The true cost of information security breaches and cyber crime /:
This pocket guide uses case studies to illustrate the possible breach scenarios that an organisation can face. It sets out a sensible, realistic assessment of the actual costs of a data or information breach and explains how managers can determine the business damage caused.
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Ely, Cambridgeshire, U.K. :
IT Governance Pub.,
2013.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | This pocket guide uses case studies to illustrate the possible breach scenarios that an organisation can face. It sets out a sensible, realistic assessment of the actual costs of a data or information breach and explains how managers can determine the business damage caused. |
Beschreibung: | 1 online resource |
ISBN: | 9781849284967 1849284962 1299823017 9781299823013 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn858926221 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr zn||||||||| | ||
008 | 130816s2013 enka o 000 0 eng d | ||
040 | |a B24X7 |b eng |e pn |c B24X7 |d OCLCO |d UMI |d DEBSZ |d E7B |d JSTOR |d OCLCO |d YDXCP |d COO |d N$T |d OCLCQ |d OCLCO |d EBLCP |d TJC |d OCLCO |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d AGLDB |d WAU |d IDEBK |d LIV |d MERUC |d OCLCQ |d IOG |d OCLCA |d OCLCF |d OCLCQ |d VTS |d CEF |d AU@ |d OCLCQ |d WYU |d LVT |d STF |d M8D |d OCLCQ |d VT2 |d UX1 |d OCLCO |d OCLCQ |d OCLCO |d OCLCL |d OCLCQ |d OCLCL |d DEGRU |d UKAHL | ||
019 | |a 857713684 |a 859144314 |a 861559188 |a 1058123270 |a 1175636633 | ||
020 | |a 9781849284967 |q (electronic bk.) | ||
020 | |a 1849284962 |q (electronic bk.) | ||
020 | |a 1299823017 | ||
020 | |a 9781299823013 | ||
020 | |z 9781849284950 | ||
020 | |z 1849284954 | ||
035 | |a (OCoLC)858926221 |z (OCoLC)857713684 |z (OCoLC)859144314 |z (OCoLC)861559188 |z (OCoLC)1058123270 |z (OCoLC)1175636633 | ||
037 | |a CL0500000301 |b Safari Books Online | ||
037 | |a 22573/ctt4k5r0p |b JSTOR | ||
050 | 4 | |a QA76.9.A25 |b K732 2013eb | |
072 | 7 | |a COM053000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Krausz, Michael. |0 http://id.loc.gov/authorities/names/no2011004375 | |
245 | 1 | 4 | |a The true cost of information security breaches and cyber crime / |c Michael Krausz, John Walker. |
260 | |a Ely, Cambridgeshire, U.K. : |b IT Governance Pub., |c 2013. | ||
300 | |a 1 online resource | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
505 | 0 | |a Introduction -- The Daily Breach -- Information Security and Business Risk -- Cost Factors of a Breach -- Case studies -- A Brief Checklist -- Conclusion. | |
520 | |a This pocket guide uses case studies to illustrate the possible breach scenarios that an organisation can face. It sets out a sensible, realistic assessment of the actual costs of a data or information breach and explains how managers can determine the business damage caused. | ||
588 | 0 | |a Print version record. | |
650 | 0 | |a Business enterprises |x Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh95010367 | |
650 | 0 | |a Computer security |x Management. | |
650 | 0 | |a Data protection |x Economic aspects |v Case studies. | |
650 | 0 | |a Computer crimes |x Economic aspects |v Case studies. | |
650 | 6 | |a Sécurité informatique |x Gestion. | |
650 | 6 | |a Protection de l'information (Informatique) |x Aspect économique |v Études de cas. | |
650 | 6 | |a Criminalité informatique |x Aspect économique |v Études de cas. | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Business enterprises |x Computer networks |x Security measures |2 fast | |
650 | 7 | |a Computer security |x Management |2 fast | |
655 | 7 | |a Case studies |2 fast | |
700 | 1 | |a Walker, John |c (Professor) |4 aut |1 https://id.oclc.org/worldcat/entity/E39PCjDJ6BVKBK37yxKYkxvxH3 |0 http://id.loc.gov/authorities/names/no2015107934 | |
758 | |i has work: |a The true cost of information security breaches and cyber crime (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGKjkTvhyfy7vWymMjFgw3 |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Krausz, Michael. |t True cost of information security breaches. |d Ely, Cambridgeshire, U.K. : IT Governance Publishing, 2013 |z 1849284954 |w (OCoLC)845516427 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=838705 |3 Volltext |
938 | |a Askews and Holts Library Services |b ASKH |n AH36161640 | ||
938 | |a De Gruyter |b DEGR |n 9781849284967 | ||
938 | |a Books 24x7 |b B247 |n bks00056016 | ||
938 | |a EBL - Ebook Library |b EBLB |n EBL1477418 | ||
938 | |a ebrary |b EBRY |n ebr10772230 | ||
938 | |a EBSCOhost |b EBSC |n 838705 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n cis26086661 | ||
938 | |a YBP Library Services |b YANK |n 11223135 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn858926221 |
---|---|
_version_ | 1816882245358583808 |
adam_text | |
any_adam_object | |
author | Krausz, Michael Walker, John (Professor) |
author_GND | http://id.loc.gov/authorities/names/no2011004375 http://id.loc.gov/authorities/names/no2015107934 |
author_facet | Krausz, Michael Walker, John (Professor) |
author_role | aut |
author_sort | Krausz, Michael |
author_variant | m k mk j w jw |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 K732 2013eb |
callnumber-search | QA76.9.A25 K732 2013eb |
callnumber-sort | QA 276.9 A25 K732 42013EB |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Introduction -- The Daily Breach -- Information Security and Business Risk -- Cost Factors of a Breach -- Case studies -- A Brief Checklist -- Conclusion. |
