Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.

LEADER 00000cam a2200541Mi 4500 
003    OCoLC 
005    20240129213017.0 
006    m     o  d         
007    cr cnu---unuuu 
008    201110s2021    xx      o     000 0 eng d 
020    9781492076162|q(electronic book) 
020    1492076163|q(electronic book) 
020    9781492076186|q(electronic bk.) 
020    149207618X|q(electronic bk.) 
020    9781492076216 
020    149207621X 
029 1  AU@|b000068857310 
035    (OCoLC)1224946074 
037    0EE6A87C-8517-4906-9880-A3CDCC2FD620|bOverDrive, Inc.
       |nhttp://www.overdrive.com 
040    VT2|beng|erda|epn|cVT2|dTOH|dEBLCP|dN$T|dOCLCO|dYDX|dOCLCF
       |dOCLCQ|dTEFOD|dOCLCO|dOCLCQ|dOCLCO|dOCLCL 
049    INap 
082 04 005.8068 
082 04 005.8068|223 
099    eBook O'Reilly for Public Librairies 
100 1  Barnum, Todd. 
245 10 Cybersecurity Manager's Guide /|cTodd Barnum.|h[O'Reilly 
       electronic resource] 
264  1 [Place of publication not identified] :|bO'Reilly Media, 
       Inc.,|c2021. 
300    1 online resource 
336    text|btxt|2rdacontent 
337    computer|bc|2rdamedia 
338    online resource|bcr|2rdacarrier 
500    Title from content provider. 
520    If you're a leader in Cybersecurity, then you know it 
       often seems like no one cares about--or understands--
       information security. Infosec professionals struggle to 
       integrate security into their companies. Most are under 
       resourced. Most are at odds with their organizations. 
       There must be a better way. This essential manager's guide
       offers a new approach to building and maintaining an 
       information security program that's both effective and 
       easy to follow. Author and longtime infosec leader Todd 
       Barnum upends the assumptions security professionals take 
       for granted. CISOs, CSOs, CIOs, and IT security 
       professionals will learn a simple seven-step process that 
       will help you build a new program or improve your current 
       program. Build better relationships with IT and other 
       teams within your organization Align your role with your 
       company's values, culture, and tolerance for information 
       loss Lay the groundwork for your security program Create a
       communications program to share your team's contributions 
       and educate your coworkers Transition security functions 
       and responsibilities to other teams Organize and build an 
       effective infosec team Measure your progress with two key 
       metrics: your staff's ability to recognize and report 
       security policy violations and phishing emails. 
588 0  Print version record. 
590    O'Reilly|bO'Reilly Online Learning: Academic/Public 
       Library Edition 
650  0 Computer security. 
650  0 Computer security|xManagement. 
650  6 Sécurité informatique. 
650  6 Sécurité informatique|xGestion. 
650  7 Computer security|2fast 
650  7 Computer security|xManagement|2fast 
856 40 |uhttps://ezproxy.naperville-lib.org/login?url=https://
       learning.oreilly.com/library/view/~/9781492076209/?ar
       |zAvailable on O'Reilly for Public Libraries 
938    ProQuest Ebook Central|bEBLB|nEBL6526782 
938    EBSCOhost|bEBSC|n2895812 
938    YBP Library Services|bYANK|n302016019 
938    YBP Library Services|bYANK|n16667303 
994    92|bJFN