Cyber threat!: how to manage the growing risk of cyber attacks
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hoboken, New Jersey
Wiley
2014
|
Schriftenreihe: | Wiley corporate F & A Series
|
Schlagworte: | |
Online-Zugang: | FRO01 UBY01 UBG01 Volltext Buchcover |
Beschreibung: | Includes index "Conquering cyber attacks requires a multi-sector, multi-modal approachCyber Threat! How to Manage the Growing Risk of Cyber Attacks is an in-depth examination of the very real cyber security risks facing all facets of government and industry, and the various factors that must align to maintain information integrity. Written by one of the nation's most highly respected cyber risk analysts, the book describes how businesses and government agencies must protect their most valuable assets to avoid potentially catastrophic consequences. Much more than just cyber security, the necessary solutions require government and industry to work cooperatively and intelligently. This resource reveals the extent of the problem, and provides a plan to change course and better manage and protect critical information. Recent news surrounding cyber hacking operations show how intellectual property theft is now a matter of national security, as well as economic and commercial security. Consequences are far-reaching, and can have enormous effects on national economies and international relations. Aggressive cyber forces in China, Russia, Eastern Europe and elsewhere, the rise of global organized criminal networks, and inattention to vulnerabilities throughout critical infrastructures converge to represent an abundantly clear threat. Managing the threat and keeping information safe is now a top priority for global businesses and government agencies. Cyber Threat! breaks the issue down into real terms, and proposes an approach to effective defense. Topics include: The information at risk The true extent of the threat The potential consequences across sectors The multifaceted approach to defense The growing cyber threat is fundamentally changing the nation's economic, diplomatic, military, and intelligence operations, and will extend into future technological, scientific, and geopolitical influence. The only effective solution will be expansive and complex, encompassing every facet of government and industry. Cyber Threat! details the situation at hand, and provides the information that can help keep the nation safe"-- "Cyber Threat! is an in-depth examination of the very real risks facing all facets of government and industry, and the various factors that must align to maintain information integrity. The book describes how businesses and government agencies must protect their most valuable assets to avoid potentially catastrophic consequences"-- Includes bibliographical references and index |
Beschreibung: | 1 Online-Ressource |
ISBN: | 9781118935965 1118935969 9781118935958 1118935950 9781118915028 111891502X 1118836359 9781118836354 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043396888 | ||
003 | DE-604 | ||
005 | 20180118 | ||
007 | cr|uuu---uuuuu | ||
008 | 160222s2014 |||| o||u| ||||||eng d | ||
020 | |a 9781118935965 |c electronic bk. |9 978-1-118-93596-5 | ||
020 | |a 1118935969 |c electronic bk. |9 1-118-93596-9 | ||
020 | |a 9781118935958 |c electronic bk. |9 978-1-118-93595-8 | ||
020 | |a 1118935950 |c electronic bk. |9 1-118-93595-0 | ||
020 | |a 9781118915028 |9 978-1-118-91502-8 | ||
020 | |a 111891502X |9 1-118-91502-X | ||
020 | |a 1118836359 |9 1-118-83635-9 | ||
020 | |a 9781118836354 |9 978-1-118-83635-4 | ||
024 | 7 | |a 10.1002/9781118915028 |2 doi | |
035 | |a (ZDB-35-WIC)ocn881387451 | ||
035 | |a (OCoLC)881387451 | ||
035 | |a (DE-599)BVBBV043396888 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-861 |a DE-706 | ||
082 | 0 | |a 658.4/78 |2 23 | |
100 | 1 | |a Ulsch, N. MacDonnell |e Verfasser |4 aut | |
245 | 1 | 0 | |a Cyber threat! |b how to manage the growing risk of cyber attacks |c N. MacDonnell Ulsch |
264 | 1 | |a Hoboken, New Jersey |b Wiley |c 2014 | |
300 | |a 1 Online-Ressource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Wiley corporate F & A Series | |
500 | |a Includes index | ||
500 | |a "Conquering cyber attacks requires a multi-sector, multi-modal approachCyber Threat! How to Manage the Growing Risk of Cyber Attacks is an in-depth examination of the very real cyber security risks facing all facets of government and industry, and the various factors that must align to maintain information integrity. Written by one of the nation's most highly respected cyber risk analysts, the book describes how businesses and government agencies must protect their most valuable assets to avoid potentially catastrophic consequences. Much more than just cyber security, the necessary solutions require government and industry to work cooperatively and intelligently. This resource reveals the extent of the problem, and provides a plan to change course and better manage and protect critical information. Recent news surrounding cyber hacking operations show how intellectual property theft is now a matter of national security, as well as economic and commercial security. | ||
