Cyber security. Simply. Make it happen: leveraging digitization through IT security
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Cham
Springer
[2017]
|
Schriftenreihe: | Management for professionals
|
Schlagworte: | |
Online-Zugang: | Inhaltstext http://www.springer.com/ Inhaltsverzeichnis |
Beschreibung: | xiii, 127 Seiten Illustrationen, Diagramme |
ISBN: | 9783319465289 3319465287 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV044029430 | ||
003 | DE-604 | ||
005 | 20181016 | ||
007 | t | ||
008 | 170206s2017 sz a||| |||| 00||| eng d | ||
016 | 7 | |a 1112075062 |2 DE-101 | |
020 | |a 9783319465289 |c Book : circa EUR 74.89 (DE) (freier Preis), circa EUR 76.99 (AT) (freier Preis), circa sfr 77.00 (freier Preis) |9 978-3-319-46528-9 | ||
020 | |a 3319465287 |9 3-319-46528-7 | ||
024 | 3 | |a 9783319465289 | |
028 | 5 | 2 | |a Bestellnummer: 978-3-319-46528-9 |
028 | 5 | 2 | |a Bestellnummer: 86881265 |
035 | |a (OCoLC)992473641 | ||
035 | |a (DE-599)DNB1112075062 | ||
040 | |a DE-604 |b ger | ||
041 | 0 | |a eng | |
044 | |a sz |c XA-CH | ||
049 | |a DE-355 |a DE-521 | ||
082 | 0 | |a 650 |2 23 | |
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
084 | |a 650 |2 sdnb | ||
245 | 1 | 0 | |a Cyber security. Simply. Make it happen |b leveraging digitization through IT security |
264 | 1 | |a Cham |b Springer |c [2017] | |
264 | 4 | |c © 2017 | |
300 | |a xiii, 127 Seiten |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Management for professionals | |
650 | 0 | 7 | |a Datenschutz |0 (DE-588)4011134-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Unternehmen |0 (DE-588)4061963-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Digitale Revolution |0 (DE-588)7854804-4 |2 gnd |9 rswk-swf |
653 | |a KJQ | ||
653 | |a IT security and digitization | ||
653 | |a IT security for corporations | ||
653 | |a IT security management | ||
653 | |a IT security outsourcing | ||
653 | |a cost of IT security | ||
653 | |a cyber securtiy sharing and analytics | ||
653 | |a cybercrime | ||
653 | |a geopolitical dimension of cybersecurity | ||
653 | |a secure cloud computing | ||
655 | 7 | |8 1\p |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a Unternehmen |0 (DE-588)4061963-1 |D s |
689 | 0 | 1 | |a Digitale Revolution |0 (DE-588)7854804-4 |D s |
689 | 0 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 3 | |a Datenschutz |0 (DE-588)4011134-9 |D s |
689 | 0 | |8 2\p |5 DE-604 | |
700 | 1 | |a Abolhassan, Ferri |d 1964- |0 (DE-588)1038724635 |4 edt | |
710 | 2 | |a Springer International Publishing |0 (DE-588)1064344704 |4 pbl | |
776 | 0 | 8 | |i Erscheint auch als |n eBook |o 10.1007/978-3-319-46529-6 |z 978-3-319-46529-6 |
856 | 4 | 2 | |m X:MVB |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=225c4898e0484e6e9b426fff8267a386&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 0 | |u http://www.springer.com/ |x Verlag |
856 | 4 | 2 | |m Digitalisierung UB Regensburg - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029436738&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-029436738 |
