Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks
scientific, and geopolitical influence. The only effective solution will be expansive and complex, encompassing every facet of government and industry. Cyber Threat! details the situation at hand, and provides the information that can help keep the nation safe
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Somerset
Wiley
2014
|
Ausgabe: | 1st ed |
Schriftenreihe: | Wiley Corporate F&A
|
Schlagworte: | |
Online-Zugang: | Buchcover |
Zusammenfassung: | scientific, and geopolitical influence. The only effective solution will be expansive and complex, encompassing every facet of government and industry. Cyber Threat! details the situation at hand, and provides the information that can help keep the nation safe |
Beschreibung: | Description based on publisher supplied metadata and other sources |
Beschreibung: | 1 online resource (227 pages) |
ISBN: | 9781118935965 9781118836354 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043610998 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 160616s2014 |||| o||u| ||||||eng d | ||
020 | |a 9781118935965 |9 978-1-118-93596-5 | ||
020 | |a 9781118836354 |c Print |9 978-1-118-83635-4 | ||
035 | |a (ZDB-30-PQE)EBC1742833 | ||
035 | |a (ZDB-89-EBL)EBL1742833 | ||
035 | |a (ZDB-38-EBR)ebr10895757 | ||
035 | |a (OCoLC)881387451 | ||
035 | |a (DE-599)BVBBV043610998 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 658.4/78 | |
100 | 1 | |a Ulsch, MacDonnell |e Verfasser |4 aut | |
245 | 1 | 0 | |a Cyber Threat! |b How to Manage the Growing Risk of Cyber Attacks |
250 | |a 1st ed | ||
264 | 1 | |a Somerset |b Wiley |c 2014 | |
264 | 4 | |c © 2014 | |
300 | |a 1 online resource (227 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Wiley Corporate F&A | |
500 | |a Description based on publisher supplied metadata and other sources | ||
520 | |a scientific, and geopolitical influence. The only effective solution will be expansive and complex, encompassing every facet of government and industry. Cyber Threat! details the situation at hand, and provides the information that can help keep the nation safe | ||
650 | 4 | |a Unternehmen | |
650 | 4 | |a Business enterprises -- Computer networks -- Security measures | |
650 | 4 | |a Computer crimes -- Prevention | |
650 | 4 | |a Computer networks -- Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Corporations -- Security measures | |
700 | 1 | |a Ulsch, N MacDonnell |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Ulsch, MacDonnell |t Cyber Threat! : How to Manage the Growing Risk of Cyber Attacks |
856 | 4 | 2 | |m SWB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029025057&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Buchcover |
912 | |a ZDB-30-PQE |a ZDB-30-PBE | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-029025057 |
Datensatz im Suchindex
_version_ | 1804176356100014080 |
---|---|
any_adam_object | 1 |
author | Ulsch, MacDonnell |
author_facet | Ulsch, MacDonnell |
author_role | aut |
author_sort | Ulsch, MacDonnell |
author_variant | m u mu |
building | Verbundindex |
bvnumber | BV043610998 |
collection | ZDB-30-PQE ZDB-30-PBE |
ctrlnum | (ZDB-30-PQE)EBC1742833 (ZDB-89-EBL)EBL1742833 (ZDB-38-EBR)ebr10895757 (OCoLC)881387451 (DE-599)BVBBV043610998 |
dewey-full | 658.4/78 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.4/78 |
dewey-search | 658.4/78 |
dewey-sort | 3658.4 278 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
edition | 1st ed |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02103nmm a2200481zc 4500</leader><controlfield tag="001">BV043610998</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160616s2014 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118935965</subfield><subfield code="9">978-1-118-93596-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118836354</subfield><subfield code="c">Print</subfield><subfield code="9">978-1-118-83635-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PQE)EBC1742833</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-89-EBL)EBL1742833</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-38-EBR)ebr10895757</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)881387451</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043610998</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.4/78</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Ulsch, MacDonnell</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber Threat!</subfield><subfield code="b">How to Manage the Growing Risk of Cyber Attacks</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Somerset</subfield><subfield code="b">Wiley</subfield><subfield code="c">2014</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (227 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Wiley Corporate F&A</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">scientific, and geopolitical influence. The only effective solution will be expansive and complex, encompassing every facet of government and industry. Cyber Threat! details the situation at hand, and provides the information that can help keep the nation safe</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Unternehmen</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business enterprises -- Computer networks -- Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes -- Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks -- Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Corporations -- Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ulsch, N MacDonnell</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Ulsch, MacDonnell</subfield><subfield code="t">Cyber Threat! : How to Manage the Growing Risk of Cyber Attacks</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">SWB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029025057&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Buchcover</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield><subfield code="a">ZDB-30-PBE</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029025057</subfield></datafield></record></collection> |
id | DE-604.BV043610998 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:30:53Z |
institution | BVB |
isbn | 9781118935965 9781118836354 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029025057 |
oclc_num | 881387451 |
open_access_boolean | |
physical | 1 online resource (227 pages) |
psigel | ZDB-30-PQE ZDB-30-PBE |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Wiley |
record_format | marc |
series2 | Wiley Corporate F&A |
spelling | Ulsch, MacDonnell Verfasser aut Cyber Threat! How to Manage the Growing Risk of Cyber Attacks 1st ed Somerset Wiley 2014 © 2014 1 online resource (227 pages) txt rdacontent c rdamedia cr rdacarrier Wiley Corporate F&A Description based on publisher supplied metadata and other sources scientific, and geopolitical influence. The only effective solution will be expansive and complex, encompassing every facet of government and industry. Cyber Threat! details the situation at hand, and provides the information that can help keep the nation safe Unternehmen Business enterprises -- Computer networks -- Security measures Computer crimes -- Prevention Computer networks -- Security measures Computer security Corporations -- Security measures Ulsch, N MacDonnell Sonstige oth Erscheint auch als Druck-Ausgabe Ulsch, MacDonnell Cyber Threat! : How to Manage the Growing Risk of Cyber Attacks SWB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029025057&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Buchcover |
spellingShingle | Ulsch, MacDonnell Cyber Threat! How to Manage the Growing Risk of Cyber Attacks Unternehmen Business enterprises -- Computer networks -- Security measures Computer crimes -- Prevention Computer networks -- Security measures Computer security Corporations -- Security measures |
title | Cyber Threat! How to Manage the Growing Risk of Cyber Attacks |
title_auth | Cyber Threat! How to Manage the Growing Risk of Cyber Attacks |
title_exact_search | Cyber Threat! How to Manage the Growing Risk of Cyber Attacks |
title_full | Cyber Threat! How to Manage the Growing Risk of Cyber Attacks |
title_fullStr | Cyber Threat! How to Manage the Growing Risk of Cyber Attacks |
title_full_unstemmed | Cyber Threat! How to Manage the Growing Risk of Cyber Attacks |
title_short | Cyber Threat! |
title_sort | cyber threat how to manage the growing risk of cyber attacks |
title_sub | How to Manage the Growing Risk of Cyber Attacks |
topic | Unternehmen Business enterprises -- Computer networks -- Security measures Computer crimes -- Prevention Computer networks -- Security measures Computer security Corporations -- Security measures |
topic_facet | Unternehmen Business enterprises -- Computer networks -- Security measures Computer crimes -- Prevention Computer networks -- Security measures Computer security Corporations -- Security measures |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029025057&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT ulschmacdonnell cyberthreathowtomanagethegrowingriskofcyberattacks AT ulschnmacdonnell cyberthreathowtomanagethegrowingriskofcyberattacks |