The cybersecurity guide to governance, risk, and compliance / (Record no. 200467406)

MARC details
000 -LEADER
fixed length control field 03945nam a22004334u 4500
001 - CONTROL NUMBER
control field 200467406
003 - CONTROL NUMBER IDENTIFIER
control field Wiley
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20260227141151.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mam|a
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 240329t2024||||xxu fs| |0|| 0|eng||
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781394250226
Qualifying information electronic
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1002/9781394250226
Source of number or code doi
040 ## - CATALOGING SOURCE
Original cataloging agency TR-AnTOB
Language of cataloging eng
Description conventions rda
Transcribing agency TR-AnTOB
041 0# - LANGUAGE CODE
Language code of text/sound track or separate title İngilizce
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number HD30.38
Item number .E34 2024
090 ## - LOCALLY ASSIGNED LC-TYPE CALL NUMBER (OCLC); LOCAL CALL NUMBER (RLIN)
Classification number (OCLC) (R) ; Classification number, CALL (RLIN) (NR) HD30.38
Local cutter number (OCLC) ; Book number/undivided call number, CALL (RLIN) .E34 2024EBK
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Edwards, Jason
Relator term author
245 14 - TITLE STATEMENT
Title The cybersecurity guide to governance, risk, and compliance /
Medium [electronic resource]
Statement of responsibility, etc. Jason Edwards, Griffin Weaver
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Hoboken, NJ :
Name of producer, publisher, distributor, manufacturer Wiley,
Date of production, publication, distribution, manufacture, or copyright notice 2024.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (xviii, 638 pages)
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
347 ## - DIGITAL FILE CHARACTERISTICS
File type text file
Source rdaft
Encoding format PDF
520 ## - SUMMARY, ETC.
Summary, etc. The Cybersecurity Guide to Governance, Risk, and Compliance Understand and respond to a new generation of cybersecurity threats Cybersecurity has never been a more significant concern of modern businesses, with security breaches and confidential data exposure as potentially existential risks. Managing these risks and maintaining compliance with agreed-upon cybersecurity policies is the focus of Cybersecurity Governance and Risk Management. This field is becoming ever more critical as a result. A wide variety of different roles and categories of business professionals have an urgent need for fluency in the language of cybersecurity risk management. The Cybersecurity Guide to Governance, Risk, and Compliance meets this need with a comprehensive but accessible resource for professionals in every business area. Filled with cutting-edge analysis of the advanced technologies revolutionizing cybersecurity, increasing key risk factors at the same time, and offering practical strategies for implementing cybersecurity measures, it is a must-own for CISOs, boards of directors, tech professionals, business leaders, regulators, entrepreneurs, researchers, and more. The Cybersecurity Guide to Governance, Risk, and Compliance also covers: Over 1300 actionable recommendations found after each section Detailed discussion of topics including AI, cloud, and quantum computing More than 70 ready-to-use KPIs and KRIs "This guide’s coverage of governance, leadership, legal frameworks, and regulatory nuances ensures organizations can establish resilient cybersecurity postures. Each chapter delivers actionable knowledge, making the guide thorough and practical." —GARY McALUM, CISO "This guide represents the wealth of knowledge and practical insights that Jason and Griffin possess. Designed for professionals across the board, from seasoned cybersecurity veterans to business leaders, auditors, and regulators, this guide integrates the latest technological insights with governance, risk, and compliance (GRC)". —WIL BENNETT, CISO
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Communication System Security
Topical term or geographic name entry element Networking / Security
Topical term or geographic name entry element Corporate Governance
9 (RLIN) 75036
653 00 - INDEX TERM--UNCONTROLLED
Uncontrolled term Cybersecurity; Governance; Risk Management; Compliance; GRC; Leadership; Artificial Intelligence (A.I.); Cloud Computing Security; Quantum Computing Security; Audit; Regulatory Frameworks; Incident Response and Recovery; Third-Party and Vendor Management; Technology Design and Security Integration; Legal; Privacy; Cyber Insurance
655 #7 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books
Source of term local
9 (RLIN) 2032
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Weaver, Griffin
Relator term author
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Printed edition:
International Standard Book Number 9781394250196
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://doi.org/10.1002/9781394250226">https://doi.org/10.1002/9781394250226</a>
Host name Wiley Online Library
Uniform Resource Identifier <a href="https://onlinelibrary.wiley.com/action/showBook?doi=10.1002%2F9781394250226">https://onlinelibrary.wiley.com/action/showBook?doi=10.1002%2F9781394250226</a>
Host name Wiley Online Library
Materials specified Cover Image
Uniform Resource Identifier <a href="https://onlinelibrary.wiley.com/cms/asset/6521cbe3-9da2-4a87-9b04-29a263f64a11/9781394250226.cover.gif">https://onlinelibrary.wiley.com/cms/asset/6521cbe3-9da2-4a87-9b04-29a263f64a11/9781394250226.cover.gif</a>
Host name Wiley Online Library
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Library of Congress Classification
Koha item type E-Book
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Not for loan Collection code Home library Current library Date acquired Source of acquisition Cost, normal purchase price Inventory number Full call number Barcode Date last seen Cost, replacement price Date shelved Koha item type
    Library of Congress Classification Geçerli değil-e-Kitap / Not applicable-e-Book E-Kitap Koleksiyonu Merkez Kütüphane Merkez Kütüphane 15/01/2025   0.00 END/İŞL HD30.38 .E34 2024EBK EBK03819 15/01/2025 0.00 15/01/2025 E-Book
Devinim Yazılım Eğitim Danışmanlık tarafından Koha'nın orjinal sürümü uyarlanarak geliştirilip kurulmuştur.