Welcome to Central Library, SUST

Cybersecurity for executives : (Record no. 64875)

MARC details
000 -LEADER
fixed length control field 07384cam a2200985 i 4500
001 - CONTROL NUMBER
control field sulb-eb0033223
003 - CONTROL NUMBER IDENTIFIER
control field BD-SySUS
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20170713221358.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr |||||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 140415s2014 nju ob 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2014015182
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Language of cataloging eng
Description conventions rda
Transcribing agency DLC
Modifying agency YDX
-- N$T
-- EBLCP
-- DG1
-- E7B
-- TEFOD
-- CUS
-- IDEBK
-- YDXCP
-- DEBSZ
-- COO
-- OCLCF
-- UMI
-- DEBBG
-- OCLCO
-- TEFOD
-- STF
-- B24X7
-- OCLCQ
-- VT2
-- CSJ
-- D6H
-- BD-SySUS
019 ## -
-- 882610202
-- 893436806
-- 900003714
-- 961588044
-- 962646351
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781118908808 (epub)
International Standard Book Number 1118908805 (epub)
International Standard Book Number 9781118908815 (pdf)
International Standard Book Number 1118908813 (pdf)
Canceled/invalid ISBN 9781118888148 (cloth)
Canceled/invalid ISBN 9781118908785
Canceled/invalid ISBN 1118908783
Canceled/invalid ISBN 1306906458
Canceled/invalid ISBN 9781306906456
Canceled/invalid ISBN 1118888146
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier CHBIS
System control number 010259706
OCLC library identifier CHVBK
System control number 325943443
OCLC library identifier DEBSZ
System control number 409827983
OCLC library identifier DEBSZ
System control number 417235267
OCLC library identifier DEBSZ
System control number 420034722
OCLC library identifier NZ1
System control number 15592109
OCLC library identifier NZ1
System control number 15906896
OCLC library identifier CHVBK
System control number 33311311X
OCLC library identifier CHBIS
System control number 010413347
OCLC library identifier DEBSZ
System control number 449433226
OCLC library identifier DEBBG
System control number BV042182837
OCLC library identifier DEBBG
System control number BV043610174
OCLC library identifier DEBBG
System control number BV043396690
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)876900980
Canceled/invalid control number (OCoLC)882610202
-- (OCoLC)893436806
-- (OCoLC)900003714
-- (OCoLC)961588044
-- (OCoLC)962646351
037 ## - SOURCE OF ACQUISITION
Stock number E024C110-C148-46F5-8C15-3D328778880C
Source of stock number/acquisition OverDrive, Inc.
Note http://www.overdrive.com
042 ## - AUTHENTICATION CODE
Authentication code pcc
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5105.59
072 #7 - SUBJECT CATEGORY CODE
Subject category code BUS
Subject category code subdivision 082000
Source bisacsh
Subject category code BUS
Subject category code subdivision 041000
Source bisacsh
Subject category code BUS
Subject category code subdivision 042000
Source bisacsh
Subject category code BUS
Subject category code subdivision 085000
Source bisacsh
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 658.4/78
Edition number 23
049 ## - LOCAL HOLDINGS (OCLC)
Holding library MAIN
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Touhill, Gregory J.
245 10 - TITLE STATEMENT
Title Cybersecurity for executives :
Remainder of title a practical guide /
Statement of responsibility, etc. by Gregory J. Touhill and C. Joseph Touhill.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Hoboken, New Jersey :
Name of producer, publisher, distributor, manufacturer John Wiley & Sons,
Date of production, publication, distribution, manufacture, or copyright notice [2014]
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource.
336 ## - CONTENT TYPE
Content type term text
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Source rdacarrier
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
588 ## - SOURCE OF DESCRIPTION NOTE
Source of description note Description based on print version record and CIP data provided by publisher.
520 ## - SUMMARY, ETC.
Summary, etc. This guide can be used by executives to make well-informed decisions on cybersecurity issues to better protect their business. It emphasizes, in a direct and uncomplicated way, how executives can identify, understand, assess, and mitigate risks associated with cybersecurity issues; covers what to do when you get hacked, including business continuity and disaster recovery planning, public relations, legal and regulatory issues, and notifications and disclosures; provides steps for integrating cybersecurity into strategy, policy and guidelines, change management and personnel management; identifies cybersecurity best practices that executives can and should use both in the office and at home to protect their vital information. --
