MARC보기
LDR04106cmm u2200613Ii 4500
001000000309637
003OCoLC
00520230525134426
006m o d
007cr cnu|||unuuu
008150814s2015 enk ob 001 0 eng d
019 ▼a 923543467 ▼a 929141985
020 ▼a 9781472466747 ▼q (electronic bk.)
020 ▼a 1472466748 ▼q (electronic bk.)
020 ▼z 9781472466730
0291 ▼a DEBSZ ▼b 449500713
035 ▼a (OCoLC)918561544 ▼z (OCoLC)923543467 ▼z (OCoLC)929141985
040 ▼a N$T ▼b eng ▼e rda ▼e pn ▼c N$T ▼d N$T ▼d OCLCO ▼d YDXCP ▼d IDEBK ▼d CDX ▼d OCLCF ▼d OCLCO ▼d EBLCP ▼d OCLCO ▼d DEBSZ ▼d OCLCQ ▼d OCLCA ▼d 248032
049 ▼a MAIN
050 4 ▼a HF5548.37
072 7 ▼a BUS ▼x 001010 ▼2 bisacsh
08204 ▼a 657.4/78 ▼2 23
1001 ▼a Green, Jeremy Swinfen, ▼e author.
24510 ▼a Cyber security : ▼b an Introduction for non-technical managers / ▼c Jeremy Swinfen Green.
264 1 ▼a Surrey : ▼b Gower, ▼c 2015.
300 ▼a 1 online resource
336 ▼a text ▼b txt ▼2 rdacontent
337 ▼a computer ▼b c ▼2 rdamedia
338 ▼a online resource ▼b cr ▼2 rdacarrier
504 ▼a Includes bibliographical references and index.
5050 ▼a ""Cover""; ""Contents""; ""Introduction""; ""Part I Introducing Cyber Security""; ""1 Cyber Security and Cyber Risk""; ""2 A Holistic Approach to Cyber Security""; ""3 The Scope of Cyber Security""; ""Part II The Main Threats to Cyber Security""; ""4 Systems Risks""; ""5 People and Networks""; ""6 Cloud Computing""; ""7 Bring Your Own Device""; ""8 Protecting People""; ""9 Keeping Data Secure outside the Office""; ""10 Social Media Risk""; ""11 Who is Stealing your Organisationa???s Identity?""; ""12 Disposing of Data Safely""; ""13 The Internet of Things""; ""Part III Managing Cyber Risk""
5058 ▼a ""14 Developing a Cyber Security Strategy""""15 Picking the Right Team""; ""16 Getting Prepared""; ""17 Developing a Risk Register""; ""18 Managing the Impac tof Cyber Incidents""; ""19 Responding to Incidents""; ""20 Digital Governance""; ""Afterword: Looking from the Past to the Future""; ""Glossary""; ""Index""
520 ▼a Cyber security involves protecting organisations from cyber risks, the threats to organisations caused by digital technology. These risks can cause direct damage to revenues and profits as well as indirect damage through reduced efficiency, lower employee morale, and reputational damage. Cyber security is often thought to be the domain of specialist IT professionals however, cyber risks are found across and within organisations. Unfortunately, many managers outside IT feel they are ill equipped to deal with cyber risks and the use of jargon makes the subject especially hard to understand. For.
5880 ▼a Online resource; title from PDF title page (EBSCO, viewed August 17, 2015).
590 ▼a eBooks on EBSCOhost ▼b All EBSCO eBooks
650 0 ▼a Business enterprises ▼x Computer networks ▼x Security measures.
650 0 ▼a Computer security.
650 0 ▼a Corporations ▼x Security measures.
650 0 ▼a Computer crimes ▼x Prevention.
650 7 ▼a BUSINESS & ECONOMICS ▼x Accounting ▼x Financial. ▼2 bisacsh
650 7 ▼a Business enterprises ▼x Computer networks ▼x Security measures. ▼2 fast ▼0 (OCoLC)fst00842535
650 7 ▼a Computer crimes ▼x Prevention. ▼2 fast ▼0 (OCoLC)fst00872068
650 7 ▼a Computer security. ▼2 fast ▼0 (OCoLC)fst00872484
650 7 ▼a Corporations ▼x Security measures. ▼2 fast ▼0 (OCoLC)fst00879928
655 4 ▼a Electronic books.
77608 ▼i Print version: ▼a Swinfen Green, Jeremy, Mr. ▼t Cyber Security : An Introduction for Non-Technical Managers. ▼d : Ashgate Publishing Ltd, 짤2015 ▼z 9781472466730
85640 ▼u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1051971
938 ▼a Coutts Information Services ▼b COUT ▼n 31481124
938 ▼a EBL - Ebook Library ▼b EBLB ▼n EBL2146476
938 ▼a EBSCOhost ▼b EBSC ▼n 1051971
938 ▼a ProQuest MyiLibrary Digital eBook Collection ▼b IDEB ▼n cis31481124
938 ▼a YBP Library Services ▼b YANK ▼n 12575381
938 ▼a YBP Library Services ▼b YANK ▼n 12924670
938 ▼a YBP Library Services ▼b YANK ▼n 12934972
990 ▼a 관리자