The cyber security handbook (Record no. 79757)

MARC details
000 -LEADER
fixed length control field 03236cam a2200361Mi 4500
001 - CONTROL NUMBER
control field on1228890103
003 - CONTROL NUMBER IDENTIFIER
control field OCoLC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240726104829.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 201127s2020 enk fo 000 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency UKAHL
Language of cataloging eng
Description conventions rda
Transcribing agency UKAHL
Modifying agency OCLCO
-- NT
-- OCLCO
-- YDX
-- OCLCF
-- UKAHL
-- OCLCO
-- YT1
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781787782631
Qualifying information
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781787782624
Qualifying information
050 04 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76
Item number .C934 2020
049 ## - LOCAL HOLDINGS (OCLC)
Holding library MAIN
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Calder, Alan,
Dates associated with a name 1957-
Relator term Author
245 10 - TITLE STATEMENT
Title The cyber security handbook
Remainder of title prepare for, respond to and recover from cyber attacks /
Statement of responsibility, etc. Alan Calder.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Ely :
Name of publisher, distributor, etc. ITGP,
Date of publication, distribution, etc. (c)2020.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
347 ## - DIGITAL FILE CHARACTERISTICS
File type data file
Source rda
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographies and index.
520 8# - SUMMARY, ETC.
Summary, etc. "This book is a comprehensive cyber security implementation manual which gives practical guidance on the individual activities identified in the IT Governance Cyber Resilience Framework (CRF) that can help organisations become cyber resilient and combat the cyber threat landscape.Suitable for senior directors (CEO, CISO, CIO), compliance managers, privacy managers, IT managers, security analysts and others, the book is divided into six parts: Part 1: Introduction. The world of cyber security and the approach taken in this book. Part 2: Threats and vulnerabilities. A discussion of a range of threats organisations face, organised by threat category, to help you understand what you are defending yourself against before you start thinking about your actual defences. Part 3: The CRF processes. Detailed discussions of each of the 24 CRF processes, explaining a wide range of security areas by process category and offering guidance on how to implement each. Part 4: Eight steps to implementing cyber security. Our eight-step approach to implementing the cyber security processes you need and maintaining them.Part 5: Reference frameworks. An explanation of how standards and frameworks work, along with their benefits. It also presents ten framework options, introducing you to some of the best-known standards and giving you an idea of the range available.Part 6: Conclusion and appendices. The appendices include a glossary of all the acronyms and abbreviations used in this book. Whether you are just starting out on the road to cyber security or looking to enhance and improve your existing cyber resilience programme, it should be clear that cyber security is no longer optional in today's information age; it is an essential component of business success."--from the publisher.
530 ## - COPYRIGHT INFORMATION:
COPYRIGHT INFORMATION COPYRIGHT NOT covered - Click this link to request copyright permission:
Uniform Resource Identifier <a href="b">b</a>
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security
Form subdivision Handbooks, manuals, etc.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Business enterprises
General subdivision Computer networks
-- Security measures.
655 #1 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic Books.
856 40 - ELECTRONIC LOCATION AND ACCESS
-- Click to access digital title | log in using your CIU ID number and my.ciu.edu password.
Uniform Resource Identifier <a href="httpss://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=2684544&site=eds-live&custid=s3260518">httpss://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=2684544&site=eds-live&custid=s3260518</a>
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Online Book (LOGIN USING YOUR MY CIU LOGIN AND PASSWORD)
DONATED BY:
VENDOR EBSCO
Classification part QA..
PUBLICATION YEAR 2020
LOCATION ONLINE
REQUESTED BY:
--
-- NFIC
Source of classification or shelving scheme
994 ## -
-- 92
-- NT
902 ## - LOCAL DATA ELEMENT B, LDB (RLIN)
a 1
b Cynthia Snell
c 1
d Cynthia Snell
Holdings
Withdrawn status Lost status Damaged status Not for loan Collection Home library Current library Shelving location Date acquired Source of acquisition Total Checkouts Full call number Barcode Date last seen Uniform Resource Identifier Price effective from Koha item type
        Non-fiction G. Allen Fleece Library G. Allen Fleece Library ONLINE 07/07/2023 EBSCO   QA76.9.25 on1228890103 07/07/2023 httpss://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=2684544&site=eds-live&custid=s3260518 07/07/2023 Online Book (LOGIN USING YOUR MY CIU LOGIN AND PASSWORD)