CyberStrong :: a primer on cyber risk management for business managers /
"Cyber risk is one of the biggest challenges businesses face in the 21st century. Increasing dependence on technology to run businesses combined with the spate of cyberattacks and reputational risk in recent times has made cybersecurity a top priority for corporates as well as big and small bus...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
New Dehli ; Thousand Oaks, California :
Vivek Mehra for SAGE Publications India Pvt Ltd.,
2021.
|
Schriftenreihe: | Response business books.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | "Cyber risk is one of the biggest challenges businesses face in the 21st century. Increasing dependence on technology to run businesses combined with the spate of cyberattacks and reputational risk in recent times has made cybersecurity a top priority for corporates as well as big and small businesses. Limited knowledge of cybersecurity among business leaders and managers is a major barrier for effective cyber-risk management. CyberStrong enables business managers to assess cyber threats, integrate cybersecurity strategy with business goals and build appropriate response systems to deal with cyber risks"-- |
Beschreibung: | 1 online resource (xxvi, 261 pages) : illustrations |
Bibliographie: | Includes bibliographical references (pages 247-260). |
ISBN: | 9789353885496 9353885493 9789353885502 9353885507 9789354792625 9354792626 |
Internformat
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBU-on1202467596 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr ||||||||||| | ||
008 | 201031t20212021ii a ob 000 0 eng d | ||
040 | |a EBLCP |b eng |e rda |e pn |c EBLCP |d YDX |d N$T |d UKMGB |d OCLCF |d UKAHL |d OSU |d OCLCO |d SGPBL |d OCLCO |d OL$ |d OCLCQ |d OCLCO |d OCLCL |d SXB | ||
015 | |a GBC0G1218 |2 bnb | ||
016 | 7 | |a 019979323 |2 Uk | |
019 | |a 1199967738 | ||
020 | |a 9789353885496 |q (epub) | ||
020 | |a 9353885493 |q (epub) | ||
020 | |a 9789353885502 |q (ebook) | ||
020 | |a 9353885507 |q (ebook) | ||
020 | |a 9789354792625 |q (ebook) | ||
020 | |a 9354792626 |q (ebook) | ||
020 | |z 9789353885489 |q (paperback) | ||
020 | |z 9353885485 |q (paperback) | ||
035 | |a (OCoLC)1202467596 |z (OCoLC)1199967738 | ||
037 | |a 9789353885496 |b Ingram Content Group | ||
050 | 4 | |a HD31.2 |b .S56 2021eb | |
082 | 7 | |a 658.4/78 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Singh, Ajay |c (Cybersecurity professional), |e author. |1 https://id.oclc.org/worldcat/entity/E39PCjKrbPFRyQXKJjvVVmppj3 |0 http://id.loc.gov/authorities/names/no2021052360 | |
245 | 1 | 0 | |a CyberStrong : |b a primer on cyber risk management for business managers / |c Ajay Singh ; foreword by Ajai Chowdhry, Padma Bhushan Awardee and Co-founder, HCL. |
246 | 3 | |a Cyber strong | |
264 | 1 | |a New Dehli ; |a Thousand Oaks, California : |b Vivek Mehra for SAGE Publications India Pvt Ltd., |c 2021. | |
264 | 4 | |c ©2021 | |
300 | |a 1 online resource (xxvi, 261 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Response business books | |
504 | |a Includes bibliographical references (pages 247-260). | ||
505 | 0 | |a Cyberattack surface: threats and vulnerabilities -- Recognizing your vulnerabilities -- Apps: can they land you in trouble? -- Discovering and recovering from cyberattacks -- Motives of a cybercriminal -- Cyberattacks can be devastating -- Cyber risk: a key business risk -- Assessing cyber risks to your business -- Cyber resilience -- The human factor in cybersecurity -- The role of technology in cybersecurity -- Cyber laws and cybersecurity regulations -- The role of leadership -- Collaboration is the future of cybersecurity -- The role of cybersecurity frameworks -- Enterprise cybersecurity and social media. | |
520 | |a "Cyber risk is one of the biggest challenges businesses face in the 21st century. Increasing dependence on technology to run businesses combined with the spate of cyberattacks and reputational risk in recent times has made cybersecurity a top priority for corporates as well as big and small businesses. Limited knowledge of cybersecurity among business leaders and managers is a major barrier for effective cyber-risk management. CyberStrong enables business managers to assess cyber threats, integrate cybersecurity strategy with business goals and build appropriate response systems to deal with cyber risks"-- |c Provided by publisher | ||
588 | 0 | |a Online resource; title from PDF title page (ProQuest, viewed April 30, 2021). | |
650 | 0 | |a Industrial management. |0 http://id.loc.gov/authorities/subjects/sh85065889 | |
650 | 0 | |a Cyberspace |x Security measures |x Management. | |
650 | 0 | |a Cyberterrorism |x Prevention. | |
650 | 6 | |a Gestion d'entreprise. | |
650 | 7 | |a Cyberterrorism |x Prevention |2 fast | |
650 | 7 | |a Industrial management |2 fast | |
655 | 4 | |a Electronic book. | |
