|
|
|
|
LEADER |
00000cam a22000008i 4500 |
001 |
OR_on1112384760 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr ||||||||||| |
008 |
190607s2019 mau ob 001 0 eng |
010 |
|
|
|a 2019980946
|
040 |
|
|
|a DLC
|b eng
|e rda
|c DLC
|d EBLCP
|d OCLCF
|d N$T
|d YDXIT
|d RECBK
|d CNO
|d WAU
|d UKMGB
|d OCLCO
|d UMI
|d VT2
|d K6U
|d UKAHL
|d OCLCO
|d OCLCQ
|d IEEEE
|
015 |
|
|
|a GBB905735
|2 bnb
|
016 |
7 |
|
|a 019203131
|2 Uk
|
019 |
|
|
|a 1113766403
|a 1151768086
|a 1235836178
|a 1240525435
|
020 |
|
|
|a 9781119442165
|q (pdf)
|
020 |
|
|
|a 1119442168
|
020 |
|
|
|a 9781119442134
|q (epub)
|
020 |
|
|
|a 1119442133
|
020 |
|
|
|a 1119442192
|
020 |
|
|
|a 9781119442196
|
020 |
|
|
|a 9781394197521
|q (electronic bk.)
|
020 |
|
|
|a 1394197527
|q (electronic bk.)
|
024 |
7 |
|
|a 10.1002/9781394197521
|2 doi
|
028 |
0 |
2 |
|a EB00764113
|b Recorded Books
|
029 |
1 |
|
|a AU@
|b 000066005961
|
029 |
0 |
|
|a UKMGB
|b 019203131
|
029 |
1 |
|
|a AU@
|b 000074095074
|
035 |
|
|
|a (OCoLC)1112384760
|z (OCoLC)1113766403
|z (OCoLC)1151768086
|z (OCoLC)1235836178
|z (OCoLC)1240525435
|
037 |
|
|
|a 9781119442134
|b Wiley
|
037 |
|
|
|a 10013706
|b IEEE
|
042 |
|
|
|a pcc
|
050 |
0 |
0 |
|a QA76.9.A25
|
082 |
0 |
0 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Cerra, Allison,
|e author.
|
245 |
1 |
4 |
|a The cybersecurity playbook :
|b how every leader and employee can contribute to a culture of security /
|c Allison Cerra.
|
250 |
|
|
|a First edition.
|
263 |
|
|
|a 1908
|
264 |
|
1 |
|a Hoboken :
|b Wiley,
|c 2019.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b n
|2 rdamedia
|
338 |
|
|
|a online resource
|b nc
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references and index.
|
520 |
|
|
|a "Today's headlines are littered with cybersecurity breaches -- each more damning than the last. For too long, cybersecurity has been relegated to the corridors of IT. Every organization's weakest link in cybersecurity is its own employees, as hackers dupe them to get access to an organization's systems. Yet most employees have no idea how to help prevent attacks, why they should bother, or what to look for. But, with any manager or employee the next unsuspecting dupe, cybersecurity can no longer be someone else's problem, but the mandate of all. While many books serve as educational resources on the topic of cybersecurity, they stop short of explaining how employees take up arms in the fight against a pernicious threat. Doing so requires demystifying cybersecurity for the business audience, giving practical prescription to these users on how they can adopt smart cybersecurity habits in their function. To make the topic both accessible and practical, this book will move beyond simply identifying the problem and provide practical prescriptions, offering simple checklists and action plans than any manager in the organization can take to protect his organization from an unknown threat. Further, the book will be based on primary marketing research, including in-depth interviews among CIOs, CISOs and other functional business leaders (e.g., CMOs and CHROs) to measure the extent of the gap among these senior leaders in making cybersecurity a business priority"--
|c Provided by publisher.
|
588 |
|
|
|a Description based on print version record and CIP data provided by publisher; resource not viewed.
|
505 |
0 |
|
|a Chapter 1 The Time I Ruined Easter 1 -- Lessons Learned the Hard Way 8 -- Additional Lessons for You 12 -- Who Was at Fault? 14 -- Remember This Crucial Element 15 -- Why Me? 16 -- Why You? 17 -- W.I.S.D.O.M. 19 -- Chapter 2 Mr./Ms. Cellophane 23 -- The New Kid on the Block 26 -- W.I.S.D.O.M. for the Board and CEO 38 -- Making Mr./Ms. Cellophane Visible 41 -- Chapter 3 “Good Morning, This is Your Wakeup Call.” 47 -- The Best Defense 54 -- W.I.S.D.O.M. for the Employee 59 -- Chapter 4 Stop the Line 69 -- The Internet of Terrorism 74 -- W.I.S.D.O.M. for the Product Developer 80 -- Chapter 5 Bridging the Gap 87 -- When Too Much of a Good Thing is Bad 90 -- It Wasn’t Always This Way 92 -- W.I.S.D.O.M. for HR Professionals 96 -- Chapter 6 Luck Favors the Prepared 109 -- BREACH! 112 -- Preparing for Battle 115 -- W.I.S.D.O.M. for the Marketer/Communicator 119 -- Chapter 7 Interesting Bedfellows 127 -- The More Things Change . . . 132 -- . . . the More They Stay the Same 137 -- W.I.S.D.O.M. for the Finance Professional 142 -- Chapter 8 Mr./Ms. Cellophane (Reprise) 147 -- A Picture is Worth a Thousand Words 149 -- Letting Go to Hold On 153 -- Assuming the Mantle 156 -- W.I.S.D.O.M. for the Cybersecurity Professional 158 -- Chapter 9 Experiencing a Culture of Security 169 -- Chapter 10 A Culture of Security for All 187 -- W.I.S.D.O.M. for the CEO/Board Member 191 -- W.I.S.D.O.M. for the Employee 191 -- W.I.S.D.O.M. for the Product Developer 192 -- W.I.S.D.O.M. for the HR Professional 192 -- W.I.S.D.O.M. for the Marketer/Communicator 193 -- W.I.S.D.O.M. for the Finance Professional 194 -- W.I.S.D.O.M. for the Cybersecurity Professional 198 -- Acknowledgments 201 -- About the Author 203 -- Index 205.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Corporate culture.
|
650 |
|
0 |
|a Confidential business information
|x Security measures.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
2 |
|a Organizational Culture
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Culture d'entreprise.
|
650 |
|
6 |
|a Renseignements commerciaux confidentiels
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Industries
|x Computers & Information Technology.
|2 bisacsh
|
650 |
|
7 |
|a Corporate culture.
|2 fast
|0 (OCoLC)fst00879624
|
650 |
|
7 |
|a Confidential business information.
|2 fast
|0 (OCoLC)fst00874699
|
650 |
|
7 |
|a Business enterprises
|x Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00842535
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
776 |
0 |
8 |
|i Print version:
|a Cerra, Allison.
|t The cybersecurity playbook
|b First edition.
|d Hoboken : Wiley, 2019.
|z 9781119442196
|w (DLC) 2019018181
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781119442196/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH35216458
|
938 |
|
|
|a Recorded Books, LLC
|b RECE
|n rbeEB00764113
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 2226926
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL5848207
|
994 |
|
|
|a 92
|b IZTAP
|