Cybersecurity in Canada: a guide to best practices, planning and management
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Toronto, Ontario
LexisNexis
august 2017
|
Schlagworte: | |
Beschreibung: | Index |
Beschreibung: | xxvi, 145 Seiten Diagramme 23 cm |
ISBN: | 0433490551 9780433490555 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV045244899 | ||
003 | DE-604 | ||
005 | 20190612 | ||
007 | t | ||
008 | 181022s2017 |||| b||| 00||| eng d | ||
020 | |a 0433490551 |9 0-433-49055-1 | ||
020 | |a 9780433490555 |9 978-0-433-49055-5 | ||
035 | |a (DE-599)BVBBV045244899 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-M382 | ||
245 | 1 | 0 | |a Cybersecurity in Canada |b a guide to best practices, planning and management |c [edited by] Imran Ahmad |
264 | 1 | |a Toronto, Ontario |b LexisNexis |c august 2017 | |
300 | |a xxvi, 145 Seiten |b Diagramme |c 23 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Index | ||
505 | 8 | 0 | |t Overview of the Canadian cybersecurity landscape |r Imran Ahmad and Sumeya Mulla |t Best practices to implement prior to a breach |r Imran Ahmad and Sarah Nasrullah |t Cloud computing |r Imran Ahmad and Roya Baryole |t Cybersecurity, procurement and the supply chain |r Rosa Mauro and Lampros Stougiannos |t Supply chain cybersecurity |r Imran Ahmad and Sarah Nasrullah |t Oversight obligations of the board of directors and management |r Imran Ahmad and Roisin Hutchison |t Incident management |r Imran Ahmad and Sarah Nasrullah |t Reporting and notification requirements under privacy laws |r Fazila Nurani |t Dealing with law enforcement |r Kenrick Bagnall |t Litigation exposure |r Imran Ahmad and Sarah Nasrullah |t Cyber and privacy insurance |r Greg Markell |t Credit monitoring |r Equifax |t Communications best practices for cyber incidents |r Angela Carmichael and Scott Radcliffe |
653 | 0 | |a Criminalité informatique / Droit / Canada | |
653 | 0 | |a Criminalité informatique / Canada / Prévention | |
653 | 0 | |a Sécurité informatique / Droit / Canada | |
653 | 0 | |a Protection de l'information (Informatique) / Droit / Canada | |
653 | 0 | |a Computer crimes / Law and legislation / Canada | |
653 | 0 | |a Computer crimes / Canada / Prevention | |
653 | 0 | |a Computer security / Law and legislation / Canada | |
653 | 0 | |a Data protection / Law and legislation / Canada | |
653 | 0 | |a Computer crimes / Law and legislation | |
653 | 0 | |a Computer crimes / Prevention | |
653 | 0 | |a Computer security / Law and legislation | |
653 | 0 | |a Data protection / Law and legislation | |
653 | 2 | |a Canada | |
655 | 7 | |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
700 | 1 | |a Ahmad, Imran |d 1977- |0 (DE-588)118833834X |4 edt | |
999 | |a oai:aleph.bib-bvb.de:BVB01-030633015 |
Datensatz im Suchindex
_version_ | 1804178983924793344 |
---|---|
any_adam_object | |
author2 | Ahmad, Imran 1977- |
author2_role | edt |
author2_variant | i a ia |
author_GND | (DE-588)118833834X |
author_additional | Imran Ahmad and Sumeya Mulla Imran Ahmad and Sarah Nasrullah Imran Ahmad and Roya Baryole Rosa Mauro and Lampros Stougiannos Imran Ahmad and Roisin Hutchison Fazila Nurani Kenrick Bagnall Greg Markell Equifax Angela Carmichael and Scott Radcliffe |
author_facet | Ahmad, Imran 1977- |
building | Verbundindex |
bvnumber | BV045244899 |
contents | Overview of the Canadian cybersecurity landscape Best practices to implement prior to a breach Cloud computing Cybersecurity, procurement and the supply chain Supply chain cybersecurity Oversight obligations of the board of directors and management Incident management Reporting and notification requirements under privacy laws Dealing with law enforcement Litigation exposure Cyber and privacy insurance Credit monitoring Communications best practices for cyber incidents |
ctrlnum | (DE-599)BVBBV045244899 |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02480nam a2200445 c 4500</leader><controlfield tag="001">BV045244899</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20190612 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">181022s2017 |||| b||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0433490551</subfield><subfield code="9">0-433-49055-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780433490555</subfield><subfield code="9">978-0-433-49055-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045244899</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-M382</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cybersecurity in Canada</subfield><subfield code="b">a guide to best practices, planning and management</subfield><subfield code="c">[edited by] Imran Ahmad</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Toronto, Ontario</subfield><subfield code="b">LexisNexis</subfield><subfield code="c">august 2017</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xxvi, 145 Seiten</subfield><subfield code="b">Diagramme</subfield><subfield code="c">23 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Index</subfield></datafield><datafield tag="505" ind1="8" ind2="0"><subfield code="t">Overview of the Canadian cybersecurity landscape</subfield><subfield code="r">Imran Ahmad and Sumeya Mulla</subfield><subfield code="t">Best practices to implement prior to a breach</subfield><subfield code="r">Imran Ahmad and Sarah Nasrullah</subfield><subfield code="t">Cloud computing</subfield><subfield code="r">Imran Ahmad and Roya Baryole</subfield><subfield code="t">Cybersecurity, procurement and the supply chain</subfield><subfield code="r">Rosa Mauro and Lampros Stougiannos</subfield><subfield code="t">Supply chain cybersecurity</subfield><subfield code="r">Imran Ahmad and Sarah Nasrullah</subfield><subfield code="t">Oversight obligations of the board of directors and management</subfield><subfield code="r">Imran Ahmad and Roisin Hutchison</subfield><subfield code="t">Incident management</subfield><subfield code="r">Imran Ahmad and Sarah Nasrullah</subfield><subfield code="t">Reporting and notification requirements under privacy laws</subfield><subfield code="r">Fazila Nurani</subfield><subfield code="t">Dealing with law