NLU Meghalaya Library

Online Public Access Catalogue (OPAC)

Cybersecurity and decision makers : (Record no. 12705)

MARC details
000 -LEADER
fixed length control field 07270cam a2200781 i 4500
001 - CONTROL NUMBER
control field on1150959452
003 - CONTROL NUMBER IDENTIFIER
control field OCoLC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240523125542.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr |||||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 200415s2020 enka o 000 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency YDX
Language of cataloging eng
Description conventions rda
-- pn
Transcribing agency YDX
Modifying agency N$T
-- YDXIT
-- EBLCP
-- DG1
-- OCLCF
-- OCL
-- UBY
-- RECBK
-- OCLCQ
-- OCLCO
-- MUB
-- UKAHL
-- VLB
-- OCLCQ
-- OCLCO
-- SFB
-- IEEEE
-- OCLCQ
-- UPM
-- OCLCQ
-- OCLCO
-- OCLCL
019 ## -
-- 1151192901
-- 1237618546
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1119720354
Qualifying information (electronic book)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119720355
Qualifying information (electronic book)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119720362
Qualifying information (electronic bk. ;
-- oBook)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1119720362
Qualifying information (electronic bk. ;
-- oBook)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119720379
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1119720370
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781786305190
Qualifying information (hardcover)
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1002/9781119720362
Source of number or code doi
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier AU@
System control number 000067253888
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)1150959452
Canceled/invalid control number (OCoLC)1151192901
-- (OCoLC)1237618546
037 ## - SOURCE OF ACQUISITION
Stock number 9820899
Source of stock number/acquisition IEEE
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number HF5548.37
Item number .F74 2020
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number F74 2020eb
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 658.478
Edition number 23
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
049 ## - LOCAL HOLDINGS (OCLC)
Holding library MAIN
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Fr�eminville, Marie de,
Relator term author.
245 10 - TITLE STATEMENT
Title Cybersecurity and decision makers :
Remainder of title data security and digital trust /
Statement of responsibility, etc. Marie de Fr�eminville.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture London :
Name of producer, publisher, distributor, manufacturer ISTE Ltd ;
Place of production, publication, distribution, manufacture Hoboken, NJ :
Name of producer, publisher, distributor, manufacturer John Wiley & Sons, Inc.,
Date of production, publication, distribution, manufacture, or copyright notice 2020.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource :
Other physical details illustrations
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
336 ## - CONTENT TYPE
Content type term still image
Content type code sti
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
490 1# - SERIES STATEMENT
Series statement Information systems, web and pervasive computing series
588 0# - SOURCE OF DESCRIPTION NOTE
Source of description note Online resource; title from digital title page (viewed on May 14, 2020).
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Cover -- Half-Title Page -- Title Page -- Copyright Page -- Contents -- Foreword -- Preface -- Introduction: Financial and Cyber Performance -- 1. An Increasingly Vulnerable World -- 1.1. The context -- 1.1.1. Technological disruptions and globalization -- 1.1.2. Data at the heart of industrial productivity -- 1.1.3. Cyberspace, an area without boundaries -- 1.1.4. IT resources -- 1.2. Cybercrime -- 1.2.1. The concept of cybercrime -- 1.2.2. Five types of threats -- 1.2.3. Five types of attackers -- 1.3. The cybersecurity market -- 1.3.1. The size of the market and its evolution
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 1.3.2. The market by sector of activity -- 1.3.3. Types of purchases and investments -- 1.3.4. Geographical distribution -- 1.4. Cyber incidents -- 1.4.1. The facts -- 1.4.2. Testimonials versus silence -- 1.4.3. Trends -- 1.4.4. Examples -- 1.5. Examples of particularly exposed sectors of activity -- 1.5.1. Cinema -- 1.5.2. Banks -- 1.5.3. Health -- 1.5.4. Tourism and business hotels -- 1.5.5. Critical national infrastructure -- 1.6. Responsibilities of officers and directors -- 2. Corporate Governance and Digital Responsibility -- 2.1. Corporate governance and stakeholders
