The chief information security officer: insights, tools and survival skills
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Ely
IT Governance Pub.
2011
|
Schlagworte: | |
Online-Zugang: | Volltext |
Beschreibung: | Chief Information Security Officers are bombarded with huge challenges every day, from recommending security applications to strategic thinking and business innovation. This guide describes the hard and soft skills that a successful CISO requires: not just a good knowledge of information security, but also attributes such as flexibility and communication skills Includes bibliographical references The nature of the CISO role -- The traditional CISO job description -- The changing CISO role -- The new CISO's toolbox -- Risk management -- The inforamtion security management system -- CISO survival -- Summary : you become what you think about |
Beschreibung: | 1 Online-Ressource (x, 64 pages) |
ISBN: | 9781849281836 1849281831 1849281823 9781849281829 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV042964441 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151030s2011 |||| o||u| ||||||eng d | ||
020 | |a 9781849281836 |c electronic bk. |9 978-1-84928-183-6 | ||
020 | |a 1849281831 |c electronic bk. |9 1-84928-183-1 | ||
020 | |a 1849281823 |9 1-84928-182-3 | ||
020 | |a 9781849281829 |9 978-1-84928-182-9 | ||
035 | |a (OCoLC)726735460 | ||
035 | |a (DE-599)BVBBV042964441 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 | |
100 | 1 | |a Kouns, Barry |e Verfasser |4 aut | |
245 | 1 | 0 | |a The chief information security officer |b insights, tools and survival skills |c Barry L. Kouns & Jake Kouns |
264 | 1 | |a Ely |b IT Governance Pub. |c 2011 | |
300 | |a 1 Online-Ressource (x, 64 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Chief Information Security Officers are bombarded with huge challenges every day, from recommending security applications to strategic thinking and business innovation. This guide describes the hard and soft skills that a successful CISO requires: not just a good knowledge of information security, but also attributes such as flexibility and communication skills | ||
500 | |a Includes bibliographical references | ||
500 | |a The nature of the CISO role -- The traditional CISO job description -- The changing CISO role -- The new CISO's toolbox -- Risk management -- The inforamtion security management system -- CISO survival -- Summary : you become what you think about | ||
650 | 4 | |a Information technology / Management | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data protection | |
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Data protection |2 fast | |
650 | 4 | |a Data protection | |
650 | 4 | |a Computer security | |
700 | 1 | |a Kouns, Jake |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391159 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBU | ||
940 | 1 | |q FLA_PDA_EBU | |
999 | |a oai:aleph.bib-bvb.de:BVB01-028390309 |
Datensatz im Suchindex
_version_ | 1804175288869847040 |
---|---|
any_adam_object | |
author | Kouns, Barry |
author_facet | Kouns, Barry |
author_role | aut |
author_sort | Kouns, Barry |
author_variant | b k bk |
building | Verbundindex |
bvnumber | BV042964441 |
collection | ZDB-4-EBU |
ctrlnum | (OCoLC)726735460 (DE-599)BVBBV042964441 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02303nmm a2200493zc 4500</leader><controlfield tag="001">BV042964441</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151030s2011 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849281836</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-84928-183-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849281831</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-84928-183-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849281823</subfield><subfield code="9">1-84928-182-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849281829</subfield><subfield code="9">978-1-84928-182-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)726735460</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042964441</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kouns, Barry</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">The chief information security officer</subfield><subfield code="b">insights, tools and survival skills</subfield><subfield code="c">Barry L. Kouns & Jake Kouns</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Ely</subfield><subfield code="b">IT Governance Pub.</subfield><subfield code="c">2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (x, 64 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Chief Information Security Officers are bombarded with huge challenges every day, from recommending security applications to strategic thinking and business innovation. This guide describes the hard and soft skills that a successful CISO requires: not just a good knowledge of information security, but also attributes such as flexibility and communication skills</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">The nature of the CISO role -- The traditional CISO job description -- The changing CISO role -- The new CISO's toolbox -- Risk management -- The inforamtion security management system -- CISO survival -- Summary : you become what you think about</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology / Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data protection</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kouns, Jake</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391159</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBU</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_EBU</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028390309</subfield></datafield></record></collection> |
id | DE-604.BV042964441 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:13:55Z |
institution | BVB |
isbn | 9781849281836 1849281831 1849281823 9781849281829 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028390309 |
oclc_num | 726735460 |
open_access_boolean | |
physical | 1 Online-Ressource (x, 64 pages) |
psigel | ZDB-4-EBU FLA_PDA_EBU |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | IT Governance Pub. |
record_format | marc |
spelling | Kouns, Barry Verfasser aut The chief information security officer insights, tools and survival skills Barry L. Kouns & Jake Kouns Ely IT Governance Pub. 2011 1 Online-Ressource (x, 64 pages) txt rdacontent c rdamedia cr rdacarrier Chief Information Security Officers are bombarded with huge challenges every day, from recommending security applications to strategic thinking and business innovation. This guide describes the hard and soft skills that a successful CISO requires: not just a good knowledge of information security, but also attributes such as flexibility and communication skills Includes bibliographical references The nature of the CISO role -- The traditional CISO job description -- The changing CISO role -- The new CISO's toolbox -- Risk management -- The inforamtion security management system -- CISO survival -- Summary : you become what you think about Information technology / Management Computer security Data protection COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security fast Data protection fast Kouns, Jake Sonstige oth http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391159 Aggregator Volltext |
spellingShingle | Kouns, Barry The chief information security officer insights, tools and survival skills Information technology / Management Computer security Data protection COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security fast Data protection fast |
title | The chief information security officer insights, tools and survival skills |
title_auth | The chief information security officer insights, tools and survival skills |
title_exact_search | The chief information security officer insights, tools and survival skills |
title_full | The chief information security officer insights, tools and survival skills Barry L. Kouns & Jake Kouns |
title_fullStr | The chief information security officer insights, tools and survival skills Barry L. Kouns & Jake Kouns |
title_full_unstemmed | The chief information security officer insights, tools and survival skills Barry L. Kouns & Jake Kouns |
title_short | The chief information security officer |
title_sort | the chief information security officer insights tools and survival skills |
title_sub | insights, tools and survival skills |
topic | Information technology / Management Computer security Data protection COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security fast Data protection fast |
topic_facet | Information technology / Management Computer security Data protection COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391159 |
work_keys_str_mv | AT kounsbarry thechiefinformationsecurityofficerinsightstoolsandsurvivalskills AT kounsjake thechiefinformationsecurityofficerinsightstoolsandsurvivalskills |