Tribe of hackers security leaders: tribal knowledge from the best in cybersecurity leadership
Tribal Knowledge from the Best in Cybersecurity Leadership The Tribe of Hackers series continues, sharing what CISSPs, CISOs, and other security leaders need to know to build solid cybersecurity teams and keep organizations secure. Dozens of experts and influential security specialists reveal their...
Gespeichert in:
Beteilige Person: | |
---|---|
Weitere beteiligte Personen: | |
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Newark
John Wiley & Sons, Incorporated
2020
|
Schriftenreihe: | Tribe of Hackers Ser
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781119643777/?ar |
Zusammenfassung: | Tribal Knowledge from the Best in Cybersecurity Leadership The Tribe of Hackers series continues, sharing what CISSPs, CISOs, and other security leaders need to know to build solid cybersecurity teams and keep organizations secure. Dozens of experts and influential security specialists reveal their best strategies for building, leading, and managing information security within organizations. Tribe of Hackers Security Leaders follows the same bestselling format as the original Tribe of Hackers, but with a detailed focus on how information security leaders impact organizational security. Information security is becoming more important and more valuable all the time. Security breaches can be costly, even shutting businesses and governments down, so security leadership is a high-stakes game. Leading teams of hackers is not always easy, but the future of your organization may depend on it. In this book, the world's top security experts answer the questions that Chief Information Security Officers and other security leaders are asking, including: What's the most important decision you've made or action you've taken to enable a business risk? How do you lead your team to execute and get results? Do you have a workforce philosophy or unique approach to talent acquisition? Have you created a cohesive strategy for your information security program or business unit? Anyone in or aspiring to an information security leadership role, whether at a team level or organization-wide, needs to read this book. Tribe of Hackers Security Leaders has the real-world advice and practical guidance you need to advance your cybersecurity leadership career. |
Beschreibung: | Includes bibliographical references. - Print version record |
Umfang: | 1 online resource (314 pages) |
ISBN: | 9781119643791 1119643791 9781119643784 1119643783 9781119643760 1119643767 9781119643777 |
Internformat
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-058899340 | ||
003 | DE-627-1 | ||
005 | 20240228121013.0 | ||
007 | cr uuu---uuuuu | ||
008 | 201021s2020 xx |||||o 00| ||eng c | ||
020 | |a 9781119643791 |c electronic book |9 978-1-119-64379-1 | ||
020 | |a 1119643791 |c electronic book |9 1-119-64379-1 | ||
020 | |a 9781119643784 |c electronic bk. |9 978-1-119-64378-4 | ||
020 | |a 1119643783 |c electronic bk. |9 1-119-64378-3 | ||
020 | |a 9781119643760 |c electronic bk. |9 978-1-119-64376-0 | ||
020 | |a 1119643767 |c electronic bk. |9 1-119-64376-7 | ||
020 | |a 9781119643777 |9 978-1-119-64377-7 | ||
035 | |a (DE-627-1)058899340 | ||
035 | |a (DE-599)KEP058899340 | ||
035 | |a (ORHE)9781119643777 | ||
035 | |a (DE-627-1)058899340 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Carey, Marcus J. |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Tribe of hackers security leaders |b tribal knowledge from the best in cybersecurity leadership |c Marcus J. Carey & Jennifer Jin |
264 | 1 | |a Newark |b John Wiley & Sons, Incorporated |c 2020 | |
300 | |a 1 online resource (314 pages) | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
490 | 0 | |a Tribe of Hackers Ser | |
500 | |a Includes bibliographical references. - Print version record | ||
520 | |a Tribal Knowledge from the Best in Cybersecurity Leadership The Tribe of Hackers series continues, sharing what CISSPs, CISOs, and other security leaders need to know to build solid cybersecurity teams and keep organizations secure. Dozens of experts and influential security specialists reveal their best strategies for building, leading, and managing information security within organizations. Tribe of Hackers Security Leaders follows the same bestselling format as the original Tribe of Hackers, but with a detailed focus on how information security leaders impact organizational security. Information security is becoming more important and more valuable all the time. Security breaches can be costly, even shutting businesses and governments down, so security leadership is a high-stakes game. Leading teams of hackers is not always easy, but the future of your organization may depend on it. In this book, the world's top security experts answer the questions that Chief Information Security Officers and other security leaders are asking, including: What's the most important decision you've made or action you've taken to enable a business risk? How do you lead your team to execute and get results? Do you have a workforce philosophy or unique approach to talent acquisition? Have you created a cohesive strategy for your information security program or business unit? Anyone in or aspiring to an information security leadership role, whether at a team level or organization-wide, needs to read this book. Tribe of Hackers Security Leaders has the real-world advice and practical guidance you need to advance your cybersecurity leadership career. | ||
650 | 0 | |a Penetration testing (Computer security) | |
650 | 0 | |a Information technology |x Security measures |x Management | |