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 2.2. The shareholders -- 2.2.1. Valuation of the company -- 2.2.2. Cyber rating agencies -- 2.2.3. Insider trading -- 2.2.4. Activist shareholders -- 2.2.5. The stock exchange authorities -- 2.2.6. The annual report -- 2.3. The board of directors -- 2.3.1. The facts -- 2.3.2. The four missions of the board of directors -- 2.3.3. Civil and criminal liability -- 2.3.4. The board of directors and cybersecurity -- 2.3.5. The board of directors and data protection -- 2.3.6. The statutory auditors -- 2.3.7. The numerical responsibility of the board of directors -- 2.4. Customers and suppliers
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 2.5. Operational management -- 2.5.1. The impacts of digital transformation -- 2.5.2. The digital strategy -- 2.5.3. The consequences of poor digital performance -- 2.5.4. Cybersecurity -- 2.5.5. Merger and acquisition transactions -- 2.5.6. Governance and data protection, cybersecurity -- 3. Risk Mapping -- 3.1. Cyber-risks -- 3.2. The context -- 3.3. Vulnerabilities -- 3.3.1. Fraud against the president -- 3.3.2. Supplier fraud -- 3.3.3. Other economic impacts -- 3.4. Legal risks -- 3.4.1. Class actions -- 3.4.2. Sanctions by the CNIL and the ICO -- 3.5. The objectives of risk mapping
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 3.6. The different methods of risk analysis -- 3.7. Risk assessment (identify) -- 3.7.1. The main actors -- 3.7.2. The steps -- 3.8. Protecting -- 3.9. Detecting -- 3.10. Reacting -- 3.11. Restoring -- 3.12. Decentralized mapping -- 3.12.1. The internal threat -- 3.12.2. Industrial risks -- 3.12.3. Suppliers, subcontractors and service providers -- 3.12.4. Connected objects -- 3.13. Insurance -- 3.14. Non-compliance risks and ethics -- 4. Regulations -- 4.1. The context -- 4.1.1. Complaints filed with the CNIL -- 4.1.2. Vectaury -- 4.1.3. Optical Center -- 4.1.4. Dailymotion
520 ## - SUMMARY, ETC.
Summary, etc. Cyber security is a key issue affecting the confidence of Internet users and the sustainability of businesses. It is also a national issue with regards to economic development and resilience. As a concern, cyber risks are not only in the hands of IT security managers, but of everyone, and non-executive directors and managing directors may be held to account in relation to shareholders, customers, suppliers, employees, banks and public authorities. The implementation of a cybersecurity system, including processes, devices and training, is essential to protect a company against theft of strategic and personal data, sabotage and fraud. Cybersecurity and Decision Makers presents a comprehensive overview of cybercrime and best practice to confidently adapt to the digital world; covering areas such as risk mapping, compliance with the General Data Protection Regulation, cyber culture, ethics and crisis management. It is intended for anyone concerned about the protection of their data, as well as decision makers in any organization.
590 ## - LOCAL NOTE (RLIN)
Local note John Wiley and Sons
Provenance (VM) [OBSOLETE] Wiley Online Library: Complete oBooks
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Business
General subdivision Data processing
-- Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security
General subdivision Management.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
650 #2 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer Security
650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Gestion
General subdivision Informatique
-- S�ecurit�e
-- Mesures.
650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element S�ecurit�e informatique
General subdivision Gestion.
650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element S�ecurit�e informatique.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTERS
General subdivision Security
-- Cryptography & Encryption.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security
General subdivision Management
Source of heading or term fast
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Business
General subdivision Data processing
-- Security measures
Source of heading or term fast
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security
Source of heading or term fast
758 ## - RESOURCE IDENTIFIER
Relationship information has work:
Label Cybersecurity and decision makers (Text)
Real World Object URI https://id.oclc.org/worldcat/entity/E39PCGghMQQWFMyjJyPxBmtMyd
Relationship https://id.oclc.org/worldcat/ontology/hasWork
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
Main entry heading De �eminville, Marie.
Title Cybersecurity and Decision Makers : Data Security and Digital Trust.
Place, publisher, and date of publication Newark : John Wiley & Sons, Incorporated, �2020
International Standard Book Number 9781786305190
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Information systems, web and pervasive computing series.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720362">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119720362</a>
938 ## -
-- Askews and Holts Library Services
-- ASKH
-- AH37732083
938 ## -
-- ProQuest Ebook Central
-- EBLB
-- EBL6173684
938 ## -
-- EBSCOhost
-- EBSC
-- 2436378
938 ## -
-- Recorded Books, LLC
-- RECE
-- rbeEB00831200
938 ## -
-- YBP Library Services
-- YANK
-- 301215732
994 ## -
-- 92
-- INLUM

No items available.