|
|
|
|
LEADER |
03211nmm a2200541 u 4500 |
001 |
EB002012779 |
003 |
EBX01000000000000001175678 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
220317 ||| eng |
020 |
|
|
|a 1119782511
|
020 |
|
|
|a 111978249X
|
020 |
|
|
|a 9781119782506
|
020 |
|
|
|a 9781119782513
|
020 |
|
|
|a 1119782503
|
020 |
|
|
|a 9781119782490
|
050 |
|
4 |
|a HD30.2
|
100 |
1 |
|
|a Sharp, Matthew K.
|
245 |
0 |
0 |
|a The CISO evolution
|b business knowledge for cybersecurity executives
|c Matthew K. Sharp, Kyriakos P. Lambros
|
260 |
|
|
|a Hoboken, New Jersey
|b John Wiley & Sons, Inc.
|c 2022
|
300 |
|
|
|a 1 online resource
|b illustrations (some color)
|
505 |
0 |
|
|a Includes bibliographical references and index
|
505 |
0 |
|
|a Cybersecurity: A Concern of the Business, Not Just IT 00 Principle 00 Application 00 Key Insights 00 Notes 00 CHAPTER 7 Translating Cyber Risk into Business Risk 00 Principle 00 Application 00 Key Insights 00 Notes 00 CHAPTER 8 Communication -- You Do it Every Day (or Do You?) 00 Principle 00 Application 00 Key Insights 00 Notes 00 CHAPTER 9 Relationship Management 00 Opportunity 00 Principle 00 Application 00 TOC BM Sharp782483_Sample.indd 8 9/6/2021 2:31:31 PM Contents ix Key Insights 00 Works Cited 00 CHAPTER 10 Recruiting and Leading High Performing Teams 00 Opportunity 00 Principle 00 Application 00 Key Insights 00 Works Cited 00 CHAPTER 11 Managing Human Capital 00 Opportunity 00 Principle 00 Application 00 Key Insights 00
|
653 |
|
|
|a Chief information officers / fast
|
653 |
|
|
|a Chief information officers / http://id.loc.gov/authorities/subjects/sh94001519
|
653 |
|
|
|a Sécurité informatique
|
653 |
|
|
|a Management information systems / Security measures
|
653 |
|
|
|a Chefs des services de l'information
|
653 |
|
|
|a Computer security / http://id.loc.gov/authorities/subjects/sh90001862
|
653 |
|
|
|a Systèmes d'information de gestion / Sécurité / Mesures
|
653 |
|
|
|a Computer security / fast
|
653 |
|
|
|a Computer Security
|
700 |
1 |
|
|a Lambros, Kyriakos P.
|e author
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b OREILLY
|a O'Reilly
|
024 |
8 |
|
|a 10.1002/9781119782513
|
776 |
|
|
|z 9781119782506
|
776 |
|
|
|z 9781119782483
|
776 |
|
|
|z 9781119782490
|
776 |
|
|
|z 111978249X
|
776 |
|
|
|z 1119782481
|
776 |
|
|
|z 9781119782513
|
776 |
|
|
|z 1119782511
|
776 |
|
|
|z 1119782503
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781119782483/?ar
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 658
|
082 |
0 |
|
|a 658.4/038011
|
520 |
|
|
|a "Cybersecurity is the protection of computer systems and networks from the theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide. A CISO (chief information security officer) is the senior-level executive within an organization responsible for establishing and maintaining the enterprise vision, strategy, and program to ensure information assets and technologies are adequately protected. The CISO directs staff in identifying, developing, implementing, and maintaining processes across the enterprise to reduce information and IT risks."--
|