000 | 07336cam a2200985 i 4500 | ||
---|---|---|---|
001 | ocn876900980 | ||
003 | OCoLC | ||
005 | 20171224114609.0 | ||
006 | m o d | ||
007 | cr ||||||||||| | ||
008 | 140415s2014 nju ob 001 0 eng | ||
010 | _a 2014015182 | ||
040 |
_aDLC _beng _erda _cDLC _dYDX _dN$T _dEBLCP _dDG1 _dE7B _dTEFOD _dCUS _dIDEBK _dYDXCP _dDEBSZ _dCOO _dOCLCF _dUMI _dDEBBG _dOCLCO _dTEFOD _dSTF _dB24X7 _dOCLCQ _dVT2 _dCSJ _dD6H |
||
019 |
_a882610202 _a893436806 _a900003714 _a961588044 _a962646351 |
||
020 | _a9781118908808 (epub) | ||
020 | _a1118908805 (epub) | ||
020 | _a9781118908815 (pdf) | ||
020 | _a1118908813 (pdf) | ||
020 | _z9781118888148 (cloth) | ||
020 | _z9781118908785 | ||
020 | _z1118908783 | ||
020 | _z1306906458 | ||
020 | _z9781306906456 | ||
020 | _z1118888146 | ||
029 | 1 |
_aCHBIS _b010259706 |
|
029 | 1 |
_aCHVBK _b325943443 |
|
029 | 1 |
_aDEBSZ _b409827983 |
|
029 | 1 |
_aDEBSZ _b417235267 |
|
029 | 1 |
_aDEBSZ _b420034722 |
|
029 | 1 |
_aNZ1 _b15592109 |
|
029 | 1 |
_aNZ1 _b15906896 |
|
029 | 1 |
_aCHVBK _b33311311X |
|
029 | 1 |
_aCHBIS _b010413347 |
|
029 | 1 |
_aDEBSZ _b449433226 |
|
029 | 1 |
_aDEBBG _bBV042182837 |
|
029 | 1 |
_aDEBBG _bBV043610174 |
|
029 | 1 |
_aDEBBG _bBV043396690 |
|
035 |
_a(OCoLC)876900980 _z(OCoLC)882610202 _z(OCoLC)893436806 _z(OCoLC)900003714 _z(OCoLC)961588044 _z(OCoLC)962646351 |
||
037 |
_aE024C110-C148-46F5-8C15-3D328778880C _bOverDrive, Inc. _nhttp://www.overdrive.com |
||
042 | _apcc | ||
050 | 0 | 0 | _aTK5105.59 |
072 | 7 |
_aBUS _x082000 _2bisacsh |
|
072 | 7 |
_aBUS _x041000 _2bisacsh |
|
072 | 7 |
_aBUS _x042000 _2bisacsh |
|
072 | 7 |
_aBUS _x085000 _2bisacsh |
|
082 | 0 | 0 |
_a658.4/78 _223 |
049 | _aMAIN | ||
100 | 1 | _aTouhill, Gregory J. | |
245 | 1 | 0 |
_aCybersecurity for executives : _ba practical guide / _cby Gregory J. Touhill and C. Joseph Touhill. |
264 | 1 |
_aHoboken, New Jersey : _bJohn Wiley & Sons, _c[2014] |
|
300 | _a1 online resource. | ||
336 |
_atext _2rdacontent |
||
337 |
_acomputer _2rdamedia |
||
338 |
_aonline resource _2rdacarrier |
||
504 | _aIncludes bibliographical references and index. | ||
588 | _aDescription based on print version record and CIP data provided by publisher. | ||
520 |
_aThis guide can be used by executives to make well-informed decisions on cybersecurity issues to better protect their business. It emphasizes, in a direct and uncomplicated way, how executives can identify, understand, assess, and mitigate risks associated with cybersecurity issues; covers what to do when you get hacked, including business continuity and disaster recovery planning, public relations, legal and regulatory issues, and notifications and disclosures; provides steps for integrating cybersecurity into strategy, policy and guidelines, change management and personnel management; identifies cybersecurity best practices that executives can and should use both in the office and at home to protect their vital information. -- _cEdited summary from book. |
||
505 | 0 | _aCybersecurity for Executives: A Practical Guide; Contents ; Foreword ; Preface ; Acknowledgments ; 1.0 INTRODUCTION ; 1.1 DEFINING CYBERSECURITY; 1.2 CYBERSECURITY IS A BUSINESS IMPERATIVE; 1.3 CYBERSECURITY IS AN EXECUTIVE-LEVEL CONCERN; 1.4 QUESTIONS TO ASK; 1.5 VIEWS OF OTHERS; 1.6 CYBERSECURITY IS A FULL-TIME ACTIVITY; 2.0 WHY BE CONCERNED? ; 2.1 A CLASSIC HACK; 2.2 WHO WANTS YOUR FORTUNE?; 2.3 NATION-STATE THREATS; 2.3.1 China; 2.3.2 Don't Think that China is the Only One; 2.4 CYBERCRIME IS BIG BUSINESS; 2.4.1 Mercenary Hackers; 2.4.2 Hacktivists; 2.4.3 The Insider Threat | |
