Cybersecurity program development for business: the essential planning guide
This essential guide, with its dozens of examples and case studies, breaks down every element of the development and management of a cybersecurity program for the executive. From understanding the need, to core risk management principles, to threats, tools, roles and responsibilities, this book walk...
Gespeichert in:
Beteilige Person: | |
---|---|
Körperschaft: | |
Weitere beteiligte Personen: | |
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
New York
Gildan Audio
℗2018
|
Ausgabe: | Unabridged. |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781469098753/?ar |
Zusammenfassung: | This essential guide, with its dozens of examples and case studies, breaks down every element of the development and management of a cybersecurity program for the executive. From understanding the need, to core risk management principles, to threats, tools, roles and responsibilities, this book walks the listener through each step of developing and implementing a cybersecurity program. From cover-to-cover, it's a thorough overview, but it can also function as a useful reference book as individual questions and difficulties arise.- Unlike other cybersecurity books, the text is not bogged down with industry jargon- Speaks specifically to the executive who is not familiar with the development or implementation of cybersecurity programs- Shows you how to make pragmatic, rational, and informed decisions for your organization- Written by a top-flight technologist with decades of experience and a track record of successIf you're a business manager or executive who needs to make sense of cybersecurity, this book demystifies it for you. |
Beschreibung: | Downloadable audio file |
Umfang: | 1 Online-Ressource (09 hr., 09 min.) |
ISBN: | 9781469098746 1469098741 9781469098753 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-069801398 | ||
003 | DE-627-1 | ||
005 | 20240228120527.0 | ||
007 | cr uuu---uuuuu | ||
008 | 211110s2018 xx |||||o 00| ||eng c | ||
020 | |a 9781469098746 |c electronic audio bk. |9 978-1-4690-9874-6 | ||
020 | |a 1469098741 |c electronic audio bk. |9 1-4690-9874-1 | ||
020 | |a 9781469098753 |9 978-1-4690-9875-3 | ||
035 | |a (DE-627-1)069801398 | ||
035 | |a (DE-599)KEP069801398 | ||
035 | |a (ORHE)9781469098753 | ||
035 | |a (DE-627-1)069801398 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 658.4/78 |2 23 | |
100 | 1 | |a Moschovitis, Christos J. P. |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Cybersecurity program development for business |b the essential planning guide |c Chris Moschovitis |
250 | |a Unabridged. | ||
264 | 1 | |a New York |b Gildan Audio |c ℗2018 | |
300 | |a 1 Online-Ressource (09 hr., 09 min.) | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Downloadable audio file | ||
520 | |a This essential guide, with its dozens of examples and case studies, breaks down every element of the development and management of a cybersecurity program for the executive. From understanding the need, to core risk management principles, to threats, tools, roles and responsibilities, this book walks the listener through each step of developing and implementing a cybersecurity program. From cover-to-cover, it's a thorough overview, but it can also function as a useful reference book as individual questions and difficulties arise.- Unlike other cybersecurity books, the text is not bogged down with industry jargon- Speaks specifically to the executive who is not familiar with the development or implementation of cybersecurity programs- Shows you how to make pragmatic, rational, and informed decisions for your organization- Written by a top-flight technologist with decades of experience and a track record of successIf you're a business manager or executive who needs to make sense of cybersecurity, this book demystifies it for you. | ||
650 | 0 | |a Information technology |x Management | |
650 | 0 | |a Business enterprises |x Computer programs | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Computer industry | |
650 | 0 | |a Business | |
650 | 4 | |a Technologie de l'information ; Gestion | |
650 | 4 | |a Entreprises ; Logiciels | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Informatique ; Industrie | |
650 | 4 | |a Affaires | |
650 | 4 | |a businesses (business enterprises) | |
650 | 4 | |a BUSINESS & ECONOMICS ; Industries ; Computer Industry | |
650 | 4 | |a BUSINESS & ECONOMICS ; General | |
650 | 4 | |a Information technology ; Management |0 (OCoLC)fst00973112 | |
650 | 4 | |a Computer networks ; Security measures |0 (OCoLC)fst00872341 | |
650 | 4 | |a Computer industry |0 (OCoLC)fst00872154 | |
650 | 4 | |a Business |0 (OCoLC)fst00842262 | |
650 | 4 | |a Downloadable audio books | |
650 | 4 | |a Audiobooks |0 (OCoLC)fst01726208 | |
650 | 4 | |a Audiobooks | |
650 | 4 | |a Livres audio | |
700 | 1 | |a Pratt, Sean |e ErzählerIn |4 nrt | |
710 | 2 | |a Gildan Media. |e MitwirkendeR |4 ctb | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781469098753/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-069801398 |
---|---|
_version_ | 1821494829831421952 |
adam_text | |
any_adam_object | |
author | Moschovitis, Christos J. P. |
author2 | Pratt, Sean |
author2_role | nrt |
author2_variant | s p sp |
author_corporate | Gildan Media |
author_corporate_role | ctb |