ctrlnum | (OCoLC)858926221 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03949cam a2200685 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn858926221</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr zn|||||||||</controlfield><controlfield tag="008">130816s2013 enka o 000 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">B24X7</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">B24X7</subfield><subfield code="d">OCLCO</subfield><subfield code="d">UMI</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">E7B</subfield><subfield code="d">JSTOR</subfield><subfield code="d">OCLCO</subfield><subfield code="d">YDXCP</subfield><subfield code="d">COO</subfield><subfield code="d">N$T</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">EBLCP</subfield><subfield code="d">TJC</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">AGLDB</subfield><subfield code="d">WAU</subfield><subfield code="d">IDEBK</subfield><subfield code="d">LIV</subfield><subfield code="d">MERUC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">IOG</subfield><subfield code="d">OCLCA</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VTS</subfield><subfield code="d">CEF</subfield><subfield code="d">AU@</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">WYU</subfield><subfield code="d">LVT</subfield><subfield code="d">STF</subfield><subfield code="d">M8D</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VT2</subfield><subfield code="d">UX1</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCL</subfield><subfield code="d">DEGRU</subfield><subfield code="d">UKAHL</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">857713684</subfield><subfield code="a">859144314</subfield><subfield code="a">861559188</subfield><subfield code="a">1058123270</subfield><subfield code="a">1175636633</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849284967</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849284962</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1299823017</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781299823013</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781849284950</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1849284954</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)858926221</subfield><subfield code="z">(OCoLC)857713684</subfield><subfield code="z">(OCoLC)859144314</subfield><subfield code="z">(OCoLC)861559188</subfield><subfield code="z">(OCoLC)1058123270</subfield><subfield code="z">(OCoLC)1175636633</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">CL0500000301</subfield><subfield code="b">Safari Books Online</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">22573/ctt4k5r0p</subfield><subfield code="b">JSTOR</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">K732 2013eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Krausz, Michael.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2011004375</subfield></datafield><datafield tag="245" ind1="1" ind2="4"><subfield code="a">The true cost of information security breaches and cyber crime /</subfield><subfield code="c">Michael Krausz, John Walker.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Ely, Cambridgeshire, U.K. :</subfield><subfield code="b">IT Governance Pub.,</subfield><subfield code="c">2013.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Introduction -- The Daily Breach -- Information Security and Business Risk -- Cost Factors of a Breach -- Case studies -- A Brief Checklist -- Conclusion.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This pocket guide uses case studies to illustrate the possible breach scenarios that an organisation can face. It sets out a sensible, realistic assessment of the actual costs of a data or information breach and explains how managers can determine the business damage caused.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Business enterprises</subfield><subfield code="x">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh95010367</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="x">Management.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection</subfield><subfield code="x">Economic aspects</subfield><subfield code="v">Case studies.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield><subfield code="x">Economic aspects</subfield><subfield code="v">Case studies.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique</subfield><subfield code="x">Gestion.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Protection de l'information (Informatique)</subfield><subfield code="x">Aspect économique</subfield><subfield code="v">Études de cas.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Criminalité informatique</subfield><subfield code="x">Aspect économique</subfield><subfield code="v">Études de cas.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Business enterprises</subfield><subfield code="x">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="x">Management</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Case studies</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Walker, John</subfield><subfield code="c">(Professor)</subfield><subfield code="4">aut</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjDJ6BVKBK37yxKYkxvxH3</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2015107934</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">The true cost of information security breaches and cyber crime (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCGKjkTvhyfy7vWymMjFgw3</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Krausz, Michael.</subfield><subfield code="t">True cost of information security breaches.</subfield><subfield code="d">Ely, Cambridgeshire, U.K. : IT Governance Publishing, 2013</subfield><subfield code="z">1849284954</subfield><subfield code="w">(OCoLC)845516427</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=838705</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH36161640</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">De Gruyter</subfield><subfield code="b">DEGR</subfield><subfield code="n">9781849284967</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Books 24x7</subfield><subfield code="b">B247</subfield><subfield code="n">bks00056016</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBL - Ebook Library</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL1477418</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10772230</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">838705</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest MyiLibrary Digital eBook Collection</subfield><subfield code="b">IDEB</subfield><subfield code="n">cis26086661</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">11223135</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | Case studies fast |
