Rational cybersecurity for business (Record no. 13813)

MARC details
000 -LEADER
fixed length control field 01715nam a22004097a 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20231110085504.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m|||||o||d| 00| 0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr || auc||a|a
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 210324s2020 nyua||||s|||| 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781484259528
Qualifying information electronic
040 ## - CATALOGING SOURCE
Transcribing agency QCPL
100 1# - MAIN ENTRY--PERSONAL NAME
9 (RLIN) 1212
Personal name Blum, Dan
Relator term author
245 10 - TITLE STATEMENT
Title Rational cybersecurity for business
Remainder of title : the security leaders’ guide to business alignment
Statement of responsibility, etc. / Dan Blum
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture New York :
Name of producer, publisher, distributor, manufacturer Apress Open,
Date of production, publication, distribution, manufacture, or copyright notice [2020]
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (333 pages) :
Other physical details illustrations
336 ## - CONTENT TYPE
Source rdacontent
Content type term text
337 ## - MEDIA TYPE
Source rdamedia
Media type term computer
338 ## - CARRIER TYPE
Source rdacarrier
Carrier type term online resource
500 ## - GENERAL NOTE
General note Includes index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 1. Executive overview
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 2. Identify and align security-related roles
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 3. Put the right security governance model in place
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 4. Strengthen security culture through effective communications and awareness programs
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 5. Manage risk in the language of business
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 6. Establish a control baseline
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 7. Simplify and rationalize it and security
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 8. Control access with minimal drag on the business
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 9. Institute resilience through detection, response, and recovery
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 10. Create your rational cybersecurity success plan
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures
655 ## - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic Books
690 ## - LOCAL SUBJECT ADDED ENTRY--TOPICAL TERM (OCLC, RLIN)
Topical term or geographic name as entry element Computers & technology
856 ## - ELECTRONIC LOCATION AND ACCESS
Host name link.springer.com
Uniform Resource Identifier https://link.springer.com/content/pdf/10.1007%2F978-1-4842-5952-8.pdf
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type eBook (Free & Open Access)
Holdings
Library use only Collection code Permanent Location Current Location Date acquired Source of acquisition Koha item type
  Circulation Accessible online Accessible online 03/24/2021 Open access eBook (Free & Open Access)