MARC details
000 -LEADER |
fixed length control field |
03486nmm a22003257a 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
OSt |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20240812095340.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
240812b |||||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781804616741 (e-book) |
040 ## - CATALOGING SOURCE |
Transcribing agency |
Cavite State University - Main Campus Library |
Description conventions |
rda |
041 ## - LANGUAGE CODE |
Language code of text/sound track or separate title |
eng |
050 ## - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA76.9 |
Item number |
A25 B81 2023 |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
Brown, Jason |
9 (RLIN) |
47909 |
Relator term |
author |
245 ## - TITLE STATEMENT |
Title |
Executive's cybersecurity program handbook : |
Remainder of title |
a comprehensive guide to building and operationalizing a complete cybersecurity program / |
Statement of responsibility, etc. |
by Jason Brown |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Birmingham : |
Name of publisher, distributor, etc. |
Packt Publishing, Limited , |
Date of publication, distribution, etc. |
2023 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
1 online resource (232, pages) : |
Other physical details |
color illustrations. |
336 ## - CONTENT TYPE |
Source |
rdacontent |
Content type term |
text |
337 ## - MEDIA TYPE |
Source |
rdamedia |
Media type term |
computer |
338 ## - CARRIER TYPE |
Source |
rdacarrier |
Carrier type term |
online resource |
500 ## - GENERAL NOTE |
General note |
https://portal.igpublish.com/iglibrary/ is required to read this e-book. |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes index<br/> |
505 ## - FORMATTED CONTENTS NOTE |
Formatted contents note |
Part 1. Getting your program off the ground -- 1. The first 90 days -- 2. Choosing the right cybersecurity framework -- 3. Cybersecurity strategic planning through the assessment process -- Part 2. Administrative cybersecurity controls<br/>-- 4. Establishing governance through policy -- 5. The security team -- 6. Risk management -- 7. Incident response -- 8. Security awareness and training -- 3. Technical controls -- 9. Network security -- 10. Computer and server security --<br/>11. Securing software development through DevSecOps --12. Testing your security and building metrics |
520 ## - SUMMARY, ETC. |
Summary, etc. |
nsomware, phishing, and data breaches are major concerns affecting all organizations as a new cyber threat seems to emerge every day, making it paramount to protect the security of your organization and be prepared for potential cyberattacks. This book will ensure that you can build a reliable cybersecurity framework to keep your organization safe from cyberattacks. This Executive’s Cybersecurity Program Handbook explains the importance of executive buy-in, mission, and vision statement of the main pillars of security program (governance, defence, people and innovation). You’ll explore the different types of cybersecurity frameworks, how they differ from one another, and how to pick the right framework to minimize cyber risk. As you advance, you’ll perform an assessment against the NIST Cybersecurity Framework, which will help you evaluate threats to your organization by identifying both internal and external vulnerabilities. Toward the end, you’ll learn the importance of standard cybersecurity policies, along with concepts of governance, risk, and compliance, and become well-equipped to build an effective incident response team. By the end of this book, you’ll have gained a thorough understanding of how to build your security program from scratch as well as the importance of implementing administrative and technical security controls. |
541 ## - IMMEDIATE SOURCE OF ACQUISITION NOTE |
Source of acquisition |
Fund 164 |
Vendor |
CE-Logic |
Method of acquisition |
Purchased |
Date of acquisition |
February 19, 2024 |
Accession number |
OEBP000453<br/> |
Owner |
P. Roderno |
Purchase price |
PHP 5,586.00 <br/> |
PO No. |
2024-02-0124 |
Sales Invoice No. |
2024-1-113 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer security |
9 (RLIN) |
1768 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Business |
9 (RLIN) |
2849 |
General subdivision |
Data processing |
856 ## - ELECTRONIC LOCATION AND ACCESS |
Electronic File |
<a href="https://portal.igpublish.com/iglibrary/obj/PACKT0006579?searchid=1720055929622_n3bGJhdSMJEBT4IorQGN">https://portal.igpublish.com/iglibrary/obj/PACKT0006579?searchid=1720055929622_n3bGJhdSMJEBT4IorQGN</a> |
Link text |
Click here to read Full-Text E-Book |
856 ## - ELECTRONIC LOCATION AND ACCESS |
Electronic File |
<a href="https://docs.google.com/forms/d/e/1FAIpQLSfSoAj3qM4b_ttQMZLuimqgwkfHDH1NyJ7S4eyjHD7Vr4j7EQ/viewform">https://docs.google.com/forms/d/e/1FAIpQLSfSoAj3qM4b_ttQMZLuimqgwkfHDH1NyJ7S4eyjHD7Vr4j7EQ/viewform</a> |
Link text |
Log-in to the website is required to read this e-book. Click here to request access. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Library of Congress Classification |
Koha item type |
Online E-Books |