000 | 03385cam a22005658i 4500 | ||
---|---|---|---|
001 | 9781003244295 | ||
003 | FlBoTFG | ||
005 | 20240213122827.0 | ||
006 | m o d | ||
007 | cr ||||||||||| | ||
008 | 220307s2023 nyu ob 001 0 eng | ||
040 |
_aOCoLC-P _beng _erda _cOCoLC-P |
||
020 |
_a9781003244295 _q(ebook) |
||
020 | _a1003244297 | ||
020 |
_a9781000636390 _q(electronic bk. : EPUB) |
||
020 |
_a1000636399 _q(electronic bk. : EPUB) |
||
020 |
_a9781000636338 _q(electronic bk. : PDF) |
||
020 |
_a100063633X _q(electronic bk. : PDF) |
||
020 |
_z9781032154756 _q(hardback) |
||
020 |
_z9781032154763 _q(paperback) |
||
024 | 7 |
_a10.4324/9781003244295 _2doi |
|
035 | _a(OCoLC)1303569875 | ||
035 | _a(OCoLC-P)1303569875 | ||
050 | 0 | 0 | _aHF5548.37 |
072 | 7 |
_aBUS _x000000 _2bisacsh |
|
072 | 7 |
_aBUS _x063000 _2bisacsh |
|
072 | 7 |
_aCOM _x014000 _2bisacsh |
|
072 | 7 |
_aKJC _2bicssc |
|
082 | 0 | 0 |
_a658.4/78 _223/eng/20220307 |
100 | 1 |
_aTrim, Peter R. J., _eauthor. |
|
245 | 1 | 0 |
_aStrategic cyber security management / _cPeter Trim, Yang-Im Lee. |
250 | _a1 Edition. | ||
264 | 1 |
_aNew York, NY : _bRoutledge, _c2023. |
|
300 | _a1 online resource | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
520 |
_a"This textbook places cyber security management within an organizational and strategic framework, enabling students to develop their knowledge and skills for a future career. The reader will learn to: evaluate different types of cyber risk, carry out a threat analysis and place cyber threats in order of severity, formulate appropriate cyber security management policy, establish an organization-specific intelligence framework and security culture, devise and implement a cyber security awareness programme, and integrate cyber security within an organization's operating system. Learning objectives, chapter summaries and further reading in each chapter provide structure and routes to further in-depth research. Firm theoretical grounding is coupled with short problem-based case studies reflecting a range of organizations and perspectives, illustrating how the theory translates to practice, with each case study followed by a set of questions to encourage understanding and analysis. Non-technical and comprehensive, this textbook shows final year undergraduate students and postgraduate students of Cyber Security Management, as well as reflective practitioners, how to adopt a pro-active approach to the management of cyber security. Online resources include PowerPoint slides, an instructor's manual, and a test bank of questions"-- _cProvided by publisher. |
||
588 | _aOCLC-licensed vendor bibliographic record. | ||
650 | 0 |
_aBusiness enterprises _xComputer networks _xSecurity measures. |
|
650 | 0 | _aComputer security. | |
650 | 0 |
_aComputer crimes _xPrevention. |
|
650 | 0 |
_aCorporations _xSecurity measures. |
|
650 | 7 |
_aBUSINESS & ECONOMICS / General _2bisacsh |
|
650 | 7 |
_aBUSINESS & ECONOMICS / Strategic Planning _2bisacsh |
|
650 | 7 |
_aCOMPUTERS / Computer Science _2bisacsh |
|
700 | 1 |
_aLee, Yang-Im, _eauthor. |
|
856 | 4 | 0 |
_3Taylor & Francis _uhttps://www.taylorfrancis.com/books/9781003244295 |
856 | 4 | 2 |
_3OCLC metadata license agreement _uhttp://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf |
999 |
_c5133 _d5133 |