MARC details
000 -LEADER |
fixed length control field |
01715nam a22004097a 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
OSt |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20231110085504.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS |
fixed length control field |
m|||||o||d| 00| 0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
cr || auc||a|a |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
210324s2020 nyua||||s|||| 001 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781484259528 |
Qualifying information |
electronic |
040 ## - CATALOGING SOURCE |
Transcribing agency |
QCPL |
100 1# - MAIN ENTRY--PERSONAL NAME |
9 (RLIN) |
1212 |
Personal name |
Blum, Dan |
Relator term |
author |
245 10 - TITLE STATEMENT |
Title |
Rational cybersecurity for business |
Remainder of title |
: the security leaders’ guide to business alignment |
Statement of responsibility, etc. |
/ Dan Blum |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
Place of production, publication, distribution, manufacture |
New York : |
Name of producer, publisher, distributor, manufacturer |
Apress Open, |
Date of production, publication, distribution, manufacture, or copyright notice |
[2020] |
300 ## - PHYSICAL DESCRIPTION |
Extent |
1 online resource (333 pages) : |
Other physical details |
illustrations |
336 ## - CONTENT TYPE |
Source |
rdacontent |
Content type term |
text |
337 ## - MEDIA TYPE |
Source |
rdamedia |
Media type term |
computer |
338 ## - CARRIER TYPE |
Source |
rdacarrier |
Carrier type term |
online resource |
500 ## - GENERAL NOTE |
General note |
Includes index. |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Chapter 1. Executive overview |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Chapter 2. Identify and align security-related roles |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Chapter 3. Put the right security governance model in place |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Chapter 4. Strengthen security culture through effective communications and awareness programs |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Chapter 5. Manage risk in the language of business |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Chapter 6. Establish a control baseline |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Chapter 7. Simplify and rationalize it and security |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Chapter 8. Control access with minimal drag on the business |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Chapter 9. Institute resilience through detection, response, and recovery |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Chapter 10. Create your rational cybersecurity success plan |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer security |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer networks |
General subdivision |
Security measures |
655 ## - INDEX TERM--GENRE/FORM |
Genre/form data or focus term |
Electronic Books |
690 ## - LOCAL SUBJECT ADDED ENTRY--TOPICAL TERM (OCLC, RLIN) |
Topical term or geographic name as entry element |
Computers & technology |
856 ## - ELECTRONIC LOCATION AND ACCESS |
Host name |
link.springer.com |
Uniform Resource Identifier |
https://link.springer.com/content/pdf/10.1007%2F978-1-4842-5952-8.pdf |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
eBook (Free & Open Access) |