this book is invaluable. It explains concepts in simple terms with excellent graphics. It subsequently dives into how to build and maintain the best cybersecurity defense based on real-life scenarios where there are resource contingencies (human, capital, other). The appendices provide in-depth details and references (NIST, ISO, others) and describes the items to be considered when writing a policy, operationalizing a cybersecurity program, assessment considerations and related formulas and graphics. These could be very helpful even for anyone who already has a program in place and wants to evaluate it. Cybersecurity is a dynamic and evolving environment and one can find in this book how to maintain an established program. As posted by another reviewer, you will find very quickly the need to bookmark often and you will want to always have the book handy. I got the kindle version which permits easy bookmarking and of course search capabilities. The book is an invaluable source of information for anyone who needs to convey the concept and propose an approach to achieve best-possible results.

## Technical Specifications

| Specification | Value |
|---------------|-------|
| Best Sellers Rank | #1,663,633 in Books ( See Top 100 in Books ) #392 in Web Encryption #398 in Computer Cryptography #862 in Information Management (Books) |
| Customer Reviews | 4.4 4.4 out of 5 stars (48) |
| Dimensions  | 7.01 x 1.21 x 10 inches |
| Edition  | First Edition |
| ISBN-10  | 1430260823 |
| ISBN-13  | 978-1430260820 |
| Item Weight  | 2.1 pounds |
| Language  | English |
| Print length  | 578 pages |
| Publication date  | May 20, 2015 |
| Publisher  | Apress |

## Images

![Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats - Image 1](https://m.media-amazon.com/images/I/61bzBLf1-GL.jpg)

## Customer Reviews

### ⭐⭐⭐⭐⭐ Extremely Useful Guide
*by G***S on June 9, 2015*

This book is extremely useful as a "how-to" guide for creating or improving your corporate information security program. There are plenty of books out there covering various technical aspects of cybersecurity but very few that describe the best overall approach to using your people, processes and technologies to defend your IT assets. "Enterprise Cybersecurity" does that job well - both as a step by step guide and as a very well organized general reference. If you're engaged in managing cybersecurity programs and you're in need of a "playbook" to get the job done - this is your book. If your CIO or Board doesn't already "get it" when it comes to cyber security - give them this book. If you're looking for help selecting the right security technologies, controls framework, policy framework, performance metrics, project priorities, crisis plan or action plans - get this book. If you're about to engage a cybersecurity consultant - read this book first, you'll get better bang for your buck. I especially appreciated the authors practical approach to problems. They share real world experience and tips on how to solve the difficult 'real world' decisions that cybersecurity managers actually face. For example, in Chapter 10 "Managing a Cybersecurity Crisis" the authors go beyond the well worn principles of managing an incident and what to do when the incident threatens the entire enterprise. The book covers crisis mode communications, applying the OODA (Observe Orient Decide Act) loop, how to take care of your people and establish proper operational tempo and the differences between restoring security and restoring IT operations. I've only had this book a week and it's already becoming a bit dog-eared from use - I strongly recommend adding it to your library.

### ⭐⭐⭐⭐⭐ It explains concepts in simple terms with excellent graphics. It subsequently dives into how to build ...
*by X***. on September 1, 2015*

As a consultant (and for sales), this book is invaluable. It explains concepts in simple terms with excellent graphics. It subsequently dives into how to build and maintain the best cybersecurity defense based on real-life scenarios where there are resource contingencies (human, capital, other). The appendices provide in-depth details and references (NIST, ISO, others) and describes the items to be considered when writing a policy, operationalizing a cybersecurity program, assessment considerations and related formulas and graphics. These could be very helpful even for anyone who already has a program in place and wants to evaluate it. Cybersecurity is a dynamic and evolving environment and one can find in this book how to maintain an established program. As posted by another reviewer, you will find very quickly the need to bookmark often and you will want to always have the book handy. I got the kindle version which permits easy bookmarking and of course search capabilities. The book is an invaluable source of information for anyone who needs to convey the concept and propose an approach to achieve best-possible results.

### ⭐⭐⭐⭐ Building a cybersecurity program, start here!
*by E***N on November 11, 2017*

This is a must have for anyone who wants to understand how cybersecurity programs are built. Scott and team take readers from framework adoption and policy creation to adoption of technical capabilities. Enterprise Cybersecurity is the ultimate desk reference.

---

## Why Shop on Desertcart?

- 🛒 **Trusted by 1.3+ Million Shoppers** — Serving international shoppers since 2016
- 🌍 **Shop Globally** — Access 737+ million products across 21 categories
- 💰 **No Hidden Fees** — All customs, duties, and taxes included in the price
- 🔄 **15-Day Free Returns** — Hassle-free returns (30 days for PRO members)
- 🔒 **Secure Payments** — Trusted payment options with buyer protection
- ⭐ **TrustPilot Rated 4.5/5** — Based on 8,000+ happy customer reviews

**Shop now:** [https://www.desertcart.pl/products/18086506-enterprise-cybersecurity-how-to-build-a-successful-cyberdefense-program-against](https://www.desertcart.pl/products/18086506-enterprise-cybersecurity-how-to-build-a-successful-cyberdefense-program-against)

---

*Product available on Desertcart Poland*
*Store origin: PL*
*Last updated: 2026-05-13*