<?xml version="1.0" encoding="UTF-8"?>
<collection xmlns="http://www.loc.gov/MARC21/slim">
 <record>
  <leader>02268nam a22004331i 4500</leader>
  <controlfield tag="001">000706460</controlfield>
  <controlfield tag="003">CaToSAGE</controlfield>
  <controlfield tag="005">20240202172226.0</controlfield>
  <controlfield tag="005">20230109140345.7</controlfield>
  <controlfield tag="006">m     o  d</controlfield>
  <controlfield tag="007">cr un|||||||||</controlfield>
  <controlfield tag="008">230109s2022    enk    fo     000 0 eng d</controlfield>
  <datafield tag="STA" ind1=" " ind2=" ">
   <subfield code="a">NEZPRACOVANÝ IMPORT</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
   <subfield code="a">9781071913215 :</subfield>
   <subfield code="c">No price</subfield>
   <subfield code="q">(ebook)</subfield>
  </datafield>
  <datafield tag="035" ind1=" " ind2=" ">
   <subfield code="a">(OCoLC)1362530057</subfield>
  </datafield>
  <datafield tag="040" ind1=" " ind2=" ">
   <subfield code="a">CaToSAGE</subfield>
   <subfield code="b">eng</subfield>
   <subfield code="e">rda</subfield>
   <subfield code="e">pn</subfield>
   <subfield code="c">CaToSAGE</subfield>
   <subfield code="d">UtOrBLW</subfield>
  </datafield>
  <datafield tag="050" ind1=" " ind2="4">
   <subfield code="a">HD45</subfield>
   <subfield code="b">.C44 2022</subfield>
  </datafield>
  <datafield tag="082" ind1="0" ind2="4">
   <subfield code="a">658.4063</subfield>
  </datafield>
  <datafield tag="100" ind1="1" ind2=" ">
   <subfield code="a">Chesbrough, Henry William,</subfield>
   <subfield code="e">author.</subfield>
  </datafield>
  <datafield tag="245" ind1="1" ind2="0">
   <subfield code="a">Leading through influence at scale :</subfield>
   <subfield code="b">open source security at the linux foundation /</subfield>
   <subfield code="c">Henry Chesbrough, John Masko.</subfield>
  </datafield>
  <datafield tag="264" ind1=" " ind2="1">
   <subfield code="a">London :</subfield>
   <subfield code="b">The Berkeley-Haas Case Series. University of California, Berkeley. Haas School of Business,</subfield>
   <subfield code="c">2022.</subfield>
  </datafield>
  <datafield tag="300" ind1=" " ind2=" ">
   <subfield code="a">1 online resource.</subfield>
  </datafield>
  <datafield tag="336" ind1=" " ind2=" ">
   <subfield code="a">text</subfield>
   <subfield code="b">txt</subfield>
   <subfield code="2">rdacontent</subfield>
  </datafield>
  <datafield tag="337" ind1=" " ind2=" ">
   <subfield code="a">computer</subfield>
   <subfield code="b">c</subfield>
   <subfield code="2">rdamedia</subfield>
  </datafield>
  <datafield tag="338" ind1=" " ind2=" ">
   <subfield code="a">online resource</subfield>
   <subfield code="b">cr</subfield>
   <subfield code="2">rdacarrier</subfield>
  </datafield>
  <datafield tag="490" ind1="1" ind2=" ">
   <subfield code="a">SAGE business cases</subfield>
  </datafield>
  <datafield tag="520" ind1="8" ind2=" ">
   <subfield code="a">This case puts students in the shoes of Jim Zemlin, who serves as executive director of the Linux Foundation (LF), a non-profit charged with providing support for the open source software (OSS) development community. Zemlin has received a call from the deputy director of national intelligence, alerting him of a recently-discovered security flaw in an OSS product, called Apache Log4j. This is a widely used piece of software, making the flaw a vulnerability for businesses all over the world. Zemlin has been &quot;invited&quot; to an emergency meeting of technology leaders and national security leaders, to discuss how to respond to the threat. With no direct power over developers, what options are available to Zemlin? Which should he choose?</subfield>
  </datafield>
  <datafield tag="588" ind1=" " ind2=" ">
   <subfield code="a">Description based on XML content.</subfield>
  </datafield>
  <datafield tag="655" ind1=" " ind2="7">
   <subfield code="a">elektronické knihy</subfield>
   <subfield code="7">fd186907</subfield>
   <subfield code="2">czenas</subfield>
  </datafield>
  <datafield tag="655" ind1=" " ind2="9">
   <subfield code="a">electronic books</subfield>
   <subfield code="2">eczenas</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
   <subfield code="a">Technological innovations</subfield>
   <subfield code="v">Case studies.</subfield>
  </datafield>
  <datafield tag="700" ind1="1" ind2=" ">
   <subfield code="a">Masko, John,</subfield>
   <subfield code="e">author.</subfield>
  </datafield>
  <datafield tag="830" ind1=" " ind2="0">
   <subfield code="a">SAGE business cases.</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2="0">
   <subfield code="3">SAGE Knowledge</subfield>
   <subfield code="u">https://sk.sagepub.com/cases/leading-through-influence-scale-open-source-security-linux-foundation</subfield>
   <subfield code="y">Plný text</subfield>
  </datafield>
  <datafield tag="BAS" ind1=" " ind2=" ">
   <subfield code="a">SBC</subfield>
  </datafield>
  <datafield tag="BAS" ind1=" " ind2=" ">
   <subfield code="a">EB</subfield>
  </datafield>
  <datafield tag="993" ind1=" " ind2=" ">
   <subfield code="x">NEPOSILAT</subfield>
   <subfield code="y">EB</subfield>
  </datafield>
 </record>
</collection>
