Cybersecurity and decision makers: data security and digital trust (Record no. 1673)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 01791nam a2200229 4500 |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20250716115732.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 250716b2020|||||||| |||| 00| 0 eng d |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| ISBN | 9781119720355 |
| 041 ## - LANGUAGE CODE | |
| Language code of text/sound track or separate title | English |
| 082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 006.35 |
| 100 ## - MAIN ENTRY--AUTHOR NAME | |
| Personal name | Freminville, Marie De |
| Relator term | Author |
| 245 ## - TITLE STATEMENT | |
| Title | Cybersecurity and decision makers: data security and digital trust |
| 250 ## - EDITION STATEMENT | |
| Edition statement | 1st ed. |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
| Place of publication | New Jersey: |
| Name of publisher | Wiley Data and Cybersecurity, |
| Year of publication | 2020. |
| 300 ## - PHYSICAL DESCRIPTION | |
| Number of Pages | xxi, 187p. |
| 500 ## - GENERAL NOTE | |
| General note | Cyber security is a key issue affecting the confidence of Internet users and the sustainability of businesses. It is also a national issue with regards to economic development and resilience. As a concern, cyber risks are not only in the hands of IT security managers, but of everyone, and non-executive directors and managing directors may be held to account in relation to shareholders, customers, suppliers, employees, banks and public authorities. The implementation of a cybersecurity system, including processes, devices and training, is essential to protect a company against theft of strategic and personal data, sabotage and fraud. Cybersecurity and Decision Makers presents a comprehensive overview of cybercrime and best practice to confidently adapt to the digital world; covering areas such as risk mapping, compliance with the General Data Protection Regulation, cyber culture, ethics and crisis management. It is intended for anyone concerned about the protection of their data, as well as decision makers in any organization. |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical Term | Cybersecurity Dashboard |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical Term | Corporate Governance and Digital Responsibility |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical Term | Ensuring Cybersecurity in Practice |
| 856 ## - ELECTRONIC LOCATION AND ACCESS | |
| Uniform Resource Identifier | https://ieeexplore.ieee.org/servlet/opac?bknumber=9820899 |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Koha item type | e-Books |
| Withdrawn status | Lost status | Damaged status | Not for loan | Permanent Location | Current Location | Shelving location | Coded location qualifier | Full call number | Accession Number | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|
| Dr. S. R. Ranganathan Library | Dr. S. R. Ranganathan Library | Ebook (Online Access) | --- | 006.35 (Online Access) | EB0101 | e-Books |