enforcement</subfield><subfield code="r">Kenrick Bagnall</subfield><subfield code="t">Litigation exposure</subfield><subfield code="r">Imran Ahmad and Sarah Nasrullah</subfield><subfield code="t">Cyber and privacy insurance</subfield><subfield code="r">Greg Markell</subfield><subfield code="t">Credit monitoring</subfield><subfield code="r">Equifax</subfield><subfield code="t">Communications best practices for cyber incidents</subfield><subfield code="r">Angela Carmichael and Scott Radcliffe</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Criminalité informatique / Droit / Canada</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Criminalité informatique / Canada / Prévention</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Sécurité informatique / Droit / Canada</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Protection de l'information (Informatique) / Droit / Canada</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer crimes / Law and legislation / Canada</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer crimes / Canada / Prevention</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer security / Law and legislation / Canada</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Data protection / Law and legislation / Canada</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer crimes / Law and legislation</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer crimes / Prevention</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer security / Law and legislation</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Data protection / Law and legislation</subfield></datafield><datafield tag="653" ind1=" " ind2="2"><subfield code="a">Canada</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ahmad, Imran</subfield><subfield code="d">1977-</subfield><subfield code="0">(DE-588)118833834X</subfield><subfield code="4">edt</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030633015</subfield></datafield></record></collection> |
genre | (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV045244899 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:12:39Z |
institution | BVB |
isbn | 0433490551 9780433490555 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030633015 |
open_access_boolean | |
owner | DE-M382 |
owner_facet | DE-M382 |
physical | xxvi, 145 Seiten Diagramme 23 cm |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | LexisNexis |
record_format | marc |
spelling | Cybersecurity in Canada a guide to best practices, planning and management [edited by] Imran Ahmad Toronto, Ontario LexisNexis august 2017 xxvi, 145 Seiten Diagramme 23 cm txt rdacontent n rdamedia nc rdacarrier Index Overview of the Canadian cybersecurity landscape Imran Ahmad and Sumeya Mulla Best practices to implement prior to a breach Imran Ahmad and Sarah Nasrullah Cloud computing Imran Ahmad and Roya Baryole Cybersecurity, procurement and the supply chain Rosa Mauro and Lampros Stougiannos Supply chain cybersecurity Imran Ahmad and Sarah Nasrullah Oversight obligations of the board of directors and management Imran Ahmad and Roisin Hutchison Incident management Imran Ahmad and Sarah Nasrullah Reporting and notification requirements under privacy laws Fazila Nurani Dealing with law enforcement Kenrick Bagnall Litigation exposure Imran Ahmad and Sarah Nasrullah Cyber and privacy insurance Greg Markell Credit monitoring Equifax Communications best practices for cyber incidents Angela Carmichael and Scott Radcliffe Criminalité informatique / Droit / Canada Criminalité informatique / Canada / Prévention Sécurité informatique / Droit / Canada Protection de l'information (Informatique) / Droit / Canada Computer crimes / Law and legislation / Canada Computer crimes / Canada / Prevention Computer security / Law and legislation / Canada Data protection / Law and legislation / Canada Computer crimes / Law and legislation Computer crimes / Prevention Computer security / Law and legislation Data protection / Law and legislation Canada (DE-588)4143413-4 Aufsatzsammlung gnd-content Ahmad, Imran 1977- (DE-588)118833834X edt |
spellingShingle | Cybersecurity in Canada a guide to best practices, planning and management Overview of the Canadian cybersecurity landscape Best practices to implement prior to a breach Cloud computing Cybersecurity, procurement and the supply chain Supply chain cybersecurity Oversight obligations of the board of directors and management Incident management Reporting and notification requirements under privacy laws Dealing with law enforcement Litigation exposure Cyber and privacy insurance Credit monitoring Communications best practices for cyber incidents |
subject_GND | (DE-588)4143413-4 |
title | Cybersecurity in Canada a guide to best practices, planning and management |
title_alt | Overview of the Canadian cybersecurity landscape Best practices to implement prior to a breach Cloud computing Cybersecurity, procurement and the supply chain Supply chain cybersecurity Oversight obligations of the board of directors and management Incident management Reporting and notification requirements under privacy laws Dealing with law enforcement Litigation exposure Cyber and privacy insurance Credit monitoring Communications best practices for cyber incidents |
title_auth | Cybersecurity in Canada a guide to best practices, planning and management |
title_exact_search | Cybersecurity in Canada a guide to best practices, planning and management |
title_full | Cybersecurity in Canada a guide to best practices, planning and management [edited by] Imran Ahmad |
title_fullStr | Cybersecurity in Canada a guide to best practices, planning and management [edited by] Imran Ahmad |
title_full_unstemmed | Cybersecurity in Canada a guide to best practices, planning and management [edited by] Imran Ahmad |
title_short | Cybersecurity in Canada |
title_sort | cybersecurity in canada a guide to best practices planning and management |
title_sub | a guide to best practices, planning and management |
topic_facet | Aufsatzsammlung |
work_keys_str_mv | AT ahmadimran cybersecurityincanadaaguidetobestpracticesplanningandmanagement |