The cybersecurity control playbook : (Record no. 93438)

000 -LEADER
fixed length control field 04564cam a22004578i 4500
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20251118092511.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr aa aaaaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 251118t20252025nju 001 0 eng c
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2025001243
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781394331888
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781394331857
Qualifying information cloth
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Cancelled/invalid ISBN 9781394331871
Qualifying information adobe pdf
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Cancelled/invalid ISBN 9781394331864
Qualifying information epub
035 ## - SYSTEM CONTROL NUMBER
System control number 24042777
035 ## - SYSTEM CONTROL NUMBER
System control number (DLC)24042777
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title eng
042 ## - AUTHENTICATION CODE
Authentication code pcc
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number E3884 2025
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23/eng/20250319
100 1# - MAIN ENTRY--PERSONAL NAME
Preferred name for the person Edwards, Jason
Titles and other words associated with a name (Cybersecurity expert)
Relator term author
Relator code aut
-- http://id.loc.gov/vocabulary/relators/aut
Authority record control number http://id.loc.gov/authorities/names/n2024010546
245 14 - TITLE STATEMENT
Title The cybersecurity control playbook :
Remainder of title from fundamentals to advanced strategies /
Statement of responsibility, etc Jason Edwards, Amazon, Cibolo, TX, US.
263 ## - PROJECTED PUBLICATION DATE
Projected publication date 2505
264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Hoboken, NJ :
Name of publisher, distributor, etc Wiley,
Date of publication, distribution, etc 2025.
264 #4 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Date of publication, distribution, etc ©2025
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
500 ## - GENERAL NOTE
General note Includes index.
520 ## - SUMMARY, ETC.
Summary, etc "This book is an essential resource for anyone looking to protect their organization in the digital age; whether running a small business, managing a medium-sized company, or leading a large corporation, this book contains strategies that will fit all needs. Written in a highly accessible, jargon-free style, the highly experienced author shares his advice for effective cybersecurity controls which are crucial for protecting sensitive data, maintaining system integrity, and ensuring privacy. They help prevent data breaches, reduce financial risks, and build trust. Additionally, they are vital for meeting regulatory requirements in various industries. As technology advances, these controls will become increasingly important in securing our digital world. Each chapter provides clear explanations of foundational concepts before delving into more advanced topics, ensuring that readers understand the basics. Additionally, the book includes appendices and links to online resources for those who need to brush up on specific skills. By incorporating these supportive elements, the book ensures that all readers can fully grasp and apply the cybersecurity strategies discussed regardless of their starting point"-- Provided by publisher.
545 0# - BIOGRAPHICAL OR HISTORICAL DATA
Biographical or historical note About the Author<br/>Jason Edwards, DM, CISSP, is an accomplished cybersecurity leader with extensive experience in the technology, finance, insurance, and energy sectors. Holding a Doctorate in Management, Information Systems, and Technology, Jason specializes in guiding large public and private companies through complex cybersecurity challenges. His career includes leadership roles across the military, insurance, finance, energy, and technology industries. He is a husband, father, former military cyber officer, adjunct professor, avid reader, dog dad, and popular on LinkedIn.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security
Authority record control number http://id.loc.gov/authorities/subjects/sh90001862
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data protection
Authority record control number http://id.loc.gov/authorities/subjects/sh85035859
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Business enterprises
General subdivision Data processing
-- Security measures
655 #4 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888
Link text Full text is available at Wiley Online Library Click here to view
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 7
b cbc
c orignew
d 1
e ecip
f 20
g y-gencatlg
942 ## - ADDED ENTRY ELEMENTS
Source of classification or shelving scheme
Item type EBOOK

No items available.