MARC details
000 -LEADER |
fixed length control field |
01904cam a2200229 a 4500 |
001 - CONTROL NUMBER |
control field |
14967266 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20200907103504.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
070814s2008 nyua b 001 0 eng |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780849379437 (alk. paper) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
0849379431 (alk. paper) |
040 ## - CATALOGING SOURCE |
Transcribing agency |
DLC |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
658.478 |
Edition number |
22 |
Item number |
T6336 |
245 00 - TITLE STATEMENT |
Title |
CISO leadership : |
Remainder of title |
essential principles for success |
Statement of responsibility, etc |
/ Todd Fitzgerald, Micki Krause. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
New York : |
Name of publisher, distributor, etc |
Auerbach Publications, |
-- |
(ISC)2, |
Date of publication, distribution, etc |
2008 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxxiii, 276 p. : |
Other physical details |
ill. ; |
Dimensions |
25 cm. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer security |
General subdivision |
Management. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer networks |
General subdivision |
Management. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Fitzgerald, Todd. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Nozaki, Micki Krause. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Koha item type |
Books |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
A LEADERSHIP DISCONNECT What You Told Us: A CISO Survey, T. Fitzgerald A LEADERSHIP MANDATE Who Companies Really Want to HIRE: How to Advance Your Career and Have Great Success, J. Brocaglia The Evolving Information Security Landscape, W.H. Murray Business Drivers for Information Security, H. DeMaio Security as a Business Function, P. Browne and S.R. Katz Security Leadership, M.J. Corby and V.M. Carr The Public Sector CISO: Life In The Fishbowl, L. McNulty A LEADERSHIP EVOLUTION A CISO Introspection, H.A. Schmidt How Savvy Are You: Can You Get What You Want? B. Lee Why and How Assessment of Organization Culture Should Shape Security Strategies, D. Saracco Selling Information Security, J.S. Christiansen The Importance of an IT Security Strategy, R. Sanovic Extending The Enterprise's Governance Program To Information Risks, R. Moulton and R. Coles Building Management Commitment through Security Councils, T. Fitzgerald Measuring Security, W.H. Murray Privacy, Ethics, and Business, R. Herold Leading Th rough a Crisis: How Not to Conduct a Security Investigation, M.D. Rasch Security Pitfalls, T. Fitzgerald Security Leader Horizon Issues: What the Future Holds, S. Skolochenko |