The Cybersecurity Playbook : (Record no. 7889)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 02213cam a22002298i 4500 |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20251224151253.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 190607s2019 mau ob 001 0 eng |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| ISBN | 9781119442165 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| ISBN | 9781119442134 |
| 041 ## - LANGUAGE CODE | |
| Language code of text/sound track or separate title | eng |
| 082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 005.8 |
| Item number | CerC |
| 100 1# - MAIN ENTRY--AUTHOR NAME | |
| Personal name | Cerra, Allison |
| 245 14 - TITLE STATEMENT | |
| Title | The Cybersecurity Playbook : |
| Remainder of title | How Every Leader and Employee Can Contribute to a Culture of Security / |
| Statement of responsibility, etc | Allison Cerra |
| 250 ## - EDITION STATEMENT | |
| Edition statement | 1st ed. |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc | "Today's headlines are littered with cybersecurity breaches -- each more damning than the last. For too long, cybersecurity has been relegated to the corridors of IT. Every organization's weakest link in cybersecurity is its own employees, as hackers dupe them to get access to an organization's systems. Yet most employees have no idea how to help prevent attacks, why they should bother, or what to look for. But, with any manager or employee the next unsuspecting dupe, cybersecurity can no longer be someone else's problem, but the mandate of all. While many books serve as educational resources on the topic of cybersecurity, they stop short of explaining how employees take up arms in the fight against a pernicious threat. Doing so requires demystifying cybersecurity for the business audience, giving practical prescription to these users on how they can adopt smart cybersecurity habits in their function. To make the topic both accessible and practical, this book will move beyond simply identifying the problem and provide practical prescriptions, offering simple checklists and action plans than any manager in the organization can take to protect his organization from an unknown threat. Further, the book will be based on primary marketing research, including in-depth interviews among CIOs, CISOs and other functional business leaders (e.g., CMOs and CHROs) to measure the extent of the gap among these senior leaders in making cybersecurity a business priority"-- |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical Term | Computer security |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical Term | Computer networks |
| General subdivision | Security measures |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical Term | Corporate culture |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical Term | Confidential business information |
| General subdivision | Security measures |
| 856 ## - ELECTRONIC LOCATION AND ACCESS | |
| Uniform Resource Identifier | https://ieeexplore.ieee.org/servlet/opac?bknumber=10013706 |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Koha item type | E-Books |
| Withdrawn status | Lost status | Damaged status | Home library | Current library | Date acquired | Full call number | Accession Number | Bill Date/Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|
| Indian Institute of Technology Tirupati | Indian Institute of Technology Tirupati | 24/12/2025 | 005.8 CerC | EB00814 | 24/12/2025 | E-Books |