Cross-industry applications of cyber security frameworks:
"This book posits that rather than cybersecurity being simply an issue of securing systems and networks, corporate leaders need to think in terms of assuring the integrity and durability of the interconnected business and social structures that sit on top of an increasingly complex technology l...
Gespeichert in:
Weitere Verfasser: | , , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pennsylvania
IGI Global
2022
|
Schlagworte: | |
Online-Zugang: | DE-83 DE-91 DE-706 DE-898 DE-1050 Volltext |
Zusammenfassung: | "This book posits that rather than cybersecurity being simply an issue of securing systems and networks, corporate leaders need to think in terms of assuring the integrity and durability of the interconnected business and social structures that sit on top of an increasingly complex technology landscape. |
Beschreibung: | Includes bibliographical references and index. - Mode of access: World Wide Web |
Beschreibung: | 1 Online-Ressource (244 Seiten) |
ISBN: | 9781668434505 |
DOI: | 10.4018/978-1-6684-3448-2 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV048447328 | ||
003 | DE-604 | ||
005 | 20230208 | ||
007 | cr|uuu---uuuuu | ||
008 | 220830s2022 xx o|||| 00||| eng d | ||
020 | |a 9781668434505 |9 978-1-66843-450-5 | ||
024 | 7 | |a 10.4018/978-1-6684-3448-2 |2 doi | |
035 | |a (ZDB-98-IGB)00284479 | ||
035 | |a (OCoLC)1344238348 | ||
035 | |a (DE-599)BVBBV048447328 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-83 |a DE-706 |a DE-898 |a DE-1050 | ||
082 | 0 | |a 005.8 | |
084 | |a WIR 523 |2 stub | ||
084 | |a DAT 000 |2 stub | ||
245 | 1 | 0 | |a Cross-industry applications of cyber security frameworks |c Sukanta Kumar Baral, Richa Goel, Md Mashiur Rahman, Jahangir Sultan, and Sarkar Jahan, editors |
264 | 1 | |a Hershey, Pennsylvania |b IGI Global |c 2022 | |
300 | |a 1 Online-Ressource (244 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index. - Mode of access: World Wide Web | ||
520 | |a "This book posits that rather than cybersecurity being simply an issue of securing systems and networks, corporate leaders need to think in terms of assuring the integrity and durability of the interconnected business and social structures that sit on top of an increasingly complex technology landscape. | ||
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Industries |x Data processing |x Security measures | |
700 | 1 | |a Jahan, Sarkar |4 edt | |
700 | 1 | |a Sultan, Jahangir |4 edt | |
700 | 1 | |a Rahman, Md Mashiur |4 edt | |
700 | 1 | |a Goel, Richa |4 edt | |
700 | 1 | |a Baral, Sukanta Kumar |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781668434482 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1668434490 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781668434499 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1668434482 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1668434482 |
856 | 4 | 0 | |u https://doi.org/10.4018/978-1-6684-3448-2 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-98-IGB | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-033825543 | |
966 | e | |u https://doi.org/10.4018/978-1-6684-3448-2 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-6684-3448-2 |l DE-91 |p ZDB-98-IGB |q TUM_Paketkauf_2022 |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-6684-3448-2 |l DE-706 |p ZDB-98-IGB |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-6684-3448-2 |l DE-898 |p ZDB-98-IGB |q FHR_PDA_IGB |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-6684-3448-2 |l DE-1050 |p ZDB-98-IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1818715324500934656 |
---|---|
adam_text | |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author2 | Jahan, Sarkar Sultan, Jahangir Rahman, Md Mashiur Goel, Richa Baral, Sukanta Kumar |
author2_role | edt edt edt edt edt |
author2_variant | s j sj j s js m m r mm mmr r g rg s k b sk skb |
author_facet | Jahan, Sarkar Sultan, Jahangir Rahman, Md Mashiur Goel, Richa Baral, Sukanta Kumar |
building | Verbundindex |
bvnumber | BV048447328 |
classification_tum | WIR 523 DAT 000 |
collection | ZDB-98-IGB |
ctrlnum | (ZDB-98-IGB)00284479 (OCoLC)1344238348 (DE-599)BVBBV048447328 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik Wirtschaftswissenschaften |
discipline_str_mv | Informatik Wirtschaftswissenschaften |
doi_str_mv | 10.4018/978-1-6684-3448-2 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zc 4500</leader><controlfield tag="001">BV048447328</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20230208</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">220830s2022 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781668434505</subfield><subfield code="9">978-1-66843-450-5</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-6684-3448-2</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-98-IGB)00284479</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1344238348</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV048447328</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-1050</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">WIR 523</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cross-industry applications of cyber security frameworks</subfield><subfield code="c">Sukanta Kumar Baral, Richa Goel, Md Mashiur Rahman, Jahangir Sultan, and Sarkar Jahan, editors</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania</subfield><subfield code="b">IGI Global</subfield><subfield code="c">2022</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (244 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Mode of access: World Wide Web</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This book posits that rather than cybersecurity being simply an issue of securing systems and networks, corporate leaders need to think in terms of assuring the integrity and durability of the interconnected business and social structures that sit on top of an increasingly complex technology landscape.