Confronting cyber risk: (Record no. 10202)

MARC details
000 -LEADER
fixed length control field 03462nam a22002297a 4500
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20251023221252.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 251023b |||||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780197526576
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Item number FAL
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Falco, Gregory
245 ## - TITLE STATEMENT
Title Confronting cyber risk:
Remainder of title an embedded endurance strategy for cybersecurity
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc. New York
Name of publisher, distributor, etc. Oxford University Press
Date of publication, distribution, etc. 2022
300 ## - PHYSICAL DESCRIPTION
Extent xi, 202 p.
365 ## - TRADE PRICE
Price type code USD
Price amount 32.99
500 ## - GENERAL NOTE
General note Table of contents:<br/>1 Why Is Cyber Risk an Issue?Get accessArrow<br/>Gregory Falco and Eric Rosenbach<br/>View chapter<br/>Expand2 Who Is Attacking Us?Get accessArrow<br/>Gregory Falco and Eric Rosenbach<br/>View chapter<br/>Expand3 How Do I Assess Our Cyber Risk?Get accessArrow<br/>Gregory Falco and Eric Rosenbach<br/>View chapter<br/>Expand4 What Do I Need to Know About Cyber Frameworks, Standards, and Laws?Get accessArrow<br/>Gregory Falco and Eric Rosenbach<br/>View chapter<br/>Expand5 Who Is Responsible for Cybersecurity?Get accessArrow<br/>Gregory Falco and Eric Rosenbach<br/>View chapter<br/>Expand6 What Risk Prevention Measures Can I Use?Get accessArrow<br/>Gregory Falco and Eric Rosenbach<br/>View chapter<br/>Expand7 What Risk Resilience Measures Can I Use?Get accessArrow<br/>Gregory Falco and Eric Rosenbach<br/>View chapter<br/>Expand8 How Do I Embed Cyber Risk Management in All Aspects of the Organization?Get accessArrow<br/>Gregory Falco and Eric Rosenbach<br/>View chapter<br/>ExpandConclusionGet accessArrow<br/>Gregory Falco and Eric Rosenbach<br/>View chapter<br/><br/>[https://academic.oup.com/oxford-law-pro/book/41146]
520 ## - SUMMARY, ETC.
Summary, etc. Confronting Cyber Risk: An Embedded Endurance Strategy for Cybersecurity is a practical leadership handbook defining a new strategy for improving cybersecurity and mitigating cyber risk. Written by two leading experts with extensive professional experience in cybersecurity, the book provides CEOs and cyber newcomers alike with novel, concrete guidance on how to implement a cutting-edge strategy to mitigate an organization’s overall risk to malicious cyberattacks. Using short, real-world case studies, the book highlights the need to address attack prevention and the resilience of each digital asset while also accounting for an incident’s potential impact on overall operations. In a world of hackers, artificial intelligence, and persistent ransomware attacks, the Embedded Endurance strategy embraces the reality of interdependent digital assets and provides an approach that addresses cyber risk at both the micro level (people, networks, systems and data) and the macro level (the organization). Most books about cybersecurity focus entirely on technology; the Embedded Endurance strategy recognizes the need for sophisticated thinking about hardware and software while also extending beyond to address operational, reputational and litigation risk. This book both provides the reader with a solid grounding in important prevention-focused technologies—such as cloud-based security and intrusion detection—and emphasizes the important role of incident response. By implementing an Embedded Endurance strategy, you can guide your team to blunt major cyber incidents with preventative and resilience measures engaged systematically across your organization<br/><br/>(https://academic.oup.com/oxford-law-pro/book/41146)
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks--Security measures
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Internet--Security measures
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Risk management
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Book
Source of classification or shelving scheme Dewey Decimal Classification
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Bill No Bill Date Home library Current library Shelving location Date acquired Source of acquisition Cost, normal purchase price Total Checkouts Full call number Accession Number Date last seen Copy number Cost, replacement price Price effective from Koha item type
    Dewey Decimal Classification     IT & Decisions Sciences TB1724 24-09-2025 Indian Institute of Management LRC Indian Institute of Management LRC General Stacks 10/12/2025 Technical Bureau India Pvt. Ltd. 1914.91   005.8 FAL 009155 10/12/2025 1 2946.01 10/12/2025 Book

©2025-26 Pragyata: Learning Resource Center. All Rights Reserved.
Indian Institute of Management Bodh Gaya
Uruvela, Prabandh Vihar, Bodh Gaya
Gaya, 824234, Bihar, India

Powered by Koha