The business of cyber: why you should question what your security team are telling you
"This book examines the cybersecurity phenomenon, looking at the folklore, the hype, and the behaviour of its practitioners. A central theme is that the management of cybersecurity needs to be owned by the people running the organisation, rather than the security team. To achieve that, managers...
Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Boca Raton, FL
CRC Press
2024
|
Ausgabe: | First edition. |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781003845447/?ar |
Zusammenfassung: | "This book examines the cybersecurity phenomenon, looking at the folklore, the hype, and the behaviour of its practitioners. A central theme is that the management of cybersecurity needs to be owned by the people running the organisation, rather than the security team. To achieve that, managers need to be provided with the background and the detail needed to challenge what they are being told by the security team, enabling them to engage in a way that will result in more appropriate outcomes for the business. This book aims to provide that background and detail. The content is strongly rooted in available research, presented in an accessible manner, with a number of business-related case studies. Each chapter in the book takes a theme such as end-user behaviours, and compares the available evidence with what the industry would have its customers believe. The conclusion is that there is definitely a problem, and we certainly need cyber defences. Just not the ones the industry is currently selling"-- |
Beschreibung: | Includes bibliographical references and index. - Description based on online resource; title from digital title page (viewed on April 30, 2024) |
Umfang: | 1 Online-Ressource (xii, 266 Seiten) |
ISBN: | 9781003380962 1003380964 9781003845423 1003845428 9781003845447 1003845444 |
Internformat
MARC
LEADER | 00000nam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-104367628 | ||
003 | DE-627-1 | ||
005 | 20240701091157.0 | ||
007 | cr uuu---uuuuu | ||
008 | 240701s2024 xx |||||o 00| ||eng c | ||
020 | |a 9781003380962 |c electronic book |9 978-1-003-38096-2 | ||
020 | |a 1003380964 |c electronic book |9 1-003-38096-4 | ||
020 | |a 9781003845423 |c electronic book |9 978-1-003-84542-3 | ||
020 | |a 1003845428 |c electronic book |9 1-003-84542-8 | ||
020 | |a 9781003845447 |c electronic book |9 978-1-003-84544-7 | ||
020 | |a 1003845444 |c electronic book |9 1-003-84544-4 | ||
035 | |a (DE-627-1)104367628 | ||
035 | |a (DE-599)KEP104367628 | ||
035 | |a (ORHE)9781003845447 | ||
035 | |a (DE-627-1)104367628 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a BUS |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a UR |2 bicssc | |
082 | 0 | |a 005.8 |2 23/eng/20230822 | |
100 | 1 | |a Fagan, Peter |e VerfasserIn |4 aut | |
245 | 1 | 4 | |a The business of cyber |b why you should question what your security team are telling you |c Peter Fagan |
250 | |a First edition. | ||
264 | 1 | |a Boca Raton, FL |b CRC Press |c 2024 | |
264 | 4 | |c ©2023 | |
300 | |a 1 Online-Ressource (xii, 266 Seiten) | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index. - Description based on online resource; title from digital title page (viewed on April 30, 2024) | ||
520 | |a "This book examines the cybersecurity phenomenon, looking at the folklore, the hype, and the behaviour of its practitioners. A central theme is that the management of cybersecurity needs to be owned by the people running the organisation, rather than the security team. To achieve that, managers need to be provided with the background and the detail needed to challenge what they are being told by the security team, enabling them to engage in a way that will result in more appropriate outcomes for the business. This book aims to provide that background and detail. The content is strongly rooted in available research, presented in an accessible manner, with a number of business-related case studies. Each chapter in the book takes a theme such as end-user behaviours, and compares the available evidence with what the industry would have its customers believe. The conclusion is that there is definitely a problem, and we certainly need cyber defences. Just not the ones the industry is currently selling"-- | ||
650 | 0 | |a Computer security | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a BUSINESS & ECONOMICS / Management | |
650 | 4 | |a COMPUTERS / Cryptography | |
650 | 4 | |a COMPUTERS / Networking / Security | |
650 | 4 | |a Computer security | |
776 | 1 | |z 9781032462868 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781032462868 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781003845447/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-104367628 |
---|---|
_version_ | 1821494931263324160 |
adam_text | |
any_adam_object | |
author | Fagan, Peter |
author_facet | Fagan, Peter |
author_role | aut |
author_sort | Fagan, Peter |
author_variant | p f pf |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)104367628 (DE-599)KEP104367628 (ORHE)9781003845447 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | First edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03058nam a22005532 4500</leader><controlfield tag="001">ZDB-30-ORH-104367628</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240701091157.