The CISO evolution: business knowledge for cybersecurity executives
"Cybersecurity is the protection of computer systems and networks from the theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide. A CISO (chief information security officer) is the senior-level executive w...
Gespeichert in:
Beteiligte Personen: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Hoboken, New Jersey
John Wiley & Sons, Inc.
[2022]
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781119782483/?ar |
Zusammenfassung: | "Cybersecurity is the protection of computer systems and networks from the theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide. A CISO (chief information security officer) is the senior-level executive within an organization responsible for establishing and maintaining the enterprise vision, strategy, and program to ensure information assets and technologies are adequately protected. The CISO directs staff in identifying, developing, implementing, and maintaining processes across the enterprise to reduce information and IT risks."-- |
Beschreibung: | Includes bibliographical references and index. - Description based on online resource; title from digital title page (viewed on April 11, 2022) |
Umfang: | 1 Online-Ressource illustrations (some color) |
ISBN: | 111978249X 9781119782506 1119782503 9781119782513 1119782511 9781119782490 9781119782483 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-07659842X | ||
003 | DE-627-1 | ||
005 | 20240228121438.0 | ||
007 | cr uuu---uuuuu | ||
008 | 220209s2022 xx |||||o 00| ||eng c | ||
020 | |a 111978249X |c electronic book |9 1-119-78249-X | ||
020 | |a 9781119782506 |c electronic book |9 978-1-119-78250-6 | ||
020 | |a 1119782503 |c electronic book |9 1-119-78250-3 | ||
020 | |a 9781119782513 |c electronic book |9 978-1-119-78251-3 | ||
020 | |a 1119782511 |c electronic book |9 1-119-78251-1 | ||
020 | |a 9781119782490 |c electronic bk. |9 978-1-119-78249-0 | ||
020 | |a 9781119782483 |9 978-1-119-78248-3 | ||
035 | |a (DE-627-1)07659842X | ||
035 | |a (DE-599)KEP07659842X | ||
035 | |a (ORHE)9781119782483 | ||
035 | |a (DE-627-1)07659842X | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 658.4/038011 |2 23 | |
100 | 1 | |a Sharp, Matthew K. |e VerfasserIn |4 aut | |
245 | 1 | 4 | |a The CISO evolution |b business knowledge for cybersecurity executives |c Matthew K. Sharp, Kyriakos P. Lambros |
264 | 1 | |a Hoboken, New Jersey |b John Wiley & Sons, Inc. |c [2022] | |
300 | |a 1 Online-Ressource |b illustrations (some color) | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index. - Description based on online resource; title from digital title page (viewed on April 11, 2022) | ||
520 | |a "Cybersecurity is the protection of computer systems and networks from the theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide. A CISO (chief information security officer) is the senior-level executive within an organization responsible for establishing and maintaining the enterprise vision, strategy, and program to ensure information assets and technologies are adequately protected. The CISO directs staff in identifying, developing, implementing, and maintaining processes across the enterprise to reduce information and IT risks."-- | ||
650 | 0 | |a Chief information officers | |
650 | 0 | |a Computer security | |
650 | 0 | |a Management information systems |x Security measures | |
650 | 2 | |a Computer Security | |
650 | 4 | |a Chefs des services de l'information | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Systèmes d'information de gestion ; Sécurité ; Mesures | |
650 | 4 | |a Chief information officers | |
650 | 4 | |a Computer security | |
700 | 1 | |a Lambros, Kyriakos P. |e VerfasserIn |4 aut | |
776 | 1 | |z 9781119782483 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781119782483 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781119782483/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-07659842X |
---|---|
_version_ | 1821494824649359360 |
adam_text | |
any_adam_object | |
author | Sharp, Matthew K. Lambros, Kyriakos P. |
author_facet | Sharp, Matthew K. Lambros, Kyriakos P. |
author_role | aut aut |
author_sort | Sharp, Matthew K. |
author_variant | m k s mk mks k p l kp kpl |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)07659842X (DE-599)KEP07659842X (ORHE)9781119782483 |
dewey-full | 658.4/038011 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.4/038011 |
dewey-search | 658.4/038011 |
dewey-sort | 3658.4 538011 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02848cam a22005532 4500</leader><controlfield tag="001">ZDB-30-ORH-07659842X</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121438.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">220209s2022 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">111978249X</subfield><subfield code="c">electronic book</subfield><subfield code="9">1-119-78249-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119782506</subfield><subfield code="c">electronic book</subfield><subfield code="9">978-1-119-78250-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119782503</subfield><subfield code="c">electronic book</subfield><subfield code="9">1-119-78250-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119782513</subfield><subfield code="c">electronic book</subfield><subfield code="9">978-1-119-78251-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119782511</subfield><subfield code="c">electronic book</subfield><subfield code="9">1-119-78251-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119782490</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-119-78249-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119782483</subfield><subfield code="9">978-1-119-78248-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)07659842X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP07659842X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781119782483</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)07659842X</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.4/038011</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Sharp, Matthew K.