MARC details
| 000 -LEADER |
| campo de control de longitud fija |
05276cam a2200445 i 4500 |
| 001 - NÚMERO DE CONTROL |
| campo de control |
20912149 |
| 003 - IDENTIFICADOR DE NÚMERO DE CONTROL |
| campo de control |
BJBSDDR |
| 005 - FECHA Y HORA DE LA ÚLTIMA TRANSACCIÓN |
| campo de control |
20230411090832.0 |
| 006 - CÓDIGOS DE INFORMACIÓN DE LONGITUD FIJA--CARACTERÍSTICAS DEL MATERIAL ADICIONAL |
| campo de control de longitud fija |
a|||||r|||| 00| 0 |
| 007 - CAMPO FIJO DE DESCRIPCIÓN FÍSICA--INFORMACIÓN GENERAL |
| campo de control de longitud fija |
ta |
| 008 - DATOS DE LONGITUD FIJA--INFORMACIÓN GENERAL |
| campo de control de longitud fija |
190322s2019 mauad b 001 0 eng c |
| 010 ## - NÚMERO DE CONTROL DE LA BIBLIOTECA DEL CONGRESO |
| Número de control de LC |
2019013638 |
| 020 ## - NÚMERO INTERNACIONAL ESTÁNDAR DEL LIBRO |
| Número Internacional Estándar del Libro |
9781633697874 (pbk.) |
| 020 ## - NÚMERO INTERNACIONAL ESTÁNDAR DEL LIBRO |
| Número Internacional Estándar del Libro |
1633697878 (pbk.) |
| 040 ## - FUENTE DE CATALOGACIÓN |
| Centro catalogador/agencia de origen |
MH/DLC |
| Lengua de catalogación |
eng |
| Centro/agencia transcriptor |
MH |
| Normas de descripción |
rda |
| Centro/agencia modificador |
DLC |
| 041 ## - CÓDIGO DE IDIOMA |
| Código de lengua del texto/banda sonora o título independiente |
eng |
| 042 ## - CÓDIGO DE AUTENTICACIÓN |
| Código de autenticación |
pcc |
| 050 14 - SIGNATURA TOPOGRÁFICA DE LA BIBLIOTECA DEL CONGRESO |
| Número de clasificación |
QA 76.9 |
| Número de ítem |
C994 2019 |
| 082 00 - NÚMERO DE LA CLASIFICACIÓN DECIMAL DEWEY |
| Número de clasificación |
005.8 |
| 245 00 - MENCIÓN DEL TÍTULO |
| Título |
Cybersecurity : |
| Resto del título |
insights you need from Harvard Business Review. |
| 264 #1 - PRODUCCIÓN, PUBLICACIÓN, DISTRIBUCIÓN, FABRICACIÓN Y COPYRIGHT |
| Producción, publicación, distribución, fabricación y copyright |
Boston, Massachusetts : |
| Nombre del de productor, editor, distribuidor, fabricante |
Harvard Business Review Press, |
| Fecha de producción, publicación, distribución, fabricación o copyright |
[2019] |
| 300 ## - DESCRIPCIÓN FÍSICA |
| Extensión |
xvi, 158 pages : |
| Otras características físicas |
illustrations, charts ; |
| Dimensiones |
21 cm |
| 336 ## - TIPO DE CONTENIDO |
| Término de tipo de contenido |
text |
| Fuente |
rdacontent |
| 337 ## - TIPO DE MEDIO |
| Nombre/término del tipo de medio |
unmediated |
| Fuente |
rdamedia |
| 338 ## - TIPO DE SOPORTE |
| Nombre/término del tipo de soporte |
volume |
| Fuente |
rdacarrier |
| 440 #0 - MENCIÓN DE SERIE/PUNTO DE ACCESO ADICIONAL--TÍTULO |
| 9 (RLIN) |
25630 |
| Título |
Insights you need from Harvard Business Review. |
| 504 ## - NOTA DE BIBLIOGRAFÍA, ETC. |
| Nota de bibliografía, etc. |
Includes bibliographical references and index. |
| 505 0# - NOTA DE CONTENIDO CON FORMATO |
| Nota de contenido con formato |
Introduction / by Alex Blau -- Internet insecurity: if your mission-critical systems are digital and connected, they can never be made fully safe / by Andy Bochman -- Security trends by the numbers: the good news is that companies are stopping more attacks than ever - you can probably guess the bad news / by Scott Berinato and Matt Perry -- Why boards aren't dealing with cyberthreats: because they're too busy focusing on areas they have expertise in, such as retaining talent and monitoring the regulatory environment / by J. Yo-Jud Cheng and Boris Groysberg -- The behavioral economics of why executives underinvest in cybersecurity: leaders need to stop thinking about cybersecurity as a problem that can be solved / by Alex Blau -- Why the entire c-suite needs to use the same metrics for cyber risk: but before that, leaders must create a common language around cybersecurity / by Jason J. Hogg -- The best cybersecurity investment you can make is better training: your first and last line of defense is prepared leaders and employees / by Dante Disparte and Chris Furlow -- Better cybersecurity starts with fixing your employees' bad habits: ways to neturalize predictably poor user behavior / by Alex Blau -- The