Cybersecurity for executives : (Record no. 21306)

MARC details
000 -LEADER
fixed length control field 06930cam a2200901 i 4500
001 - CONTROL NUMBER
control field ocn876900980
003 - CONTROL NUMBER IDENTIFIER
control field OCoLC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20230823094828.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS--GENERAL INFORMATION
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr |||||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 140415s2014 nju ob 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2014015182
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Language of cataloging eng
Description conventions rda
Transcribing agency DLC
Modifying agency YDX
-- N$T
-- EBLCP
-- DG1
-- E7B
-- TEFOD
-- CUS
-- IDEBK
-- YDXCP
-- DEBSZ
-- COO
-- OCLCF
-- UMI
-- DEBBG
-- OCLCO
-- TEFOD
-- STF
-- B24X7
-- OCLCQ
-- VT2
-- CSJ
-- D6H
019 ## -
-- 882610202
-- 893436806
-- 900003714
-- 961588044
-- 962646351
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781118908808 (epub)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 1118908805 (epub)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781118908815 (pdf)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 1118908813 (pdf)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Cancelled/invalid ISBN 9781118888148 (cloth)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Cancelled/invalid ISBN 9781118908785
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Cancelled/invalid ISBN 1118908783
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Cancelled/invalid ISBN 1306906458
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Cancelled/invalid ISBN 9781306906456
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Cancelled/invalid ISBN 1118888146
029 1# - (OCLC)
OCLC library identifier CHBIS
System control number 010259706
029 1# - (OCLC)
OCLC library identifier CHVBK
System control number 325943443
029 1# - (OCLC)
OCLC library identifier DEBSZ
System control number 409827983
029 1# - (OCLC)
OCLC library identifier DEBSZ
System control number 417235267
029 1# - (OCLC)
OCLC library identifier DEBSZ
System control number 420034722
029 1# - (OCLC)
OCLC library identifier NZ1
System control number 15592109
029 1# - (OCLC)
OCLC library identifier NZ1
System control number 15906896
029 1# - (OCLC)
OCLC library identifier CHVBK
System control number 33311311X
029 1# - (OCLC)
OCLC library identifier CHBIS
System control number 010413347
029 1# - (OCLC)
OCLC library identifier DEBSZ
System control number 449433226
029 1# - (OCLC)
OCLC library identifier DEBBG
System control number BV042182837
029 1# - (OCLC)
OCLC library identifier DEBBG
System control number BV043610174
029 1# - (OCLC)
OCLC library identifier DEBBG
System control number BV043396690
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)876900980
Canceled/invalid control number (OCoLC)882610202
-- (OCoLC)893436806
-- (OCoLC)900003714
-- (OCoLC)961588044
-- (OCoLC)962646351
037 ## - SOURCE OF ACQUISITION
Stock number E024C110-C148-46F5-8C15-3D328778880C
Source of stock number/acquisition OverDrive, Inc.
Note http://www.overdrive.com
042 ## - AUTHENTICATION CODE
Authentication code pcc
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5105.59
072 #7 - SUBJECT CATEGORY CODE
Subject category code BUS
Subject category code subdivision 082000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code BUS
Subject category code subdivision 041000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code BUS
Subject category code subdivision 042000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code BUS
Subject category code subdivision 085000
Source bisacsh
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 658.4/78
Edition number 23
049 ## - LOCAL HOLDINGS (OCLC)
Holding library MAIN
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Touhill, Gregory J.
245 10 - TITLE STATEMENT
Title Cybersecurity for executives :
Remainder of title a practical guide /
Statement of responsibility, etc by Gregory J. Touhill and C. Joseph Touhill.
264 #1 -
-- Hoboken, New Jersey :
-- John Wiley & Sons,
-- [2014]
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource.
336 ## -
-- text
-- rdacontent
337 ## -
-- computer
-- rdamedia
338 ## -
-- online resource
-- rdacarrier
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
588 ## -
-- Description based on print version record and CIP data provided by publisher.
520 ## - SUMMARY, ETC.
