You can stop stupid : (Record no. 7863)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 02235nam a22002055i 4500 |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20251224105049.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 191210s2020 inu 000 0 eng |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| ISBN | 9781119621980 |
| 041 ## - LANGUAGE CODE | |
| Language code of text/sound track or separate title | eng |
| 082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 658.47 |
| Item number | WinY |
| 100 1# - MAIN ENTRY--AUTHOR NAME | |
| Personal name | Winkler, Ira |
| 245 10 - TITLE STATEMENT | |
| Title | You can stop stupid : |
| Remainder of title | stopping losses from accidental and malicious actions / |
| Statement of responsibility, etc | Ira Winkler |
| 250 ## - EDITION STATEMENT | |
| Edition statement | 1 ed. |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc | Stopping Losses from Accidental and Malicious Actions Around the world, users cost organizations billions of dollars due to simple errors and malicious actions. They believe that there is some deficiency in the users. In response, organizations believe that they have to improve their awareness efforts and making more secure users. This is like saying that coalmines should get healthier canaries. The reality is that it takes a multilayered approach that acknowledges that users will inevitably make mistakes or have malicious intent, and the failure is in not planning for that. It takes a holistic approach to assessing risk combined with technical defenses and countermeasures layered with a security culture and continuous improvement. Only with this kind of defense in depth can organizations hope to prevent the worst of the cybersecurity breaches and other user-initiated losses. Using lessons from tested and proven disciplines like military kill-chain analysis, counterterrorism analysis, industrial safety programs, and more, Ira Winkler and Dr. Tracy Celaya's You CAN Stop Stupid provides a methodology to analyze potential losses and determine appropriate countermeasures to implement. * Minimize business losses associated with user failings * Proactively plan to prevent and mitigate data breaches * Optimize your security spending * Cost justify your security and loss reduction efforts * Improve your organization's culture Business technology and security professionals will benefit from the information provided by these two well-known and influential cybersecurity speakers and experts. |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical Term | Technology |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical Term | Executive Business intelligence and security |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical Term | Management & public relations |
| 856 ## - ELECTRONIC LOCATION AND ACCESS | |
| Uniform Resource Identifier | https://ieeexplore.ieee.org/servlet/opac?bknumber=9820851 |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Koha item type | Books |
| Withdrawn status | Lost status | Damaged status | Home library | Current library | Date acquired | Full call number | Accession Number | Bill Date/Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|
| Indian Institute of Technology Tirupati | Indian Institute of Technology Tirupati | 24/12/2025 | 658.47 WinY | EB00842 | 24/12/2025 | Books |