500 | |a Consequences are far-reaching, and can have enormous effects on national economies and international relations. Aggressive cyber forces in China, Russia, Eastern Europe and elsewhere, the rise of global organized criminal networks, and inattention to vulnerabilities throughout critical infrastructures converge to represent an abundantly clear threat. Managing the threat and keeping information safe is now a top priority for global businesses and government agencies. Cyber Threat! breaks the issue down into real terms, and proposes an approach to effective defense. Topics include: The information at risk The true extent of the threat The potential consequences across sectors The multifaceted approach to defense The growing cyber threat is fundamentally changing the nation's economic, diplomatic, military, and intelligence operations, and will extend into future technological, scientific, and geopolitical influence. | ||
500 | |a The only effective solution will be expansive and complex, encompassing every facet of government and industry. Cyber Threat! details the situation at hand, and provides the information that can help keep the nation safe"-- | ||
500 | |a "Cyber Threat! is an in-depth examination of the very real risks facing all facets of government and industry, and the various factors that must align to maintain information integrity. The book describes how businesses and government agencies must protect their most valuable assets to avoid potentially catastrophic consequences"-- | ||
500 | |a Includes bibliographical references and index | ||
650 | 7 | |a BUSINESS & ECONOMICS / Information Management |2 bisacsh | |
650 | 7 | |a Business enterprises / Computer networks / Security measures |2 fast | |
650 | 7 | |a Computer crimes / Prevention |2 fast | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Corporations / Security measures |2 fast | |
650 | 4 | |a Unternehmen | |
650 | 4 | |a Wirtschaft | |
650 | 4 | |a Corporations / Security measures | |
650 | 4 | |a Business enterprises / Computer networks / Security measures | |
650 | 4 | |a Computer crimes / Prevention | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computer networks / Security measures | |
653 | |a Electronic books | ||
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Hardcover |z 978-1-118-83635-4 |
856 | 4 | 0 | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781118915028 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
856 | 4 | 2 | |m SWB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028815472&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Buchcover |
912 | |a ZDB-35-WIC | ||
940 | 1 | |q UBG_PDA_WIC | |
999 | |a oai:aleph.bib-bvb.de:BVB01-028815472 | ||
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781118915028 |l FRO01 |p ZDB-35-WIC |q FRO_PDA_WIC |x Verlag |3 Volltext | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781118915028 |l UBY01 |p ZDB-35-WIC |q UBY_PDA_WIC_Kauf |x Verlag |3 Volltext | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781118915028 |l UBG01 |p ZDB-35-WIC |q UBG_PDA_WIC |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175978394550272 |
---|---|
any_adam_object | 1 |
author | Ulsch, N. MacDonnell |
author_facet | Ulsch, N. MacDonnell |
author_role | aut |
author_sort | Ulsch, N. MacDonnell |
author_variant | n m u nm nmu |
building | Verbundindex |
bvnumber | BV043396888 |
collection | ZDB-35-WIC |
ctrlnum | (ZDB-35-WIC)ocn881387451 (OCoLC)881387451 (DE-599)BVBBV043396888 |
dewey-full | 658.4/78 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.4/78 |
dewey-search | 658.4/78 |
dewey-sort | 3658.4 278 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05524nmm a2200721zc 4500</leader><controlfield tag="001">BV043396888</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20180118 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160222s2014 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118935965</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-118-93596-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1118935969</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-118-93596-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118935958</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-118-93595-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1118935950</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-118-93595-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118915028</subfield><subfield code="9">978-1-118-91502-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">111891502X</subfield><subfield code="9">1-118-91502-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1118836359</subfield><subfield code="9">1-118-83635-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118836354</subfield><subfield code="9">978-1-118-83635-4</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1002/9781118915028</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-35-WIC)ocn881387451</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)881387451</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043396888</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-861</subfield><subfield code="a">DE-706</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.4/78</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Ulsch, N. MacDonnell</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber threat!