Datensatz im Suchindex
_version_ | 1806413228725501952 |
---|---|
adam_text |
Contents
1 Security: The Real Challenge for Digitalization. 1
Ferri Abolhassan
1.1 Introduction. 1
1.2 Status Quo: The Cloud Is the Backbone of Digitalization. 2
1.3 Data Security: Only a Secure Cloud Will Lead to Secure
Digitalization. 3
1.3.1 Risk Transformation: It Has to Be Easy to Get into the
Cloud. 4
1.3.2 Risk of an Incident: Making Sure the Cloud Doesn’t
Crash. 5
1.3.3 Risk of Technical/Physical Attack: A Castle Wall Alone
Isn’t Enough. 6
1.3.4 Risk of a Cyberattack: Ensuring Data and Devices Aren’t
Casualties. 7
1.4 Looking to the Future. 9
1.5 Conclusion. 9
References. 10
2 Security Policy: Rules for Cyberspace. 13
Wolfgang Ischinger
2.1 Taking Stock: Digital Warfare in the 21st Century. 14
2.2 Challenges for the Political Sphere: Rules, Resources and
Expertise. 15
2.3 Outlook: A Strategy for the Digital Age. 18
References. 19
3 Data Protection Empowerment. 21
Peter Schaar
3.1 Code Is Law. 22
3.2 Empowerment. 23
3.3 Information Technology and Social Values. 26
References. 26
fX
X
Contents
4 Red Teaming and Wargaming: How Can Management and
Supervisory Board Members Become More Involved in
Cybersecurity?. 27
Marco Gercke
4.1 Cybersecurity: A Management Board Issue. 27
4.2 Integrating the Management Board into Existing Cybersecurity
Strategies. 28
4.3 Red Teaming and Wargaming. 28
4.3.1 Red Teaming Defined. 29
4.3.2 Wargaming Defined. 29
4.3.3 Differences Compared with Methods Currently
in Use. 29
4.4 Use of Red Teaming in Combination with Wargaming at
Companies. 30
4.4.1 Classification. 31
4.4.2 Definition of a Target. 31
4.4.3 Composition of the Teams. 32
4.4.4 Analysis: Data Collection and Evaluation. 32
4.4.5 Wargaming. 33
4.4.6 Report. 34
4.5 Conclusion. 34
References. 34
5 The Law and Its Contribution to IT Security: Legal Framework,
Requirements, Limits. 37
Klaus Brisch
5.1 Key Features of the Existing Legal Framework. 38
5.1.1 IT Compliance: A Challenge for Management Boards
and Executives. 38
5.1.2 Who Is Responsible?. 39
5.1.3 Regulation on Determining Critical Infrastructure . . 41
5.1.4 Controversial: Changes Affecting Telemedia
Services. 42
5.2 International Issues: The European Union’s Directive on Security
of Network and Information Systems (NIS Directive). 42
5.3 Data Protection and Data Security in the United States. 43
5.4 Data Exchange Between EU and US Companies. 43
5.4.1 Safe Harbor. 44
5.4.2 Privacy Shield. 44
5.5 Conclusion: Many Legal Issues to Consider. 44
References. 45
Contents
XI
6 IT Security: Stronger Together. 47
Ralf Schneider
6.1 The Trinity of IT Security. 48
6.2 CSS A - Security Through Collaboration. 49
6.2.1 Targeted Interaction. 50
6.2.2 Network of Trust. 50
6.3 The Six Elements of an Integrated Defense Strategy. 51
6.3.1 Prevention Is Better Than the Cure. 52
6.3.2 Knowledge Is Power. 53
6.3.3 IT Security Is Not an End in Itself. 54
6.3.4 It’s Only a Matter of Time: Incident Management. 55
6.3.5 Fitness Training: Prepare for Emergencies. 56
6.3.6 Stronger Together. 56
6.4 Conclusion. 56
References. 57
7 The German Security Market: Searching for the Complete
Peace-of-Mind Service. 59
Markus a Campo, Henning Dransfeld, and Frank Heuer
7.1 Challenges for IT Security Managers. 59
7.2 Choosing the Right Protection in a Fragmented Market. 61
7.2.1 Data Leakage/Loss Prevention (DLP). 61
7.2.2 Security Information and Event Management (SIEM). 61
7.2.3 Email/Web/Collaboration Security. 61
7.2.4 Endpoint Security. 62
7.2.5 Identity and Access Management (IAM). 62
7.2.6 Mobile Security - Are Employees Really the Biggest
Risk?. 63
7.2.7 Network Security. 64
7.2.8 Conclusion. 65
7.3 Security from a Single Source: Managed Security Services . 65
7.3.1 Managed Service or Cloud Solution?. 66
7.3.2 Selection Criteria. 67
7.3.3 Assessment of Deutsche Telekom/T-Systems as a
Managed Security Services Provider. 67
7.3.4 Specialized Managed Security Services. 69
8 CSP, not 007: Integrated Cybersecurity Skills Training. 71
Rüdiger Peusquens
8.1 The New Profession of Cybersecurity Specialist:
From IT Worker to IT Security Expert. 71
8.2 Hands-on Experience in All-Round Security. 72
8.3 Cybersecurity Expertise for Managers, too. 73
8.4 Conclusion.
Reference. ^
XII
Contents
9 Human Factors in IT Security. 75
Linus Neumann
9.1 IT Security Is Just Not Very People-Centric. 75
9.1.1 The Thing with Passwords. 76
9.1.2 The “Security versus Productivity” Dilemma. 77
9.2 Social Engineering. 77
9.3 Human “Weaknesses” Are Often Social Norms or Simple
Instincts. 79
9.3.1 Would You Mind Installing This Malware on Your
Computer?. 79
9.3.2 Excuse Me, What Exactly Is Your Password?. 81
9.4 Would You Please Transfer Me a Few Million?. 82
9.5 Defensive Measures. 83
9.5.1 Recognizing Social Engineering. 84
9.5.2 The Learning Objective: Reporting Suspicious
Activity. 84