758 | |i has work: |a CyberStrong (Text) |1 https://id.oclc.org/worldcat/entity/E39PCH97yWvYgj7mmCH8TRBWwC |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Singh, Ajay (Cybersecurity professional). |t CyberStrong. |d Thousand Oaks : SAGE Publishing, 2021 |z 9789353885489 |w (DLC) 2020035043 |w (OCoLC)1182021118 |
830 | 0 | |a Response business books. |0 http://id.loc.gov/authorities/names/no2012034014 | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBU |q FWS_PDA_EBU |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2648233 |3 Volltext |
938 | |a Askews and Holts Library Services |b ASKH |n AH37743086 | ||
938 | |a EBSCOhost |b EBSC |n 2648233 | ||
938 | |a Sage Publications |b SAGE |n SAGE000014228 | ||
938 | |a YBP Library Services |b YANK |n 301622236 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBU | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBU-on1202467596 |
---|---|
_version_ | 1816796938365829120 |
adam_text | |
any_adam_object | |
author | Singh, Ajay (Cybersecurity professional) |
author_GND | http://id.loc.gov/authorities/names/no2021052360 |
author_facet | Singh, Ajay (Cybersecurity professional) |
author_role | aut |
author_sort | Singh, Ajay (Cybersecurity professional) |
author_variant | a s as |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | H - Social Science |
callnumber-label | HD31 |
callnumber-raw | HD31.2 .S56 2021eb |
callnumber-search | HD31.2 .S56 2021eb |
callnumber-sort | HD 231.2 S56 42021EB |
callnumber-subject | HD - Industries, Land Use, Labor |
collection | ZDB-4-EBU |
contents | Cyberattack surface: threats and vulnerabilities -- Recognizing your vulnerabilities -- Apps: can they land you in trouble? -- Discovering and recovering from cyberattacks -- Motives of a cybercriminal -- Cyberattacks can be devastating -- Cyber risk: a key business risk -- Assessing cyber risks to your business -- Cyber resilience -- The human factor in cybersecurity -- The role of technology in cybersecurity -- Cyber laws and cybersecurity regulations -- The role of leadership -- Collaboration is the future of cybersecurity -- The role of cybersecurity frameworks -- Enterprise cybersecurity and social media. |
ctrlnum | (OCoLC)1202467596 |
dewey-full | 658.4/78 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.4/78 |
dewey-search | 658.4/78 |
dewey-sort | 3658.4 278 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04258cam a2200661 i 4500</leader><controlfield tag="001">ZDB-4-EBU-on1202467596</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr |||||||||||</controlfield><controlfield tag="008">201031t20212021ii a ob 000 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">EBLCP</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">EBLCP</subfield><subfield code="d">YDX</subfield><subfield code="d">N$T</subfield><subfield code="d">UKMGB</subfield><subfield code="d">OCLCF</subfield><subfield code="d">UKAHL</subfield><subfield code="d">OSU</subfield><subfield code="d">OCLCO</subfield><subfield code="d">SGPBL</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OL$</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">SXB</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBC0G1218</subfield><subfield code="2">bnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">019979323</subfield><subfield code="2">Uk</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">1199967738</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789353885496</subfield><subfield code="q">(epub)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9353885493</subfield><subfield code="q">(epub)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789353885502</subfield><subfield code="q">(ebook)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9353885507</subfield><subfield code="q">(ebook)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789354792625</subfield><subfield code="q">(ebook)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9354792626</subfield><subfield code="q">(ebook)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9789353885489</subfield><subfield code="q">(paperback)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9353885485</subfield><subfield code="q">(paperback)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1202467596</subfield><subfield code="z">(OCoLC)1199967738</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">9789353885496</subfield><subfield code="b">Ingram Content Group</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HD31.2</subfield><subfield code="b">.S56 2021eb</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">658.4/78</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Singh, Ajay</subfield><subfield code="c">(Cybersecurity professional),</subfield><subfield code="e">author.</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjKrbPFRyQXKJjvVVmppj3</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2021052360</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">CyberStrong :</subfield><subfield code="b">a primer on cyber risk management for business managers /</subfield><subfield code="c">Ajay Singh ; foreword by Ajai Chowdhry, Padma Bhushan Awardee and Co-founder, HCL.