Assigning source Edited summary from book.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Cybersecurity for Executives: A Practical Guide; Contents ; Foreword ; Preface ; Acknowledgments ; 1.0 INTRODUCTION ; 1.1 DEFINING CYBERSECURITY; 1.2 CYBERSECURITY IS A BUSINESS IMPERATIVE; 1.3 CYBERSECURITY IS AN EXECUTIVE-LEVEL CONCERN; 1.4 QUESTIONS TO ASK; 1.5 VIEWS OF OTHERS; 1.6 CYBERSECURITY IS A FULL-TIME ACTIVITY; 2.0 WHY BE CONCERNED? ; 2.1 A CLASSIC HACK; 2.2 WHO WANTS YOUR FORTUNE?; 2.3 NATION-STATE THREATS; 2.3.1 China; 2.3.2 Don't Think that China is the Only One; 2.4 CYBERCRIME IS BIG BUSINESS; 2.4.1 Mercenary Hackers; 2.4.2 Hacktivists; 2.4.3 The Insider Threat
Formatted contents note 2.4.4 Substandard Products and Services2.5 SUMMARY; 3.0 MANAGING RISK ; 3.1 WHO OWNS RISK IN YOUR BUSINESS?; 3.2 WHAT ARE YOUR RISKS?; 3.2.1 Threats to Your Intellectual Property and Trade Secrets; 3.2.2 Technical Risks; 3.2.3 Human Risks; 3.3 CALCULATING YOUR RISK; 3.3.1 Quantitative Risk Assessment; 3.3.2 Qualitative Risk Assessment; 3.3.3 Risk Decisions; 3.4 COMMUNICATING RISK; 3.4.1 Communicating Risk Internally; 3.4.2 Regulatory Communications; 3.4.3 Communicating with Shareholders; 3.5 ORGANIZING FOR SUCCESS; 3.5.1 Risk Management Committee; 3.5.2 Chief Risk Officers; 3.6 SUMMARY
Formatted contents note 4.0 BUILD YOUR STRATEGY 4.1 HOW MUCH "CYBERSECURITY" DO I NEED?; 4.2 THE MECHANICS OF BUILDING YOUR STRATEGY; 4.2.1 Where are We Now?; 4.2.2 What do We have to Work with?; 4.2.3 Where do We Want to be?; 4.2.4 How do We Get There?; 4.2.5 Goals and Objectives; 4.3 AVOIDING STRATEGY FAILURE; 4.3.1 Poor Plans, Poor Execution; 4.3.2 Lack of Communication; 4.3.3 Resistance to Change; 4.3.4 Lack of Leadership and Oversight; 4.4 WAYS TO INCORPORATE CYBERSECURITY INTO YOUR STRATEGY; 4.4.1 Identify the Information Critical to Your Business; 4.4.2 Make Cybersecurity Part of Your Culture
Formatted contents note 4.4.3 Consider Cybersecurity Impacts in Your Decisions4.4.4 Measure Your Progress; 4.5 PLAN FOR SUCCESS; 4.6 SUMMARY; 5.0 Plan for Success ; 5.1 TURNING VISION INTO REALITY; 5.1.1 Planning for Excellence; 5.1.2 A Plan of Action; 5.1.3 Doing Things ; 5.2 POLICIES COMPLEMENT PLANS; 5.2.1 Great Cybersecurity Policies for Everyone; 5.2.2 Be Clear about Your Policies and Who Owns Them; 5.3 PROCEDURES IMPLEMENT PLANS; 5.4 EXERCISE YOUR PLANS; 5.5 LEGAL COMPLIANCE CONCERNS; 5.6 AUDITING; 5.7 SUMMARY; 6.0 CHANGE MANAGEMENT ; 6.1 WHY MANAGING CHANGE IS IMPORTANT; 6.2 WHEN TO CHANGE?
Formatted contents note 6.3 WHAT IS IMPACTED BY CHANGE?6.4 CHANGE MANAGEMENT AND INTERNAL CONTROLS; 6.5 CHANGE MANAGEMENT AS A PROCESS; 6.5.1 The Touhill Change Management Process; 6.5.2 Following the Process; 6.5.3 Have a Plan B, Plan C, and maybe a Plan D; 6.6 BEST PRACTICES IN CHANGE MANAGEMENT; 6.7 SUMMARY; 7.0 PERSONNEL MANAGEMENT ; 7.1 FINDING THE RIGHT FIT; 7.2 CREATING THE TEAM; 7.2.1 Picking the Right Leaders; 7.2.2 Your Cybersecurity Leaders; 7.3 ESTABLISHING PERFORMANCE STANDARDS; 7.4 ORGANIZATIONAL CONSIDERATIONS; 7.5 TRAINING FOR SUCCESS; 7.5.1 Information Every Employee Ought to Know
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures.
Topical term or geographic name as entry element Computer networks
General subdivision Security measures.
Topical term or geographic name as entry element BUSINESS & ECONOMICS
General subdivision Industrial Management.
Source of heading or term bisacsh
Topical term or geographic name as entry element BUSINESS & ECONOMICS
General subdivision Management.
Source of heading or term bisacsh
Topical term or geographic name as entry element BUSINESS & ECONOMICS
General subdivision Management Science.
Source of heading or term bisacsh
Topical term or geographic name as entry element BUSINESS & ECONOMICS
General subdivision Organizational Behavior.
Source of heading or term bisacsh
Topical term or geographic name as entry element Computer networks
General subdivision Security measures.
Source of heading or term fast
Authority record control number (OCoLC)fst00872341
Topical term or geographic name as entry element Computer networks / Security measures.
Source of heading or term local
655 #4 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
Genre/form data or focus term Electronic books.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Touhill, C. J.,
Dates associated with a name 1938-
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
Main entry heading Touhill, Gregory J.
Title Cybersecurity for executives
Place, publisher, and date of publication Hoboken, New Jersey : John Wiley & Sons, [2014]
International Standard Book Number 9781118888148
Record control number (DLC) 2014002691
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="http://onlinelibrary.wiley.com/book/10.1002/9781118908785">http://onlinelibrary.wiley.com/book/10.1002/9781118908785</a>
Public note Wiley Online Library [Free Download only for SUST IP]
938 ## -
-- EBL - Ebook Library
-- EBLB
-- EBL1707094
-- ebrary
-- EBRY
-- ebr10879737
-- EBSCOhost
-- EBSC
-- 792115
-- Ingram Digital eBook Collection
-- IDEB
-- cis28553940
-- YBP Library Services
-- YANK
-- 11858484
-- YBP Library Services
-- YANK
-- 11605720
-- YBP Library Services
-- YANK
-- 12673621
-- Books 24x7
-- B247
-- bks00072721
994 ## -
-- 92
-- DG1

No items available.