MARC details
| 000 -LEADER |
| fixed length control field |
04291cam a2200421 i 4500 |
| 001 - CONTROL NUMBER |
| control field |
20382927 |
| 005 - DATE AND TIME OF LATEST TRANSACTION |
| control field |
20210317141413.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
180301s2018 njua b 001 0 eng d |
| 010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
| LC control number |
2017058958 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9781119429517 (hardback) |
| 040 ## - CATALOGING SOURCE |
| Original cataloging agency |
EG-NcFUE |
| Language of cataloging |
eng |
| Transcribing agency |
DLC |
| Description conventions |
rda |
| Modifying agency |
DLC |
| -- |
EG-NcFUE |
| 042 ## - AUTHENTICATION CODE |
| Authentication code |
pcc |
| 050 00 - LIBRARY OF CONGRESS CALL NUMBER |
| Classification number |
HD30.2 |
| Item number |
.M674 2018 |
| 082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
| Classification number |
658.478 |
| Edition number |
23 |
| Item number |
M.C.C |
| 084 ## - OTHER CLASSIFICATION NUMBER |
| Classification number |
BUS070030 |
| Source of number |
bisacsh |
| 100 1# - MAIN ENTRY--PERSONAL NAME |
| Personal name |
Moschovitis, Christos J. P., |
| Relator term |
author. |
| 245 10 - TITLE STATEMENT |
| Title |
Cybersecurity program development for business : |
| Remainder of title |
the essential planning guide / |
| Statement of responsibility, etc |
Chris Moschovitis. |
| 264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
| Place of publication, distribution, etc |
Hoboken, New Jersey : |
| Name of publisher, distributor, etc |
Wiley, |
| Date of publication, distribution, etc |
[2018] |
| 264 #4 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
| Date of publication, distribution, etc |
©2018 |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
xvi, 206 pages : |
| Other physical details |
illustartions ; |
| Dimensions |
25 cm |
| 336 ## - CONTENT TYPE |
| Content type term |
text |
| Content type code |
txt |
| Source |
rdacontent |
| 337 ## - MEDIA TYPE |
| Media type term |
unmediated |
| Media type code |
n |
| Source |
rdamedia |
| 338 ## - CARRIER TYPE |
| Carrier type term |
volume |
| Carrier type code |
nc |
| Source |
rdacarrier |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE |
| Bibliography, etc |
Includes bibliographical references (pages 187-193) and index. |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
Foreword vii Preface xi About The Author xiii Acknowledgments xv CHAPTER 1 Understanding Risk 1 CHAPTER 2 Everything You Always Wanted to Know About Tech (But Were Afraid to Ask Your Kids) 9 CHAPTER 3 A Cybersecurity Primer 15 CHAPTER 4 Management, Governance, and Alignment 47 CHAPTER 5 Your Cybersecurity Program: A High-Level Overview 67 CHAPTER 6 Assets 81 CHAPTER 7 Threats 95 CHAPTER 8 Vulnerabilities 105 CHAPTER 9 Environments 113 CHAPTER 10 Controls 131 CHAPTER 11 Incident-Response Planning 147 CHAPTER 12 People 163 CHAPTER 13 Living Cybersecure! 175 Bibliography 187 Appendix: Clear And Present Danger 195 Index 199<br/> |
| 520 ## - SUMMARY, ETC. |
| Summary, etc |
"Get answers to all your cybersecurity questions In 2016, we reached a tipping point—a moment where the global and local implications of cybersecurity became undeniable. Despite the seriousness of the topic, the term "cybersecurity" still exasperates many people. They feel terrorized and overwhelmed. The majority of business people have very little understanding of cybersecurity, how to manage it, and what's really at risk. This essential guide, with its dozens of examples and case studies, breaks down every element of the development and management of a cybersecurity program for the executive. From understanding the need, to core risk management principles, to threats, tools, roles and responsibilities, this book walks the reader through each step of developing and implementing a cybersecurity program. Read cover-to-cover, it’s a thorough overview, but it can also function as a useful reference book as individual questions and difficulties arise. Unlike other cybersecurity books, the text is not bogged down with industry jargon Speaks specifically to the executive who is not familiar with the development or implementation of cybersecurity programs Shows you how to make pragmatic, rational, and informed decisions for your organization Written by a top-flight technologist with decades of experience and a track record of success If you’re a business manager or executive who needs to make sense of cybersecurity, this book demystifies it for you. "-- |
| Assigning source |
Provided by publisher. |
| 520 ## - SUMMARY, ETC. |
| Summary, etc |
"This essential guide, with its dozens of examples and case studies, breaks down every element of the development and management of a cybersecurity program for the executive. From understanding the need, to core risk management principles, to threats, tools, roles and responsibilities, this book walks the reader through each step of developing and implementing a cybersecurity program. Read cover-to-cover, it's a thorough overview, but it can also function as a useful reference book as individual questions and difficulties arise"-- |
| Assigning source |
Provided by publisher. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Information technology |
| General subdivision |
Management. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Business enterprises |
| General subdivision |
Computer programs. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computer networks |
| General subdivision |
Security measures. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computer industry. |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
BUSINESS & ECONOMICS / Industries / Computer Industry. |
| Source of heading or term |
bisacsh |
| 776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
| Display text |
Online version: |
| Main entry heading |
Moschovitis, Christos J. P., author. |
| Title |
Cybersecurity program development for business |
| Place, publisher, and date of publication |
Hoboken : Wiley, 2018 |
| International Standard Book Number |
9781119430056 |
| Record control number |
(DLC) 2018015364 |
| 906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) |
| a |
7 |
| b |
cbc |
| c |
orignew |
| d |
1 |
| e |
ecip |
| f |
20 |
| g |
y-gencatlg |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) |
| Source of classification or shelving scheme |
Dewey Decimal Classification |
| Koha item type |
Books |