It looks like you're offline.
Open Library logo
additional options menu

MARC record from Internet Archive

LEADER: 01960cam 2200385 i 4500
001 9925212982501661
005 20151106060905.3
008 150312s2015 enk b 001 0 eng
010 $a 2015010130
020 $a9781472466730 (hardback : alk. paper)
020 $a147246673X (hardback : alk. paper)
020 $z9781472466747 (ebook)
020 $z9781472466754 (epub)
035 $a99965017418
035 $a(OCoLC)906027746
035 $a(OCoLC)ocn906027746
040 $aDLC$beng$erda$cDLC$dYDX$dBTCTA$dOCLCF$dYDXCP$dCDX
042 $apcc
050 00 $aHF5548.37$b.G737 2015
082 00 $a658.4/78$223
100 1 $aGreen, Jeremy Swinfen.
245 10 $aCyber security :$ban introduction for non-technical managers /$cJeremy Swinfen Green, Mosoco Ltd, London, UK.
264 1 $aFarnham, Surrey ;$aBurlington, VT :$bGower,$c[2015]
300 $avi, 255 pages ;$c23 cm
336 $atext$2rdacontent
337 $aunmediated$2rdamedia
338 $avolume$2rdacarrier
504 $aIncludes bibliographical references and index.
505 0 $aCyber security and cyber risk -- A holistic approach to cyber security -- The scope of cyber security -- Systems risks -- People and networks -- Cloud computing -- Bring your own device -- Protecting people -- Keeping data secure outside the office -- Social media risk -- Who is stealing your organisation's identity? -- Disposing of data safely -- The internet of things -- Developing a cyber security strategy -- Picking the right team -- Getting prepared -- Developing a risk register -- Managing the impact of cyber incidents -- Responding to incidents -- Digital governance -- Afterword : looking from the past to the future.
650 0 $aBusiness enterprises$xComputer networks$xSecurity measures.
650 0 $aComputer security.
650 0 $aCorporations$xSecurity measures.
650 0 $aComputer crimes$xPrevention.
947 $hCIRCSTACKS$r31786103015274
980 $a99965017418