genre_facet | Case studies |
id | ZDB-4-EBA-ocn858926221 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:25:33Z |
institution | BVB |
isbn | 9781849284967 1849284962 1299823017 9781299823013 |
language | English |
oclc_num | 858926221 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource |
psigel | ZDB-4-EBA |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | IT Governance Pub., |
record_format | marc |
spelling | Krausz, Michael. http://id.loc.gov/authorities/names/no2011004375 The true cost of information security breaches and cyber crime / Michael Krausz, John Walker. Ely, Cambridgeshire, U.K. : IT Governance Pub., 2013. 1 online resource text txt rdacontent computer c rdamedia online resource cr rdacarrier Introduction -- The Daily Breach -- Information Security and Business Risk -- Cost Factors of a Breach -- Case studies -- A Brief Checklist -- Conclusion. This pocket guide uses case studies to illustrate the possible breach scenarios that an organisation can face. It sets out a sensible, realistic assessment of the actual costs of a data or information breach and explains how managers can determine the business damage caused. Print version record. Business enterprises Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh95010367 Computer security Management. Data protection Economic aspects Case studies. Computer crimes Economic aspects Case studies. Sécurité informatique Gestion. Protection de l'information (Informatique) Aspect économique Études de cas. Criminalité informatique Aspect économique Études de cas. COMPUTERS Security General. bisacsh Business enterprises Computer networks Security measures fast Computer security Management fast Case studies fast Walker, John (Professor) aut https://id.oclc.org/worldcat/entity/E39PCjDJ6BVKBK37yxKYkxvxH3 http://id.loc.gov/authorities/names/no2015107934 has work: The true cost of information security breaches and cyber crime (Text) https://id.oclc.org/worldcat/entity/E39PCGKjkTvhyfy7vWymMjFgw3 https://id.oclc.org/worldcat/ontology/hasWork Print version: Krausz, Michael. True cost of information security breaches. Ely, Cambridgeshire, U.K. : IT Governance Publishing, 2013 1849284954 (OCoLC)845516427 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=838705 Volltext |
spellingShingle | Krausz, Michael Walker, John (Professor) The true cost of information security breaches and cyber crime / Introduction -- The Daily Breach -- Information Security and Business Risk -- Cost Factors of a Breach -- Case studies -- A Brief Checklist -- Conclusion. Business enterprises Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh95010367 Computer security Management. Data protection Economic aspects Case studies. Computer crimes Economic aspects Case studies. Sécurité informatique Gestion. Protection de l'information (Informatique) Aspect économique Études de cas. Criminalité informatique Aspect économique Études de cas. COMPUTERS Security General. bisacsh Business enterprises Computer networks Security measures fast Computer security Management fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh95010367 |
title | The true cost of information security breaches and cyber crime / |
title_auth | The true cost of information security breaches and cyber crime / |
title_exact_search | The true cost of information security breaches and cyber crime / |
title_full | The true cost of information security breaches and cyber crime / Michael Krausz, John Walker. |
title_fullStr | The true cost of information security breaches and cyber crime / Michael Krausz, John Walker. |
title_full_unstemmed | The true cost of information security breaches and cyber crime / Michael Krausz, John Walker. |
title_short | The true cost of information security breaches and cyber crime / |
title_sort | true cost of information security breaches and cyber crime |
topic | Business enterprises Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh95010367 Computer security Management. Data protection Economic aspects Case studies. Computer crimes Economic aspects Case studies. Sécurité informatique Gestion. Protection de l'information (Informatique) Aspect économique Études de cas. Criminalité informatique Aspect économique Études de cas. COMPUTERS Security General. bisacsh Business enterprises Computer networks Security measures fast Computer security Management fast |
topic_facet | Business enterprises Computer networks Security measures. Computer security Management. Data protection Economic aspects Case studies. Computer crimes Economic aspects Case studies. Sécurité informatique Gestion. Protection de l'information (Informatique) Aspect économique Études de cas. Criminalité informatique Aspect économique Études de cas. COMPUTERS Security General. Business enterprises Computer networks Security measures Computer security Management Case studies |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=838705 |
work_keys_str_mv | AT krauszmichael thetruecostofinformationsecuritybreachesandcybercrime AT walkerjohn thetruecostofinformationsecuritybreachesandcybercrime AT krauszmichael truecostofinformationsecuritybreachesandcybercrime AT walkerjohn truecostofinformationsecuritybreachesandcybercrime |