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Industries</subfield><subfield code="x">Data processing</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Jahan, Sarkar</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sultan, Jahangir</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rahman, Md Mashiur</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Goel, Richa</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Baral, Sukanta Kumar</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781668434482</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1668434490</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781668434499</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1668434482</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1668434482</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.4018/978-1-6684-3448-2</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-033825543</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-6684-3448-2</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-6684-3448-2</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUM_Paketkauf_2022</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-6684-3448-2</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-6684-3448-2</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FHR_PDA_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-6684-3448-2</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV048447328 |
illustrated | Not Illustrated |
index_date | 2024-07-03T20:29:37Z |
indexdate | 2024-12-17T19:01:33Z |
institution | BVB |
isbn | 9781668434505 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-033825543 |
oclc_num | 1344238348 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-83 DE-706 DE-898 DE-BY-UBR DE-1050 |
owner_facet | DE-91 DE-BY-TUM DE-83 DE-706 DE-898 DE-BY-UBR DE-1050 |
physical | 1 Online-Ressource (244 Seiten) |
psigel | ZDB-98-IGB ZDB-98-IGB TUB_EBS_IGB ZDB-98-IGB TUM_Paketkauf_2022 ZDB-98-IGB FHR_PDA_IGB |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | IGI Global |
record_format | marc |
spelling | Cross-industry applications of cyber security frameworks Sukanta Kumar Baral, Richa Goel, Md Mashiur Rahman, Jahangir Sultan, and Sarkar Jahan, editors Hershey, Pennsylvania IGI Global 2022 1 Online-Ressource (244 Seiten) txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references and index. - Mode of access: World Wide Web "This book posits that rather than cybersecurity being simply an issue of securing systems and networks, corporate leaders need to think in terms of assuring the integrity and durability of the interconnected business and social structures that sit on top of an increasingly complex technology landscape. Computer networks Security measures Computer security Industries Data processing Security measures Jahan, Sarkar edt Sultan, Jahangir edt Rahman, Md Mashiur edt Goel, Richa edt Baral, Sukanta Kumar edt Erscheint auch als Druck-Ausgabe 9781668434482 Erscheint auch als Druck-Ausgabe 1668434490 Erscheint auch als Druck-Ausgabe 9781668434499 Erscheint auch als Druck-Ausgabe 1668434482 https://doi.org/10.4018/978-1-6684-3448-2 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Cross-industry applications of cyber security frameworks Computer networks Security measures Computer security Industries Data processing Security measures |
title | Cross-industry applications of cyber security frameworks |
title_auth | Cross-industry applications of cyber security frameworks |
title_exact_search | Cross-industry applications of cyber security frameworks |
title_exact_search_txtP | Cross-industry applications of cyber security frameworks |
title_full | Cross-industry applications of cyber security frameworks Sukanta Kumar Baral, Richa Goel, Md Mashiur Rahman, Jahangir Sultan, and Sarkar Jahan, editors |
title_fullStr | Cross-industry applications of cyber security frameworks Sukanta Kumar Baral, Richa Goel, Md Mashiur Rahman, Jahangir Sultan, and Sarkar Jahan, editors |
title_full_unstemmed | Cross-industry applications of cyber security frameworks Sukanta Kumar Baral, Richa Goel, Md Mashiur Rahman, Jahangir Sultan, and Sarkar Jahan, editors |
title_short | Cross-industry applications of cyber security frameworks |
title_sort | cross industry applications of cyber security frameworks |
topic | Computer networks Security measures Computer security Industries Data processing Security measures |
topic_facet | Computer networks Security measures Computer security Industries Data processing Security measures |
url | https://doi.org/10.4018/978-1-6684-3448-2 |
work_keys_str_mv | AT jahansarkar crossindustryapplicationsofcybersecurityframeworks AT sultanjahangir crossindustryapplicationsofcybersecurityframeworks AT rahmanmdmashiur crossindustryapplicationsofcybersecurityframeworks AT goelricha crossindustryapplicationsofcybersecurityframeworks AT baralsukantakumar crossindustryapplicationsofcybersecurityframeworks |