000 | 01984cam a2200385 i 4500 | ||
---|---|---|---|
001 | 18524753 | ||
003 | OSt | ||
005 | 20220412103607.0 | ||
008 | 150312s2015 enk b 001 0 eng | ||
010 | _a 2015010130 | ||
020 | _a9781472466730 (hardback : alk. paper) | ||
020 | _z9781472466747 (ebook) | ||
020 | _z9781472466754 (epub) | ||
040 |
_aLCC _beng _cGSU _erda _dGSU |
||
042 | _apcc | ||
050 | 0 | 0 |
_aHF5548.37 _b.G737 2015 |
082 | 0 | 0 |
_a658.4/78 _223 |
100 | 1 |
_aGreen, Jeremy Swinfen. _eauthor |
|
245 | 1 | 0 |
_aCyber security : _ban introduction for non-technical managers / _cJeremy Swinfen Green, Mosoco Ltd, London, UK. |
264 | 1 |
_aFarnham, Surrey ; _aBurlington, VT : _bGower, _c[2015] |
|
300 |
_avi, 255 pages ; _c23 cm |
||
336 |
_atext _2rdacontent |
||
337 |
_aunmediated _2rdamedia |
||
338 |
_avolume _2rdacarrier |
||
500 | _aincludes index | ||
504 | _aIncludes bibliographical references and index. | ||
505 | 0 | _aCyber security and cyber risk -- A holistic approach to cyber security -- The scope of cyber security -- Systems risks -- People and networks -- Cloud computing -- Bring your own device -- Protecting people -- Keeping data secure outside the office -- Social media risk -- Who is stealing your organisation's identity? -- Disposing of data safely -- The internet of things -- Developing a cyber security strategy -- Picking the right team -- Getting prepared -- Developing a risk register -- Managing the impact of cyber incidents -- Responding to incidents -- Digital governance -- Afterword : looking from the past to the future. | |
650 | 0 |
_aBusiness enterprises _xComputer networks _xSecurity measures. |
|
650 | 0 | _aComputer security. | |
650 | 0 |
_aCorporations _xSecurity measures. |
|
650 | 0 |
_aComputer crimes _xPrevention. |
|
906 |
_a7 _bcbc _corignew _d1 _eecip _f20 _gy-gencatlg |
||
942 |
_2lcc _cBK _n0 |
||
999 |
_c556 _d556 |