|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_ocn876900980 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr ||||||||||| |
008 |
140415s2014 nju ob 001 0 eng |
010 |
|
|
|a 2014015182
|
040 |
|
|
|a DLC
|b eng
|e rda
|e pn
|c DLC
|d YDX
|d N$T
|d EBLCP
|d DG1
|d E7B
|d TEFOD
|d CUS
|d IDEBK
|d YDXCP
|d DEBSZ
|d COO
|d OCLCF
|d UMI
|d DEBBG
|d OCLCO
|d TEFOD
|d STF
|d B24X7
|d OCLCQ
|d VT2
|d CSJ
|d D6H
|d CNNOR
|d DG1
|d CCO
|d LIP
|d PIFBY
|d ZCU
|d LIV
|d MERUC
|d OCLCQ
|d U3W
|d UCO
|d OCLCQ
|d CEF
|d ICG
|d INT
|d OCLCQ
|d G3B
|d TKN
|d OCLCQ
|d UAB
|d ORZ
|d DKC
|d OCLCQ
|d BRF
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 882610202
|a 893436806
|a 900003714
|a 961588044
|a 962646351
|
020 |
|
|
|a 9781118908808
|q (epub)
|
020 |
|
|
|a 1118908805
|q (epub)
|
020 |
|
|
|a 9781118908815
|q (pdf)
|
020 |
|
|
|a 1118908813
|q (pdf)
|
020 |
|
|
|z 9781118888148
|q (cloth)
|
020 |
|
|
|z 9781118908785
|
020 |
|
|
|z 1118908783
|
020 |
|
|
|z 1306906458
|
020 |
|
|
|z 9781306906456
|
020 |
|
|
|z 1118888146
|
029 |
1 |
|
|a AU@
|b 000052777481
|
029 |
1 |
|
|a CHBIS
|b 010259706
|
029 |
1 |
|
|a CHBIS
|b 010413347
|
029 |
1 |
|
|a CHNEW
|b 000943012
|
029 |
1 |
|
|a CHVBK
|b 33311311X
|
029 |
1 |
|
|a CHVBK
|b 480254168
|
029 |
1 |
|
|a DEBBG
|b BV042182837
|
029 |
1 |
|
|a DEBBG
|b BV043396690
|
029 |
1 |
|
|a DEBBG
|b BV043610174
|
029 |
1 |
|
|a DEBSZ
|b 409827983
|
029 |
1 |
|
|a DEBSZ
|b 417235267
|
029 |
1 |
|
|a DEBSZ
|b 420034722
|
029 |
1 |
|
|a DEBSZ
|b 449433226
|
029 |
1 |
|
|a DEBSZ
|b 485047535
|
029 |
1 |
|
|a DKDLA
|b 820120-katalog:999942697205765
|
029 |
1 |
|
|a NZ1
|b 15592109
|
029 |
1 |
|
|a NZ1
|b 15906896
|
035 |
|
|
|a (OCoLC)876900980
|z (OCoLC)882610202
|z (OCoLC)893436806
|z (OCoLC)900003714
|z (OCoLC)961588044
|z (OCoLC)962646351
|
037 |
|
|
|a E024C110-C148-46F5-8C15-3D328778880C
|b OverDrive, Inc.
|n http://www.overdrive.com
|
042 |
|
|
|a pcc
|
050 |
0 |
0 |
|a TK5105.59
|
072 |
|
7 |
|a BUS
|x 082000
|2 bisacsh
|
072 |
|
7 |
|a BUS
|x 041000
|2 bisacsh
|
072 |
|
7 |
|a BUS
|x 042000
|2 bisacsh
|
072 |
|
7 |
|a BUS
|x 085000
|2 bisacsh
|
082 |
0 |
0 |
|a 658.4/78
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Touhill, Gregory J.,
|e author.
|
245 |
1 |
0 |
|a Cybersecurity for executives :
|b a practical guide /
|c by Gregory J. Touhill and C. Joseph Touhill.
|
264 |
|
1 |
|a Hoboken, New Jersey :
|b John Wiley & Sons,
|c [2014]
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references and index.
|
588 |
0 |
|
|a Online resource; title from digital title page (viewed on February 20, 2019).
|
520 |
|
|
|a This guide can be used by executives to make well-informed decisions on cybersecurity issues to better protect their business. It emphasizes, in a direct and uncomplicated way, how executives can identify, understand, assess, and mitigate risks associated with cybersecurity issues; covers what to do when you get hacked, including business continuity and disaster recovery planning, public relations, legal and regulatory issues, and notifications and disclosures; provides steps for integrating cybersecurity into strategy, policy and guidelines, change management and personnel management; identifies cybersecurity best practices that executives can and should use both in the office and at home to protect their vital information. --
|c Edited summary from book.