650 | 0 | |a Computer security | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 2 | |a Computer Security | |
650 | 4 | |a Tests d'intrusion | |
650 | 4 | |a Technologie de l'information ; Sécurité ; Mesures ; Gestion | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a COMPUTERS ; Security ; Cryptography & Encryption | |
650 | 4 | |a Penetration testing (Computer security) | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Computer security | |
700 | 1 | |a Jin, Jennifer |e MitwirkendeR |4 ctb | |
776 | 1 | |z 9781119643777 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781119643777 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781119643777/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-058899340 |
---|---|
_version_ | 1833357043860242432 |
adam_text | |
any_adam_object | |
author | Carey, Marcus J. |
author2 | Jin, Jennifer |
author2_role | ctb |
author2_variant | j j jj |
author_facet | Carey, Marcus J. Jin, Jennifer |
author_role | aut |
author_sort | Carey, Marcus J. |
author_variant | m j c mj mjc |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)058899340 (DE-599)KEP058899340 (ORHE)9781119643777 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04056cam a22006132c 4500</leader><controlfield tag="001">ZDB-30-ORH-058899340</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121013.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">201021s2020 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119643791</subfield><subfield code="c">electronic book</subfield><subfield code="9">978-1-119-64379-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119643791</subfield><subfield code="c">electronic book</subfield><subfield code="9">1-119-64379-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119643784</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-119-64378-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119643783</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-119-64378-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119643760</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-119-64376-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119643767</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-119-64376-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119643777</subfield><subfield code="9">978-1-119-64377-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)058899340</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP058899340</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781119643777</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)058899340</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Carey, Marcus J.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Tribe of hackers security leaders</subfield><subfield code="b">tribal knowledge from the best in cybersecurity leadership</subfield><subfield code="c">Marcus J. Carey & Jennifer Jin</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Newark</subfield><subfield code="b">John Wiley & Sons, Incorporated</subfield><subfield code="c">2020</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (314 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Tribe of Hackers Ser</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references. - Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Tribal Knowledge from the Best in Cybersecurity Leadership The Tribe of Hackers series continues, sharing what CISSPs, CISOs, and other security leaders need to know to build solid cybersecurity teams and keep organizations secure. Dozens of experts and influential security specialists reveal their best strategies for building, leading, and managing information security within organizations. Tribe of Hackers Security Leaders follows the same bestselling format as the original Tribe of Hackers, but with a detailed focus on how information security leaders impact organizational security. Information security is becoming more important and more valuable all the time. Security breaches can be costly, even shutting businesses and governments down, so security leadership is a high-stakes game. Leading teams of hackers is not always easy, but the future of your organization may depend on it. In this book, the world's top security experts answer the questions that Chief Information Security Officers and other security leaders are asking, including: What's the most important decision you've made or action you've taken to enable a business risk? How do you lead your team to execute and get results? Do you have a workforce philosophy or unique approach to talent acquisition? Have you created a cohesive strategy for your information security program or business unit? Anyone in or aspiring to an information security leadership role, whether at a team level or organization-wide, needs to read this book. Tribe of Hackers Security Leaders has the real-world advice and practical guidance you need to advance your cybersecurity leadership career.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Penetration testing (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information technology</subfield><subfield code="x">Security measures</subfield><subfield code="x">Management</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Tests d'intrusion</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Technologie de l'information ; Sécurité ; Mesures ; Gestion</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Security ; Cryptography & Encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Penetration testing (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Jin, Jennifer</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781119643777</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781119643777</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781119643777/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-058899340 |
