|
|
|
|
LEADER |
00000cim a2200000Ma 4500 |
001 |
OR_on1281675285 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
051021s2019 xx uunn o n eng d |
040 |
|
|
|a TOH
|b eng
|c TOH
|d LUN
|d OCLCF
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 1287801460
|
020 |
|
|
|a 9781469074924
|
020 |
|
|
|a 1469074923
|
024 |
8 |
|
|a 9781469074924
|
035 |
|
|
|a (OCoLC)1281675285
|z (OCoLC)1287801460
|
082 |
0 |
4 |
|a 658.4/78
|q OCoLC
|2 23/eng/20230216
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Cerra, Allison,
|e author.
|
245 |
1 |
4 |
|a The Cybersecurity Playbook /
|c Cerra, Allison.
|
250 |
|
|
|a 1st edition.
|
264 |
|
1 |
|b Ascent Audio,
|c 2019.
|
300 |
|
|
|a 1 online resource (17950 pages)
|
336 |
|
|
|a spoken word
|b spw
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a audio file
|
365 |
|
|
|b 109.00
|
520 |
|
|
|a Many books discuss the technical underpinnings and complex configurations necessary for cybersecurity-but they fail to address the everyday steps that boards, managers, and employees can take to prevent attacks. The Cybersecurity Playbook is the step-by-step guide to protecting your organization from unknown threats and integrating good security habits into everyday business situations. This book provides clear guidance on how to identify weaknesses, assess possible threats, and implement effective policies. Recognizing that an organization's security is only as strong as its weakest link, this book offers specific strategies for employees at every level. Drawing from her experience as CMO of one of the world's largest cybersecurity companies, author Allison Cerra incorporates straightforward assessments, adaptable action plans, and many current examples to provide practical recommendations for cybersecurity policies. By demystifying cybersecurity and applying the central concepts to real-world business scenarios, this book will help you deploy cybersecurity measures using easy-to-follow methods and proven techniques, develop a practical security plan tailor-made for your specific needs, and incorporate vital security practices into your everyday workflow quickly and efficiently.
|
542 |
|
|
|f Copyright © Ascent Audio
|
550 |
|
|
|a Made available through: Safari, an O'Reilly Media Company.
|
588 |
0 |
|
|a Online resource; Title from title page (viewed October 15, 2019).
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Business.
|
650 |
|
6 |
|a Affaires.
|
650 |
|
7 |
|a Business.
|2 fast
|0 (OCoLC)fst00842262
|
655 |
|
4 |
|a Audiobooks.
|
700 |
1 |
|
|a Cannon, Chloe,
|e narrator.
|
710 |
2 |
|
|a O'Reilly for Higher Education (Firm),
|e distributor.
|
710 |
2 |
|
|a Safari, an O'Reilly Media Company.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781469074924/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|