|
|
|
|
LEADER |
06900nam a2200889 4500 |
001 |
ocn881387451 |
003 |
OCoLC |
005 |
20170124071227.6 |
006 |
m o d |
007 |
cr ||||||||||| |
008 |
140404s2014 nju ob 001 0 eng |
010 |
|
|
|a 2014013652
|
040 |
|
|
|a DLC
|b eng
|e rda
|e pn
|c DLC
|d YDX
|d EBLCP
|d N$T
|d IDEBK
|d YDXCP
|d DG1
|d DEBSZ
|d CDX
|d OCLCF
|d STF
|d E7B
|d OCLCO
|d RECBK
|d TEFOD
|d UMI
|d B24X7
|d COO
|d OCLCO
|d OCLCQ
|d OCLCO
|d DEBBG
|d OCLCO
|d TEFOD
|d VT2
|d BAL
|d GrThAP
|
019 |
|
|
|a 889308033
|a 907398178
|a 915731398
|a 961577741
|a 962611150
|
020 |
|
|
|a 9781118935965
|q (electronic bk.)
|
020 |
|
|
|a 1118935969
|q (electronic bk.)
|
020 |
|
|
|a 9781118935958
|q (electronic bk.)
|
020 |
|
|
|a 1118935950
|q (electronic bk.)
|
020 |
|
|
|z 9781118836354
|q (hardback)
|
020 |
|
|
|z 9781118915028
|
020 |
|
|
|z 111891502X
|
020 |
|
|
|a 1118836359
|
020 |
|
|
|a 9781118836354
|
020 |
|
|
|a 9781306979634
|
020 |
|
|
|a 1306979633
|
029 |
1 |
|
|a CHBIS
|b 010259769
|
029 |
1 |
|
|a CHVBK
|b 32594217X
|
029 |
1 |
|
|a DEBSZ
|b 410564842
|
029 |
1 |
|
|a NZ1
|b 15920749
|
029 |
1 |
|
|a DEBBG
|b BV042683136
|
029 |
1 |
|
|a DEBBG
|b BV042741885
|
029 |
1 |
|
|a DEBSZ
|b 446583413
|
029 |
1 |
|
|a DEBBG
|b BV043610998
|
029 |
1 |
|
|a DEBSZ
|b 475027310
|
029 |
1 |
|
|a DEBBG
|b BV043396888
|
035 |
|
|
|a (OCoLC)881387451
|z (OCoLC)889308033
|z (OCoLC)907398178
|z (OCoLC)915731398
|z (OCoLC)961577741
|z (OCoLC)962611150
|
037 |
|
|
|a 3E370535-94AF-4124-B6CC-EE5680620239
|b OverDrive, Inc.
|n http://www.overdrive.com
|
042 |
|
|
|a pcc
|
050 |
0 |
0 |
|a HD30.2
|
072 |
|
7 |
|a BUS
|x 082000
|2 bisacsh
|
072 |
|
7 |
|a BUS
|x 041000
|2 bisacsh
|
072 |
|
7 |
|a BUS
|x 042000
|2 bisacsh
|
072 |
|
7 |
|a BUS
|x 085000
|2 bisacsh
|
082 |
0 |
0 |
|a 658.4/78
|2 23
|
084 |
|
|
|a BUS083000
|2 bisacsh
|
049 |
|
|
|a MAIN
|
100 |
1 |
|
|a Ulsch, N. MacDonnell,
|d 1951-
|
245 |
1 |
0 |
|a Cyber threat! :
|b how to manage the growing risk of cyber attacks /
|c N. MacDonnell Ulsch.
|
264 |
|
1 |
|a Hoboken, New Jersey :
|b Wiley,
|c 2014.
|
300 |
|
|
|a 1 online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Wiley corporate F & A Series
|
500 |
|
|
|a Includes index.