</subfield><subfield code="b">how to manage the growing risk of cyber attacks</subfield><subfield code="c">N. MacDonnell Ulsch</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, New Jersey</subfield><subfield code="b">Wiley</subfield><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Wiley corporate F & A Series</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Conquering cyber attacks requires a multi-sector, multi-modal approachCyber Threat! How to Manage the Growing Risk of Cyber Attacks is an in-depth examination of the very real cyber security risks facing all facets of government and industry, and the various factors that must align to maintain information integrity. Written by one of the nation's most highly respected cyber risk analysts, the book describes how businesses and government agencies must protect their most valuable assets to avoid potentially catastrophic consequences. Much more than just cyber security, the necessary solutions require government and industry to work cooperatively and intelligently. This resource reveals the extent of the problem, and provides a plan to change course and better manage and protect critical information. Recent news surrounding cyber hacking operations show how intellectual property theft is now a matter of national security, as well as economic and commercial security. </subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Consequences are far-reaching, and can have enormous effects on national economies and international relations. Aggressive cyber forces in China, Russia, Eastern Europe and elsewhere, the rise of global organized criminal networks, and inattention to vulnerabilities throughout critical infrastructures converge to represent an abundantly clear threat. Managing the threat and keeping information safe is now a top priority for global businesses and government agencies. Cyber Threat! breaks the issue down into real terms, and proposes an approach to effective defense. Topics include: The information at risk The true extent of the threat The potential consequences across sectors The multifaceted approach to defense The growing cyber threat is fundamentally changing the nation's economic, diplomatic, military, and intelligence operations, and will extend into future technological, scientific, and geopolitical influence. </subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">The only effective solution will be expansive and complex, encompassing every facet of government and industry. Cyber Threat! details the situation at hand, and provides the information that can help keep the nation safe"--</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Cyber Threat! is an in-depth examination of the very real risks facing all facets of government and industry, and the various factors that must align to maintain information integrity. The book describes how businesses and government agencies must protect their most valuable assets to avoid potentially catastrophic consequences"--</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Information Management</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Business enterprises / Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes / Prevention</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Corporations / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Unternehmen</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wirtschaft</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Corporations / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business enterprises / Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes / Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Electronic books</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Hardcover</subfield><subfield code="z">978-1-118-83635-4</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118915028</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">SWB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028815472&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Buchcover</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-35-WIC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">UBG_PDA_WIC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028815472</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118915028</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">FRO_PDA_WIC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118915028</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">UBY_PDA_WIC_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118915028</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">UBG_PDA_WIC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043396888 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:24:52Z |
institution | BVB |
isbn | 9781118935965 1118935969 9781118935958 1118935950 9781118915028 111891502X 1118836359 9781118836354 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028815472 |
oclc_num | 881387451 |
open_access_boolean | |
owner | DE-861 DE-706 |
owner_facet | DE-861 DE-706 |
physical | 1 Online-Ressource |
psigel | ZDB-35-WIC UBG_PDA_WIC ZDB-35-WIC FRO_PDA_WIC ZDB-35-WIC UBY_PDA_WIC_Kauf ZDB-35-WIC UBG_PDA_WIC |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Wiley |
record_format | marc |
series2 | Wiley corporate F & A Series |
