The true cost of information security breaches and cyber crime:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Ely, Cambridgeshire, U.K.
IT Governance Pub.
2013
|
Schlagworte: | |
Beschreibung: | Print version record |
Beschreibung: | 1 online resource |
ISBN: | 9781849284967 1849284962 1299823017 9781299823013 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV045350270 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 181210s2013 |||| o||u| ||||||eng d | ||
020 | |a 9781849284967 |9 978-1-84928-496-7 | ||
020 | |a 1849284962 |9 1-84928-496-2 | ||
020 | |a 1299823017 |9 1-299-82301-7 | ||
020 | |a 9781299823013 |9 978-1-299-82301-3 | ||
035 | |a (ZDB-4-ITC)ocn858926221 | ||
035 | |a (OCoLC)858926221 | ||
035 | |a (DE-599)BVBBV045350270 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Krausz, Michael |e Verfasser |4 aut | |
245 | 1 | 0 | |a The true cost of information security breaches and cyber crime |c Michael Krausz, John Walker |
264 | 1 | |a Ely, Cambridgeshire, U.K. |b IT Governance Pub. |c 2013 | |
300 | |a 1 online resource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Print version record | ||
505 | 8 | |a This pocket guide uses case studies to illustrate the possible breach scenarios that an organisation can face. It sets out a sensible, realistic assessment of the actual costs of a data or information breach and explains how managers can determine the business damage caused | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Business enterprises / Information technology / Security measures |2 local | |
650 | 7 | |a Business enterprises / Computer networks / Security measures |2 local | |
650 | 7 | |a Information technology / Security measures |2 local | |
650 | 7 | |a Computer security / Management |2 local | |
650 | 7 | |a Computer networks / Security measures |2 local | |
650 | 7 | |a Data protection |2 local | |
650 | 7 | |a Computer crimes |2 local | |
650 | 7 | |a Business enterprises / Computer networks / Security measures |2 fast | |
650 | 7 | |a Computer security / Management |2 fast | |
650 | 4 | |a Business enterprises |x Computer networks |x Security measures |a Computer security |x Management |a Data protection |x Economic aspects |v Case studies |a Computer crimes |x Economic aspects |v Case studies | |
655 | 7 | |8 1\p |0 (DE-588)4522595-3 |a Fallstudiensammlung |2 gnd-content | |
700 | 1 | |a Walker, John |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Krausz, Michael |t True cost of information security breaches |d Ely, Cambridgeshire, U.K. : IT Governance Publishing, 2013 |z 1849284954 |
912 | |a ZDB-4-ITC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-030736923 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804179174788694016 |
---|---|
any_adam_object | |
author | Krausz, Michael |
author_facet | Krausz, Michael |
author_role | aut |
author_sort | Krausz, Michael |
author_variant | m k mk |
building | Verbundindex |
bvnumber | BV045350270 |
collection | ZDB-4-ITC |
contents | This pocket guide uses case studies to illustrate the possible breach scenarios that an organisation can face. It sets out a sensible, realistic assessment of the actual costs of a data or information breach and explains how managers can determine the business damage caused |
ctrlnum | (ZDB-4-ITC)ocn858926221 (OCoLC)858926221 (DE-599)BVBBV045350270 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02525nmm a2200517zc 4500</leader><controlfield tag="001">BV045350270</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">181210s2013 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849284967</subfield><subfield code="9">978-1-84928-496-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849284962</subfield><subfield code="9">1-84928-496-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1299823017</subfield><subfield code="9">1-299-82301-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781299823013</subfield><subfield code="9">978-1-299-82301-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-ITC)ocn858926221</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)858926221</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045350270</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Krausz, Michael</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">The true cost of information security breaches and cyber crime</subfield><subfield code="c">Michael Krausz, John Walker</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Ely, Cambridgeshire, U.K.</subfield><subfield code="b">IT Governance Pub.</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Print version record</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">This pocket guide uses case studies to illustrate the possible breach scenarios that an organisation can face. It sets out a sensible, realistic assessment of the actual costs of a data or information breach and explains how managers can determine the business damage caused</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Business enterprises / Information technology / Security measures</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Business enterprises / Computer networks / Security measures</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information technology / Security measures</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security / Management</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data protection</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Business enterprises / Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security / Management</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business enterprises</subfield><subfield code="x">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="a">Computer security</subfield><subfield code="x">Management</subfield><subfield code="a">Data protection</subfield><subfield code="x">Economic aspects</subfield><subfield code="v">Case studies</subfield><subfield code="a">Computer crimes</subfield><subfield code="x">Economic aspects</subfield><subfield code="v">Case studies</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="8">1\p</subfield><subfield code="0">(DE-588)4522595-3</subfield><subfield code="a">Fallstudiensammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Walker, John</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Krausz, Michael</subfield><subfield code="t">True cost of information security breaches</subfield><subfield code="d">Ely, Cambridgeshire, U.K. : IT Governance Publishing, 2013</subfield><subfield code="z">1849284954</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-ITC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030736923</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
