LEADER 03695nam 2200541 450 001 9910794306003321 005 20230125211819.0 010 $a1-5231-4598-6 010 $a1-63081-816-X 035 $a(CKB)4100000011478594 035 $a(MiAaPQ)EBC6371470 035 $a(CaBNVSL)mat09220003 035 $a(IEEE)9220003 035 $a(EXLCZ)994100000011478594 100 $a20201030h20202020 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aMedical device cybersecurity for engineers and manufacturers /$fAxel Wirth, Christopher Gates, Jason Smith 210 1$aNorwood, Massachusetts :$cArtech House,$d2020. 210 2$a[Piscataqay, New Jersey] :$cIEEE Xplore,$d2020 210 4$dİ2020 215 $a1 online resource (303 pages) 225 1 $aArtech House Information Security and Privacy Series 311 $a1-63081-815-1 320 $aIncludes bibliographical references (pages 260-261) and index. 327 $a1. Why secure medical devices? -- 2. Establishing a cybersecurity focus -- 3. Supply chain management -- 4. Medical device manufacturers' development cycle -- 5. Security in production and sales -- 6. Medical device manufacturer postmarket lifecycle -- 7. HDO lifecycle -- 8. Documentation and artifacts -- 9. Organizational development of roles and responsibilities -- 10. Security technology, tools, and practices -- 11. Select topics/deep dives -- Glossary -- References -- About the authors -- Contributors -- Index. 330 $a" Cybersecurity for medical devices is no longer optional. We must not allow sensationalism or headlines to drive the discussion?? Nevertheless, we must proceed with urgency. In the end, this is about preventing patient harm and preserving patient trust. A comprehensive guide to medical device secure lifecycle management, this is a book for engineers, managers, and regulatory specialists. Readers gain insight into the security aspects of every phase of the product lifecycle, including concept, design, implementation, supply chain, manufacturing, postmarket surveillance, maintenance, updates, and end of life. Learn how to mitigate or completely avoid common cybersecurity vulnerabilities introduced during development and production. Grow your awareness of cybersecurity development topics ranging from high-level concepts to practical solutions and tools. Get insight into emerging regulatory and customer expectations. Uncover how to minimize schedule impacts and accelerate time-to-market while still accomplishing the main goal: reducing patient and business exposure to cybersecurity risks. Medical Device Cybersecurity for Engineers and Manufacturers is designed to help all stakeholders lead the charge to a better medical device security posture and improve the resilience of our medical device ecosystem. "--$cProvided by publisher. 410 0$aArtech House information security and privacy series. 606 $aMedical instruments and apparatus industry 606 $aMedical instruments and apparatus$xSafety regulations 606 $aComputer security 615 0$aMedical instruments and apparatus industry. 615 0$aMedical instruments and apparatus$xSafety regulations. 615 0$aComputer security. 676 $a338.476817610973 700 $aWirth$b Axel$01111470 702 $aSmith$b Jason 702 $aGates$b Christopher 801 0$bCaBNVSL 801 1$bCaBNVSL 801 2$bCaBNVSL 906 $aBOOK 912 $a9910794306003321 996 $aMedical device cybersecurity for engineers and manufacturers$93784607 997 $aUNINA LEADER 05358nam 2200673Ia 450 001 9910784354503321 005 20230120004337.0 010 $a1-281-02250-0 010 $a9786611022501 010 $a0-08-052201-7 035 $a(CKB)1000000000349839 035 $a(EBL)298371 035 $a(OCoLC)316822443 035 $a(SSID)ssj0000073695 035 $a(PQKBManifestationID)11171365 035 $a(PQKBTitleCode)TC0000073695 035 $a(PQKBWorkID)10117607 035 $a(PQKB)10944103 035 $a(Au-PeEL)EBL298371 035 $a(CaPaEBR)ebr10175624 035 $a(CaONFJC)MIL102250 035 $a(CaSebORM)9780750679855 035 $a(MiAaPQ)EBC298371 035 $a(EXLCZ)991000000000349839 100 $a20070816d2007 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 14$aThe art of war for security managers$b[electronic resource] $e10 steps to enhancing organizational effectiveness /$fScott A. Watson 205 $a1st edition 210 $aAmsterdam ;$aBoston $cSyngress/Elsevier$dc2007 215 $a1 online resource (199 p.) 300 $aDescription based upon print version of record. 