spelling | Ulsch, N. MacDonnell Verfasser aut Cyber threat! how to manage the growing risk of cyber attacks N. MacDonnell Ulsch Hoboken, New Jersey Wiley 2014 1 Online-Ressource txt rdacontent c rdamedia cr rdacarrier Wiley corporate F & A Series Includes index "Conquering cyber attacks requires a multi-sector, multi-modal approachCyber Threat! How to Manage the Growing Risk of Cyber Attacks is an in-depth examination of the very real cyber security risks facing all facets of government and industry, and the various factors that must align to maintain information integrity. Written by one of the nation's most highly respected cyber risk analysts, the book describes how businesses and government agencies must protect their most valuable assets to avoid potentially catastrophic consequences. Much more than just cyber security, the necessary solutions require government and industry to work cooperatively and intelligently. This resource reveals the extent of the problem, and provides a plan to change course and better manage and protect critical information. Recent news surrounding cyber hacking operations show how intellectual property theft is now a matter of national security, as well as economic and commercial security. Consequences are far-reaching, and can have enormous effects on national economies and international relations. Aggressive cyber forces in China, Russia, Eastern Europe and elsewhere, the rise of global organized criminal networks, and inattention to vulnerabilities throughout critical infrastructures converge to represent an abundantly clear threat. Managing the threat and keeping information safe is now a top priority for global businesses and government agencies. Cyber Threat! breaks the issue down into real terms, and proposes an approach to effective defense. Topics include: The information at risk The true extent of the threat The potential consequences across sectors The multifaceted approach to defense The growing cyber threat is fundamentally changing the nation's economic, diplomatic, military, and intelligence operations, and will extend into future technological, scientific, and geopolitical influence. The only effective solution will be expansive and complex, encompassing every facet of government and industry. Cyber Threat! details the situation at hand, and provides the information that can help keep the nation safe"-- "Cyber Threat! is an in-depth examination of the very real risks facing all facets of government and industry, and the various factors that must align to maintain information integrity. The book describes how businesses and government agencies must protect their most valuable assets to avoid potentially catastrophic consequences"-- Includes bibliographical references and index BUSINESS & ECONOMICS / Information Management bisacsh Business enterprises / Computer networks / Security measures fast Computer crimes / Prevention fast Computer networks / Security measures fast Computer security fast Corporations / Security measures fast Unternehmen Wirtschaft Corporations / Security measures Business enterprises / Computer networks / Security measures Computer crimes / Prevention Computer security Computer networks / Security measures Electronic books Erscheint auch als Druck-Ausgabe, Hardcover 978-1-118-83635-4 https://onlinelibrary.wiley.com/doi/book/10.1002/9781118915028 Verlag URL des Erstveröffentlichers Volltext SWB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028815472&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Buchcover |
spellingShingle | Ulsch, N. MacDonnell Cyber threat! how to manage the growing risk of cyber attacks BUSINESS & ECONOMICS / Information Management bisacsh Business enterprises / Computer networks / Security measures fast Computer crimes / Prevention fast Computer networks / Security measures fast Computer security fast Corporations / Security measures fast Unternehmen Wirtschaft Corporations / Security measures Business enterprises / Computer networks / Security measures Computer crimes / Prevention Computer security Computer networks / Security measures |
title | Cyber threat! how to manage the growing risk of cyber attacks |
title_auth | Cyber threat! how to manage the growing risk of cyber attacks |
title_exact_search | Cyber threat! how to manage the growing risk of cyber attacks |
title_full | Cyber threat! how to manage the growing risk of cyber attacks N. MacDonnell Ulsch |
title_fullStr | Cyber threat! how to manage the growing risk of cyber attacks N. MacDonnell Ulsch |
title_full_unstemmed | Cyber threat! how to manage the growing risk of cyber attacks N. MacDonnell Ulsch |
title_short | Cyber threat! |
title_sort | cyber threat how to manage the growing risk of cyber attacks |
title_sub | how to manage the growing risk of cyber attacks |
topic | BUSINESS & ECONOMICS / Information Management bisacsh Business enterprises / Computer networks / Security measures fast Computer crimes / Prevention fast Computer networks / Security measures fast Computer security fast Corporations / Security measures fast Unternehmen Wirtschaft Corporations / Security measures Business enterprises / Computer networks / Security measures Computer crimes / Prevention Computer security Computer networks / Security measures |
topic_facet | BUSINESS & ECONOMICS / Information Management Business enterprises / Computer networks / Security measures Computer crimes / Prevention Computer networks / Security measures Computer security Corporations / Security measures Unternehmen Wirtschaft |
url | https://onlinelibrary.wiley.com/doi/book/10.1002/9781118915028 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028815472&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT ulschnmacdonnell cyberthreathowtomanagethegrowingriskofcyberattacks |