Executive's cybersecurity program handbook : (Record no. 64481)

MARC details
000 -LEADER
fixed length control field 03486nmm a22003257a 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240812095340.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 240812b |||||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781804616741 (e-book)
040 ## - CATALOGING SOURCE
Transcribing agency Cavite State University - Main Campus Library
Description conventions rda
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title eng
050 ## - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9
Item number A25 B81 2023
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Brown, Jason
9 (RLIN) 47909
Relator term author
245 ## - TITLE STATEMENT
Title Executive's cybersecurity program handbook :
Remainder of title a comprehensive guide to building and operationalizing a complete cybersecurity program /
Statement of responsibility, etc. by Jason Brown
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Birmingham :
Name of publisher, distributor, etc. Packt Publishing, Limited ,
Date of publication, distribution, etc. 2023
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (232, pages) :
Other physical details color illustrations.
336 ## - CONTENT TYPE
Source rdacontent
Content type term text
337 ## - MEDIA TYPE
Source rdamedia
Media type term computer
338 ## - CARRIER TYPE
Source rdacarrier
Carrier type term online resource
500 ## - GENERAL NOTE
General note https://portal.igpublish.com/iglibrary/ is required to read this e-book.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes index<br/>
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note Part 1. Getting your program off the ground -- 1. The first 90 days -- 2. Choosing the right cybersecurity framework -- 3. Cybersecurity strategic planning through the assessment process -- Part 2. Administrative cybersecurity controls<br/>-- 4. Establishing governance through policy -- 5. The security team -- 6. Risk management -- 7. Incident response -- 8. Security awareness and training -- 3. Technical controls -- 9. Network security -- 10. Computer and server security --<br/>11. Securing software development through DevSecOps --12. Testing your security and building metrics
520 ## - SUMMARY, ETC.
Summary, etc. nsomware, phishing, and data breaches are major concerns affecting all organizations as a new cyber threat seems to emerge every day, making it paramount to protect the security of your organization and be prepared for potential cyberattacks. This book will ensure that you can build a reliable cybersecurity framework to keep your organization safe from cyberattacks. This Executive’s Cybersecurity Program Handbook explains the importance of executive buy-in, mission, and vision statement of the main pillars of security program (governance, defence, people and innovation). You’ll explore the different types of cybersecurity frameworks, how they differ from one another, and how to pick the right framework to minimize cyber risk. As you advance, you’ll perform an assessment against the NIST Cybersecurity Framework, which will help you evaluate threats to your organization by identifying both internal and external vulnerabilities. Toward the end, you’ll learn the importance of standard cybersecurity policies, along with concepts of governance, risk, and compliance, and become well-equipped to build an effective incident response team. By the end of this book, you’ll have gained a thorough understanding of how to build your security program from scratch as well as the importance of implementing administrative and technical security controls.
541 ## - IMMEDIATE SOURCE OF ACQUISITION NOTE
Source of acquisition Fund 164
Vendor CE-Logic
Method of acquisition Purchased
Date of acquisition February 19, 2024
Accession number OEBP000453<br/>
Owner P. Roderno
Purchase price PHP 5,586.00 <br/>
PO No. 2024-02-0124
Sales Invoice No. 2024-1-113
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security
9 (RLIN) 1768
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Business
9 (RLIN) 2849
General subdivision Data processing
856 ## - ELECTRONIC LOCATION AND ACCESS
Electronic File <a href="https://portal.igpublish.com/iglibrary/obj/PACKT0006579?searchid=1720055929622_n3bGJhdSMJEBT4IorQGN">https://portal.igpublish.com/iglibrary/obj/PACKT0006579?searchid=1720055929622_n3bGJhdSMJEBT4IorQGN</a>
Link text Click here to read Full-Text E-Book
856 ## - ELECTRONIC LOCATION AND ACCESS
Electronic File <a href="https://docs.google.com/forms/d/e/1FAIpQLSfSoAj3qM4b_ttQMZLuimqgwkfHDH1NyJ7S4eyjHD7Vr4j7EQ/viewform">https://docs.google.com/forms/d/e/1FAIpQLSfSoAj3qM4b_ttQMZLuimqgwkfHDH1NyJ7S4eyjHD7Vr4j7EQ/viewform</a>
Link text Log-in to the website is required to read this e-book. Click here to request access.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Library of Congress Classification
Koha item type Online E-Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Shelving location Date acquired Source of acquisition Coded location qualifier Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type Public note
    Library of Congress Classification     Non-fiction Ladislao N. Diwa Memorial Library Ladislao N. Diwa Memorial Library Multimedia Section 02/19/2024 164 OEBP   OEBP QA76.9.A25 B81 2023 OEBP000453 08/12/2024 08/12/2024 Online E-Books PAV
    Library of Congress Classification   Room use only Non-fiction Ladislao N. Diwa Memorial Library Ladislao N. Diwa Memorial Library Multimedia Section 02/19/2024 164 EB   EB QA76.9.A25 B81 2023 CD0001382 08/12/2024 08/12/2024 Compact Discs PAV
Copyright © 2024. Cavite State University | Koha 23.05