| 000 -LEADER |
| fixed length control field |
03821nam a22002657a 4500 |
| 005 - DATE AND TIME OF LATEST TRANSACTION |
| control field |
20260131104828.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
260129b ||||| |||| 00| 0 eng d |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9781636983868 |
| Qualifying information |
(ebook). |
| 041 ## - LANGUAGE CODE |
| Language code of text/sound track or separate title |
eng. |
| 082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
| Edition number |
23 |
| Classification number |
005.8 |
| 110 ## - MAIN ENTRY--CORPORATE NAME |
| Corporate name or jurisdiction name as entry element |
Featuring Cybersecurity And Compliance Experts From Around The World Featuring Cybersecurity And Compliance Experts From Around The World |
| Relator term |
author. |
| 245 ## - TITLE STATEMENT |
| Title |
From exposed to secure : |
| Remainder of title |
the cost of cybersecurity and compliance inaction and the best way to keep your company safe / |
| Statement of responsibility, etc |
Featuring Cybersecurity And Compliance Experts From Around The World Featuring Cybersecurity And Compliance Experts From Around The World |
| 264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
| Place of publication, distribution, etc |
New York : |
| Name of publisher, distributor, etc |
Morgan James Publishing ; |
| Date of publication, distribution, etc |
[2024]. |
| 264 #4 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
| Date of publication, distribution, etc |
©2024. |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
1 electronic resource. |
| 336 ## - CONTENT TYPE |
| Source |
text |
| Content type term |
txt |
| Content type code |
rdacontent |
| 337 ## - MEDIA TYPE |
| Source |
unmediated |
| Media type term |
n |
| Media type code |
rdamedia |
| 338 ## - CARRIER TYPE |
| Source |
volume |
| Carrier type term |
nc |
| Carrier type code |
rdacarrier |
| 505 0# - CONTENTS |
| Statement of responsibility |
Chapter 1 : The Cybersecurity Trap : Why Cybersecurity and Cyber Compliance Are NOT the Same / Wayne Hunter<br/>Chapter 2 : Why Small Businesses Are a Cybercriminal's #1 Target / Konrad Martin<br/>Chapter 3 : What Are the Biggest Cyberthreats That Could Take Your Business Down? / Pervez Delawalla<br/>Chapter 4 : Why Cybersecurity Is Not One-and-Done / Matt Horning<br/>Chapter 5 : How to Take the Confusion Out of Compliance / Ron Shoe<br/>Chapter 6 : The Perceptions About Compliance That Could Put Your Business in Danger / Gino Capito and Ray Riddle<br/>Chapter 7 : Stop Overcomplicating Compliance by Starting with the Basics / Lisa Brown<br/>Chapter 8 : How NOT Taking Compliance as a Culture Seriously Can Destroy Your Company / Chad Brush<br/>Chapter 9 : Your Workforce Is Your Biggest Cybersecurity Risk ; Here's Eight Best Practices You Need to Minimize the Risk / Paul Marchese<br/>Chapter 10 : Why Employee Education Is Your First Line of Defense / Zac Abdulkadir<br/>Chapter 11 : How to Inspire Enthusiastic Cybersecurity Compliance from Every Employee / Robin Cole<br/>Chapter 12 : Why Compliance as a Culture Must Be Taken Seriously from the Top Down / Gregory Mauer<br/>Chapter 13 : Why It's a Dangerous Mistake to Dump the Entire Burden of Compliance on Your Internal IT Department / Tim Conard<br/>Chapter 14 : Why You Have No Choice but to Be Honest About Your Cyber Hygiene / Rick Rudolph<br/>Chapter 15 : Why Cybersecurity Won't Save You If You're Not Compliant / Jarom Renfeldt<br/>Chapter 16 : The Impact of Noncompliance / Cora Park<br/>Chapter 17 : The Cost of Noncompliance Is the Value of Your Business And - Bottom Line - Your Revenues / Duane Lansdowne<br/>Chapter 18 : The Government Doesn't Care That You Didn't Know : How to Protect Yourself from Paying Fines and Going to Jail If You Get Hacked / Christopher Brown<br/>Chapter 19 : How Much Compliance Is Right for You? / Robert Sparre<br/>Chapter 20 : How to Ensure You Have Exactly the Right Compliance Strategy Without Overspending<br/>What You Don't Know Really Can Hurt You / Jeremy Valverde<br/>Chapter 21 : The Secret to Mitigating Your Risk / Roland Parker<br/>Chapter 22 : The Ten Strategies You Must Have in Place Before Insurers Will Even Consider Writing a Cyber Policy / Michael Mullin<br/>Chapter 23 : Critical Steps to Take If You've Been Hacked / Daaniël van Siereveld<br/>Chapter 24 : Understanding CMMC Compliance : What You Need to Know / Craig Rabe<br/>Chapter 25 : Why the Answers to These Sixteen Questions Can Help You Select the Right IT Provider / William Prusow<br/>Chapter 26 : How an IT Services Provider Keeps Her Own Kids Safe Online / Kari Renn |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computer security. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Compliance auditing. |
| 655 #4 - INDEX TERM--GENRE/FORM |
| Genre/form data or focus term |
Electronic books. |
| 856 40 - ELECTRONIC LOCATION AND ACCESS |
| Uniform Resource Identifier |
https://ebookcentral.proquest.com/lib/citph-ebooks/detail.action?docID=31191245&query=9781636983868 |
| Link text |
Full text available at ProQuest Ebook Central. Click here to view. |
| 942 ## - ADDED ENTRY ELEMENTS |
| Source of classification or shelving scheme |
|
| Item type |
EBOOK |