Summary, etc This guide can be used by executives to make well-informed decisions on cybersecurity issues to better protect their business. It emphasizes, in a direct and uncomplicated way, how executives can identify, understand, assess, and mitigate risks associated with cybersecurity issues; covers what to do when you get hacked, including business continuity and disaster recovery planning, public relations, legal and regulatory issues, and notifications and disclosures; provides steps for integrating cybersecurity into strategy, policy and guidelines, change management and personnel management; identifies cybersecurity best practices that executives can and should use both in the office and at home to protect their vital information. --
-- Edited summary from book.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Cybersecurity for Executives: A Practical Guide; Contents ; Foreword ; Preface ; Acknowledgments ; 1.0 INTRODUCTION ; 1.1 DEFINING CYBERSECURITY; 1.2 CYBERSECURITY IS A BUSINESS IMPERATIVE; 1.3 CYBERSECURITY IS AN EXECUTIVE-LEVEL CONCERN; 1.4 QUESTIONS TO ASK; 1.5 VIEWS OF OTHERS; 1.6 CYBERSECURITY IS A FULL-TIME ACTIVITY; 2.0 WHY BE CONCERNED? ; 2.1 A CLASSIC HACK; 2.2 WHO WANTS YOUR FORTUNE?; 2.3 NATION-STATE THREATS; 2.3.1 China; 2.3.2 Don't Think that China is the Only One; 2.4 CYBERCRIME IS BIG BUSINESS; 2.4.1 Mercenary Hackers; 2.4.2 Hacktivists; 2.4.3 The Insider Threat
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 2.4.4 Substandard Products and Services2.5 SUMMARY; 3.0 MANAGING RISK ; 3.1 WHO OWNS RISK IN YOUR BUSINESS?; 3.2 WHAT ARE YOUR RISKS?; 3.2.1 Threats to Your Intellectual Property and Trade Secrets; 3.2.2 Technical Risks; 3.2.3 Human Risks; 3.3 CALCULATING YOUR RISK; 3.3.1 Quantitative Risk Assessment; 3.3.2 Qualitative Risk Assessment; 3.3.3 Risk Decisions; 3.4 COMMUNICATING RISK; 3.4.1 Communicating Risk Internally; 3.4.2 Regulatory Communications; 3.4.3 Communicating with Shareholders; 3.5 ORGANIZING FOR SUCCESS; 3.5.1 Risk Management Committee; 3.5.2 Chief Risk Officers; 3.6 SUMMARY
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 4.0 BUILD YOUR STRATEGY 4.1 HOW MUCH "CYBERSECURITY" DO I NEED?; 4.2 THE MECHANICS OF BUILDING YOUR STRATEGY; 4.2.1 Where are We Now?; 4.2.2 What do We have to Work with?; 4.2.3 Where do We Want to be?; 4.2.4 How do We Get There?; 4.2.5 Goals and Objectives; 4.3 AVOIDING STRATEGY FAILURE; 4.3.1 Poor Plans, Poor Execution; 4.3.2 Lack of Communication; 4.3.3 Resistance to Change; 4.3.4 Lack of Leadership and Oversight; 4.4 WAYS TO INCORPORATE CYBERSECURITY INTO YOUR STRATEGY; 4.4.1 Identify the Information Critical to Your Business; 4.4.2 Make Cybersecurity Part of Your Culture
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 4.4.3 Consider Cybersecurity Impacts in Your Decisions4.4.4 Measure Your Progress; 4.5 PLAN FOR SUCCESS; 4.6 SUMMARY; 5.0 Plan for Success ; 5.1 TURNING VISION INTO REALITY; 5.1.1 Planning for Excellence; 5.1.2 A Plan of Action; 5.1.3 Doing Things ; 5.2 POLICIES COMPLEMENT PLANS; 5.2.1 Great Cybersecurity Policies for Everyone; 5.2.2 Be Clear about Your Policies and Who Owns Them; 5.3 PROCEDURES IMPLEMENT PLANS; 5.4 EXERCISE YOUR PLANS; 5.5 LEGAL COMPLIANCE CONCERNS; 5.6 AUDITING; 5.7 SUMMARY; 6.0 CHANGE MANAGEMENT ; 6.1 WHY MANAGING CHANGE IS IMPORTANT; 6.2 WHEN TO CHANGE?
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 6.3 WHAT IS IMPACTED BY CHANGE?6.4 CHANGE MANAGEMENT AND INTERNAL CONTROLS; 6.5 CHANGE MANAGEMENT AS A PROCESS; 6.5.1 The Touhill Change Management Process; 6.5.2 Following the Process; 6.5.3 Have a Plan B, Plan C, and maybe a Plan D; 6.6 BEST PRACTICES IN CHANGE MANAGEMENT; 6.7 SUMMARY; 7.0 PERSONNEL MANAGEMENT ; 7.1 FINDING THE RIGHT FIT; 7.2 CREATING THE TEAM; 7.2.1 Picking the Right Leaders; 7.2.2 Your Cybersecurity Leaders; 7.3 ESTABLISHING PERFORMANCE STANDARDS; 7.4 ORGANIZATIONAL CONSIDERATIONS; 7.5 TRAINING FOR SUCCESS; 7.5.1 Information Every Employee Ought to Know
526 ## - STUDY PROGRAM INFORMATION NOTE
Department Economics
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures.
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element BUSINESS & ECONOMICS
General subdivision Industrial Management.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element BUSINESS & ECONOMICS
General subdivision Management.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element BUSINESS & ECONOMICS
General subdivision Management Science.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element BUSINESS & ECONOMICS
General subdivision Organizational Behavior.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures.
Source of heading or term fast
-- (OCoLC)fst00872341
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks / Security measures.
Source of heading or term local
655 #4 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
655 #0 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Touhill, C. J.,
Dates associated with a name 1938-
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Print version:
Main entry heading Touhill, Gregory J.
Title Cybersecurity for executives
Place, publisher, and date of publication Hoboken, New Jersey : John Wiley & Sons, [2014]
International Standard Book Number 9781118888148
Record control number (DLC) 2014002691
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="http://dx.doi.org/10.1002/9781118908785">http://dx.doi.org/10.1002/9781118908785</a>
Public note Wiley Online Library
994 ## -
-- 92
-- DG1

No items available.