MARC details
| 000 -LEADER |
| fixed length control field |
03945nam a22004334u 4500 |
| 001 - CONTROL NUMBER |
| control field |
200467406 |
| 003 - CONTROL NUMBER IDENTIFIER |
| control field |
Wiley |
| 005 - DATE AND TIME OF LATEST TRANSACTION |
| control field |
20260227141151.0 |
| 007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
| fixed length control field |
cr nn 008mam|a |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
240329t2024||||xxu fs| |0|| 0|eng|| |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9781394250226 |
| Qualifying information |
electronic |
| 024 7# - OTHER STANDARD IDENTIFIER |
| Standard number or code |
10.1002/9781394250226 |
| Source of number or code |
doi |
| 040 ## - CATALOGING SOURCE |
| Original cataloging agency |
TR-AnTOB |
| Language of cataloging |
eng |
| Description conventions |
rda |
| Transcribing agency |
TR-AnTOB |
| 041 0# - LANGUAGE CODE |
| Language code of text/sound track or separate title |
İngilizce |
| 050 00 - LIBRARY OF CONGRESS CALL NUMBER |
| Classification number |
HD30.38 |
| Item number |
.E34 2024 |
| 090 ## - LOCALLY ASSIGNED LC-TYPE CALL NUMBER (OCLC); LOCAL CALL NUMBER (RLIN) |
| Classification number (OCLC) (R) ; Classification number, CALL (RLIN) (NR) |
HD30.38 |
| Local cutter number (OCLC) ; Book number/undivided call number, CALL (RLIN) |
.E34 2024EBK |
| 100 1# - MAIN ENTRY--PERSONAL NAME |
| Personal name |
Edwards, Jason |
| Relator term |
author |
| 245 14 - TITLE STATEMENT |
| Title |
The cybersecurity guide to governance, risk, and compliance / |
| Medium |
[electronic resource] |
| Statement of responsibility, etc. |
Jason Edwards, Griffin Weaver |
| 264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
| Place of production, publication, distribution, manufacture |
Hoboken, NJ : |
| Name of producer, publisher, distributor, manufacturer |
Wiley, |
| Date of production, publication, distribution, manufacture, or copyright notice |
2024. |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
1 online resource (xviii, 638 pages) |
| 336 ## - CONTENT TYPE |
| Content type term |
text |
| Content type code |
txt |
| Source |
rdacontent |
| 337 ## - MEDIA TYPE |
| Media type term |
computer |
| Media type code |
c |
| Source |
rdamedia |
| 338 ## - CARRIER TYPE |
| Carrier type term |
online resource |
| Carrier type code |
cr |
| Source |
rdacarrier |
| 347 ## - DIGITAL FILE CHARACTERISTICS |
| File type |
text file |
| Source |
rdaft |
|
| Encoding format |
PDF |
| 520 ## - SUMMARY, ETC. |
| Summary, etc. |
The Cybersecurity Guide to Governance, Risk, and Compliance Understand and respond to a new generation of cybersecurity threats Cybersecurity has never been a more significant concern of modern businesses, with security breaches and confidential data exposure as potentially existential risks. Managing these risks and maintaining compliance with agreed-upon cybersecurity policies is the focus of Cybersecurity Governance and Risk Management. This field is becoming ever more critical as a result. A wide variety of different roles and categories of business professionals have an urgent need for fluency in the language of cybersecurity risk management. The Cybersecurity Guide to Governance, Risk, and Compliance meets this need with a comprehensive but accessible resource for professionals in every business area. Filled with cutting-edge analysis of the advanced technologies revolutionizing cybersecurity, increasing key risk factors at the same time, and offering practical strategies for implementing cybersecurity measures, it is a must-own for CISOs, boards of directors, tech professionals, business leaders, regulators, entrepreneurs, researchers, and more. The Cybersecurity Guide to Governance, Risk, and Compliance also covers: Over 1300 actionable recommendations found after each section Detailed discussion of topics including AI, cloud, and quantum computing More than 70 ready-to-use KPIs and KRIs "This guide’s coverage of governance, leadership, legal frameworks, and regulatory nuances ensures organizations can establish resilient cybersecurity postures. Each chapter delivers actionable knowledge, making the guide thorough and practical." —GARY McALUM, CISO "This guide represents the wealth of knowledge and practical insights that Jason and Griffin possess. Designed for professionals across the board, from seasoned cybersecurity veterans to business leaders, auditors, and regulators, this guide integrates the latest technological insights with governance, risk, and compliance (GRC)". —WIL BENNETT, CISO |
| 650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Communication System Security |
|
| Topical term or geographic name entry element |
Networking / Security |
|
| Topical term or geographic name entry element |
Corporate Governance |
| 9 (RLIN) |
75036 |
| 653 00 - INDEX TERM--UNCONTROLLED |
| Uncontrolled term |
Cybersecurity; Governance; Risk Management; Compliance; GRC; Leadership; Artificial Intelligence (A.I.); Cloud Computing Security; Quantum Computing Security; Audit; Regulatory Frameworks; Incident Response and Recovery; Third-Party and Vendor Management; Technology Design and Security Integration; Legal; Privacy; Cyber Insurance |
| 655 #7 - INDEX TERM--GENRE/FORM |
| Genre/form data or focus term |
Electronic books |
| Source of term |
local |
| 9 (RLIN) |
2032 |
| 700 1# - ADDED ENTRY--PERSONAL NAME |
| Personal name |
Weaver, Griffin |
| Relator term |
author |
| 776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
| Relationship information |
Printed edition: |
| International Standard Book Number |
9781394250196 |
| 856 40 - ELECTRONIC LOCATION AND ACCESS |
| Uniform Resource Identifier |
<a href="https://doi.org/10.1002/9781394250226">https://doi.org/10.1002/9781394250226</a> |
| Host name |
Wiley Online Library |
|
| Uniform Resource Identifier |
<a href="https://onlinelibrary.wiley.com/action/showBook?doi=10.1002%2F9781394250226">https://onlinelibrary.wiley.com/action/showBook?doi=10.1002%2F9781394250226</a> |
| Host name |
Wiley Online Library |
|
| Materials specified |
Cover Image |
| Uniform Resource Identifier |
<a href="https://onlinelibrary.wiley.com/cms/asset/6521cbe3-9da2-4a87-9b04-29a263f64a11/9781394250226.cover.gif">https://onlinelibrary.wiley.com/cms/asset/6521cbe3-9da2-4a87-9b04-29a263f64a11/9781394250226.cover.gif</a> |
| Host name |
Wiley Online Library |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) |
| Source of classification or shelving scheme |
Library of Congress Classification |
| Koha item type |
E-Book |