Next-Generation Enterprise Security and Governance. (Record no. 4815)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 04953cam a2200565Ki 4500 |
001 - CONTROL NUMBER | |
control field | 9781003121541 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | FlBoTFG |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240213122824.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS | |
fixed length control field | m o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr cnu|||unuuu |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 220302s2022 xx eo 000 0 eng d |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | OCoLC-P |
Language of cataloging | eng |
Description conventions | rda |
-- | pn |
Transcribing agency | OCoLC-P |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781003121541 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1003121543 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 9780367639624 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781000569797 |
Qualifying information | (electronic bk. : EPUB) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1000569799 |
Qualifying information | (electronic bk. : EPUB) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 9781032247755 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781000569759 |
Qualifying information | (electronic bk. : PDF) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1000569756 |
Qualifying information | (electronic bk. : PDF) |
024 7# - OTHER STANDARD IDENTIFIER | |
Standard number or code | 10.1201/9781003121541 |
Source of number or code | doi |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (OCoLC)1301430850 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (OCoLC-P)1301430850 |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | QA76.9.A25 |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | COM |
Subject category code subdivision | 005030 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | BUS |
Subject category code subdivision | 083000 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | COM |
Subject category code subdivision | 053000 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | UR |
Source | bicssc |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 |
Edition number | 23 |
245 00 - TITLE STATEMENT | |
Title | Next-Generation Enterprise Security and Governance. |
250 ## - EDITION STATEMENT | |
Edition statement | First edition. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Place of production, publication, distribution, manufacture | [Place of publication not identified] : |
Name of producer, publisher, distributor, manufacturer | CRC Press, |
Date of production, publication, distribution, manufacture, or copyright notice | 2022. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 1 online resource (xvi, 248 pages). |
336 ## - CONTENT TYPE | |
Content type term | text |
Content type code | txt |
Source | rdacontent |
337 ## - MEDIA TYPE | |
Media type term | computer |
Media type code | c |
Source | rdamedia |
338 ## - CARRIER TYPE | |
Carrier type term | online resource |
Carrier type code | cr |
Source | rdacarrier |
490 0# - SERIES STATEMENT | |
Series statement | Security, Audit and Leadership Series |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Chapter 1: Enterprise Threat IntelligenceChapter 2: Enabling Corporate and Institutional Governance for Effective IT GovernanceChapter 3: The Non-Malicious Risky Behaviour in the Enterprise Information System SecurityChapter 4: Cybersecurity Incident Response in the EnterpriseChapter 5: Cyber-enabled crime as an enabler in market manipulation schemesChapter 6: Data Lakes: A Panacea for Big Data Problems, Cyber Safety Issues, and Enterprise Security Chapter 7: The Battle for Cloud Supremacy and the Remaking of Enterprise SecurityChapter 8: Security, Privacy and Trust of Emerging Intelligent Transportation: Cognitive Internet of VehiclesChapter 9: IT Governance and Enterprise Security Policy in the 6G Era |
520 ## - SUMMARY, ETC. | |
Summary, etc. | The Internet is making our daily lives as digital as possible, and this new era is called the Internet of Everything (IoE). The key force behind the rapid growth of the Internet is the technological advancement of enterprises. The digital world we live in is facilitated by these enterprises' advances and business intelligence. These enterprises need to deal with gazillions of bytes of data, and in today's age of General Data Protection Regulation, enterprises are required to ensure privacy and security of large-scale data collections. However, the increased connectivity and devices used to facilitate IoE are continually creating more room for cybercriminals to find vulnerabilities in enterprise systems and flaws in their corporate governance. Ensuring cybersecurity and corporate governance for enterprises should not be an afterthought or present a huge challenge. In recent times, the complex diversity of cyber-attacks has been skyrocketing, and zero-day attacks, such as ransomware, botnet, and telecommunication attacks, are happening more frequently than before. New hacking strategies would easily bypass existing enterprise security and governance platforms using advanced, persistent threats. For example, in 2020, the Toll Group firm was exploited by a new crypto-attack family for violating its data privacy, where an advanced ransomware technique was launched to exploit the corporation and request a huge figure of monetary ransom. Even after applying rational governance hygiene, cybersecurity configuration and software updates are often overlooked when they are most needed to fight cyber-crime and ensure data privacy. Therefore, the threat landscape in the context of enterprises has become wider and far more challenging. There is a clear need for collaborative work throughout the entire value chain of this network. In this context, this book addresses the cybersecurity and cooperate governance challenges associated with enterprises, which will provide a bigger picture of the concepts, intelligent techniques, practices, and open research directions in this area. This book serves as a single source of reference for acquiring the knowledge on the technology, process, and people involved in next-generation privacy and security. |
588 ## - SOURCE OF DESCRIPTION NOTE | |
Source of description note | OCLC-licensed vendor bibliographic record. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer security. |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | BUSINESS & ECONOMICS / Information Management |
Source of heading or term | bisacsh |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | COMPUTERS / Security / General |
Source of heading or term | bisacsh |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Āhameda, Mahiuddina, |
Relator term | editor. |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Moustafa, Nour, |
Relator term | editor. |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Barkat, Abu, |
Relator term | editor. |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Dowland, Paul, |
Relator term | editor. |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Materials specified | Taylor & Francis |
Uniform Resource Identifier | <a href="https://www.taylorfrancis.com/books/9781003121541">https://www.taylorfrancis.com/books/9781003121541</a> |
856 42 - ELECTRONIC LOCATION AND ACCESS | |
Materials specified | OCLC metadata license agreement |
Uniform Resource Identifier | <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a> |
No items available.