author_facet | Moschovitis, Christos J. P. Pratt, Sean Gildan Media |
author_role | aut |
author_sort | Moschovitis, Christos J. P. |
author_variant | c j p m cjp cjpm |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)069801398 (DE-599)KEP069801398 (ORHE)9781469098753 |
dewey-full | 658.4/78 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.4/78 |
dewey-search | 658.4/78 |
dewey-sort | 3658.4 278 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
edition | Unabridged. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03416cam a22006492 4500</leader><controlfield tag="001">ZDB-30-ORH-069801398</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120527.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">211110s2018 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781469098746</subfield><subfield code="c">electronic audio bk.</subfield><subfield code="9">978-1-4690-9874-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1469098741</subfield><subfield code="c">electronic audio bk.</subfield><subfield code="9">1-4690-9874-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781469098753</subfield><subfield code="9">978-1-4690-9875-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)069801398</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP069801398</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781469098753</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)069801398</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.4/78</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Moschovitis, Christos J. P.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cybersecurity program development for business</subfield><subfield code="b">the essential planning guide</subfield><subfield code="c">Chris Moschovitis</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Unabridged.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York</subfield><subfield code="b">Gildan Audio</subfield><subfield code="c">℗2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (09 hr., 09 min.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Downloadable audio file</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This essential guide, with its dozens of examples and case studies, breaks down every element of the development and management of a cybersecurity program for the executive. From understanding the need, to core risk management principles, to threats, tools, roles and responsibilities, this book walks the listener through each step of developing and implementing a cybersecurity program. From cover-to-cover, it's a thorough overview, but it can also function as a useful reference book as individual questions and difficulties arise.- Unlike other cybersecurity books, the text is not bogged down with industry jargon- Speaks specifically to the executive who is not familiar with the development or implementation of cybersecurity programs- Shows you how to make pragmatic, rational, and informed decisions for your organization- Written by a top-flight technologist with decades of experience and a track record of successIf you're a business manager or executive who needs to make sense of cybersecurity, this book demystifies it for you.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information technology</subfield><subfield code="x">Management</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Business enterprises</subfield><subfield code="x">Computer programs</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer industry</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Business</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Technologie de l'information ; Gestion</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Entreprises ; Logiciels</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatique ; Industrie</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Affaires</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">businesses (business enterprises)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">BUSINESS & ECONOMICS ; Industries ; Computer Industry</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">BUSINESS & ECONOMICS ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology ; Management</subfield><subfield code="0">(OCoLC)fst00973112</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield><subfield code="0">(OCoLC)fst00872341</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer industry</subfield><subfield code="0">(OCoLC)fst00872154</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business</subfield><subfield code="0">(OCoLC)fst00842262</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Downloadable audio books</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Audiobooks</subfield><subfield code="0">(OCoLC)fst01726208</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Audiobooks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Livres audio</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Pratt, Sean</subfield><subfield code="e">ErzählerIn</subfield><subfield code="4">nrt</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Gildan Media.</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781469098753/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-069801398 |
illustrated | Not Illustrated |
indexdate | 2025-01-17T11:20:36Z |
institution | BVB |
