Easy Steps to Managing Cybersecurity.:
An introductory guide to managing cybersecurity for businesses. How to prevent, protect and respond to threats.
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
London :
Legend Press,
2018.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | An introductory guide to managing cybersecurity for businesses. How to prevent, protect and respond to threats. |
Beschreibung: | 1 online resource (165 pages) |
ISBN: | 1787197956 9781787197954 |
Internformat
MARC
LEADER | 00000cam a2200000Mu 4500 | ||
---|---|---|---|
001 | ZDB-4-EBU-on1044792438 | ||
003 | OCoLC | ||
005 | 20240405112445.0 | ||
006 | m o d | ||
007 | cr |n|---||||| | ||
008 | 180714s2018 enk o 000 0 eng d | ||
040 | |a EBLCP |b eng |e pn |c EBLCP |d YDX |d IDB |d MERUC |d OCLCQ |d LVT |d N$T |d OCLCQ |d UKAHL |d UKMGB |d K6U |d SNK |d OCLCQ |d OCLCL | ||
015 | |a GBB8F9963 |2 bnb | ||
016 | 7 | |a 019033485 |2 Uk | |
019 | |a 1044802935 |a 1045453267 |a 1264751524 | ||
020 | |a 1787197956 | ||
020 | |a 9781787197954 |q (electronic bk.) | ||
020 | |z 1787197964 | ||
020 | |z 9781787197961 | ||
035 | |a (OCoLC)1044792438 |z (OCoLC)1044802935 |z (OCoLC)1045453267 |z (OCoLC)1264751524 | ||
037 | |a 9781787197954 |b Legend Press | ||
050 | 4 | |a TK5105.8857 |b .E279 2018eb | |
082 | 7 | |a 005.8 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Reuvid, Jonathan. | |
245 | 1 | 0 | |a Easy Steps to Managing Cybersecurity. |
260 | |a London : |b Legend Press, |c 2018. | ||
300 | |a 1 online resource (165 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
588 | 0 | |a Print version record. | |
505 | 0 | |a Cover; Title; Copyright; Contents; Foreword; Part One: Cyber Security -- No Longer an Option; 1.1 Introduction to Cyber security Risk; 1.2 The Cost of Cyber Crime; 1.3 The Cyber security Threat; Part Two: International Action in Cyber Security; 2.1 International Cooperation from the Banking Sector; 2.2 Framework -- adopted by US Financial Services; 2.3 Support Services for UK Public and Private Sectors; 2.4 EU and UK Cyber security Developments; Part Three: Preparation; 3.1 How Much Will It Cost?; 3.2 A Framework for Cyber security; 3.3 Security Framework: A Map for Resilience. | |
505 | 8 | |a 3.4 Protecting Financial Data from InsidersPart Four: Prevention; 4.1 Turning Your People into Your Most Effective Defence; 4.2 Making Your Business Cyber Resilient; 4.3 Countermeasures to Advanced Threats; Part Five: Protection and Response; 5.1 Managing Incidents and Internal Security Breaches; 5.2 Everyone Thinks They Have a Plan; 5.3 Managing Cyber Incident; 5.4 Turbulence and Further Threats; 5.5 Reviewing and Updating Contingency Plans; Book Summary; Acknowledgements; Appendix: Contributors contacts; References. | |
520 | |a An introductory guide to managing cybersecurity for businesses. How to prevent, protect and respond to threats. | ||
650 | 0 | |a Internet of things-Security measures. | |
758 | |i has work: |a Easy Steps to Managing Cybersecurity (Text) |1 https://id.oclc.org/worldcat/entity/E39PCYH9d8bX99ymddd6JryY8C |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Reuvid, Jonathan. |t Easy Steps to Managing Cybersecurity. |d London : Legend Press, ©2018 |z 9781787197961 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBU |q FWS_PDA_EBU |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1809038 |3 Volltext |
938 | |a Askews and Holts Library Services |b ASKH |n AH34462853 | ||
938 | |a EBL - Ebook Library |b EBLB |n EBL5442626 | ||
938 | |a EBSCOhost |b EBSC |n 1809038 | ||
938 | |a YBP Library Services |b YANK |n 15583094 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBU | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBU-on1044792438 |
---|---|
_version_ | 1804748468637401088 |
adam_text | |
any_adam_object | |
author | Reuvid, Jonathan |
author_facet | Reuvid, Jonathan |
author_role | |
author_sort | Reuvid, Jonathan |
author_variant | j r jr |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.8857 .E279 2018eb |
callnumber-search | TK5105.8857 .E279 2018eb |
callnumber-sort | TK 45105.8857 E279 42018EB |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-4-EBU |