505 | 8 | _a2.4.4 Substandard Products and Services2.5 SUMMARY; 3.0 MANAGING RISK ; 3.1 WHO OWNS RISK IN YOUR BUSINESS?; 3.2 WHAT ARE YOUR RISKS?; 3.2.1 Threats to Your Intellectual Property and Trade Secrets; 3.2.2 Technical Risks; 3.2.3 Human Risks; 3.3 CALCULATING YOUR RISK; 3.3.1 Quantitative Risk Assessment; 3.3.2 Qualitative Risk Assessment; 3.3.3 Risk Decisions; 3.4 COMMUNICATING RISK; 3.4.1 Communicating Risk Internally; 3.4.2 Regulatory Communications; 3.4.3 Communicating with Shareholders; 3.5 ORGANIZING FOR SUCCESS; 3.5.1 Risk Management Committee; 3.5.2 Chief Risk Officers; 3.6 SUMMARY | |
505 | 8 | _a4.0 BUILD YOUR STRATEGY 4.1 HOW MUCH "CYBERSECURITY" DO I NEED?; 4.2 THE MECHANICS OF BUILDING YOUR STRATEGY; 4.2.1 Where are We Now?; 4.2.2 What do We have to Work with?; 4.2.3 Where do We Want to be?; 4.2.4 How do We Get There?; 4.2.5 Goals and Objectives; 4.3 AVOIDING STRATEGY FAILURE; 4.3.1 Poor Plans, Poor Execution; 4.3.2 Lack of Communication; 4.3.3 Resistance to Change; 4.3.4 Lack of Leadership and Oversight; 4.4 WAYS TO INCORPORATE CYBERSECURITY INTO YOUR STRATEGY; 4.4.1 Identify the Information Critical to Your Business; 4.4.2 Make Cybersecurity Part of Your Culture | |
505 | 8 | _a4.4.3 Consider Cybersecurity Impacts in Your Decisions4.4.4 Measure Your Progress; 4.5 PLAN FOR SUCCESS; 4.6 SUMMARY; 5.0 Plan for Success ; 5.1 TURNING VISION INTO REALITY; 5.1.1 Planning for Excellence; 5.1.2 A Plan of Action; 5.1.3 Doing Things ; 5.2 POLICIES COMPLEMENT PLANS; 5.2.1 Great Cybersecurity Policies for Everyone; 5.2.2 Be Clear about Your Policies and Who Owns Them; 5.3 PROCEDURES IMPLEMENT PLANS; 5.4 EXERCISE YOUR PLANS; 5.5 LEGAL COMPLIANCE CONCERNS; 5.6 AUDITING; 5.7 SUMMARY; 6.0 CHANGE MANAGEMENT ; 6.1 WHY MANAGING CHANGE IS IMPORTANT; 6.2 WHEN TO CHANGE? | |
505 | 8 | _a6.3 WHAT IS IMPACTED BY CHANGE?6.4 CHANGE MANAGEMENT AND INTERNAL CONTROLS; 6.5 CHANGE MANAGEMENT AS A PROCESS; 6.5.1 The Touhill Change Management Process; 6.5.2 Following the Process; 6.5.3 Have a Plan B, Plan C, and maybe a Plan D; 6.6 BEST PRACTICES IN CHANGE MANAGEMENT; 6.7 SUMMARY; 7.0 PERSONNEL MANAGEMENT ; 7.1 FINDING THE RIGHT FIT; 7.2 CREATING THE TEAM; 7.2.1 Picking the Right Leaders; 7.2.2 Your Cybersecurity Leaders; 7.3 ESTABLISHING PERFORMANCE STANDARDS; 7.4 ORGANIZATIONAL CONSIDERATIONS; 7.5 TRAINING FOR SUCCESS; 7.5.1 Information Every Employee Ought to Know | |
650 | 0 |
_aComputer networks _xSecurity measures. |
|
650 | 4 |
_aComputer networks _xSecurity measures. |
|
650 | 7 |
_aBUSINESS & ECONOMICS _xIndustrial Management. _2bisacsh |
|
650 | 7 |
_aBUSINESS & ECONOMICS _xManagement. _2bisacsh |
|
650 | 7 |
_aBUSINESS & ECONOMICS _xManagement Science. _2bisacsh |
|
650 | 7 |
_aBUSINESS & ECONOMICS _xOrganizational Behavior. _2bisacsh |
|
650 | 7 |
_aComputer networks _xSecurity measures. _2fast _0(OCoLC)fst00872341 |
|
650 | 7 |
_aComputer networks / Security measures. _2local |
|
655 | 4 | _aElectronic books. | |
655 | 0 | _aElectronic books. | |
700 | 1 |
_aTouhill, C. J., _d1938- |
|
776 | 0 | 8 |
_iPrint version: _aTouhill, Gregory J. _tCybersecurity for executives _dHoboken, New Jersey : John Wiley & Sons, [2014] _z9781118888148 _w(DLC) 2014002691 |
856 | 4 | 0 |
_uhttp://onlinelibrary.wiley.com/book/10.1002/9781118908785 _zWiley Online Library |
938 |
_aEBL - Ebook Library _bEBLB _nEBL1707094 |
||
938 |
_aebrary _bEBRY _nebr10879737 |
||
938 |
_aEBSCOhost _bEBSC _n792115 |
||
938 |
_aIngram Digital eBook Collection _bIDEB _ncis28553940 |
||
938 |
_aYBP Library Services _bYANK _n11858484 |
||
938 |
_aYBP Library Services _bYANK _n11605720 |
||
938 |
_aYBP Library Services _bYANK _n12673621 |
||
938 |
_aBooks 24x7 _bB247 _nbks00072721 |
||
994 |
_a92 _bDG1 |
||
999 |
_c13394 _d13394 |