</subfield></datafield><datafield tag="246" ind1="3" ind2=" "><subfield code="a">Cyber strong</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New Dehli ;</subfield><subfield code="a">Thousand Oaks, California :</subfield><subfield code="b">Vivek Mehra for SAGE Publications India Pvt Ltd.,</subfield><subfield code="c">2021.</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2021</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxvi, 261 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Response business books</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (pages 247-260).</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cyberattack surface: threats and vulnerabilities -- Recognizing your vulnerabilities -- Apps: can they land you in trouble? -- Discovering and recovering from cyberattacks -- Motives of a cybercriminal -- Cyberattacks can be devastating -- Cyber risk: a key business risk -- Assessing cyber risks to your business -- Cyber resilience -- The human factor in cybersecurity -- The role of technology in cybersecurity -- Cyber laws and cybersecurity regulations -- The role of leadership -- Collaboration is the future of cybersecurity -- The role of cybersecurity frameworks -- Enterprise cybersecurity and social media.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"Cyber risk is one of the biggest challenges businesses face in the 21st century. Increasing dependence on technology to run businesses combined with the spate of cyberattacks and reputational risk in recent times has made cybersecurity a top priority for corporates as well as big and small businesses. Limited knowledge of cybersecurity among business leaders and managers is a major barrier for effective cyber-risk management. CyberStrong enables business managers to assess cyber threats, integrate cybersecurity strategy with business goals and build appropriate response systems to deal with cyber risks"--</subfield><subfield code="c">Provided by publisher</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Online resource; title from PDF title page (ProQuest, viewed April 30, 2021).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Industrial management.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85065889</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberspace</subfield><subfield code="x">Security measures</subfield><subfield code="x">Management.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberterrorism</subfield><subfield code="x">Prevention.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Gestion d'entreprise.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyberterrorism</subfield><subfield code="x">Prevention</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Industrial management</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic book.</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">CyberStrong (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCH97yWvYgj7mmCH8TRBWwC</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Singh, Ajay (Cybersecurity professional).</subfield><subfield code="t">CyberStrong.</subfield><subfield code="d">Thousand Oaks : SAGE Publishing, 2021</subfield><subfield code="z">9789353885489</subfield><subfield code="w">(DLC) 2020035043</subfield><subfield code="w">(OCoLC)1182021118</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Response business books.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2012034014</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBU</subfield><subfield code="q">FWS_PDA_EBU</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2648233</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH37743086</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">2648233</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Sage Publications</subfield><subfield code="b">SAGE</subfield><subfield code="n">SAGE000014228</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">301622236</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBU</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | Electronic book. |
genre_facet | Electronic book. |
id | ZDB-4-EBU-on1202467596 |
illustrated | Illustrated |
indexdate | 2024-11-26T14:49:38Z |
institution | BVB |
isbn | 9789353885496 9353885493 9789353885502 9353885507 9789354792625 9354792626 |
language | English |
oclc_num | 1202467596 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xxvi, 261 pages) : illustrations |
psigel | ZDB-4-EBU |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | Vivek Mehra for SAGE Publications India Pvt Ltd., |
record_format | marc |
series | Response business books. |
series2 | Response business books |
