The cybersecurity control playbook : (Record no. 93438)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 04564cam a22004578i 4500 |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20251118092511.0 |
| 007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
| fixed length control field | cr aa aaaaa |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 251118t20252025nju 001 0 eng c |
| 010 ## - LIBRARY OF CONGRESS CONTROL NUMBER | |
| LC control number | 2025001243 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9781394331888 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9781394331857 |
| Qualifying information | cloth |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| Cancelled/invalid ISBN | 9781394331871 |
| Qualifying information | adobe pdf |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| Cancelled/invalid ISBN | 9781394331864 |
| Qualifying information | epub |
| 035 ## - SYSTEM CONTROL NUMBER | |
| System control number | 24042777 |
| 035 ## - SYSTEM CONTROL NUMBER | |
| System control number | (DLC)24042777 |
| 041 ## - LANGUAGE CODE | |
| Language code of text/sound track or separate title | eng |
| 042 ## - AUTHENTICATION CODE | |
| Authentication code | pcc |
| 050 00 - LIBRARY OF CONGRESS CALL NUMBER | |
| Classification number | QA76.9.A25 |
| Item number | E3884 2025 |
| 082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 005.8 |
| Edition number | 23/eng/20250319 |
| 100 1# - MAIN ENTRY--PERSONAL NAME | |
| Preferred name for the person | Edwards, Jason |
| Titles and other words associated with a name | (Cybersecurity expert) |
| Relator term | author |
| Relator code | aut |
| -- | http://id.loc.gov/vocabulary/relators/aut |
| Authority record control number | http://id.loc.gov/authorities/names/n2024010546 |
| 245 14 - TITLE STATEMENT | |
| Title | The cybersecurity control playbook : |
| Remainder of title | from fundamentals to advanced strategies / |
| Statement of responsibility, etc | Jason Edwards, Amazon, Cibolo, TX, US. |
| 263 ## - PROJECTED PUBLICATION DATE | |
| Projected publication date | 2505 |
| 264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
| Place of publication, distribution, etc | Hoboken, NJ : |
| Name of publisher, distributor, etc | Wiley, |
| Date of publication, distribution, etc | 2025. |
| 264 #4 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
| Date of publication, distribution, etc | ©2025 |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | 1 online resource |
| 336 ## - CONTENT TYPE | |
| Content type term | text |
| Content type code | txt |
| Source | rdacontent |
| 337 ## - MEDIA TYPE | |
| Media type term | computer |
| Media type code | c |
| Source | rdamedia |
| 338 ## - CARRIER TYPE | |
| Carrier type term | online resource |
| Carrier type code | cr |
| Source | rdacarrier |
| 500 ## - GENERAL NOTE | |
| General note | Includes index. |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc | "This book is an essential resource for anyone looking to protect their organization in the digital age; whether running a small business, managing a medium-sized company, or leading a large corporation, this book contains strategies that will fit all needs. Written in a highly accessible, jargon-free style, the highly experienced author shares his advice for effective cybersecurity controls which are crucial for protecting sensitive data, maintaining system integrity, and ensuring privacy. They help prevent data breaches, reduce financial risks, and build trust. Additionally, they are vital for meeting regulatory requirements in various industries. As technology advances, these controls will become increasingly important in securing our digital world. Each chapter provides clear explanations of foundational concepts before delving into more advanced topics, ensuring that readers understand the basics. Additionally, the book includes appendices and links to online resources for those who need to brush up on specific skills. By incorporating these supportive elements, the book ensures that all readers can fully grasp and apply the cybersecurity strategies discussed regardless of their starting point"-- Provided by publisher. |
| 545 0# - BIOGRAPHICAL OR HISTORICAL DATA | |
| Biographical or historical note | About the Author<br/>Jason Edwards, DM, CISSP, is an accomplished cybersecurity leader with extensive experience in the technology, finance, insurance, and energy sectors. Holding a Doctorate in Management, Information Systems, and Technology, Jason specializes in guiding large public and private companies through complex cybersecurity challenges. His career includes leadership roles across the military, insurance, finance, energy, and technology industries. He is a husband, father, former military cyber officer, adjunct professor, avid reader, dog dad, and popular on LinkedIn. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Computer security |
| Authority record control number | http://id.loc.gov/authorities/subjects/sh90001862 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Data protection |
| Authority record control number | http://id.loc.gov/authorities/subjects/sh85035859 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Business enterprises |
| General subdivision | Data processing |
| -- | Security measures |
| 655 #4 - INDEX TERM--GENRE/FORM | |
| Genre/form data or focus term | Electronic books. |
| 856 40 - ELECTRONIC LOCATION AND ACCESS | |
| Uniform Resource Identifier | https://onlinelibrary.wiley.com/doi/book/10.1002/9781394331888 |
| Link text | Full text is available at Wiley Online Library Click here to view |
| 906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) | |
| a | 7 |
| b | cbc |
| c | orignew |
| d | 1 |
| e | ecip |
| f | 20 |
| g | y-gencatlg |
| 942 ## - ADDED ENTRY ELEMENTS | |
| Source of classification or shelving scheme | |
| Item type | EBOOK |
No items available.