MARC details
| 000 -LEADER |
| fixed length control field |
03574cam a22003978i 4500 |
| 001 - CONTROL NUMBER |
| control field |
on1030444821 |
| 003 - CONTROL NUMBER IDENTIFIER |
| control field |
OCoLC |
| 005 - DATE AND TIME OF LATEST TRANSACTION |
| control field |
20240808155356.0 |
| 006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS |
| fixed length control field |
m o d |
| 007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
| fixed length control field |
cr ||||||||||| |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
180328s2018 nju sb 001 0 eng |
| 010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
| LC control number |
2018015364 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| Canceled/invalid ISBN |
9781119429517 |
| Qualifying information |
(Hardcover) |
| 035 ## - SYSTEM CONTROL NUMBER |
| System control number |
(OCoLC)1030444821 |
| 040 ## - CATALOGING SOURCE |
| Original cataloging agency |
DLC |
| Language of cataloging |
eng |
| Description conventions |
rda |
| -- |
pn |
| Transcribing agency |
TUPM |
| Modifying agency |
N$T |
| -- |
OCLCQ |
| -- |
EBLCP |
| -- |
DG1 |
| -- |
NUSCL |
| 050 #0 - LIBRARY OF CONGRESS CALL NUMBER |
| Classification number |
HD 30.2 |
| Item number |
M67 2018 |
| 100 1# - MAIN ENTRY--PERSONAL NAME |
| Personal name |
Moschovitis, Christos J. P., |
| Relator term |
author. |
| 245 00 - TITLE STATEMENT |
| Title |
Cybersecurity program development for business |
| Remainder of title |
the essential planning guide / |
| Statement of responsibility, etc. |
Chris Moschovitis. |
| 264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
| Place of production, publication, distribution, manufacture |
Hoboken : |
| Name of producer, publisher, distributor, manufacturer |
Wiley, |
| Date of production, publication, distribution, manufacture, or copyright notice |
2018. |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
xvi, 206 pages ; |
| Dimensions |
25 cm |
| 336 ## - CONTENT TYPE |
| Content type term |
text |
| Content type code |
txt |
| Source |
rdacontent. |
| 337 ## - MEDIA TYPE |
| Media type term |
unmediated |
| Media type code |
n |
| Source |
rdamedia. |
| 338 ## - CARRIER TYPE |
| Carrier type term |
volume |
| Carrier type code |
nc |
| Source |
rdacarrier. |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE |
| Bibliography, etc. note |
Includes bibliographical references and index. |
| 506 ## - RESTRICTIONS ON ACCESS NOTE |
| Terms governing access |
Online version restricted to NUS staff and students only through NUSNET. |
| 520 ## - SUMMARY, ETC. |
| Summary, etc. |
"Get answers to all your cybersecurity questions In 2016, we reached a tipping pointa moment where the global and local implications of cybersecurity became undeniable. Despite the seriousness of the topic, the term "cybersecurity" still exasperates many people. They feel terrorized and overwhelmed. The majority of business people have very little understanding of cybersecurity, how to manage it, and what's really at risk. This essential guide, with its dozens of examples and case studies, breaks down every element of the development and management of a cybersecurity program for the executive. From understanding the need, to core risk management principles, to threats, tools, roles and responsibilities, this book walks the reader through each step of developing and implementing a cybersecurity program. Read cover-to-cover, its a thorough overview, but it can also function as a useful reference book as individual questions and difficulties arise. Unlike other cybersecurity books, the text is not bogged down with industry jargon Speaks specifically to the executive who is not familiar with the development or implementation of cybersecurity programs Shows you how to make pragmatic, rational, and informed decisions for your organization Written by a top-flight technologist with decades of experience and a track record of success If youre a business manager or executive who needs to make sense of cybersecurity, this book demystifies it for you."-- |
| Assigning source |
Provided by publisher. |
| 520 ## - SUMMARY, ETC. |
| Summary, etc. |
"This essential guide, with its dozens of examples and case studies, breaks down every element of the development and management of a cybersecurity program for the executive. From understanding the need, to core risk management principles, to threats, tools, roles and responsibilities, this book walks the reader through each step of developing and implementing a cybersecurity program. Read cover-to-cover, it's a thorough overview, but it can also function as a useful reference book as individual questions and difficulties arise"-- |
| Assigning source |
Provided by publisher. |
| 538 ## - SYSTEM DETAILS NOTE |
| System details note |
Mode of access: World Wide Web. |
| 538 ## - SYSTEM DETAILS NOTE |
| System details note |
System requirements: Internet connectivity; World Wide Web browser. |
| 650 10 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Information technology |
| General subdivision |
Management. |
| 650 10 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Business enterprises |
| General subdivision |
Computer programs. |
| 650 10 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Computer networks |
| General subdivision |
Security measures. |
| 650 10 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Computer industry. |
| 776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
| Relationship information |
Print version: |
| Main entry heading |
Moschovitis, Christos J.P. |
| Title |
Cybersecurity program development for business. |
| Place, publisher, and date of publication |
Hoboken : Wiley, 2018 |
| International Standard Book Number |
9781119429517 |
| Record control number |
(DLC) 2017058958. |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) |
| Source of classification or shelving scheme |
Library of Congress Classification |
| Koha item type |
Book |