The Cybersecurity Playbook : (Record no. 7889)

MARC details
000 -LEADER
fixed length control field 02213cam a22002298i 4500
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20251224151253.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 190607s2019 mau ob 001 0 eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781119442165
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781119442134
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title eng
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Item number CerC
100 1# - MAIN ENTRY--AUTHOR NAME
Personal name Cerra, Allison
245 14 - TITLE STATEMENT
Title The Cybersecurity Playbook :
Remainder of title How Every Leader and Employee Can Contribute to a Culture of Security /
Statement of responsibility, etc Allison Cerra
250 ## - EDITION STATEMENT
Edition statement 1st ed.
520 ## - SUMMARY, ETC.
Summary, etc "Today's headlines are littered with cybersecurity breaches -- each more damning than the last. For too long, cybersecurity has been relegated to the corridors of IT. Every organization's weakest link in cybersecurity is its own employees, as hackers dupe them to get access to an organization's systems. Yet most employees have no idea how to help prevent attacks, why they should bother, or what to look for. But, with any manager or employee the next unsuspecting dupe, cybersecurity can no longer be someone else's problem, but the mandate of all. While many books serve as educational resources on the topic of cybersecurity, they stop short of explaining how employees take up arms in the fight against a pernicious threat. Doing so requires demystifying cybersecurity for the business audience, giving practical prescription to these users on how they can adopt smart cybersecurity habits in their function. To make the topic both accessible and practical, this book will move beyond simply identifying the problem and provide practical prescriptions, offering simple checklists and action plans than any manager in the organization can take to protect his organization from an unknown threat. Further, the book will be based on primary marketing research, including in-depth interviews among CIOs, CISOs and other functional business leaders (e.g., CMOs and CHROs) to measure the extent of the gap among these senior leaders in making cybersecurity a business priority"--
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Computer security
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Computer networks
General subdivision Security measures
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Corporate culture
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Confidential business information
General subdivision Security measures
856 ## - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://ieeexplore.ieee.org/servlet/opac?bknumber=10013706
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type E-Books
Holdings
Withdrawn status Lost status Damaged status Home library Current library Date acquired Full call number Accession Number Bill Date/Price effective from Koha item type
      Indian Institute of Technology Tirupati Indian Institute of Technology Tirupati 24/12/2025 005.8 CerC EB00814 24/12/2025 E-Books