genre | 1\p (DE-588)4522595-3 Fallstudiensammlung gnd-content |
genre_facet | Fallstudiensammlung |
id | DE-604.BV045350270 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:15:41Z |
institution | BVB |
isbn | 9781849284967 1849284962 1299823017 9781299823013 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030736923 |
oclc_num | 858926221 |
open_access_boolean | |
physical | 1 online resource |
psigel | ZDB-4-ITC |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | IT Governance Pub. |
record_format | marc |
spelling | Krausz, Michael Verfasser aut The true cost of information security breaches and cyber crime Michael Krausz, John Walker Ely, Cambridgeshire, U.K. IT Governance Pub. 2013 1 online resource txt rdacontent c rdamedia cr rdacarrier Print version record This pocket guide uses case studies to illustrate the possible breach scenarios that an organisation can face. It sets out a sensible, realistic assessment of the actual costs of a data or information breach and explains how managers can determine the business damage caused COMPUTERS / Security / General bisacsh Business enterprises / Information technology / Security measures local Business enterprises / Computer networks / Security measures local Information technology / Security measures local Computer security / Management local Computer networks / Security measures local Data protection local Computer crimes local Business enterprises / Computer networks / Security measures fast Computer security / Management fast Business enterprises Computer networks Security measures Computer security Management Data protection Economic aspects Case studies Computer crimes Economic aspects Case studies 1\p (DE-588)4522595-3 Fallstudiensammlung gnd-content Walker, John Sonstige oth Erscheint auch als Druck-Ausgabe Krausz, Michael True cost of information security breaches Ely, Cambridgeshire, U.K. : IT Governance Publishing, 2013 1849284954 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Krausz, Michael The true cost of information security breaches and cyber crime This pocket guide uses case studies to illustrate the possible breach scenarios that an organisation can face. It sets out a sensible, realistic assessment of the actual costs of a data or information breach and explains how managers can determine the business damage caused COMPUTERS / Security / General bisacsh Business enterprises / Information technology / Security measures local Business enterprises / Computer networks / Security measures local Information technology / Security measures local Computer security / Management local Computer networks / Security measures local Data protection local Computer crimes local Business enterprises / Computer networks / Security measures fast Computer security / Management fast Business enterprises Computer networks Security measures Computer security Management Data protection Economic aspects Case studies Computer crimes Economic aspects Case studies |
subject_GND | (DE-588)4522595-3 |
title | The true cost of information security breaches and cyber crime |
title_auth | The true cost of information security breaches and cyber crime |
title_exact_search | The true cost of information security breaches and cyber crime |
title_full | The true cost of information security breaches and cyber crime Michael Krausz, John Walker |
title_fullStr | The true cost of information security breaches and cyber crime Michael Krausz, John Walker |
title_full_unstemmed | The true cost of information security breaches and cyber crime Michael Krausz, John Walker |
title_short | The true cost of information security breaches and cyber crime |
title_sort | the true cost of information security breaches and cyber crime |
topic | COMPUTERS / Security / General bisacsh Business enterprises / Information technology / Security measures local Business enterprises / Computer networks / Security measures local Information technology / Security measures local Computer security / Management local Computer networks / Security measures local Data protection local Computer crimes local Business enterprises / Computer networks / Security measures fast Computer security / Management fast Business enterprises Computer networks Security measures Computer security Management Data protection Economic aspects Case studies Computer crimes Economic aspects Case studies |
topic_facet | COMPUTERS / Security / General Business enterprises / Information technology / Security measures Business enterprises / Computer networks / Security measures Information technology / Security measures Computer security / Management Computer networks / Security measures Data protection Computer crimes Business enterprises Computer networks Security measures Computer security Management Data protection Economic aspects Case studies Computer crimes Economic aspects Case studies Fallstudiensammlung |
work_keys_str_mv | AT krauszmichael thetruecostofinformationsecuritybreachesandcybercrime AT walkerjohn thetruecostofinformationsecuritybreachesandcybercrime |