key to better cybersecurity: keep employee rules simple - people look for workarounds when policies are too complicated / by Maarten Van Horenbeeck -- The avoidable mistakes executives continue to make after a data breach: you will get hacked - here's what not to do when it happens / by Bill Bourdon -- Active defense and "hacking back": a primer - passive monitoring isn't your only choice / by Scott Berinato -- Cybersecurity is putting customer trust at the center of competition: don't just protect customer data - demonstrate that you're doing everything in your power to minimize breaches / by Andrew Burt -- Privacy and cybersecurity are converging: here's why that matters for people and for companies - big data and machine learning could kill the notion of consent / by Andrew Burt -- What countries and companies can do when trade and cybersecurity overlap: a framework for understanding and categorizing cybersecurity concerns involved in trade / by Stuart Madnick, Simon Johnson, and Keman Huang -- AI is the future of cybersecurity, for better and for worse: it will become both the problem and the solution / by Roman V. Yampolskiy. |
| 520 ## - RESUMEN, ETC. |
| Sumario, etc. |
Too many of us associate cybersecurity with credit card theft and think the solution is for our banking partners, social media platforms, and large retailers to improve and increase their data security practices. But in the world we live and work in, where our systems are increasingly interconnected and our employees and customers are logging in to access their work or our products from all over the world and on all types of devices, the risk is much greater than we imagine. As the complexity and sophistication of our interconnected systems increases, so too do the skills of our adversaries. From outlining the challenges to exploring the solutions, Cybersecurity: The Insights You Need from Harvard Business Review will help leaders address the managerial, organizational, and strategic aspects of these ever-present threats to your organization. Catch up on current topics and deepen your understanding of them with the Insights You Need series from Harvard Business Review. Featuring some of HBR's best and most recent thinking, Insights You Need titles are both a primer on today's most pressing issues and an extension of the conversation, with interesting research, interviews, case studies, and practical ideas to help you explore how a particular issue will impact your company and what it will mean for you and your business.-- |
| Fuente proveedora |
Provided by publisher |
| 650 #0 - PUNTO DE ACCESO ADICIONAL DE MATERIA--TÉRMINO DE MATERIA |
| Término de materia o nombre geográfico como elemento de entrada |
Computer security. |
| 650 #4 - PUNTO DE ACCESO ADICIONAL DE MATERIA--TÉRMINO DE MATERIA |
| Término de materia o nombre geográfico como elemento de entrada |
Seguridad informática |
| 9 (RLIN) |
15555 |
| 650 #0 - PUNTO DE ACCESO ADICIONAL DE MATERIA--TÉRMINO DE MATERIA |
| Término de materia o nombre geográfico como elemento de entrada |
Business enterprises |
| Subdivisión general |
Security measures. |
| 650 #4 - PUNTO DE ACCESO ADICIONAL DE MATERIA--TÉRMINO DE MATERIA |
| Término de materia o nombre geográfico como elemento de entrada |
Empresas comerciales |
| Subdivisión general |
Medidas de seguridad |
| 9 (RLIN) |
25738 |
| 710 2# - ENTRADA AGREGADA--NOMBRE DE ENTIDAD CORPORATIVA |
| 9 (RLIN) |
21437 |
| Nombre de entidad corporativa o nombre de jurisdicción como elemento de entrada |
Harvard Business Review Press |
| 730 0# - ASIENTO SECUNDARIO--TITULO UNIFORME |
| 9 (RLIN) |
25737 |
| Título uniforme |
Cybersecurity (Harvard Business Review Press) |
| 830 #0 - PUNTO DE ACCESO ADICIONAL DE SERIE-TÍTULO UNIFORME |
| Título uniforme |
Insights you need from Harvard Business Review. |
| 906 ## - ELEMENTOS DE DATOS F LOCAL, LDF (RLIN) |
| a |
7 |
| b |
cbc |
| c |
orignew |
| d |
1 |
| e |
ecip |
| f |
20 |
| g |
y-gencatlg |
| 942 ## - ELEMENTOS DE ENTRADA SECUNDARIOS (KOHA) |
| Fuente del sistema de clasificación o colocación |
Clasificación de Library of Congress |
| Tipo de ítem Koha |
Libro |