spelling | Singh, Ajay (Cybersecurity professional), author. https://id.oclc.org/worldcat/entity/E39PCjKrbPFRyQXKJjvVVmppj3 http://id.loc.gov/authorities/names/no2021052360 CyberStrong : a primer on cyber risk management for business managers / Ajay Singh ; foreword by Ajai Chowdhry, Padma Bhushan Awardee and Co-founder, HCL. Cyber strong New Dehli ; Thousand Oaks, California : Vivek Mehra for SAGE Publications India Pvt Ltd., 2021. ©2021 1 online resource (xxvi, 261 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier Response business books Includes bibliographical references (pages 247-260). Cyberattack surface: threats and vulnerabilities -- Recognizing your vulnerabilities -- Apps: can they land you in trouble? -- Discovering and recovering from cyberattacks -- Motives of a cybercriminal -- Cyberattacks can be devastating -- Cyber risk: a key business risk -- Assessing cyber risks to your business -- Cyber resilience -- The human factor in cybersecurity -- The role of technology in cybersecurity -- Cyber laws and cybersecurity regulations -- The role of leadership -- Collaboration is the future of cybersecurity -- The role of cybersecurity frameworks -- Enterprise cybersecurity and social media. "Cyber risk is one of the biggest challenges businesses face in the 21st century. Increasing dependence on technology to run businesses combined with the spate of cyberattacks and reputational risk in recent times has made cybersecurity a top priority for corporates as well as big and small businesses. Limited knowledge of cybersecurity among business leaders and managers is a major barrier for effective cyber-risk management. CyberStrong enables business managers to assess cyber threats, integrate cybersecurity strategy with business goals and build appropriate response systems to deal with cyber risks"-- Provided by publisher Online resource; title from PDF title page (ProQuest, viewed April 30, 2021). Industrial management. http://id.loc.gov/authorities/subjects/sh85065889 Cyberspace Security measures Management. Cyberterrorism Prevention. Gestion d'entreprise. Cyberterrorism Prevention fast Industrial management fast Electronic book. has work: CyberStrong (Text) https://id.oclc.org/worldcat/entity/E39PCH97yWvYgj7mmCH8TRBWwC https://id.oclc.org/worldcat/ontology/hasWork Print version: Singh, Ajay (Cybersecurity professional). CyberStrong. Thousand Oaks : SAGE Publishing, 2021 9789353885489 (DLC) 2020035043 (OCoLC)1182021118 Response business books. http://id.loc.gov/authorities/names/no2012034014 FWS01 ZDB-4-EBU FWS_PDA_EBU https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2648233 Volltext |
spellingShingle | Singh, Ajay (Cybersecurity professional) CyberStrong : a primer on cyber risk management for business managers / Response business books. Cyberattack surface: threats and vulnerabilities -- Recognizing your vulnerabilities -- Apps: can they land you in trouble? -- Discovering and recovering from cyberattacks -- Motives of a cybercriminal -- Cyberattacks can be devastating -- Cyber risk: a key business risk -- Assessing cyber risks to your business -- Cyber resilience -- The human factor in cybersecurity -- The role of technology in cybersecurity -- Cyber laws and cybersecurity regulations -- The role of leadership -- Collaboration is the future of cybersecurity -- The role of cybersecurity frameworks -- Enterprise cybersecurity and social media. Industrial management. http://id.loc.gov/authorities/subjects/sh85065889 Cyberspace Security measures Management. Cyberterrorism Prevention. Gestion d'entreprise. Cyberterrorism Prevention fast Industrial management fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh85065889 |
title | CyberStrong : a primer on cyber risk management for business managers / |
title_alt | Cyber strong |
title_auth | CyberStrong : a primer on cyber risk management for business managers / |
title_exact_search | CyberStrong : a primer on cyber risk management for business managers / |
title_full | CyberStrong : a primer on cyber risk management for business managers / Ajay Singh ; foreword by Ajai Chowdhry, Padma Bhushan Awardee and Co-founder, HCL. |
title_fullStr | CyberStrong : a primer on cyber risk management for business managers / Ajay Singh ; foreword by Ajai Chowdhry, Padma Bhushan Awardee and Co-founder, HCL. |
title_full_unstemmed | CyberStrong : a primer on cyber risk management for business managers / Ajay Singh ; foreword by Ajai Chowdhry, Padma Bhushan Awardee and Co-founder, HCL. |
title_short | CyberStrong : |
title_sort | cyberstrong a primer on cyber risk management for business managers |
title_sub | a primer on cyber risk management for business managers / |
topic | Industrial management. http://id.loc.gov/authorities/subjects/sh85065889 Cyberspace Security measures Management. Cyberterrorism Prevention. Gestion d'entreprise. Cyberterrorism Prevention fast Industrial management fast |
topic_facet | Industrial management. Cyberspace Security measures Management. Cyberterrorism Prevention. Gestion d'entreprise. Cyberterrorism Prevention Industrial management Electronic book. |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2648233 |
work_keys_str_mv | AT singhajay cyberstrongaprimeroncyberriskmanagementforbusinessmanagers AT singhajay cyberstrong |