9.5.3 Practice Makes Perfect. 85
9.6 Conclusion: IT Must Work for and Not against Users. 86
Reference. 86
10 Secure and Simple: Plug-and-Play Security. 87
Dirk Backofen
10.1 Data Security in the Danger Zone. 88
10.2 Digitalization Needs New Security Concepts. 91
10.3 Digital Identity Is the New Currency. 92
10.4 Does Absolute Protection Exist?. 93
10.5 This Is What Attack Scenarios Look Like Today. 94
10.6 In Need of Improvement: Security at SMEs. 95
10.7 Expensive Does Not Necessarily Mean Secure:
Gaps in Security at Large Companies. 96
10.8 The “Made in Germany” Stamp of Quality. 96
10.9 Companies Want the Cloud - But Securely. 97
References. 98
11 Cybersecurity - What’s Next?. 101
Thomas Tschersich
11.1 The Motives of Attackers Are Becoming More Malicious with
Each Passing Generation. 101
11.2 Cybersecurity — The Sleeping Giant in the Company. 106
11.3 What Will Protect Us?. 108
11.4 Conclusion. Ill
References. Ill
12 Conclusion. 113
Ferri Abolhassan
12.1 The Internet Has Become Ubiquitous. 113
12.2 Good Internet, Bad Internet. 114
Contents
xtii
12.3 Cyberhare vs. Cybertortoise. 114
12.4 Simple and Secure Is the Motto. 116
References. 117
Appendix. 119
Glossary. 125 |
any_adam_object | 1 |
author2 | Abolhassan, Ferri 1964- |
author2_role | edt |
author2_variant | f a fa |
author_GND | (DE-588)1038724635 |
author_facet | Abolhassan, Ferri 1964- |
building | Verbundindex |
bvnumber | BV044029430 |
classification_rvk | ST 277 |
ctrlnum | (OCoLC)992473641 (DE-599)DNB1112075062 |
dewey-full | 650 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 650 - Management and auxiliary services |
dewey-raw | 650 |
dewey-search | 650 |
dewey-sort | 3650 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Informatik Wirtschaftswissenschaften |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 c 4500</leader><controlfield tag="001">BV044029430</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20181016</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">170206s2017 sz a||| |||| 00||| eng d</controlfield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1112075062</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319465289</subfield><subfield code="c">Book : circa EUR 74.89 (DE) (freier Preis), circa EUR 76.99 (AT) (freier Preis), circa sfr 77.00 (freier Preis)</subfield><subfield code="9">978-3-319-46528-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3319465287</subfield><subfield code="9">3-319-46528-7</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783319465289</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Bestellnummer: 978-3-319-46528-9</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Bestellnummer: 86881265</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)992473641</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1112075062</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">sz</subfield><subfield code="c">XA-CH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield><subfield code="a">DE-521</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">650</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">650</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber security. Simply. Make it happen</subfield><subfield code="b">leveraging digitization through IT security</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield><subfield code="c">[2017]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2017</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xiii, 127 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Management for professionals</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Unternehmen</subfield><subfield code="0">(DE-588)4061963-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Digitale Revolution</subfield><subfield code="0">(DE-588)7854804-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">KJQ</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">IT security and digitization</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">IT security for corporations</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">IT security management</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">IT security outsourcing</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">cost of IT security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">cyber securtiy sharing and analytics</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">cybercrime</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">geopolitical dimension of cybersecurity</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">secure cloud computing</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="8">1\p</subfield><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Unternehmen</subfield><subfield code="0">(DE-588)4061963-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Digitale