MARC details
000 -LEADER |
fixed length control field |
02490nam a22003017a 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
ZW-GwMSU |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20200902111156.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
200821b ||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781472466730 |
040 ## - CATALOGING SOURCE |
Language of cataloging |
English |
Transcribing agency |
MSU |
Description conventions |
rda |
041 ## - |
-- |
eng |
050 00 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
HF5548.37 GRE |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Green, Jeremy S. |
Relator term |
Author |
Fuller form of name |
Jeremy Swinfen Green |
245 10 - TITLE STATEMENT |
Title |
Cyber security : |
Remainder of title |
an introduction for non-technical managers |
Statement of responsibility, etc |
created by Jeremy S Green |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
Surrey |
Name of publisher, distributor, etc |
Gower |
Date of publication, distribution, etc |
2015 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
255 pages |
Dimensions |
23 cm |
336 ## - CONTENT TYPE |
content type term |
text |
Source |
rdacontent |
337 ## - MEDIA TYPE |
media type term |
unmediated |
source |
rdamedia |
media type code |
n |
338 ## - CARRIER TYPE |
carrier type term |
volume |
source |
rdacarrier |
carrier type code |
nc |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Includes bibliographical references and index. |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Cyber security and cyber risk -- A holistic approach to cyber security -- The scope of cyber security -- Systems risks -- People and networks -- Cloud computing -- Bring your own device -- Protecting people -- Keeping data secure outside the office -- Social media risk -- Who is stealing your organisation's identity? -- Disposing of data safely -- The internet of things -- Developing a cyber security strategy -- Picking the right team -- Getting prepared -- Developing a risk register -- Managing the impact of cyber incidents -- Responding to incidents -- Digital governance -- Afterword : looking from the past to the future. |
520 ## - SUMMARY, ETC. |
Summary, etc |
This publication provides a detailed analysis of some of the key cyber security risks facing business today, and provides useful guidance on how to develop an effective strategy to address them.' Andy Williams, Cyber Connect UK 'Advances in technology bring enormous benefits but also pose significant risks. Managing these risks will challenge all organizations, whatever their sector or size. This book is a welcome addition to the guidance available and, importantly, emphasizes the role of behavioral issues as well as technical solutions to achieve effective cyber security.' Carolyn Williams, The Institute of Risk Management 'Jeremy Swinfen Green has succeeded in creating a cybersecurity book that is both well written and uses the language of business management. This is just the right reference for managers who need to understand key cybersecurity concepts and threats and how they can manage the risks. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Business enterprises |
General subdivision |
Computer networks |
-- |
Security measures |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer security |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Corporations |
General subdivision |
Security measures |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer crimes |
General subdivision |
Prevention |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Library of Congress Classification |
Koha item type |
Book |