A Leader's Guide to Cybersecurity : (Record no. 182144)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 02894nam a2200373 i 4500 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | OSt |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20211118174751.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 210218t20202020enk gr 001 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781633697997 |
Terms of availability | RM 152.25 |
Qualifying information | hardback |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | PPAK |
Language of cataloging | eng |
Transcribing agency | PPAK |
Description conventions | rda |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Edition number | 23 |
Classification number | 005.8 |
090 00 - LOCALLY ASSIGNED LC-TYPE CALL NUMBER (OCLC); LOCAL CALL NUMBER (RLIN) | |
Classification number (OCLC) (R) ; Classification number, CALL (RLIN) (NR) | 005.8 |
Feature heading | PAR |
Feature heading | G |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Parenty, Thomas J., |
Relator term | author |
245 12 - TITLE STATEMENT | |
Title | A Leader's Guide to Cybersecurity : |
Remainder of title | WHY BOARDS NEED TO LEAD - AND HOW TO DO IT / |
Statement of responsibility, etc. | Thomas J. Parenty | Jack J. Domet. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Place of production, publication, distribution, manufacture | Boston, MA : |
Name of producer, publisher, distributor, manufacturer | Harvard Business Review Press, |
Date of production, publication, distribution, manufacture, or copyright notice | 2020 |
Date of production, publication, distribution, manufacture, or copyright notice | ©2020. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | viii, 218 pages ; |
Dimensions | 25 cm. |
336 ## - CONTENT TYPE | |
Content type term | text |
Source | rdacontent |
337 ## - MEDIA TYPE | |
Media type term | unmediated |
Source | rdamedia |
338 ## - CARRIER TYPE | |
Carrier type term | volume |
Source | rdacarrier |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc. note | Includes bibliographical references (pages 199-209) and index. |
505 ## - FORMATTED CONTENTS NOTE | |
Miscellaneous information | Introduction. |
Title | Digital stewardship |
Miscellaneous information | Part 1. |
Title | The problems. |
-- | Misleading platitudes ; |
-- | Hidden dynamics ;<br/> |
-- | Misguided voices |
Miscellaneous information | Part 2. |
Title | The principles. |
-- | If you don't understand it, they didn't explain it ; |
-- | It is the business at risk ; |
-- | Make cybersecurity mainstream ; |
-- | Engage motivation |
Miscellaneous information | Part 4. |
Title | The aides. |
-- | Aide mémoire: manage cyber risks ;<br/> |
-- | Aide mémoire: fortify the company ; |
-- | Aide mémoire: lead in crisis. |
Miscellaneous information | Part 3. |
Title | The foundation. |
-- | Manage cyber risks ; |
-- | Fortify the company ; |
-- | Lead in crisis <br/> |
520 ## - SUMMARY, ETC. | |
Summary, etc. | Companies are investing an unprecedented amount of money <br/> to keep their data and assets safe, yet cyberattacks are <br/> on the rise -- and the problem is worsening. No amount of <br/> technology, resources, or policies will reverse this <br/> trend. Only sound governance, originating with the board, <br/> can turn the tide. Protection against cyberattacks can't <br/> be treated as a problem solely belonging to an IT or <br/> cybersecurity department. It needs to cast a wide and <br/> impenetrable net that covers everything an organization <br/> does -- from its business operations, models, and <br/> strategies to its products and intellectual property. And <br/> boards are in the best position to oversee the needed <br/> changes to strategy and hold their companies accountable. <br/> Not surprisingly, many boards aren't prepared to assume <br/> this responsibility. In A Leader's Guide to Cybersecurity,<br/> Thomas Parenty and Jack Domet, who've spent over three <br/> decades in the field, present a timely, clear-eyed, and <br/> actionable framework that will empower senior executives <br/> and board members to become stewards of their companies' <br/> cybersecurity activities. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer security. |
Topical term or geographic name entry element | Boards of directors. |
Topical term or geographic name entry element | Organizational behavior. |
Topical term or geographic name entry element | Business planning. |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Domet, Jack J., |
Relator term | author. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Dewey Decimal Classification |
Koha item type | Book |
Withdrawn | Not for loan | Current library | Shelving location | Date acquired | Total Checkouts | Full call number | Barcode | Date last seen | Date last checked out | Koha item type | Total Renewals |
---|---|---|---|---|---|---|---|---|---|---|---|
Perpustakaan Alor Setar | Pinjaman Dewasa | 14/04/2021 | 1 | 005.8 PAR | A01683427 | 10/09/2022 | 21/08/2022 | Book | |||
Perpustakaan Awam Sungai Petani | Pinjaman Dewasa | 14/04/2021 | 1 | 005.8 PAR | A01683428 | 24/05/2022 | 12/04/2022 | Book | 1 | ||
Perpustakaan Kulim | Pinjaman Dewasa | 14/04/2021 | 005.8 PAR | A01683429 | 14/04/2021 | Book |