Tribe of hackers security leaders: tribal knowledge from the best in cybersecurity leadership (Record no. 1832)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 02489nam a2200229 4500 |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20250806140013.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 250806b2020|||||||| |||| 00| 0 eng d |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| ISBN | 9781119643791 |
| 041 ## - LANGUAGE CODE | |
| Language code of text/sound track or separate title | English |
| 082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 005.87 |
| 100 ## - MAIN ENTRY--AUTHOR NAME | |
| Personal name | Carey, Marcus J. |
| Relator term | Author |
| 100 ## - MAIN ENTRY--AUTHOR NAME | |
| Personal name | Jin, Jennifer |
| Relator term | Co-Author |
| 245 ## - TITLE STATEMENT | |
| Title | Tribe of hackers security leaders: tribal knowledge from the best in cybersecurity leadership |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
| Place of publication | New Jersey: |
| Name of publisher | Wiley Data and Cybersecurity, |
| Year of publication | 2020. |
| 300 ## - PHYSICAL DESCRIPTION | |
| Number of Pages | x, 295p. |
| 500 ## - GENERAL NOTE | |
| General note | Tribal Knowledge from the Best in Cybersecurity Leadership<br/><br/>The Tribe of Hackers series continues, sharing what CISSPs, CISOs, and other security leaders need to know to build solid cybersecurity teams and keep organizations secure. Dozens of experts and influential security specialists reveal their best strategies for building, leading, and managing information security within organizations. Tribe of Hackers Security Leaders follows the same bestselling format as the original Tribe of Hackers, but with a detailed focus on how information security leaders impact organizational security.<br/><br/>Information security is becoming more important and more valuable all the time. Security breaches can be costly, even shutting businessesand governments down, so security leadership is a high-stakes game. Leading teams of hackers is not always easy, but the future of your organization may depend on it. In this book, the world’s top security experts answer the questions that Chief Information Security Officers and other security leaders are asking, including:<br/><br/>What’s the most important decision you’ve made or action you’ve taken to enable a business risk?<br/>How do you lead your team to execute and get results?<br/>Do you have a workforce philosophy or unique approach to talent acquisition?<br/>Have you created a cohesive strategy for your information security program or business unit?<br/>Anyone in or aspiring to an information security leadership role, whether at a team level or organization-wide, needs to read this book. Tribe of Hackers Security Leaders has the real-world advice and practical guidance you need to advance your cybersecurity leadership career. |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical Term | Sharing what CISSPs, CISOs, and other security leaders |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical Term | Cybersecurity teams and keep organizations secure |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical Term | Leading teams of hackers |
| 856 ## - ELECTRONIC LOCATION AND ACCESS | |
| Uniform Resource Identifier | https://ieeexplore.ieee.org/servlet/opac?bknumber=9820856 |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Koha item type | e-Books |
| Withdrawn status | Lost status | Damaged status | Not for loan | Permanent Location | Current Location | Shelving location | Coded location qualifier | Full call number | Accession Number | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|
| Dr. S. R. Ranganathan Library | Dr. S. R. Ranganathan Library | Ebook (Online Access) | --- | 005.87 | EB0256 | e-Books |