MARC details
000 -LEADER |
fixed length control field |
05151cam a2200361Ii 4500 |
001 - CONTROL NUMBER |
control field |
on1111475093 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
OCoLC |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20240726105214.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
190803s2019 xx o 000 0 eng d |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
EBLCP |
Language of cataloging |
eng |
Description conventions |
pn |
-- |
rda |
Transcribing agency |
EBLCP |
Modifying agency |
YDX |
-- |
OCLCQ |
-- |
NT |
-- |
EBLCP |
-- |
OCLCF |
-- |
CNO |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781633697881 |
Qualifying information |
|
050 04 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA76 |
Item number |
.C934 2019 |
049 ## - LOCAL HOLDINGS (OCLC) |
Holding library |
MAIN |
245 10 - TITLE STATEMENT |
Title |
Cybersecurity : |
Remainder of title |
the Insights You Need from Harvard Business Review. |
Statement of responsibility, etc. |
|
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Boston, Massachusetts : |
Name of publisher, distributor, etc. |
Harvard Business Review Press, |
Date of publication, distribution, etc. |
(c)2019. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
1 online resource (xvi, 158 pages) |
336 ## - CONTENT TYPE |
Content type term |
text |
Content type code |
txt |
Source |
rdacontent |
337 ## - MEDIA TYPE |
Media type term |
computer |
Media type code |
c |
Source |
rdamedia |
338 ## - CARRIER TYPE |
Carrier type term |
online resource |
Carrier type code |
cr |
Source |
rdacarrier |
347 ## - DIGITAL FILE CHARACTERISTICS |
File type |
data file |
Source |
rda |
490 1# - SERIES STATEMENT |
Series statement |
Insights you need from Harvard Business Review |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes bibliographies and index. |
520 0# - SUMMARY, ETC. |
Summary, etc. |
Too many of us associate cybersecurity with credit card theft and think the solution is for our banking partners, social media platforms, and large retailers to improve and increase their data security practices. But in the world we live and work in, where our systems are increasingly interconnected and our employees and customers are logging in to access their work or our products from all over the world and on all types of devices, the risk is much greater than we imagine. As the complexity and sophistication of our interconnected systems increases, so too do the skills of our adversaries. From outlining the challenges to exploring the solutions, Cybersecurity: The Insights You Need from Harvard Business Review will help leaders address the managerial, organizational, and strategic aspects of these ever-present threats to your organization. Catch up on current topics and deepen your understanding of them with the Insights You Need series from Harvard Business Review. Featuring some of HBR's best and most recent thinking, Insights You Need titles are both a primer on today's most pressing issues and an extension of the conversation, with interesting research, interviews, case studies, and practical ideas to help you explore how a particular issue will impact your company and what it will mean for you and your business.-- |
Assigning source |
|
505 00 - FORMATTED CONTENTS NOTE |
Formatted contents note |
Introduction / |
Statement of responsibility |
by Alex Blau -- |
Title |
Internet insecurity: if your mission-critical systems are digital and connected, they can never be made fully safe / |
Statement of responsibility |
by Andy Bochman -- |
Title |
Security trends by the numbers: the good news is that companies are stopping more attacks than ever -- |
-- |
you can probably guess the bad news / |
Statement of responsibility |
by Scott Berinato and Matt Perry -- |
Title |
Why boards aren't dealing with cyberthreats: because they're too busy focusing on areas they have expertise in, such as retaining talent and monitoring the regulatory environment / |
Statement of responsibility |
by J. Yo-Jud Cheng and Boris Groysberg -- |
Title |
The behavioral economics of why executives underinvest in cybersecurity: leaders need to stop thinking about cybersecurity as a problem that can be solved / |
Statement of responsibility |
by Alex Blau -- |
Title |
Why the entire c-suite needs to use the same metrics for cyber risk: but before that, leaders must create a common language around cybersecurity / |
Statement of responsibility |
by Jason J. Hogg -- |
Title |
The best cybersecurity investment you can make is better training: your first and last line of defense is prepared leaders and employees / |
Statement of responsibility |
by Dante Disparte and Chris Furlow -- |
Title |
Better cybersecurity starts with fixing your employees' bad habits: ways to neturalize predictably poor user behavior / |
Statement of responsibility |
by Alex Blau -- |
Title |
The key to better cybersecurity: keep employee rules simple -- |
-- |
people look for workarounds when policies are too complicated / |
Statement of responsibility |
by Maarten Van Horenbeeck -- |
Title |
The avoidable mistakes executives continue to make after a data breach: you will get hacked -- |
-- |
here's what not to do when it happens / |
Statement of responsibility |
by Bill Bourdon -- |
Title |
Active defense and "hacking back": a primer -- |
-- |
passive monitoring isn't your only choice / |
Statement of responsibility |
by Scott Berinato -- |
Title |
Cybersecurity is putting customer trust at the center of competition: don't just protect customer data -- |
-- |
demonstrate that you're doing everything in your power to minimize breaches / |
Statement of responsibility |
by Andrew Burt -- |
Title |
Privacy and cybersecurity are converging: here's why that matters for people and for companies -- |
-- |
big data and machine learning could kill the notion of consent / |
Statement of responsibility |
by Andrew Burt -- |
Title |
What countries and companies can do when trade and cybersecurity overlap: a framework for understanding and categorizing cybersecurity concerns involved in trade / |
Statement of responsibility |
by Stuart Madnick, Simon Johnson, and Keman Huang -- |
Title |
AI is the future of cybersecurity, for better and for worse: it will become both the problem and the solution / |
Statement of responsibility |
by Roman V. Yampolskiy. |
530 ## - COPYRIGHT INFORMATION: |
COPYRIGHT INFORMATION |
COPYRIGHT NOT covered - Click this link to request copyright permission: |
Uniform Resource Identifier |
<a href="b">b</a> |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer security. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Business enterprises |
General subdivision |
Security measures. |
655 #1 - INDEX TERM--GENRE/FORM |
Genre/form data or focus term |
Electronic Books. |
856 40 - ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
<a href="https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=2003607&site=eds-live&custid=s3260518">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=2003607&site=eds-live&custid=s3260518</a> |
-- |
Click to access digital title | log in using your CIU ID number and my.ciu.edu password |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Koha item type |
Online Book (LOGIN USING YOUR MY CIU LOGIN AND PASSWORD) |
DONATED BY: |
|
VENDOR |
EBSCO |
Classification part |
QA.. |
PUBLICATION YEAR |
2019 |
LOCATION |
ONLINE |
REQUESTED BY: |
|
-- |
|
-- |
NFIC |
Source of classification or shelving scheme |
|
994 ## - |
-- |
92 |
-- |
NT |
902 ## - LOCAL DATA ELEMENT B, LDB (RLIN) |
a |
1 |
b |
Cynthia Snell |
c |
1 |
d |
Cynthia Snell |