000 | 06144cam a2200829 i 4500 | ||
---|---|---|---|
001 | on1145571952 | ||
003 | OCoLC | ||
005 | 20240523125542.0 | ||
006 | m o d | ||
007 | cr |n|---||||| | ||
008 | 200321s2020 nju o 000 0 eng d | ||
040 |
_aEBLCP _beng _epn _cEBLCP _dUKAHL _dOCLCQ _dYDX _dN$T _dYDXIT _dOCLCQ _dDG1 _dOCLCF _dRECBK _dDG1 _dAJB _dOCLCQ _dOCLCO _dTEFOD _dOCLCQ _dNBJ _dOCLCO _dOCL _dOCLCO _dIEEEE _dOCLCQ _dUKMGB _dOCLCO _dOCLCL |
||
015 |
_aGBC337533 _2bnb |
||
016 | 7 |
_a019798851 _2Uk |
|
019 |
_a1144894853 _a1151859308 _a1181795002 |
||
020 |
_a9781119643791 _q(electronic book) |
||
020 |
_a1119643791 _q(electronic book) |
||
020 |
_a9781119643784 _q(electronic bk.) |
||
020 |
_a1119643783 _q(electronic bk.) |
||
020 |
_a9781119643760 _q(electronic bk.) |
||
020 |
_a1119643767 _q(electronic bk.) |
||
020 | _z1119643775 | ||
020 | _z9781119643777 | ||
024 | 7 |
_a10.1002/9781119643784 _2doi |
|
029 | 1 |
_aAU@ _b000067253831 |
|
029 | 1 |
_aAU@ _b000068845949 |
|
029 | 1 |
_aUKMGB _b019798851 |
|
035 |
_a(OCoLC)1145571952 _z(OCoLC)1144894853 _z(OCoLC)1151859308 _z(OCoLC)1181795002 |
||
037 |
_aED46CCD6-0849-4BCD-81C5-F419A03DF169 _bOverDrive, Inc. _nhttp://www.overdrive.com |
||
037 |
_a9820856 _bIEEE |
||
050 | 4 |
_aQA76.9.A25 _bC37 2020 |
|
082 | 0 | 4 |
_a005.8 _223 |
049 | _aMAIN | ||
100 | 1 |
_aCarey, Marcus J. _c(Cybersecurity professional), _eauthor. _1https://id.oclc.org/worldcat/entity/E39PCjw9rYcCTBW8PGfXjMkT6q |
|
245 | 1 | 0 |
_aTribe of hackers security leaders : _btribal knowledge from the best in cybersecurity leadership / _cMarcus J. Carey & Jennifer Jin. |
264 | 1 |
_aNewark : _bJohn Wiley & Sons, Incorporated, _c2020. |
|
300 | _a1 online resource (314 pages) | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
490 | 1 | _aTribe of Hackers Ser. | |
588 | 0 | _aPrint version record. | |
505 | 0 | _aIntroduction -- Marcus J. Carey -- Ian Anderson -- James Arlen -- Mark Arnold -- Andrew Bagrin -- Zate Berg -- Tash Bettridge -- Philip Beyer -- Kyle Bubp -- Joanna Burkey -- Bill Burns -- Lesley Carhart -- Christopher Caruso -- Mike Chapple -- Steve Christey Coley -- Jim Christy -- Chris Cochran -- Edward Contreras -- Dan Cornell -- Mary Ann Davidson -- Kimber Dowsett -- David Evenden -- Martin Fisher -- Chris Hadnagy -- Andrew Hay -- Mark Hillick -- Terence Jackson -- Tanya Janca -- David Kennedy -- Joe Krull -- Robert M. Lee -- Rafal Los -- Tracy Z. Maleeff -- Jeffrey Man -- Angela Marafino -- James Medlock -- Kent Nabors -- Charles Nwatu -- Greg Ose -- Edward Prevost -- Ray [REDACTED] -- Stephen A. Ridley -- David Rook -- Marina Segal -- Khalil Sehnaoui -- Jackie Singh -- Dan Tentler -- Eugene Teo -- Dominique West -- Jake Williams -- Wirefall -- Appendix: Recommended Reading -- Advert -- EULA. | |
520 | _aTribal Knowledge from the Best in Cybersecurity Leadership The Tribe of Hackers series continues, sharing what CISSPs, CISOs, and other security leaders need to know to build solid cybersecurity teams and keep organizations secure. Dozens of experts and influential security specialists reveal their best strategies for building, leading, and managing information security within organizations. Tribe of Hackers Security Leaders follows the same bestselling format as the original Tribe of Hackers, but with a detailed focus on how information security leaders impact organizational security. Information security is becoming more important and more valuable all the time. Security breaches can be costly, even shutting businesses and governments down, so security leadership is a high-stakes game. Leading teams of hackers is not always easy, but the future of your organization may depend on it. In this book, the world's top security experts answer the questions that Chief Information Security Officers and other security leaders are asking, including: What's the most important decision you've made or action you've taken to enable a business risk? How do you lead your team to execute and get results? Do you have a workforce philosophy or unique approach to talent acquisition? Have you created a cohesive strategy for your information security program or business unit? Anyone in or aspiring to an information security leadership role, whether at a team level or organization-wide, needs to read this book. Tribe of Hackers Security Leaders has the real-world advice and practical guidance you need to advance your cybersecurity leadership career. | ||
504 | _aIncludes bibliographical references. | ||
590 |
_aJohn Wiley and Sons _bWiley Online Library: Complete oBooks |
||
650 | 0 | _aPenetration testing (Computer security) | |
650 | 0 |
_aInformation technology _xSecurity measures _xManagement. |
|
650 | 0 | _aComputer security. | |
650 | 0 |
_aComputer networks _xSecurity measures. |
|
650 | 2 | _aComputer Security | |
650 | 6 | _aTests d'intrusion. | |
650 | 6 |
_aTechnologie de l'information _xS�ecurit�e _xMesures _xGestion. |
|
650 | 6 | _aS�ecurit�e informatique. | |
650 | 6 |
_aR�eseaux d'ordinateurs _xS�ecurit�e _xMesures. |
|
650 | 7 |
_aCOMPUTERS _xSecurity _xCryptography & Encryption. _2bisacsh |
|
650 | 7 |
_aPenetration testing (Computer security) _2fast |
|
650 | 7 |
_aComputer networks _xSecurity measures _2fast |
|
650 | 7 |
_aComputer security _2fast |
|
700 | 1 | _aJin, Jennifer. | |
776 | 0 | 8 |
_iPrint version: _aCarey, Marcus J. _tTribe of Hackers Security Leaders : Tribal Knowledge from the Best in Cybersecurity Leadership. _dNewark : John Wiley & Sons, Incorporated, �2020 _z9781119643777 |
830 | 0 | _aTribe of Hackers Ser. | |
856 | 4 | 0 | _uhttps://onlinelibrary.wiley.com/doi/book/10.1002/9781119643784 |
938 |
_aYBP Library Services _bYANK _n16322862 |
||
938 |
_aAskews and Holts Library Services _bASKH _nAH37736215 |
||
938 |
_aAskews and Holts Library Services _bASKH _nAH37294433 |
||
938 |
_aProQuest Ebook Central _bEBLB _nEBL6132338 |
||
938 |
_aEBSCOhost _bEBSC _n2393170 |
||
938 |
_aRecorded Books, LLC _bRECE _nrbeEB00821963 |
||
938 |
_aYBP Library Services _bYANK _n301158259 |
||
994 |
_a92 _bINLUM |
||
999 |
_c12692 _d12692 |