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="4"><subfield code="a">The CISO evolution</subfield><subfield code="b">business knowledge for cybersecurity executives</subfield><subfield code="c">Matthew K. Sharp, Kyriakos P. Lambros</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, New Jersey</subfield><subfield code="b">John Wiley & Sons, Inc.</subfield><subfield code="c">[2022]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield><subfield code="b">illustrations (some color)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Description based on online resource; title from digital title page (viewed on April 11, 2022)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"Cybersecurity is the protection of computer systems and networks from the theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide. A CISO (chief information security officer) is the senior-level executive within an organization responsible for establishing and maintaining the enterprise vision, strategy, and program to ensure information assets and technologies are adequately protected. The CISO directs staff in identifying, developing, implementing, and maintaining processes across the enterprise to reduce information and IT risks."--</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Chief information officers</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Management information systems</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Chefs des services de l'information</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systèmes d'information de gestion ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Chief information officers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lambros, Kyriakos P.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781119782483</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781119782483</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781119782483/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-07659842X |
illustrated | Illustrated |
indexdate | 2025-01-17T11:20:31Z |
institution | BVB |
isbn | 111978249X 9781119782506 1119782503 9781119782513 1119782511 9781119782490 9781119782483 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource illustrations (some color) |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | John Wiley & Sons, Inc. |
record_format | marc |
spelling | Sharp, Matthew K. VerfasserIn aut The CISO evolution business knowledge for cybersecurity executives Matthew K. Sharp, Kyriakos P. Lambros Hoboken, New Jersey John Wiley & Sons, Inc. [2022] 1 Online-Ressource illustrations (some color) Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references and index. - Description based on online resource; title from digital title page (viewed on April 11, 2022) "Cybersecurity is the protection of computer systems and networks from the theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide. A CISO (chief information security officer) is the senior-level executive within an organization responsible for establishing and maintaining the enterprise vision, strategy, and program to ensure information assets and technologies are adequately protected. The CISO directs staff in identifying, developing, implementing, and maintaining processes across the enterprise to reduce information and IT risks."-- Chief information officers Computer security Management information systems Security measures Computer Security Chefs des services de l'information Sécurité informatique Systèmes d'information de gestion ; Sécurité ; Mesures Lambros, Kyriakos P. VerfasserIn aut 9781119782483 Erscheint auch als Druck-Ausgabe 9781119782483 |
spellingShingle | Sharp, Matthew K. Lambros, Kyriakos P. The CISO evolution business knowledge for cybersecurity executives Chief information officers Computer security Management information systems Security measures Computer Security Chefs des services de l'information Sécurité informatique Systèmes d'information de gestion ; Sécurité ; Mesures |
title | The CISO evolution business knowledge for cybersecurity executives |
title_auth | The CISO evolution business knowledge for cybersecurity executives |
title_exact_search | The CISO evolution business knowledge for cybersecurity executives |
title_full | The CISO evolution business knowledge for cybersecurity executives Matthew K. Sharp, Kyriakos P. Lambros |
title_fullStr | The CISO evolution business knowledge for cybersecurity executives Matthew K. Sharp, Kyriakos P. Lambros |
title_full_unstemmed | The CISO evolution business knowledge for cybersecurity executives Matthew K. Sharp, Kyriakos P. Lambros |
title_short | The CISO evolution |
title_sort | ciso evolution business knowledge for cybersecurity executives |
title_sub | business knowledge for cybersecurity executives |
topic | Chief information officers Computer security Management information systems Security measures Computer Security Chefs des services de l'information Sécurité informatique Systèmes d'information de gestion ; Sécurité ; Mesures |
topic_facet | Chief information officers Computer security Management information systems Security measures Computer Security Chefs des services de l'information Sécurité informatique Systèmes d'information de gestion ; Sécurité ; Mesures |
work_keys_str_mv | AT sharpmatthewk thecisoevolutionbusinessknowledgeforcybersecurityexecutives AT lambroskyriakosp thecisoevolutionbusinessknowledgeforcybersecurityexecutives AT sharpmatthewk cisoevolutionbusinessknowledgeforcybersecurityexecutives AT lambroskyriakosp cisoevolutionbusinessknowledgeforcybersecurityexecutives |