contents | Cover; Title; Copyright; Contents; Foreword; Part One: Cyber Security -- No Longer an Option; 1.1 Introduction to Cyber security Risk; 1.2 The Cost of Cyber Crime; 1.3 The Cyber security Threat; Part Two: International Action in Cyber Security; 2.1 International Cooperation from the Banking Sector; 2.2 Framework -- adopted by US Financial Services; 2.3 Support Services for UK Public and Private Sectors; 2.4 EU and UK Cyber security Developments; Part Three: Preparation; 3.1 How Much Will It Cost?; 3.2 A Framework for Cyber security; 3.3 Security Framework: A Map for Resilience. 3.4 Protecting Financial Data from InsidersPart Four: Prevention; 4.1 Turning Your People into Your Most Effective Defence; 4.2 Making Your Business Cyber Resilient; 4.3 Countermeasures to Advanced Threats; Part Five: Protection and Response; 5.1 Managing Incidents and Internal Security Breaches; 5.2 Everyone Thinks They Have a Plan; 5.3 Managing Cyber Incident; 5.4 Turbulence and Further Threats; 5.5 Reviewing and Updating Contingency Plans; Book Summary; Acknowledgements; Appendix: Contributors contacts; References. |
ctrlnum | (OCoLC)1044792438 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03118cam a2200493Mu 4500</leader><controlfield tag="001">ZDB-4-EBU-on1044792438</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20240405112445.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr |n|---|||||</controlfield><controlfield tag="008">180714s2018 enk o 000 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">EBLCP</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">EBLCP</subfield><subfield code="d">YDX</subfield><subfield code="d">IDB</subfield><subfield code="d">MERUC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">LVT</subfield><subfield code="d">N$T</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UKAHL</subfield><subfield code="d">UKMGB</subfield><subfield code="d">K6U</subfield><subfield code="d">SNK</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBB8F9963</subfield><subfield code="2">bnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">019033485</subfield><subfield code="2">Uk</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">1044802935</subfield><subfield code="a">1045453267</subfield><subfield code="a">1264751524</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1787197956</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781787197954</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1787197964</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781787197961</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1044792438</subfield><subfield code="z">(OCoLC)1044802935</subfield><subfield code="z">(OCoLC)1045453267</subfield><subfield code="z">(OCoLC)1264751524</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">9781787197954</subfield><subfield code="b">Legend Press</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.8857</subfield><subfield code="b">.E279 2018eb</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Reuvid, Jonathan.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Easy Steps to Managing Cybersecurity.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">London :</subfield><subfield code="b">Legend Press,</subfield><subfield code="c">2018.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (165 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cover; Title; Copyright; Contents; Foreword; Part One: Cyber Security -- No Longer an Option; 1.1 Introduction to Cyber security Risk; 1.2 The Cost of Cyber Crime; 1.3 The Cyber security Threat; Part Two: International Action in Cyber Security; 2.1 International Cooperation from the Banking Sector; 2.2 Framework -- adopted by US Financial Services; 2.3 Support Services for UK Public and Private Sectors; 2.4 EU and UK Cyber security Developments; Part Three: Preparation; 3.1 How Much Will It Cost?; 3.2 A Framework for Cyber security; 3.3 Security Framework: A Map for Resilience.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">3.4 Protecting Financial Data from InsidersPart Four: Prevention; 4.1 Turning Your People into Your Most Effective Defence; 4.2 Making Your Business Cyber Resilient; 4.3 Countermeasures to Advanced Threats; Part Five: Protection and Response; 5.1 Managing Incidents and Internal Security Breaches; 5.2 Everyone Thinks They Have a Plan; 5.3 Managing Cyber Incident; 5.4 Turbulence and Further Threats; 5.5 Reviewing and Updating Contingency Plans; Book Summary; Acknowledgements; Appendix: Contributors contacts; References.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">An introductory guide to managing cybersecurity for businesses. How to prevent, protect and respond to threats.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet of things-Security measures.</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Easy Steps to Managing Cybersecurity (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCYH9d8bX99ymddd6JryY8C</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Reuvid, Jonathan.</subfield><subfield code="t">Easy Steps to Managing Cybersecurity.</subfield><subfield code="d">London : Legend Press, ©2018</subfield><subfield code="z">9781787197961</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBU</subfield><subfield code="q">FWS_PDA_EBU</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1809038</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH34462853</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBL - Ebook Library</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL5442626</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">1809038</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">15583094</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBU</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBU-on1044792438 |
