Amazon cover image
Image from Amazon.com

Cyber security : an introduction for non-technical managers / Jeremy Swinfen Green, Mosoco Ltd, London, UK.

By: Material type: TextTextPublisher: Farnham, Surrey ; Burlington, VT : Gower, [2015]Description: vi, 255 pages ; 23 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9781472466730 (hardback : alk. paper)
Subject(s): DDC classification:
  • 658.4/78 23
LOC classification:
  • HF5548.37 .G737 2015
Contents:
Cyber security and cyber risk -- A holistic approach to cyber security -- The scope of cyber security -- Systems risks -- People and networks -- Cloud computing -- Bring your own device -- Protecting people -- Keeping data secure outside the office -- Social media risk -- Who is stealing your organisation's identity? -- Disposing of data safely -- The internet of things -- Developing a cyber security strategy -- Picking the right team -- Getting prepared -- Developing a risk register -- Managing the impact of cyber incidents -- Responding to incidents -- Digital governance -- Afterword : looking from the past to the future.
Item type: Books
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Copy number Status Date due Barcode
Books Books GSU Library Epoch General Stacks HF5548.37GRE (Browse shelf(Opens below)) 1 Available 50000002248
Books Books GSU Library Epoch General Stacks HF5548.37GRE (Browse shelf(Opens below)) 2 Available 50000002252

includes index

Includes bibliographical references and index.

Cyber security and cyber risk -- A holistic approach to cyber security -- The scope of cyber security -- Systems risks -- People and networks -- Cloud computing -- Bring your own device -- Protecting people -- Keeping data secure outside the office -- Social media risk -- Who is stealing your organisation's identity? -- Disposing of data safely -- The internet of things -- Developing a cyber security strategy -- Picking the right team -- Getting prepared -- Developing a risk register -- Managing the impact of cyber incidents -- Responding to incidents -- Digital governance -- Afterword : looking from the past to the future.

There are no comments on this title.

to post a comment.
Share