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">240701s2024 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781003380962</subfield><subfield code="c">electronic book</subfield><subfield code="9">978-1-003-38096-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1003380964</subfield><subfield code="c">electronic book</subfield><subfield code="9">1-003-38096-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781003845423</subfield><subfield code="c">electronic book</subfield><subfield code="9">978-1-003-84542-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1003845428</subfield><subfield code="c">electronic book</subfield><subfield code="9">1-003-84542-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781003845447</subfield><subfield code="c">electronic book</subfield><subfield code="9">978-1-003-84544-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1003845444</subfield><subfield code="c">electronic book</subfield><subfield code="9">1-003-84544-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)104367628</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP104367628</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781003845447</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)104367628</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">UR</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20230822</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Fagan, Peter</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="4"><subfield code="a">The business of cyber</subfield><subfield code="b">why you should question what your security team are telling you</subfield><subfield code="c">Peter Fagan</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">First edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton, FL</subfield><subfield code="b">CRC Press</subfield><subfield code="c">2024</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2023</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xii, 266 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Description based on online resource; title from digital title page (viewed on April 30, 2024)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This book examines the cybersecurity phenomenon, looking at the folklore, the hype, and the behaviour of its practitioners. A central theme is that the management of cybersecurity needs to be owned by the people running the organisation, rather than the security team. To achieve that, managers need to be provided with the background and the detail needed to challenge what they are being told by the security team, enabling them to engage in a way that will result in more appropriate outcomes for the business. This book aims to provide that background and detail. The content is strongly rooted in available research, presented in an accessible manner, with a number of business-related case studies. Each chapter in the book takes a theme such as end-user behaviours, and compares the available evidence with what the industry would have its customers believe. The conclusion is that there is definitely a problem, and we certainly need cyber defences. Just not the ones the industry is currently selling"--</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">BUSINESS & ECONOMICS / Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS / Cryptography</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS / Networking / Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781032462868</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781032462868</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781003845447/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-104367628 |
illustrated | Not Illustrated |
indexdate | 2025-01-17T11:22:13Z |
institution | BVB |
isbn | 9781003380962 1003380964 9781003845423 1003845428 9781003845447 1003845444 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (xii, 266 Seiten) |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | CRC Press |
record_format | marc |
spelling | Fagan, Peter VerfasserIn aut The business of cyber why you should question what your security team are telling you Peter Fagan First edition. Boca Raton, FL CRC Press 2024 ©2023 1 Online-Ressource (xii, 266 Seiten) Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references and index. - Description based on online resource; title from digital title page (viewed on April 30, 2024) "This book examines the cybersecurity phenomenon, looking at the folklore, the hype, and the behaviour of its practitioners. A central theme is that the management of cybersecurity needs to be owned by the people running the organisation, rather than the security team. To achieve that, managers need to be provided with the background and the detail needed to challenge what they are being told by the security team, enabling them to engage in a way that will result in more appropriate outcomes for the business. This book aims to provide that background and detail. The content is strongly rooted in available research, presented in an accessible manner, with a number of business-related case studies. Each chapter in the book takes a theme such as end-user behaviours, and compares the available evidence with what the industry would have its customers believe. The conclusion is that there is definitely a problem, and we certainly need cyber defences. Just not the ones the industry is currently selling"-- Computer security Sécurité informatique BUSINESS & ECONOMICS / Management COMPUTERS / Cryptography COMPUTERS / Networking / Security 9781032462868 Erscheint auch als Druck-Ausgabe 9781032462868 |
spellingShingle | Fagan, Peter The business of cyber why you should question what your security team are telling you Computer security Sécurité informatique BUSINESS & ECONOMICS / Management COMPUTERS / Cryptography COMPUTERS / Networking / Security |
title | The business of cyber why you should question what your security team are telling you |
title_auth | The business of cyber why you should question what your security team are telling you |
title_exact_search | The business of cyber why you should question what your security team are telling you |
title_full | The business of cyber why you should question what your security team are telling you Peter Fagan |
title_fullStr | The business of cyber why you should question what your security team are telling you Peter Fagan |
title_full_unstemmed | The business of cyber why you should question what your security team are telling you Peter Fagan |
title_short | The business of cyber |
title_sort | business of cyber why you should question what your security team are telling you |
title_sub | why you should question what your security team are telling you |
topic | Computer security Sécurité informatique BUSINESS & ECONOMICS / Management COMPUTERS / Cryptography COMPUTERS / Networking / Security |
topic_facet | Computer security Sécurité informatique BUSINESS & ECONOMICS / Management COMPUTERS / Cryptography COMPUTERS / Networking / Security |
work_keys_str_mv | AT faganpeter thebusinessofcyberwhyyoushouldquestionwhatyoursecurityteamaretellingyou AT faganpeter businessofcyberwhyyoushouldquestionwhatyoursecurityteamaretellingyou |