|
520 |
|
|
|a "Conquering cyber attacks requires a multi-sector, multi-modal approachCyber Threat! How to Manage the Growing Risk of Cyber Attacks is an in-depth examination of the very real cyber security risks facing all facets of government and industry, and the various factors that must align to maintain information integrity. Written by one of the nation's most highly respected cyber risk analysts, the book describes how businesses and government agencies must protect their most valuable assets to avoid potentially catastrophic consequences. Much more than just cyber security, the necessary solutions require government and industry to work cooperatively and intelligently. This resource reveals the extent of the problem, and provides a plan to change course and better manage and protect critical information. Recent news surrounding cyber hacking operations show how intellectual property theft is now a matter of national security, as well as economic and commercial security. Consequences are far-reaching, and can have enormous effects on national economies and international relations. Aggressive cyber forces in China, Russia, Eastern Europe and elsewhere, the rise of global organized criminal networks, and inattention to vulnerabilities throughout critical infrastructures converge to represent an abundantly clear threat. Managing the threat and keeping information safe is now a top priority for global businesses and government agencies. Cyber Threat! breaks the issue down into real terms, and proposes an approach to effective defense. Topics include: The information at risk The true extent of the threat The potential consequences across sectors The multifaceted approach to defense The growing cyber threat is fundamentally changing the nation's economic, diplomatic, military, and intelligence operations, and will extend into future technological, scientific, and geopolitical influence. The only effective solution will be expansive and complex, encompassing every facet of government and industry. Cyber Threat! details the situation at hand, and provides the information that can help keep the nation safe"--
|c Provided by publisher.
|
520 |
|
|
|a "Cyber Threat! is an in-depth examination of the very real risks facing all facets of government and industry, and the various factors that must align to maintain information integrity. The book describes how businesses and government agencies must protect their most valuable assets to avoid potentially catastrophic consequences"--
|c Provided by publisher.
|
588 |
0 |
|
|a Print version record and CIP data provided by publisher.
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a The Cyber Threat to the Corporate Brand: How It Will Impact Your Company -- The Rise of Cyber Organized Crime and Its Global Impact -- The Emergence of the Cyber Nation-State and Technology Espionage: Red China Rising and Its Global Cyber Theft Strategy -- Cyber Al Qaeda Poses a Threat to Critical Infrastructure -- Corporate Vulnerabilities in the Digital Society: Prepare to Defend Yourself and Your Brand -- What Is the True Cost of a Cyber Attack? -- U.S. Cyber Public Policy: Don't Rely on It to Protect the Brand -- Four Trends Driving Cyber Breaches and Increasing Corporate Risk: Technological, Cultural, Economic, and Geopolitical Shifts -- Social Media and Digital Protest -- Protecting the Brand : Actions Executive Management Must Take to Reduce Cyber Risk -- Managing the Brand When the Worst Occurs -- Managing the Big Risk: Third-Party Vendors -- Creating Executive Cyber Risk Councils -- Early Warnings: Something Bad Is on the Way.
|
650 |
|
0 |
|a Corporations
|x Security measures.
|
650 |
|
0 |
|a Business enterprises
|x Computer networks
|x Security measures.
|
650 |
|
0 |
|a Computer crimes
|x Prevention.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Information Management.
|2 bisacsh
|
650 |
|
7 |
|a Business enterprises
|x Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00842535
|
650 |
|
7 |
|a Computer crimes
|x Prevention.
|2 fast
|0 (OCoLC)fst00872068
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a Corporations
|x Security measures.
|2 fast
|0 (OCoLC)fst00879928
|
655 |
|
4 |
|a Electronic books.
|
655 |
|
0 |
|a Electronic books.
|
776 |
0 |
8 |
|i Print version:
|a Ulsch, N. MacDonnell, 1951-
|t Cyber threat!
|d Hoboken, New Jersey : Wiley, 2014
|z 9781118836354
|w (DLC) 2014012281
|
830 |
|
0 |
|a Wiley corporate F & A.
|
856 |
4 |
0 |
|u https://doi.org/10.1002/9781118915028
|z Full Text via HEAL-Link
|
994 |
|
|
|a 92
|b DG1
|