|
505 |
0 |
|
|a Cybersecurity for Executives: A Practical Guide; Contents ; Foreword ; Preface ; Acknowledgments ; 1.0 INTRODUCTION ; 1.1 DEFINING CYBERSECURITY; 1.2 CYBERSECURITY IS A BUSINESS IMPERATIVE; 1.3 CYBERSECURITY IS AN EXECUTIVE-LEVEL CONCERN; 1.4 QUESTIONS TO ASK; 1.5 VIEWS OF OTHERS; 1.6 CYBERSECURITY IS A FULL-TIME ACTIVITY; 2.0 WHY BE CONCERNED? ; 2.1 A CLASSIC HACK; 2.2 WHO WANTS YOUR FORTUNE?; 2.3 NATION-STATE THREATS; 2.3.1 China; 2.3.2 Don't Think that China is the Only One; 2.4 CYBERCRIME IS BIG BUSINESS; 2.4.1 Mercenary Hackers; 2.4.2 Hacktivists; 2.4.3 The Insider Threat.
|
505 |
8 |
|
|a 2.4.4 Substandard Products and Services; 2.5 SUMMARY; 3.0 MANAGING RISK ; 3.1 WHO OWNS RISK IN YOUR BUSINESS?; 3.2 WHAT ARE YOUR RISKS?; 3.2.1 Threats to Your Intellectual Property and Trade Secrets; 3.2.2 Technical Risks; 3.2.3 Human Risks; 3.3 CALCULATING YOUR RISK; 3.3.1 Quantitative Risk Assessment; 3.3.2 Qualitative Risk Assessment; 3.3.3 Risk Decisions; 3.4 COMMUNICATING RISK; 3.4.1 Communicating Risk Internally; 3.4.2 Regulatory Communications; 3.4.3 Communicating with Shareholders; 3.5 ORGANIZING FOR SUCCESS; 3.5.1 Risk Management Committee; 3.5.2 Chief Risk Officers; 3.6 SUMMARY.
|
505 |
8 |
|
|a 4.0 BUILD YOUR STRATEGY 4.1 HOW MUCH "CYBERSECURITY" DO I NEED?; 4.2 THE MECHANICS OF BUILDING YOUR STRATEGY; 4.2.1 Where are We Now?; 4.2.2 What do We have to Work with?; 4.2.3 Where do We Want to be?; 4.2.4 How do We Get There?; 4.2.5 Goals and Objectives; 4.3 AVOIDING STRATEGY FAILURE; 4.3.1 Poor Plans, Poor Execution; 4.3.2 Lack of Communication; 4.3.3 Resistance to Change; 4.3.4 Lack of Leadership and Oversight; 4.4 WAYS TO INCORPORATE CYBERSECURITY INTO YOUR STRATEGY; 4.4.1 Identify the Information Critical to Your Business; 4.4.2 Make Cybersecurity Part of Your Culture.
|
505 |
8 |
|
|a 4.4.3 Consider Cybersecurity Impacts in Your Decisions; 4.4.4 Measure Your Progress; 4.5 PLAN FOR SUCCESS; 4.6 SUMMARY; 5.0 Plan for Success ; 5.1 TURNING VISION INTO REALITY; 5.1.1 Planning for Excellence; 5.1.2 A Plan of Action; 5.1.3 Doing Things ; 5.2 POLICIES COMPLEMENT PLANS; 5.2.1 Great Cybersecurity Policies for Everyone; 5.2.2 Be Clear about Your Policies and Who Owns Them; 5.3 PROCEDURES IMPLEMENT PLANS; 5.4 EXERCISE YOUR PLANS; 5.5 LEGAL COMPLIANCE CONCERNS; 5.6 AUDITING; 5.7 SUMMARY; 6.0 CHANGE MANAGEMENT ; 6.1 WHY MANAGING CHANGE IS IMPORTANT; 6.2 WHEN TO CHANGE?
|
505 |
8 |
|
|a 6.3 WHAT IS IMPACTED BY CHANGE?6.4 CHANGE MANAGEMENT AND INTERNAL CONTROLS; 6.5 CHANGE MANAGEMENT AS A PROCESS; 6.5.1 The Touhill Change Management Process; 6.5.2 Following the Process; 6.5.3 Have a Plan B, Plan C, and maybe a Plan D; 6.6 BEST PRACTICES IN CHANGE MANAGEMENT; 6.7 SUMMARY; 7.0 PERSONNEL MANAGEMENT ; 7.1 FINDING THE RIGHT FIT; 7.2 CREATING THE TEAM; 7.2.1 Picking the Right Leaders; 7.2.2 Your Cybersecurity Leaders; 7.3 ESTABLISHING PERFORMANCE STANDARDS; 7.4 ORGANIZATIONAL CONSIDERATIONS; 7.5 TRAINING FOR SUCCESS; 7.5.1 Information Every Employee Ought to Know.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Industrial Management.
|2 bisacsh
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Management.
|2 bisacsh
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Management Science.
|2 bisacsh
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Organizational Behavior.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
700 |
1 |
|
|a Touhill, C. J.,
|d 1938-
|e author.
|
776 |
0 |
8 |
|i Print version:
|a Touhill, Gregory J.
|t Cybersecurity for executives.
|d Hoboken, New Jersey : Wiley, [2014]
|z 9781118888148
|w (DLC) 2014002691
|w (OCoLC)876900683
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781118908808/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00072721
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL1707094
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10879737
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 792115
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n cis28553940
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 11605720
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 12673621
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 11858484
|
994 |
|
|
|a 92
|b IZTAP
|