From exposed to secure : (Record no. 94123)

000 -LEADER
fixed length control field 03821nam a22002657a 4500
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20260131104828.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 260129b ||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781636983868
Qualifying information (ebook).
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title eng.
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Edition number 23
Classification number 005.8
110 ## - MAIN ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element Featuring Cybersecurity And Compliance Experts From Around The World Featuring Cybersecurity And Compliance Experts From Around The World
Relator term author.
245 ## - TITLE STATEMENT
Title From exposed to secure :
Remainder of title the cost of cybersecurity and compliance inaction and the best way to keep your company safe /
Statement of responsibility, etc Featuring Cybersecurity And Compliance Experts From Around The World Featuring Cybersecurity And Compliance Experts From Around The World
264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc New York :
Name of publisher, distributor, etc Morgan James Publishing ;
Date of publication, distribution, etc [2024].
264 #4 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Date of publication, distribution, etc ©2024.
300 ## - PHYSICAL DESCRIPTION
Extent 1 electronic resource.
336 ## - CONTENT TYPE
Source text
Content type term txt
Content type code rdacontent
337 ## - MEDIA TYPE
Source unmediated
Media type term n
Media type code rdamedia
338 ## - CARRIER TYPE
Source volume
Carrier type term nc
Carrier type code rdacarrier
505 0# - CONTENTS
Statement of responsibility Chapter 1 : The Cybersecurity Trap : Why Cybersecurity and Cyber Compliance Are NOT the Same / Wayne Hunter<br/>Chapter 2 : Why Small Businesses Are a Cybercriminal's #1 Target / Konrad Martin<br/>Chapter 3 : What Are the Biggest Cyberthreats That Could Take Your Business Down? / Pervez Delawalla<br/>Chapter 4 : Why Cybersecurity Is Not One-and-Done / Matt Horning<br/>Chapter 5 : How to Take the Confusion Out of Compliance / Ron Shoe<br/>Chapter 6 : The Perceptions About Compliance That Could Put Your Business in Danger / Gino Capito and Ray Riddle<br/>Chapter 7 : Stop Overcomplicating Compliance by Starting with the Basics / Lisa Brown<br/>Chapter 8 : How NOT Taking Compliance as a Culture Seriously Can Destroy Your Company / Chad Brush<br/>Chapter 9 : Your Workforce Is Your Biggest Cybersecurity Risk ; Here's Eight Best Practices You Need to Minimize the Risk / Paul Marchese<br/>Chapter 10 : Why Employee Education Is Your First Line of Defense / Zac Abdulkadir<br/>Chapter 11 : How to Inspire Enthusiastic Cybersecurity Compliance from Every Employee / Robin Cole<br/>Chapter 12 : Why Compliance as a Culture Must Be Taken Seriously from the Top Down / Gregory Mauer<br/>Chapter 13 : Why It's a Dangerous Mistake to Dump the Entire Burden of Compliance on Your Internal IT Department / Tim Conard<br/>Chapter 14 : Why You Have No Choice but to Be Honest About Your Cyber Hygiene / Rick Rudolph<br/>Chapter 15 : Why Cybersecurity Won't Save You If You're Not Compliant / Jarom Renfeldt<br/>Chapter 16 : The Impact of Noncompliance / Cora Park<br/>Chapter 17 : The Cost of Noncompliance Is the Value of Your Business And - Bottom Line - Your Revenues / Duane Lansdowne<br/>Chapter 18 : The Government Doesn't Care That You Didn't Know : How to Protect Yourself from Paying Fines and Going to Jail If You Get Hacked / Christopher Brown<br/>Chapter 19 : How Much Compliance Is Right for You? / Robert Sparre<br/>Chapter 20 : How to Ensure You Have Exactly the Right Compliance Strategy Without Overspending<br/>What You Don't Know Really Can Hurt You / Jeremy Valverde<br/>Chapter 21 : The Secret to Mitigating Your Risk / Roland Parker<br/>Chapter 22 : The Ten Strategies You Must Have in Place Before Insurers Will Even Consider Writing a Cyber Policy / Michael Mullin<br/>Chapter 23 : Critical Steps to Take If You've Been Hacked / Daaniël van Siereveld<br/>Chapter 24 : Understanding CMMC Compliance : What You Need to Know / Craig Rabe<br/>Chapter 25 : Why the Answers to These Sixteen Questions Can Help You Select the Right IT Provider / William Prusow<br/>Chapter 26 : How an IT Services Provider Keeps Her Own Kids Safe Online / Kari Renn
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Compliance auditing.
655 #4 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://ebookcentral.proquest.com/lib/citph-ebooks/detail.action?docID=31191245&query=9781636983868
Link text Full text available at ProQuest Ebook Central. Click here to view.
942 ## - ADDED ENTRY ELEMENTS
Source of classification or shelving scheme
Item type EBOOK
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Use restrictions Not for loan Permanent Location Current Location Date acquired Inventory number Full call number Barcode Date last seen Price effective from Item type
        In Process   COLLEGE LIBRARY COLLEGE LIBRARY 2026-01-29 55009 005.8 F313 2024 LC-55009 2026-01-29 2026-01-29 EBOOK