|
|
|
|
LEADER |
00000cam a2200000Mi 4500 |
001 |
OR_on1224946074 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
201110s2021 xx o 000 0 eng d |
040 |
|
|
|a VT2
|b eng
|e rda
|e pn
|c VT2
|d TOH
|d EBLCP
|d N$T
|d OCLCO
|d YDX
|d OCLCF
|d OCLCQ
|d TEFOD
|d OCLCO
|d OCLCQ
|d OCLCO
|
020 |
|
|
|a 9781492076162
|q (electronic book)
|
020 |
|
|
|a 1492076163
|q (electronic book)
|
020 |
|
|
|a 9781492076186
|q (electronic bk.)
|
020 |
|
|
|a 149207618X
|q (electronic bk.)
|
020 |
|
|
|a 9781492076216
|
020 |
|
|
|a 149207621X
|
029 |
1 |
|
|a AU@
|b 000068857310
|
035 |
|
|
|a (OCoLC)1224946074
|
037 |
|
|
|a 0EE6A87C-8517-4906-9880-A3CDCC2FD620
|b OverDrive, Inc.
|n http://www.overdrive.com
|
050 |
|
4 |
|a QA76.9.A25
|b B37 2021
|
082 |
0 |
4 |
|a 005.8068
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Barnum, Todd.
|
245 |
1 |
0 |
|a Cybersecurity Manager's Guide /
|c Todd Barnum.
|
264 |
|
1 |
|a [Place of publication not identified] :
|b O'Reilly Media, Inc.,
|c 2021.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
500 |
|
|
|a Title from content provider.
|
520 |
|
|
|a If you're a leader in Cybersecurity, then you know it often seems like no one cares about--or understands--information security. Infosec professionals struggle to integrate security into their companies. Most are under resourced. Most are at odds with their organizations. There must be a better way. This essential manager's guide offers a new approach to building and maintaining an information security program that's both effective and easy to follow. Author and longtime infosec leader Todd Barnum upends the assumptions security professionals take for granted. CISOs, CSOs, CIOs, and IT security professionals will learn a simple seven-step process that will help you build a new program or improve your current program. Build better relationships with IT and other teams within your organization Align your role with your company's values, culture, and tolerance for information loss Lay the groundwork for your security program Create a communications program to share your team's contributions and educate your coworkers Transition security functions and responsibilities to other teams Organize and build an effective infosec team Measure your progress with two key metrics: your staff's ability to recognize and report security policy violations and phishing emails.
|
588 |
0 |
|
|a Print version record.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer security
|x Management.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Sécurité informatique
|x Gestion.
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Computer security
|x Management
|2 fast
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781492076209/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL6526782
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 2895812
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 302016019
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 16667303
|
994 |
|
|
|a 92
|b IZTAP
|