illustrated | Not Illustrated |
indexdate | 2025-05-28T09:45:25Z |
institution | BVB |
isbn | 9781119643791 1119643791 9781119643784 1119643783 9781119643760 1119643767 9781119643777 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 online resource (314 pages) |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | John Wiley & Sons, Incorporated |
record_format | marc |
series2 | Tribe of Hackers Ser |
spelling | Carey, Marcus J. VerfasserIn aut Tribe of hackers security leaders tribal knowledge from the best in cybersecurity leadership Marcus J. Carey & Jennifer Jin Newark John Wiley & Sons, Incorporated 2020 1 online resource (314 pages) Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Tribe of Hackers Ser Includes bibliographical references. - Print version record Tribal Knowledge from the Best in Cybersecurity Leadership The Tribe of Hackers series continues, sharing what CISSPs, CISOs, and other security leaders need to know to build solid cybersecurity teams and keep organizations secure. Dozens of experts and influential security specialists reveal their best strategies for building, leading, and managing information security within organizations. Tribe of Hackers Security Leaders follows the same bestselling format as the original Tribe of Hackers, but with a detailed focus on how information security leaders impact organizational security. Information security is becoming more important and more valuable all the time. Security breaches can be costly, even shutting businesses and governments down, so security leadership is a high-stakes game. Leading teams of hackers is not always easy, but the future of your organization may depend on it. In this book, the world's top security experts answer the questions that Chief Information Security Officers and other security leaders are asking, including: What's the most important decision you've made or action you've taken to enable a business risk? How do you lead your team to execute and get results? Do you have a workforce philosophy or unique approach to talent acquisition? Have you created a cohesive strategy for your information security program or business unit? Anyone in or aspiring to an information security leadership role, whether at a team level or organization-wide, needs to read this book. Tribe of Hackers Security Leaders has the real-world advice and practical guidance you need to advance your cybersecurity leadership career. Penetration testing (Computer security) Information technology Security measures Management Computer security Computer networks Security measures Computer Security Tests d'intrusion Technologie de l'information ; Sécurité ; Mesures ; Gestion Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures COMPUTERS ; Security ; Cryptography & Encryption Computer networks ; Security measures Jin, Jennifer MitwirkendeR ctb 9781119643777 Erscheint auch als Druck-Ausgabe 9781119643777 |
spellingShingle | Carey, Marcus J. Tribe of hackers security leaders tribal knowledge from the best in cybersecurity leadership Penetration testing (Computer security) Information technology Security measures Management Computer security Computer networks Security measures Computer Security Tests d'intrusion Technologie de l'information ; Sécurité ; Mesures ; Gestion Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures COMPUTERS ; Security ; Cryptography & Encryption Computer networks ; Security measures |
title | Tribe of hackers security leaders tribal knowledge from the best in cybersecurity leadership |
title_auth | Tribe of hackers security leaders tribal knowledge from the best in cybersecurity leadership |
title_exact_search | Tribe of hackers security leaders tribal knowledge from the best in cybersecurity leadership |
title_full | Tribe of hackers security leaders tribal knowledge from the best in cybersecurity leadership Marcus J. Carey & Jennifer Jin |
title_fullStr | Tribe of hackers security leaders tribal knowledge from the best in cybersecurity leadership Marcus J. Carey & Jennifer Jin |
title_full_unstemmed | Tribe of hackers security leaders tribal knowledge from the best in cybersecurity leadership Marcus J. Carey & Jennifer Jin |
title_short | Tribe of hackers security leaders |
title_sort | tribe of hackers security leaders tribal knowledge from the best in cybersecurity leadership |
title_sub | tribal knowledge from the best in cybersecurity leadership |
topic | Penetration testing (Computer security) Information technology Security measures Management Computer security Computer networks Security measures Computer Security Tests d'intrusion Technologie de l'information ; Sécurité ; Mesures ; Gestion Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures COMPUTERS ; Security ; Cryptography & Encryption Computer networks ; Security measures |
topic_facet | Penetration testing (Computer security) Information technology Security measures Management Computer security Computer networks Security measures Computer Security Tests d'intrusion Technologie de l'information ; Sécurité ; Mesures ; Gestion Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures COMPUTERS ; Security ; Cryptography & Encryption Computer networks ; Security measures |
work_keys_str_mv | AT careymarcusj tribeofhackerssecurityleaderstribalknowledgefromthebestincybersecurityleadership AT jinjennifer tribeofhackerssecurityleaderstribalknowledgefromthebestincybersecurityleadership |