The cyber security handbook : (Record no. 129)

MARC details
000 -LEADER
fixed length control field 02651nam a22002777a 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220707192714.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 220504b |||||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781787782617
040 ## - CATALOGING SOURCE
Transcribing agency 0
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8 CAL
092 ## - LOCALLY ASSIGNED DEWEY CALL NUMBER (OCLC)
Edition number 0
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Calder, Alan
245 ## - TITLE STATEMENT
Title The cyber security handbook :
Statement of responsibility, etc. Alan Calder
Remainder of title prepare for, respond to and recover from cyber attacks
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Ely
Name of publisher, distributor, etc. ITGP
Date of publication, distribution, etc. 2020
300 ## - PHYSICAL DESCRIPTION
Extent 361 pages
Other physical details illus.
Dimensions 22 cm
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references
520 ## - SUMMARY, ETC.
Summary, etc. "This book is a comprehensive cyber security implementation manual which gives practical guidance on the individual activities identified in the IT Governance Cyber Resilience Framework (CRF) that can help organisations become cyber resilient and combat the cyber threat landscape.Suitable for senior directors (CEO, CISO, CIO), compliance managers, privacy managers, IT managers, security analysts and others, the book is divided into six parts: Part 1: Introduction. The world of cyber security and the approach taken in this book. Part 2: Threats and vulnerabilities. A discussion of a range of threats organisations face, organised by threat category, to help you understand what you are defending yourself against before you start thinking about your actual defences. Part 3: The CRF processes. Detailed discussions of each of the 24 CRF processes, explaining a wide range of security areas by process category and offering guidance on how to implement each. Part 4: Eight steps to implementing cyber security. Our eight-step approach to implementing the cyber security processes you need and maintaining them.Part 5: Reference frameworks. An explanation of how standards and frameworks work, along with their benefits. It also presents ten framework options, introducing you to some of the best-known standards and giving you an idea of the range available.Part 6: Conclusion and appendices. The appendices include a glossary of all the acronyms and abbreviations used in this book. Whether you are just starting out on the road to cyber security or looking to enhance and improve your existing cyber resilience programme, it should be clear that cyber security is no longer optional in today's information age; it is an essential component of business success."--from the publisher.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security
Form subdivision Handbooks, manuals, etc
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Business enterprises
Form subdivision Computer networks
General subdivision Security measures.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Sécurité informatique
General subdivision Guides, manuels, etc.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Security measures
843 ## - REPRODUCTION NOTE
Type of reproduction Photocopy
887 ## - NON-MARC INFORMATION FIELD
Source of data CamTech Library
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Books
Suppress in OPAC No
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Total Checkouts Full call number Barcode Date due Date last seen Date last checked out Copy number Price effective from Koha item type
    Dewey Decimal Classification     CamTech Library CamTech Library STEM & Engineering 05/04/2022 1 005.8 CAL CamTech 000695 02/20/2024 02/06/2024 02/06/2024 1 05/04/2022 Books