Cybersecurity and decision makers : (Record no. 12705)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 07270cam a2200781 i 4500 |
001 - CONTROL NUMBER | |
control field | on1150959452 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | OCoLC |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240523125542.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS | |
fixed length control field | m o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr ||||||||||| |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 200415s2020 enka o 000 0 eng d |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | YDX |
Language of cataloging | eng |
Description conventions | rda |
-- | pn |
Transcribing agency | YDX |
Modifying agency | N$T |
-- | YDXIT |
-- | EBLCP |
-- | DG1 |
-- | OCLCF |
-- | OCL |
-- | UBY |
-- | RECBK |
-- | OCLCQ |
-- | OCLCO |
-- | MUB |
-- | UKAHL |
-- | VLB |
-- | OCLCQ |
-- | OCLCO |
-- | SFB |
-- | IEEEE |
-- | OCLCQ |
-- | UPM |
-- | OCLCQ |
-- | OCLCO |
-- | OCLCL |
019 ## - | |
-- | 1151192901 |
-- | 1237618546 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1119720354 |
Qualifying information | (electronic book) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781119720355 |
Qualifying information | (electronic book) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781119720362 |
Qualifying information | (electronic bk. ; |
-- | oBook) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1119720362 |
Qualifying information | (electronic bk. ; |
-- | oBook) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781119720379 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1119720370 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 9781786305190 |
Qualifying information | (hardcover) |
024 7# - OTHER STANDARD IDENTIFIER | |
Standard number or code | 10.1002/9781119720362 |
Source of number or code | doi |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | AU@ |
System control number | 000067253888 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (OCoLC)1150959452 |
Canceled/invalid control number | (OCoLC)1151192901 |
-- | (OCoLC)1237618546 |
037 ## - SOURCE OF ACQUISITION | |
Stock number | 9820899 |
Source of stock number/acquisition | IEEE |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | HF5548.37 |
Item number | .F74 2020 |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | QA76.9.A25 |
Item number | F74 2020eb |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 658.478 |
Edition number | 23 |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 |
Edition number | 23 |
049 ## - LOCAL HOLDINGS (OCLC) | |
Holding library | MAIN |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Fr�eminville, Marie de, |
Relator term | author. |
245 10 - TITLE STATEMENT | |
Title | Cybersecurity and decision makers : |
Remainder of title | data security and digital trust / |
Statement of responsibility, etc. | Marie de Fr�eminville. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Place of production, publication, distribution, manufacture | London : |
Name of producer, publisher, distributor, manufacturer | ISTE Ltd ; |
Place of production, publication, distribution, manufacture | Hoboken, NJ : |
Name of producer, publisher, distributor, manufacturer | John Wiley & Sons, Inc., |
Date of production, publication, distribution, manufacture, or copyright notice | 2020. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 1 online resource : |
Other physical details | illustrations |
336 ## - CONTENT TYPE | |
Content type term | text |
Content type code | txt |
Source | rdacontent |
336 ## - CONTENT TYPE | |
Content type term | still image |
Content type code | sti |
Source | rdacontent |
337 ## - MEDIA TYPE | |
Media type term | computer |
Media type code | c |
Source | rdamedia |
338 ## - CARRIER TYPE | |
Carrier type term | online resource |
Carrier type code | cr |
Source | rdacarrier |
490 1# - SERIES STATEMENT | |
Series statement | Information systems, web and pervasive computing series |
588 0# - SOURCE OF DESCRIPTION NOTE | |
Source of description note | Online resource; title from digital title page (viewed on May 14, 2020). |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Cover -- Half-Title Page -- Title Page -- Copyright Page -- Contents -- Foreword -- Preface -- Introduction: Financial and Cyber Performance -- 1. An Increasingly Vulnerable World -- 1.1. The context -- 1.1.1. Technological disruptions and globalization -- 1.1.2. Data at the heart of industrial productivity -- 1.1.3. Cyberspace, an area without boundaries -- 1.1.4. IT resources -- 1.2. Cybercrime -- 1.2.1. The concept of cybercrime -- 1.2.2. Five types of threats -- 1.2.3. Five types of attackers -- 1.3. The cybersecurity market -- 1.3.1. The size of the market and its evolution |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | 1.3.2. The market by sector of activity -- 1.3.3. Types of purchases and investments -- 1.3.4. Geographical distribution -- 1.4. Cyber incidents -- 1.4.1. The facts -- 1.4.2. Testimonials versus silence -- 1.4.3. Trends -- 1.4.4. Examples -- 1.5. Examples of particularly exposed sectors of activity -- 1.5.1. Cinema -- 1.5.2. Banks -- 1.5.3. Health -- 1.5.4. Tourism and business hotels -- 1.5.5. Critical national infrastructure -- 1.6. Responsibilities of officers and directors -- 2. Corporate Governance and Digital Responsibility -- 2.1. Corporate governance and stakeholders |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | 2.2. The shareholders -- 2.2.1. Valuation of the company -- 2.2.2. Cyber rating agencies -- 2.2.3. Insider