The chief information security officer: insights, tools and survival skills
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Ely
IT Governance Pub.
2011
|
Schlagworte: | |
Beschreibung: | Print version record |
Beschreibung: | 1 online resource (x, 64 pages) |
ISBN: | 9781849281836 1849281831 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV045349234 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 181210s2011 |||| o||u| ||||||eng d | ||
020 | |a 9781849281836 |9 978-1-84928-183-6 | ||
020 | |a 1849281831 |9 1-84928-183-1 | ||
035 | |a (ZDB-4-ITC)ocn726735460 | ||
035 | |a (OCoLC)726735460 | ||
035 | |a (DE-599)BVBBV045349234 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 | |
100 | 1 | |a Kouns, Barry |e Verfasser |4 aut | |
245 | 1 | 0 | |a The chief information security officer |b insights, tools and survival skills |c Barry L. Kouns & Jake Kouns |
264 | 1 | |a Ely |b IT Governance Pub. |c 2011 | |
300 | |a 1 online resource (x, 64 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Print version record | ||
505 | 8 | |a Chief Information Security Officers are bombarded with huge challenges every day, from recommending security applications to strategic thinking and business innovation. This guide describes the hard and soft skills that a successful CISO requires: not just a good knowledge of information security, but also attributes such as flexibility and communication skills | |
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Data protection |2 fast | |
650 | 4 | |a Data protection |a Computer security | |
700 | 1 | |a Kouns, Jake |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Kouns, Barry |t Chief information security officer |d Ely : IT Governance Publishing, 2011 |z 9781849281829 |
912 | |a ZDB-4-ITC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-030735886 |
Datensatz im Suchindex
_version_ | 1804179172972560384 |
---|---|
any_adam_object | |
author | Kouns, Barry |
author_facet | Kouns, Barry |
author_role | aut |
author_sort | Kouns, Barry |
author_variant | b k bk |
building | Verbundindex |
bvnumber | BV045349234 |
collection | ZDB-4-ITC |
contents | Chief Information Security Officers are bombarded with huge challenges every day, from recommending security applications to strategic thinking and business innovation. This guide describes the hard and soft skills that a successful CISO requires: not just a good knowledge of information security, but also attributes such as flexibility and communication skills |
ctrlnum | (ZDB-4-ITC)ocn726735460 (OCoLC)726735460 (DE-599)BVBBV045349234 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01804nmm a2200409zc 4500</leader><controlfield tag="001">BV045349234</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">181210s2011 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849281836</subfield><subfield code="9">978-1-84928-183-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849281831</subfield><subfield code="9">1-84928-183-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-ITC)ocn726735460</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)726735460</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045349234</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kouns, Barry</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">The chief information security officer</subfield><subfield code="b">insights, tools and survival skills</subfield><subfield code="c">Barry L. Kouns & Jake Kouns</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Ely</subfield><subfield code="b">IT Governance Pub.</subfield><subfield code="c">2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (x, 64 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Print version record</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Chief Information Security Officers are bombarded with huge challenges every day, from recommending security applications to strategic thinking and business innovation. This guide describes the hard and soft skills that a successful CISO requires: not just a good knowledge of information security, but also attributes such as flexibility and communication skills</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data protection</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield><subfield code="a">Computer security</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kouns, Jake</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Kouns, Barry</subfield><subfield code="t">Chief information security officer</subfield><subfield code="d">Ely : IT Governance Publishing, 2011</subfield><subfield code="z">9781849281829</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-ITC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030735886</subfield></datafield></record></collection> |
id | DE-604.BV045349234 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:15:39Z |
institution | BVB |
isbn | 9781849281836 1849281831 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030735886 |
oclc_num | 726735460 |
open_access_boolean | |
physical | 1 online resource (x, 64 pages) |
psigel | ZDB-4-ITC |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | IT Governance Pub. |
record_format | marc |
spelling | Kouns, Barry Verfasser aut The chief information security officer insights, tools and survival skills Barry L. Kouns & Jake Kouns Ely IT Governance Pub. 2011 1 online resource (x, 64 pages) txt rdacontent c rdamedia cr rdacarrier Print version record Chief Information Security Officers are bombarded with huge challenges every day, from recommending security applications to strategic thinking and business innovation. This guide describes the hard and soft skills that a successful CISO requires: not just a good knowledge of information security, but also attributes such as flexibility and communication skills COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security fast Data protection fast Data protection Computer security Kouns, Jake Sonstige oth Erscheint auch als Druck-Ausgabe Kouns, Barry Chief information security officer Ely : IT Governance Publishing, 2011 9781849281829 |
spellingShingle | Kouns, Barry The chief information security officer insights, tools and survival skills Chief Information Security Officers are bombarded with huge challenges every day, from recommending security applications to strategic thinking and business innovation. This guide describes the hard and soft skills that a successful CISO requires: not just a good knowledge of information security, but also attributes such as flexibility and communication skills COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security fast Data protection fast Data protection Computer security |
title | The chief information security officer insights, tools and survival skills |
title_auth | The chief information security officer insights, tools and survival skills |
title_exact_search | The chief information security officer insights, tools and survival skills |
title_full | The chief information security officer insights, tools and survival skills Barry L. Kouns & Jake Kouns |
title_fullStr | The chief information security officer insights, tools and survival skills Barry L. Kouns & Jake Kouns |
title_full_unstemmed | The chief information security officer insights, tools and survival skills Barry L. Kouns & Jake Kouns |
title_short | The chief information security officer |
title_sort | the chief information security officer insights tools and survival skills |
title_sub | insights, tools and survival skills |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security fast Data protection fast Data protection Computer security |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer security Data protection Data protection Computer security |
work_keys_str_mv | AT kounsbarry thechiefinformationsecurityofficerinsightstoolsandsurvivalskills AT kounsjake thechiefinformationsecurityofficerinsightstoolsandsurvivalskills |