Lessons Learned: How to protect critical information infrastructure
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Ely
IT Governance Publishing
2018
|
Schlagworte: | |
Online-Zugang: | FLA01 |
Beschreibung: | Print version record |
Beschreibung: | 1 online resource (92 pages) |
ISBN: | 9781849289580 1849289581 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV046102005 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 190813s2018 |||| o||u| ||||||eng d | ||
020 | |a 9781849289580 |9 978-1-84928-958-0 | ||
020 | |a 1849289581 |9 1-84928-958-1 | ||
035 | |a (ZDB-4-EBU)on1021809406 | ||
035 | |a (OCoLC)1021809406 | ||
035 | |a (DE-599)BVBBV046102005 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 658.4/78 |2 23 | |
100 | 1 | |a Viira, Toomas |e Verfasser |4 aut | |
245 | 1 | 0 | |a Lessons Learned |b How to protect critical information infrastructure |
264 | 1 | |a Ely |b IT Governance Publishing |c 2018 | |
300 | |a 1 online resource (92 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Print version record | ||
505 | 8 | |a ""I loved the quotes at the beginning of each chapter - very interesting and thought-provoking. I also enjoyed the author's style and his technical expertise shone through.""Christopher Wright, Wright CandA Consulting LtdProtecting critical information infrastructure (CII) is not an easy process. Risks need to be minimised and systems adequately protected. It is an endless balancing act, where one side is constantly on the defensive and the other on the offensive. Lessons Learned: Critical Information Infrastructure Protection aims to help you be as successful as possible in protecting your CI. | |
650 | 7 | |a BUSINESS & ECONOMICS / Industrial Management |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS / Management |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS / Management Science |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS / Organizational Behavior |2 bisacsh | |
650 | 7 | |a Data protection |2 fast | |
650 | 7 | |a Information resources management |2 fast | |
650 | 7 | |a Information superhighway |2 fast | |
650 | 4 | |a Data protection |a Information resources management |a Information superhighway | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Viira, Toomas |t Lessons Learned: Critical Information Infrastructure Protection |d Ely : IT Governance Publishing, ©2018 |z 9781849289573 |
912 | |a ZDB-4-EBU | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-031482783 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1696465 |l FLA01 |p ZDB-4-EBU |q FLA_PDA_EBU |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804180410000736256 |
---|---|
any_adam_object | |
author | Viira, Toomas |
author_facet | Viira, Toomas |
author_role | aut |
author_sort | Viira, Toomas |
author_variant | t v tv |
building | Verbundindex |
bvnumber | BV046102005 |
collection | ZDB-4-EBU |
contents | ""I loved the quotes at the beginning of each chapter - very interesting and thought-provoking. I also enjoyed the author's style and his technical expertise shone through.""Christopher Wright, Wright CandA Consulting LtdProtecting critical information infrastructure (CII) is not an easy process. Risks need to be minimised and systems adequately protected. It is an endless balancing act, where one side is constantly on the defensive and the other on the offensive. Lessons Learned: Critical Information Infrastructure Protection aims to help you be as successful as possible in protecting your CI. |
ctrlnum | (ZDB-4-EBU)on1021809406 (OCoLC)1021809406 (DE-599)BVBBV046102005 |
dewey-full | 658.4/78 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.4/78 |
dewey-search | 658.4/78 |
dewey-sort | 3658.4 278 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02352nmm a2200433zc 4500</leader><controlfield tag="001">BV046102005</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190813s2018 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849289580</subfield><subfield code="9">978-1-84928-958-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849289581</subfield><subfield code="9">1-84928-958-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-EBU)on1021809406</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1021809406</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046102005</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.4/78</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Viira, Toomas</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Lessons Learned</subfield><subfield code="b">How to protect critical information infrastructure</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Ely</subfield><subfield code="b">IT Governance Publishing</subfield><subfield code="c">2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (92 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Print version record</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">""I loved the quotes at the beginning of each chapter - very interesting and thought-provoking. I also enjoyed the author's style and his technical expertise shone through.""Christopher Wright, Wright CandA Consulting LtdProtecting critical information infrastructure (CII) is not an easy process. Risks need to be minimised and systems adequately protected. It is an endless balancing act, where one side is constantly on the defensive and the other on the offensive. Lessons Learned: Critical Information Infrastructure Protection aims to help you be as successful as possible in protecting your CI.