trading -- 2.2.4. Activist shareholders -- 2.2.5. The stock exchange authorities -- 2.2.6. The annual report -- 2.3. The board of directors -- 2.3.1. The facts -- 2.3.2. The four missions of the board of directors -- 2.3.3. Civil and criminal liability -- 2.3.4. The board of directors and cybersecurity -- 2.3.5. The board of directors and data protection -- 2.3.6. The statutory auditors -- 2.3.7. The numerical responsibility of the board of directors -- 2.4. Customers and suppliers |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | 2.5. Operational management -- 2.5.1. The impacts of digital transformation -- 2.5.2. The digital strategy -- 2.5.3. The consequences of poor digital performance -- 2.5.4. Cybersecurity -- 2.5.5. Merger and acquisition transactions -- 2.5.6. Governance and data protection, cybersecurity -- 3. Risk Mapping -- 3.1. Cyber-risks -- 3.2. The context -- 3.3. Vulnerabilities -- 3.3.1. Fraud against the president -- 3.3.2. Supplier fraud -- 3.3.3. Other economic impacts -- 3.4. Legal risks -- 3.4.1. Class actions -- 3.4.2. Sanctions by the CNIL and the ICO -- 3.5. The objectives of risk mapping |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | 3.6. The different methods of risk analysis -- 3.7. Risk assessment (identify) -- 3.7.1. The main actors -- 3.7.2. The steps -- 3.8. Protecting -- 3.9. Detecting -- 3.10. Reacting -- 3.11. Restoring -- 3.12. Decentralized mapping -- 3.12.1. The internal threat -- 3.12.2. Industrial risks -- 3.12.3. Suppliers, subcontractors and service providers -- 3.12.4. Connected objects -- 3.13. Insurance -- 3.14. Non-compliance risks and ethics -- 4. Regulations -- 4.1. The context -- 4.1.1. Complaints filed with the CNIL -- 4.1.2. Vectaury -- 4.1.3. Optical Center -- 4.1.4. Dailymotion |
520 ## - SUMMARY, ETC. | |
Summary, etc. | Cyber security is a key issue affecting the confidence of Internet users and the sustainability of businesses. It is also a national issue with regards to economic development and resilience. As a concern, cyber risks are not only in the hands of IT security managers, but of everyone, and non-executive directors and managing directors may be held to account in relation to shareholders, customers, suppliers, employees, banks and public authorities. The implementation of a cybersecurity system, including processes, devices and training, is essential to protect a company against theft of strategic and personal data, sabotage and fraud. Cybersecurity and Decision Makers presents a comprehensive overview of cybercrime and best practice to confidently adapt to the digital world; covering areas such as risk mapping, compliance with the General Data Protection Regulation, cyber culture, ethics and crisis management. It is intended for anyone concerned about the protection of their data, as well as decision makers in any organization. |
590 ## - LOCAL NOTE (RLIN) | |
Local note | John Wiley and Sons |
Provenance (VM) [OBSOLETE] | Wiley Online Library: Complete oBooks |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Business |
General subdivision | Data processing |
-- | Security measures. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer security |
General subdivision | Management. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer security. |
650 #2 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer Security |
650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Gestion |
General subdivision | Informatique |
-- | S�ecurit�e |
-- | Mesures. |
650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | S�ecurit�e informatique |
General subdivision | Gestion. |
650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | S�ecurit�e informatique. |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | COMPUTERS |
General subdivision | Security |
-- | Cryptography & Encryption. |
Source of heading or term | bisacsh |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer security |
General subdivision | Management |
Source of heading or term | fast |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Business |
General subdivision | Data processing |
-- | Security measures |
Source of heading or term | fast |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer security |
Source of heading or term | fast |
758 ## - RESOURCE IDENTIFIER | |
Relationship information | has work: |
Label | Cybersecurity and decision makers (Text) |
Real World Object URI | https://id.oclc.org/worldcat/entity/E39PCGghMQQWFMyjJyPxBmtMyd |
Relationship | https://id.oclc.org/worldcat/ontology/hasWork |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Relationship information | Print version: |
Main entry heading | De �eminville, Marie. |
Title | Cybersecurity and Decision Makers : Data Security and Digital Trust. |
Place, publisher, and date of publication | Newark : John Wiley & Sons, Incorporated, �2020 |
International Standard Book Number | 9781786305190 |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE | |
Uniform title | Information systems, web and pervasive computing series. |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720362">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720362</a> |
938 ## - | |
-- | Askews and Holts Library Services |
-- | ASKH |
-- | AH37732083 |
938 ## - | |
-- | ProQuest Ebook Central |
-- | EBLB |
-- | EBL6173684 |
938 ## - | |
-- | EBSCOhost |
-- | EBSC |
-- | 2436378 |
938 ## - | |
-- | Recorded Books, LLC |
-- | RECE |
-- | rbeEB00831200 |
938 ## - | |
-- | YBP Library Services |
-- | YANK |
-- | 301215732 |
994 ## - | |
-- | 92 |
-- | INLUM |
No items available.