Cybersecurity for executives : a practical guide / (Record no. 207375)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 06882cam a2200877 i 4500 |
001 - CONTROL NUMBER | |
control field | ocn876900980 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | OCoLC |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20171030135344.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS | |
fixed length control field | m o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr ||||||||||| |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 140415s2014 nju ob 001 0 eng |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER | |
LC control number | 2014015182 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781118908808 (epub) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1118908805 (epub) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781118908815 (pdf) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1118908813 (pdf) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 9781118888148 (cloth) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 9781118908785 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 1118908783 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 1306906458 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 9781306906456 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 1118888146 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | CHBIS |
System control number | 010259706 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | CHVBK |
System control number | 325943443 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | DEBSZ |
System control number | 409827983 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | DEBSZ |
System control number | 417235267 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | DEBSZ |
System control number | 420034722 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | NZ1 |
System control number | 15592109 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | NZ1 |
System control number | 15906896 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | CHVBK |
System control number | 33311311X |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | CHBIS |
System control number | 010413347 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | DEBSZ |
System control number | 449433226 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | DEBBG |
System control number | BV042182837 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | DEBBG |
System control number | BV043610174 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | DEBBG |
System control number | BV043396690 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (OCoLC)876900980 |
Canceled/invalid control number | (OCoLC)882610202 |
-- | (OCoLC)893436806 |
-- | (OCoLC)900003714 |
-- | (OCoLC)961588044 |
-- | (OCoLC)962646351 |
037 ## - SOURCE OF ACQUISITION | |
Stock number | E024C110-C148-46F5-8C15-3D328778880C |
Source of stock number/acquisition | OverDrive, Inc. |
Note | http://www.overdrive.com |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | DLC |
Language of cataloging | eng |
Description conventions | rda |
Transcribing agency | DLC |
Modifying agency | YDX |
-- | N$T |
-- | EBLCP |
-- | DG1 |
-- | E7B |
-- | TEFOD |
-- | CUS |
-- | IDEBK |
-- | YDXCP |
-- | DEBSZ |
-- | COO |
-- | OCLCF |
-- | UMI |
-- | DEBBG |
-- | OCLCO |
-- | TEFOD |
-- | STF |
-- | B24X7 |
-- | OCLCQ |
-- | VT2 |
-- | CSJ |
-- | D6H |
042 ## - AUTHENTICATION CODE | |
Authentication code | pcc |
049 ## - LOCAL HOLDINGS (OCLC) | |
Holding library | MAIN |
050 00 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | TK5105.59 |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | BUS |
Subject category code subdivision | 082000 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | BUS |
Subject category code subdivision | 041000 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | BUS |
Subject category code subdivision | 042000 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | BUS |
Subject category code subdivision | 085000 |
Source | bisacsh |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 658.4/78 |
Edition number | 23 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Touhill, Gregory J. |
245 10 - TITLE STATEMENT | |
Title | Cybersecurity for executives : a practical guide / |
Statement of responsibility, etc. | by Gregory J. Touhill and C. Joseph Touhill. |
Medium | [electronic resource] |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Place of production, publication, distribution, manufacture | Hoboken, New Jersey : |
Name of producer, publisher, distributor, manufacturer | John Wiley & Sons, |
Date of production, publication, distribution, manufacture, or copyright notice | [2014] |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 1 online resource. |
336 ## - CONTENT TYPE | |
Content type term | text |
Source | rdacontent |
337 ## - MEDIA TYPE | |
Media type term | computer |
Source | rdamedia |
338 ## - CARRIER TYPE | |
Carrier type term | online resource |