311 $a0-7506-7985-9 320 $aIncludes bibliographical references and index. 327 $aFront cover; The Art of War for Security Managers; Copyright page; Table of contents; Preface; Acknowledgments; Chapter 1: Introduction to The Art of War; Executive Summary; Today's Threat Environment; Who Was Sun Tzu?; Applications of The Art of War; The Art of War for Security Managers; Discussion Questions; Chapter 2: Be a Leader!; Executive Summary; Who Would You Follow into Battle?; Fundamental Questions; Who Should Lead and Why?; The Leader's Role and Characteristics; Failures of Leadership; Leadership; Discussion Questions; Chapter 3: Accept the Inevitability of Conflict 327 $aExecutive SummaryConflict Is Inevitable; World-View and Conflict; Business World Conflicts; The Security Manager and Conflict; Chapter 3 Scenario; Discussion Questions; Chapter 4: Know Yourself and Know Your Enemy; Executive Summary; Who Is the Enemy?; Discussion Questions; Chapter 5: Conduct Strategic Assessments; Executive Summary; Strategy and Tactics; Sun Tzu's View of Strategic Assessments; Sun Tzu's Strategic Assessments for the Security Manager; Conducting a Strategic Assessment; Chapter 5 Scenario; Discussion Questions; Chapter 6: Remember What Is Really Important; Executive Summary 327 $aThe SchoolyardThe Battlefield; Lessons Learned; The Business World; What Really Matters?; The Department; The Security Manager; Victory Is Important, Not Persistence; Chapter 6 Scenario; Discussion Questions; Chapter 7: Engage the Enemy; Executive Summary; Preparations; The Context of Battle; Types of Militarists; Fundamental Concepts of Battle; The Battle Equation; Basic Battle Strategies; Choosing a Basic Battle Strategy; Chapter 7 Scenario; Discussion Questions; Chapter 8: Maneuver Your Army; Executive Summary; Terrain and Position; Rules for Maneuvering Armies; Movement 327 $aChapter 8 ScenarioDiscussion Questions; Chapter 9: Adapt to the Battlefield; Executive Summary; Dynamics of the Conventional and Unconventional; Adaptation and the Security Manager; Conventional Security Management Knowledge; Unconventional Knowledge; Chapter 9 Scenario 1; Chapter 9 Scenario 2; Discussion Questions; Chapter 10: Avoid Predictability; Executive Summary; Predictability: The Ultimate Strategic Advantage or Detriment; The Balance; Avoiding Predictability; Chapter 10 Scenario 1; Chapter 10 Scenario 2; Discussion Questions; Chapter 11: Collect Intelligence; Executive Summary 327 $aThe Importance of IntelligenceThe Intelligence Cycle; Evaluating Your Intelligence Capability; Intelligence: A Key Concept; Chapter 11 Scenario; Discussion Questions; Chapter 12: The Art of War and Homeland Security; Executive Summary; "Objectivity" and the War on Terror; September 11, 2001-A Watershed Event; The Wrong Question; The Right Questions; The Private Sector; The Big Question; Definitional Problems; Sun Tzu and the War on Terrorism; A Continual War on Terrorism; Conclusions; Appendix: The Armory; Annotated Bibliography; Index 330 $aThe classic book The Art of War (or as it is sometimes translated, The Art of Strategy) by Sun Tzu is often used to illustrate principles that can apply to the management of business environments. The Art of War for Security Managers is the first book to apply the time-honored principles of Sun Tzu's theories of conflict to contemporary organizational security.Corporate leaders have a responsibility to make rational choices that maximize return on investment. The author posits that while conflict is inevitable, it need not be costly. The result is an efficient fram 606 $aConflict management 606 $aRisk management 606 $aCrisis management 615 0$aConflict management. 615 0$aRisk management. 615 0$aCrisis management. 676 $a658.4/7 676 $a658.47 700 $aWatson$b Scott A$01511554 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910784354503321 996 $aThe art of war for security managers$93744905 997 $aUNINA