Revolution</subfield><subfield code="0">(DE-588)7854804-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Abolhassan, Ferri</subfield><subfield code="d">1964-</subfield><subfield code="0">(DE-588)1038724635</subfield><subfield code="4">edt</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Springer International Publishing</subfield><subfield code="0">(DE-588)1064344704</subfield><subfield code="4">pbl</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">eBook</subfield><subfield code="o">10.1007/978-3-319-46529-6</subfield><subfield code="z">978-3-319-46529-6</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=225c4898e0484e6e9b426fff8267a386&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.springer.com/</subfield><subfield code="x">Verlag</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Regensburg - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029436738&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029436738</subfield></datafield></record></collection> |
genre | 1\p (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV044029430 |
illustrated | Illustrated |
indexdate | 2024-08-04T00:05:00Z |
institution | BVB |
institution_GND | (DE-588)1064344704 |
isbn | 9783319465289 3319465287 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029436738 |
oclc_num | 992473641 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR DE-521 |
owner_facet | DE-355 DE-BY-UBR DE-521 |
physical | xiii, 127 Seiten Illustrationen, Diagramme |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | Springer |
record_format | marc |
series2 | Management for professionals |
spelling | Cyber security. Simply. Make it happen leveraging digitization through IT security Cham Springer [2017] © 2017 xiii, 127 Seiten Illustrationen, Diagramme txt rdacontent n rdamedia nc rdacarrier Management for professionals Datenschutz (DE-588)4011134-9 gnd rswk-swf Unternehmen (DE-588)4061963-1 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Digitale Revolution (DE-588)7854804-4 gnd rswk-swf KJQ IT security and digitization IT security for corporations IT security management IT security outsourcing cost of IT security cyber securtiy sharing and analytics cybercrime geopolitical dimension of cybersecurity secure cloud computing 1\p (DE-588)4143413-4 Aufsatzsammlung gnd-content Unternehmen (DE-588)4061963-1 s Digitale Revolution (DE-588)7854804-4 s Computersicherheit (DE-588)4274324-2 s Datenschutz (DE-588)4011134-9 s 2\p DE-604 Abolhassan, Ferri 1964- (DE-588)1038724635 edt Springer International Publishing (DE-588)1064344704 pbl Erscheint auch als eBook 10.1007/978-3-319-46529-6 978-3-319-46529-6 X:MVB text/html http://deposit.dnb.de/cgi-bin/dokserv?id=225c4898e0484e6e9b426fff8267a386&prov=M&dok_var=1&dok_ext=htm Inhaltstext http://www.springer.com/ Verlag Digitalisierung UB Regensburg - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029436738&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Cyber security. Simply. Make it happen leveraging digitization through IT security Datenschutz (DE-588)4011134-9 gnd Unternehmen (DE-588)4061963-1 gnd Computersicherheit (DE-588)4274324-2 gnd Digitale Revolution (DE-588)7854804-4 gnd |
subject_GND | (DE-588)4011134-9 (DE-588)4061963-1 (DE-588)4274324-2 (DE-588)7854804-4 (DE-588)4143413-4 |
title | Cyber security. Simply. Make it happen leveraging digitization through IT security |
title_auth | Cyber security. Simply. Make it happen leveraging digitization through IT security |
title_exact_search | Cyber security. Simply. Make it happen leveraging digitization through IT security |
title_full | Cyber security. Simply. Make it happen leveraging digitization through IT security |
title_fullStr | Cyber security. Simply. Make it happen leveraging digitization through IT security |
title_full_unstemmed | Cyber security. Simply. Make it happen leveraging digitization through IT security |
title_short | Cyber security. Simply. Make it happen |
title_sort | cyber security simply make it happen leveraging digitization through it security |
title_sub | leveraging digitization through IT security |
topic | Datenschutz (DE-588)4011134-9 gnd Unternehmen (DE-588)4061963-1 gnd Computersicherheit (DE-588)4274324-2 gnd Digitale Revolution (DE-588)7854804-4 gnd |
topic_facet | Datenschutz Unternehmen Computersicherheit Digitale Revolution Aufsatzsammlung |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=225c4898e0484e6e9b426fff8267a386&prov=M&dok_var=1&dok_ext=htm http://www.springer.com/ http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029436738&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT abolhassanferri cybersecuritysimplymakeithappenleveragingdigitizationthroughitsecurity AT springerinternationalpublishing cybersecuritysimplymakeithappenleveragingdigitizationthroughitsecurity |