Source | rdacarrier |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc | Includes bibliographical references and index. |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Cybersecurity for Executives: A Practical Guide; Contents ; Foreword ; Preface ; Acknowledgments ; 1.0 INTRODUCTION ; 1.1 DEFINING CYBERSECURITY; 1.2 CYBERSECURITY IS A BUSINESS IMPERATIVE; 1.3 CYBERSECURITY IS AN EXECUTIVE-LEVEL CONCERN; 1.4 QUESTIONS TO ASK; 1.5 VIEWS OF OTHERS; 1.6 CYBERSECURITY IS A FULL-TIME ACTIVITY; 2.0 WHY BE CONCERNED? ; 2.1 A CLASSIC HACK; 2.2 WHO WANTS YOUR FORTUNE?; 2.3 NATION-STATE THREATS; 2.3.1 China; 2.3.2 Don't Think that China is the Only One; 2.4 CYBERCRIME IS BIG BUSINESS; 2.4.1 Mercenary Hackers; 2.4.2 Hacktivists; 2.4.3 The Insider Threat |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | 2.4.4 Substandard Products and Services2.5 SUMMARY; 3.0 MANAGING RISK ; 3.1 WHO OWNS RISK IN YOUR BUSINESS?; 3.2 WHAT ARE YOUR RISKS?; 3.2.1 Threats to Your Intellectual Property and Trade Secrets; 3.2.2 Technical Risks; 3.2.3 Human Risks; 3.3 CALCULATING YOUR RISK; 3.3.1 Quantitative Risk Assessment; 3.3.2 Qualitative Risk Assessment; 3.3.3 Risk Decisions; 3.4 COMMUNICATING RISK; 3.4.1 Communicating Risk Internally; 3.4.2 Regulatory Communications; 3.4.3 Communicating with Shareholders; 3.5 ORGANIZING FOR SUCCESS; 3.5.1 Risk Management Committee; 3.5.2 Chief Risk Officers; 3.6 SUMMARY |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | 4.0 BUILD YOUR STRATEGY 4.1 HOW MUCH "CYBERSECURITY" DO I NEED?; 4.2 THE MECHANICS OF BUILDING YOUR STRATEGY; 4.2.1 Where are We Now?; 4.2.2 What do We have to Work with?; 4.2.3 Where do We Want to be?; 4.2.4 How do We Get There?; 4.2.5 Goals and Objectives; 4.3 AVOIDING STRATEGY FAILURE; 4.3.1 Poor Plans, Poor Execution; 4.3.2 Lack of Communication; 4.3.3 Resistance to Change; 4.3.4 Lack of Leadership and Oversight; 4.4 WAYS TO INCORPORATE CYBERSECURITY INTO YOUR STRATEGY; 4.4.1 Identify the Information Critical to Your Business; 4.4.2 Make Cybersecurity Part of Your Culture |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | 4.4.3 Consider Cybersecurity Impacts in Your Decisions4.4.4 Measure Your Progress; 4.5 PLAN FOR SUCCESS; 4.6 SUMMARY; 5.0 Plan for Success ; 5.1 TURNING VISION INTO REALITY; 5.1.1 Planning for Excellence; 5.1.2 A Plan of Action; 5.1.3 Doing Things ; 5.2 POLICIES COMPLEMENT PLANS; 5.2.1 Great Cybersecurity Policies for Everyone; 5.2.2 Be Clear about Your Policies and Who Owns Them; 5.3 PROCEDURES IMPLEMENT PLANS; 5.4 EXERCISE YOUR PLANS; 5.5 LEGAL COMPLIANCE CONCERNS; 5.6 AUDITING; 5.7 SUMMARY; 6.0 CHANGE MANAGEMENT ; 6.1 WHY MANAGING CHANGE IS IMPORTANT; 6.2 WHEN TO CHANGE? |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | 6.3 WHAT IS IMPACTED BY CHANGE?6.4 CHANGE MANAGEMENT AND INTERNAL CONTROLS; 6.5 CHANGE MANAGEMENT AS A PROCESS; 6.5.1 The Touhill Change Management Process; 6.5.2 Following the Process; 6.5.3 Have a Plan B, Plan C, and maybe a Plan D; 6.6 BEST PRACTICES IN CHANGE MANAGEMENT; 6.7 SUMMARY; 7.0 PERSONNEL MANAGEMENT ; 7.1 FINDING THE RIGHT FIT; 7.2 CREATING THE TEAM; 7.2.1 Picking the Right Leaders; 7.2.2 Your Cybersecurity Leaders; 7.3 ESTABLISHING PERFORMANCE STANDARDS; 7.4 ORGANIZATIONAL CONSIDERATIONS; 7.5 TRAINING FOR SUCCESS; 7.5.1 Information Every Employee Ought to Know |
520 ## - SUMMARY, ETC. | |
Summary, etc. | This guide can be used by executives to make well-informed decisions on cybersecurity issues to better protect their business. It emphasizes, in a direct and uncomplicated way, how executives can identify, understand, assess, and mitigate risks associated with cybersecurity issues; covers what to do when you get hacked, including business continuity and disaster recovery planning, public relations, legal and regulatory issues, and notifications and disclosures; provides steps for integrating cybersecurity into strategy, policy and guidelines, change management and personnel management; identifies cybersecurity best practices that executives can and should use both in the office and at home to protect their vital information. -- |
Assigning source | Edited summary from book. |
588 ## - SOURCE OF DESCRIPTION NOTE | |
Source of description note | Description based on print version record and CIP data provided by publisher. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer networks |
General subdivision | Security measures. |
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer networks |
General subdivision | Security measures. |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | BUSINESS & ECONOMICS |
General subdivision | Industrial Management. |
Source of heading or term | bisacsh |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | BUSINESS & ECONOMICS |
General subdivision | Management. |
Source of heading or term | bisacsh |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | BUSINESS & ECONOMICS |
General subdivision | Management Science. |
Source of heading or term | bisacsh |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | BUSINESS & ECONOMICS |
General subdivision | Organizational Behavior. |
Source of heading or term | bisacsh |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer networks |
General subdivision | Security measures. |
Source of heading or term | fast |
Authority record control number | (OCoLC)fst00872341 |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer networks / Security measures. |
Source of heading or term | local |
655 #4 - INDEX TERM--GENRE/FORM | |
Genre/form data or focus term | Electronic books. |
655 #0 - INDEX TERM--GENRE/FORM | |
Genre/form data or focus term | Electronic books. |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Touhill, C. J., |
Dates associated with a name | 1938- |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Relationship information | Print version: |
Main entry heading | Touhill, Gregory J. |
Title | Cybersecurity for executives |
Place, publisher, and date of publication | Hoboken, New Jersey : John Wiley & Sons, [2014] |
International Standard Book Number | 9781118888148 |
Record control number | (DLC) 2014002691 |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | http://onlinelibrary.wiley.com/book/10.1002/9781118908785 |
Public note | Wiley Online Library |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | |
Koha item type | Books |
No items available.