000 06144cam a2200829 i 4500
001 on1145571952
003 OCoLC
005 20240523125542.0
006 m o d
007 cr |n|---|||||
008 200321s2020 nju o 000 0 eng d
040 _aEBLCP
_beng
_epn
_cEBLCP
_dUKAHL
_dOCLCQ
_dYDX
_dN$T
_dYDXIT
_dOCLCQ
_dDG1
_dOCLCF
_dRECBK
_dDG1
_dAJB
_dOCLCQ
_dOCLCO
_dTEFOD
_dOCLCQ
_dNBJ
_dOCLCO
_dOCL
_dOCLCO
_dIEEEE
_dOCLCQ
_dUKMGB
_dOCLCO
_dOCLCL
015 _aGBC337533
_2bnb
016 7 _a019798851
_2Uk
019 _a1144894853
_a1151859308
_a1181795002
020 _a9781119643791
_q(electronic book)
020 _a1119643791
_q(electronic book)
020 _a9781119643784
_q(electronic bk.)
020 _a1119643783
_q(electronic bk.)
020 _a9781119643760
_q(electronic bk.)
020 _a1119643767
_q(electronic bk.)
020 _z1119643775
020 _z9781119643777
024 7 _a10.1002/9781119643784
_2doi
029 1 _aAU@
_b000067253831
029 1 _aAU@
_b000068845949
029 1 _aUKMGB
_b019798851
035 _a(OCoLC)1145571952
_z(OCoLC)1144894853
_z(OCoLC)1151859308
_z(OCoLC)1181795002
037 _aED46CCD6-0849-4BCD-81C5-F419A03DF169
_bOverDrive, Inc.
_nhttp://www.overdrive.com
037 _a9820856
_bIEEE
050 4 _aQA76.9.A25
_bC37 2020
082 0 4 _a005.8
_223
049 _aMAIN
100 1 _aCarey, Marcus J.
_c(Cybersecurity professional),
_eauthor.
_1https://id.oclc.org/worldcat/entity/E39PCjw9rYcCTBW8PGfXjMkT6q
245 1 0 _aTribe of hackers security leaders :
_btribal knowledge from the best in cybersecurity leadership /
_cMarcus J. Carey & Jennifer Jin.
264 1 _aNewark :
_bJohn Wiley & Sons, Incorporated,
_c2020.
300 _a1 online resource (314 pages)
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
490 1 _aTribe of Hackers Ser.
588 0 _aPrint version record.
505 0 _aIntroduction -- Marcus J. Carey -- Ian Anderson -- James Arlen -- Mark Arnold -- Andrew Bagrin -- Zate Berg -- Tash Bettridge -- Philip Beyer -- Kyle Bubp -- Joanna Burkey -- Bill Burns -- Lesley Carhart -- Christopher Caruso -- Mike Chapple -- Steve Christey Coley -- Jim Christy -- Chris Cochran -- Edward Contreras -- Dan Cornell -- Mary Ann Davidson -- Kimber Dowsett -- David Evenden -- Martin Fisher -- Chris Hadnagy -- Andrew Hay -- Mark Hillick -- Terence Jackson -- Tanya Janca -- David Kennedy -- Joe Krull -- Robert M. Lee -- Rafal Los -- Tracy Z. Maleeff -- Jeffrey Man -- Angela Marafino -- James Medlock -- Kent Nabors -- Charles Nwatu -- Greg Ose -- Edward Prevost -- Ray [REDACTED] -- Stephen A. Ridley -- David Rook -- Marina Segal -- Khalil Sehnaoui -- Jackie Singh -- Dan Tentler -- Eugene Teo -- Dominique West -- Jake Williams -- Wirefall -- Appendix: Recommended Reading -- Advert -- EULA.
520 _aTribal Knowledge from the Best in Cybersecurity Leadership The Tribe of Hackers series continues, sharing what CISSPs, CISOs, and other security leaders need to know to build solid cybersecurity teams and keep organizations secure. Dozens of experts and influential security specialists reveal their best strategies for building, leading, and managing information security within organizations. Tribe of Hackers Security Leaders follows the same bestselling format as the original Tribe of Hackers, but with a detailed focus on how information security leaders impact organizational security. Information security is becoming more important and more valuable all the time. Security breaches can be costly, even shutting businesses and governments down, so security leadership is a high-stakes game. Leading teams of hackers is not always easy, but the future of your organization may depend on it. In this book, the world's top security experts answer the questions that Chief Information Security Officers and other security leaders are asking, including: What's the most important decision you've made or action you've taken to enable a business risk? How do you lead your team to execute and get results? Do you have a workforce philosophy or unique approach to talent acquisition? Have you created a cohesive strategy for your information security program or business unit? Anyone in or aspiring to an information security leadership role, whether at a team level or organization-wide, needs to read this book. Tribe of Hackers Security Leaders has the real-world advice and practical guidance you need to advance your cybersecurity leadership career.
504 _aIncludes bibliographical references.
590 _aJohn Wiley and Sons
_bWiley Online Library: Complete oBooks
650 0 _aPenetration testing (Computer security)
650 0 _aInformation technology
_xSecurity measures
_xManagement.
650 0 _aComputer security.
650 0 _aComputer networks
_xSecurity measures.
650 2 _aComputer Security
650 6 _aTests d'intrusion.
650 6 _aTechnologie de l'information
_xS�ecurit�e
_xMesures
_xGestion.
650 6 _aS�ecurit�e informatique.
650 6 _aR�eseaux d'ordinateurs
_xS�ecurit�e
_xMesures.
650 7 _aCOMPUTERS
_xSecurity
_xCryptography & Encryption.
_2bisacsh
650 7 _aPenetration testing (Computer security)
_2fast
650 7 _aComputer networks
_xSecurity measures
_2fast
650 7 _aComputer security
_2fast
700 1 _aJin, Jennifer.
776 0 8 _iPrint version:
_aCarey, Marcus J.
_tTribe of Hackers Security Leaders : Tribal Knowledge from the Best in Cybersecurity Leadership.
_dNewark : John Wiley & Sons, Incorporated, �2020
_z9781119643777
830 0 _aTribe of Hackers Ser.
856 4 0 _uhttps://onlinelibrary.wiley.com/doi/book/10.1002/9781119643784
938 _aYBP Library Services
_bYANK
_n16322862
938 _aAskews and Holts Library Services
_bASKH
_nAH37736215
938 _aAskews and Holts Library Services
_bASKH
_nAH37294433
938 _aProQuest Ebook Central
_bEBLB
_nEBL6132338
938 _aEBSCOhost
_bEBSC
_n2393170
938 _aRecorded Books, LLC
_bRECE
_nrbeEB00821963
938 _aYBP Library Services
_bYANK
_n301158259
994 _a92
_bINLUM
999 _c12692
_d12692