illustrated | Not Illustrated |
indexdate | 2024-07-16T15:04:22Z |
institution | BVB |
isbn | 1787197956 9781787197954 |
language | English |
oclc_num | 1044792438 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (165 pages) |
psigel | ZDB-4-EBU |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | Legend Press, |
record_format | marc |
spelling | Reuvid, Jonathan. Easy Steps to Managing Cybersecurity. London : Legend Press, 2018. 1 online resource (165 pages) text txt rdacontent computer c rdamedia online resource cr rdacarrier Print version record. Cover; Title; Copyright; Contents; Foreword; Part One: Cyber Security -- No Longer an Option; 1.1 Introduction to Cyber security Risk; 1.2 The Cost of Cyber Crime; 1.3 The Cyber security Threat; Part Two: International Action in Cyber Security; 2.1 International Cooperation from the Banking Sector; 2.2 Framework -- adopted by US Financial Services; 2.3 Support Services for UK Public and Private Sectors; 2.4 EU and UK Cyber security Developments; Part Three: Preparation; 3.1 How Much Will It Cost?; 3.2 A Framework for Cyber security; 3.3 Security Framework: A Map for Resilience. 3.4 Protecting Financial Data from InsidersPart Four: Prevention; 4.1 Turning Your People into Your Most Effective Defence; 4.2 Making Your Business Cyber Resilient; 4.3 Countermeasures to Advanced Threats; Part Five: Protection and Response; 5.1 Managing Incidents and Internal Security Breaches; 5.2 Everyone Thinks They Have a Plan; 5.3 Managing Cyber Incident; 5.4 Turbulence and Further Threats; 5.5 Reviewing and Updating Contingency Plans; Book Summary; Acknowledgements; Appendix: Contributors contacts; References. An introductory guide to managing cybersecurity for businesses. How to prevent, protect and respond to threats. Internet of things-Security measures. has work: Easy Steps to Managing Cybersecurity (Text) https://id.oclc.org/worldcat/entity/E39PCYH9d8bX99ymddd6JryY8C https://id.oclc.org/worldcat/ontology/hasWork Print version: Reuvid, Jonathan. Easy Steps to Managing Cybersecurity. London : Legend Press, ©2018 9781787197961 FWS01 ZDB-4-EBU FWS_PDA_EBU https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1809038 Volltext |
spellingShingle | Reuvid, Jonathan Easy Steps to Managing Cybersecurity. Cover; Title; Copyright; Contents; Foreword; Part One: Cyber Security -- No Longer an Option; 1.1 Introduction to Cyber security Risk; 1.2 The Cost of Cyber Crime; 1.3 The Cyber security Threat; Part Two: International Action in Cyber Security; 2.1 International Cooperation from the Banking Sector; 2.2 Framework -- adopted by US Financial Services; 2.3 Support Services for UK Public and Private Sectors; 2.4 EU and UK Cyber security Developments; Part Three: Preparation; 3.1 How Much Will It Cost?; 3.2 A Framework for Cyber security; 3.3 Security Framework: A Map for Resilience. 3.4 Protecting Financial Data from InsidersPart Four: Prevention; 4.1 Turning Your People into Your Most Effective Defence; 4.2 Making Your Business Cyber Resilient; 4.3 Countermeasures to Advanced Threats; Part Five: Protection and Response; 5.1 Managing Incidents and Internal Security Breaches; 5.2 Everyone Thinks They Have a Plan; 5.3 Managing Cyber Incident; 5.4 Turbulence and Further Threats; 5.5 Reviewing and Updating Contingency Plans; Book Summary; Acknowledgements; Appendix: Contributors contacts; References. Internet of things-Security measures. |
title | Easy Steps to Managing Cybersecurity. |
title_auth | Easy Steps to Managing Cybersecurity. |
title_exact_search | Easy Steps to Managing Cybersecurity. |
title_full | Easy Steps to Managing Cybersecurity. |
title_fullStr | Easy Steps to Managing Cybersecurity. |
title_full_unstemmed | Easy Steps to Managing Cybersecurity. |
title_short | Easy Steps to Managing Cybersecurity. |
title_sort | easy steps to managing cybersecurity |
topic | Internet of things-Security measures. |
topic_facet | Internet of things-Security measures. |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1809038 |
work_keys_str_mv | AT reuvidjonathan easystepstomanagingcybersecurity |