Cybersecurity for Executives: A Practical Guide
Practical guide that can be used by executives to make well-informed decisions on cybersecurity issues to better protect their business Emphasizes, in a direct and uncomplicated way, how executives can identify, understand, assess, and mitigate risks associated with cybersecurity issues Covers '...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Somerset
Wiley
2014
|
Ausgabe: | 1st ed |
Schlagworte: | |
Zusammenfassung: | Practical guide that can be used by executives to make well-informed decisions on cybersecurity issues to better protect their business Emphasizes, in a direct and uncomplicated way, how executives can identify, understand, assess, and mitigate risks associated with cybersecurity issues Covers 'What to Do When You Get Hacked?' including Business Continuity and Disaster Recovery planning, Public Relations, Legal and Regulatory issues, and Notifications and Disclosures Provides steps for integrating cybersecurity into Strategy; Policy and Guidelines; Change Management and Personnel Management Identifies cybersecurity best practices that executives can and should use both in the office and at home to protect their vital information |
Beschreibung: | Description based on publisher supplied metadata and other sources |
Beschreibung: | 1 online resource (412 pages) |
ISBN: | 9781118908815 9781118888148 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043610174 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 160616s2014 |||| o||u| ||||||eng d | ||
020 | |a 9781118908815 |9 978-1-118-90881-5 | ||
020 | |a 9781118888148 |c Print |9 978-1-118-88814-8 | ||
035 | |a (ZDB-30-PQE)EBC1707094 | ||
035 | |a (ZDB-89-EBL)EBL1707094 | ||
035 | |a (ZDB-38-EBR)ebr10879737 | ||
035 | |a (OCoLC)876900980 | ||
035 | |a (DE-599)BVBBV043610174 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 658.4/78 | |
100 | 1 | |a Touhill, Gregory J. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Cybersecurity for Executives |b A Practical Guide |
250 | |a 1st ed | ||
264 | 1 | |a Somerset |b Wiley |c 2014 | |
264 | 4 | |c © 2014 | |
300 | |a 1 online resource (412 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Description based on publisher supplied metadata and other sources | ||
520 | |a Practical guide that can be used by executives to make well-informed decisions on cybersecurity issues to better protect their business Emphasizes, in a direct and uncomplicated way, how executives can identify, understand, assess, and mitigate risks associated with cybersecurity issues Covers 'What to Do When You Get Hacked?' including Business Continuity and Disaster Recovery planning, Public Relations, Legal and Regulatory issues, and Notifications and Disclosures Provides steps for integrating cybersecurity into Strategy; Policy and Guidelines; Change Management and Personnel Management Identifies cybersecurity best practices that executives can and should use both in the office and at home to protect their vital information | ||
650 | 4 | |a Computer networks -- Security measures | |
700 | 1 | |a Touhill, C. Joseph |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Touhill, Gregory J |t . Cybersecurity for Executives : A Practical Guide |
912 | |a ZDB-30-PQE |a ZDB-38-ESG | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-029024233 |
Datensatz im Suchindex
_version_ | 1804176355762372608 |
---|---|
any_adam_object | |
author | Touhill, Gregory J. |
author_facet | Touhill, Gregory J. |
author_role | aut |
author_sort | Touhill, Gregory J. |
author_variant | g j t gj gjt |
building | Verbundindex |
bvnumber | BV043610174 |
collection | ZDB-30-PQE ZDB-38-ESG |
ctrlnum | (ZDB-30-PQE)EBC1707094 (ZDB-89-EBL)EBL1707094 (ZDB-38-EBR)ebr10879737 (OCoLC)876900980 (DE-599)BVBBV043610174 |
dewey-full | 658.4/78 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.4/78 |
dewey-search | 658.4/78 |
dewey-sort | 3658.4 278 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
edition | 1st ed |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02046nmm a2200397zc 4500</leader><controlfield tag="001">BV043610174</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160616s2014 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118908815</subfield><subfield code="9">978-1-118-90881-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118888148</subfield><subfield code="c">Print</subfield><subfield code="9">978-1-118-88814-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PQE)EBC1707094</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-89-EBL)EBL1707094</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-38-EBR)ebr10879737</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)876900980</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043610174</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.4/78</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Touhill, Gregory J.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cybersecurity for Executives</subfield><subfield code="b">A Practical Guide</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Somerset</subfield><subfield code="b">Wiley</subfield><subfield code="c">2014</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (412 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Practical guide that can be used by executives to make well-informed decisions on cybersecurity issues to better protect their business Emphasizes, in a direct and uncomplicated way, how executives can identify, understand, assess, and mitigate risks associated with cybersecurity issues Covers 'What to Do When You Get Hacked?' including Business Continuity and Disaster Recovery planning, Public Relations, Legal and Regulatory issues, and Notifications and Disclosures Provides steps for integrating cybersecurity into Strategy; Policy and Guidelines; Change Management and Personnel Management Identifies cybersecurity best practices that executives can and should use both in the office and at home to protect their vital information</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks -- Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Touhill, C. Joseph</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Touhill, Gregory J</subfield><subfield code="t">. Cybersecurity for Executives : A Practical Guide</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield><subfield code="a">ZDB-38-ESG</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029024233</subfield></datafield></record></collection> |
id | DE-604.BV043610174 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:30:52Z |
institution | BVB |
isbn | 9781118908815 9781118888148 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029024233 |
oclc_num | 876900980 |
open_access_boolean | |
physical | 1 online resource (412 pages) |
psigel | ZDB-30-PQE ZDB-38-ESG |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Wiley |
record_format | marc |
spelling | Touhill, Gregory J. Verfasser aut Cybersecurity for Executives A Practical Guide 1st ed Somerset Wiley 2014 © 2014 1 online resource (412 pages) txt rdacontent c rdamedia cr rdacarrier Description based on publisher supplied metadata and other sources Practical guide that can be used by executives to make well-informed decisions on cybersecurity issues to better protect their business Emphasizes, in a direct and uncomplicated way, how executives can identify, understand, assess, and mitigate risks associated with cybersecurity issues Covers 'What to Do When You Get Hacked?' including Business Continuity and Disaster Recovery planning, Public Relations, Legal and Regulatory issues, and Notifications and Disclosures Provides steps for integrating cybersecurity into Strategy; Policy and Guidelines; Change Management and Personnel Management Identifies cybersecurity best practices that executives can and should use both in the office and at home to protect their vital information Computer networks -- Security measures Touhill, C. Joseph Sonstige oth Erscheint auch als Druck-Ausgabe Touhill, Gregory J . Cybersecurity for Executives : A Practical Guide |
spellingShingle | Touhill, Gregory J. Cybersecurity for Executives A Practical Guide Computer networks -- Security measures |
title | Cybersecurity for Executives A Practical Guide |
title_auth | Cybersecurity for Executives A Practical Guide |
title_exact_search | Cybersecurity for Executives A Practical Guide |
title_full | Cybersecurity for Executives A Practical Guide |
title_fullStr | Cybersecurity for Executives A Practical Guide |
title_full_unstemmed | Cybersecurity for Executives A Practical Guide |
title_short | Cybersecurity for Executives |
title_sort | cybersecurity for executives a practical guide |
title_sub | A Practical Guide |
topic | Computer networks -- Security measures |
topic_facet | Computer networks -- Security measures |
work_keys_str_mv | AT touhillgregoryj cybersecurityforexecutivesapracticalguide AT touhillcjoseph cybersecurityforexecutivesapracticalguide |