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Industrial Management</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Management</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Management Science</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Organizational Behavior</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data protection</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information resources management</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information superhighway</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield><subfield code="a">Information resources management</subfield><subfield code="a">Information superhighway</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Viira, Toomas</subfield><subfield code="t">Lessons Learned: Critical Information Infrastructure Protection</subfield><subfield code="d">Ely : IT Governance Publishing, ©2018</subfield><subfield code="z">9781849289573</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBU</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031482783</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1696465</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-4-EBU</subfield><subfield code="q">FLA_PDA_EBU</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046102005 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:35:19Z |
institution | BVB |
isbn | 9781849289580 1849289581 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031482783 |
oclc_num | 1021809406 |
open_access_boolean | |
physical | 1 online resource (92 pages) |
psigel | ZDB-4-EBU ZDB-4-EBU FLA_PDA_EBU |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | IT Governance Publishing |
record_format | marc |
spelling | Viira, Toomas Verfasser aut Lessons Learned How to protect critical information infrastructure Ely IT Governance Publishing 2018 1 online resource (92 pages) txt rdacontent c rdamedia cr rdacarrier Print version record ""I loved the quotes at the beginning of each chapter - very interesting and thought-provoking. I also enjoyed the author's style and his technical expertise shone through.""Christopher Wright, Wright CandA Consulting LtdProtecting critical information infrastructure (CII) is not an easy process. Risks need to be minimised and systems adequately protected. It is an endless balancing act, where one side is constantly on the defensive and the other on the offensive. Lessons Learned: Critical Information Infrastructure Protection aims to help you be as successful as possible in protecting your CI. BUSINESS & ECONOMICS / Industrial Management bisacsh BUSINESS & ECONOMICS / Management bisacsh BUSINESS & ECONOMICS / Management Science bisacsh BUSINESS & ECONOMICS / Organizational Behavior bisacsh Data protection fast Information resources management fast Information superhighway fast Data protection Information resources management Information superhighway Erscheint auch als Druck-Ausgabe Viira, Toomas Lessons Learned: Critical Information Infrastructure Protection Ely : IT Governance Publishing, ©2018 9781849289573 |
spellingShingle | Viira, Toomas Lessons Learned How to protect critical information infrastructure ""I loved the quotes at the beginning of each chapter - very interesting and thought-provoking. I also enjoyed the author's style and his technical expertise shone through.""Christopher Wright, Wright CandA Consulting LtdProtecting critical information infrastructure (CII) is not an easy process. Risks need to be minimised and systems adequately protected. It is an endless balancing act, where one side is constantly on the defensive and the other on the offensive. Lessons Learned: Critical Information Infrastructure Protection aims to help you be as successful as possible in protecting your CI. BUSINESS & ECONOMICS / Industrial Management bisacsh BUSINESS & ECONOMICS / Management bisacsh BUSINESS & ECONOMICS / Management Science bisacsh BUSINESS & ECONOMICS / Organizational Behavior bisacsh Data protection fast Information resources management fast Information superhighway fast Data protection Information resources management Information superhighway |
title | Lessons Learned How to protect critical information infrastructure |
title_auth | Lessons Learned How to protect critical information infrastructure |
title_exact_search | Lessons Learned How to protect critical information infrastructure |
title_full | Lessons Learned How to protect critical information infrastructure |
title_fullStr | Lessons Learned How to protect critical information infrastructure |
title_full_unstemmed | Lessons Learned How to protect critical information infrastructure |
title_short | Lessons Learned |
title_sort | lessons learned how to protect critical information infrastructure |
title_sub | How to protect critical information infrastructure |
topic | BUSINESS & ECONOMICS / Industrial Management bisacsh BUSINESS & ECONOMICS / Management bisacsh BUSINESS & ECONOMICS / Management Science bisacsh BUSINESS & ECONOMICS / Organizational Behavior bisacsh Data protection fast Information resources management fast Information superhighway fast Data protection Information resources management Information superhighway |
topic_facet | BUSINESS & ECONOMICS / Industrial Management BUSINESS & ECONOMICS / Management BUSINESS & ECONOMICS / Management Science BUSINESS & ECONOMICS / Organizational Behavior Data protection Information resources management Information superhighway Data protection Information resources management Information superhighway |
work_keys_str_mv | AT viiratoomas lessonslearnedhowtoprotectcriticalinformationinfrastructure |