isbn | 9781469098746 1469098741 9781469098753 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (09 hr., 09 min.) |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | Gildan Audio |
record_format | marc |
spelling | Moschovitis, Christos J. P. VerfasserIn aut Cybersecurity program development for business the essential planning guide Chris Moschovitis Unabridged. New York Gildan Audio ℗2018 1 Online-Ressource (09 hr., 09 min.) Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Downloadable audio file This essential guide, with its dozens of examples and case studies, breaks down every element of the development and management of a cybersecurity program for the executive. From understanding the need, to core risk management principles, to threats, tools, roles and responsibilities, this book walks the listener through each step of developing and implementing a cybersecurity program. From cover-to-cover, it's a thorough overview, but it can also function as a useful reference book as individual questions and difficulties arise.- Unlike other cybersecurity books, the text is not bogged down with industry jargon- Speaks specifically to the executive who is not familiar with the development or implementation of cybersecurity programs- Shows you how to make pragmatic, rational, and informed decisions for your organization- Written by a top-flight technologist with decades of experience and a track record of successIf you're a business manager or executive who needs to make sense of cybersecurity, this book demystifies it for you. Information technology Management Business enterprises Computer programs Computer networks Security measures Computer industry Business Technologie de l'information ; Gestion Entreprises ; Logiciels Réseaux d'ordinateurs ; Sécurité ; Mesures Informatique ; Industrie Affaires businesses (business enterprises) BUSINESS & ECONOMICS ; Industries ; Computer Industry BUSINESS & ECONOMICS ; General Information technology ; Management (OCoLC)fst00973112 Computer networks ; Security measures (OCoLC)fst00872341 Computer industry (OCoLC)fst00872154 Business (OCoLC)fst00842262 Downloadable audio books Audiobooks (OCoLC)fst01726208 Audiobooks Livres audio Pratt, Sean ErzählerIn nrt Gildan Media. MitwirkendeR ctb |
spellingShingle | Moschovitis, Christos J. P. Cybersecurity program development for business the essential planning guide Information technology Management Business enterprises Computer programs Computer networks Security measures Computer industry Business Technologie de l'information ; Gestion Entreprises ; Logiciels Réseaux d'ordinateurs ; Sécurité ; Mesures Informatique ; Industrie Affaires businesses (business enterprises) BUSINESS & ECONOMICS ; Industries ; Computer Industry BUSINESS & ECONOMICS ; General Information technology ; Management (OCoLC)fst00973112 Computer networks ; Security measures (OCoLC)fst00872341 Computer industry (OCoLC)fst00872154 Business (OCoLC)fst00842262 Downloadable audio books Audiobooks (OCoLC)fst01726208 Audiobooks Livres audio |
subject_GND | (OCoLC)fst00973112 (OCoLC)fst00872341 (OCoLC)fst00872154 (OCoLC)fst00842262 (OCoLC)fst01726208 |
title | Cybersecurity program development for business the essential planning guide |
title_auth | Cybersecurity program development for business the essential planning guide |
title_exact_search | Cybersecurity program development for business the essential planning guide |
title_full | Cybersecurity program development for business the essential planning guide Chris Moschovitis |
title_fullStr | Cybersecurity program development for business the essential planning guide Chris Moschovitis |
title_full_unstemmed | Cybersecurity program development for business the essential planning guide Chris Moschovitis |
title_short | Cybersecurity program development for business |
title_sort | cybersecurity program development for business the essential planning guide |
title_sub | the essential planning guide |
topic | Information technology Management Business enterprises Computer programs Computer networks Security measures Computer industry Business Technologie de l'information ; Gestion Entreprises ; Logiciels Réseaux d'ordinateurs ; Sécurité ; Mesures Informatique ; Industrie Affaires businesses (business enterprises) BUSINESS & ECONOMICS ; Industries ; Computer Industry BUSINESS & ECONOMICS ; General Information technology ; Management (OCoLC)fst00973112 Computer networks ; Security measures (OCoLC)fst00872341 Computer industry (OCoLC)fst00872154 Business (OCoLC)fst00842262 Downloadable audio books Audiobooks (OCoLC)fst01726208 Audiobooks Livres audio |
topic_facet | Information technology Management Business enterprises Computer programs Computer networks Security measures Computer industry Business Technologie de l'information ; Gestion Entreprises ; Logiciels Réseaux d'ordinateurs ; Sécurité ; Mesures Informatique ; Industrie Affaires businesses (business enterprises) BUSINESS & ECONOMICS ; Industries ; Computer Industry BUSINESS & ECONOMICS ; General Information technology ; Management Computer networks ; Security measures Downloadable audio books Audiobooks Livres audio |
work_keys_str_mv | AT moschovitischristosjp cybersecurityprogramdevelopmentforbusinesstheessentialplanningguide AT prattsean cybersecurityprogramdevelopmentforbusinesstheessentialplanningguide AT gildanmedia cybersecurityprogramdevelopmentforbusinesstheessentialplanningguide |