|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
EBSCO_on1062396762 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
181112t20182018dk a ob 001 0 eng d |
040 |
|
|
|a N$T
|b eng
|e rda
|e pn
|c N$T
|d YDX
|d OCLCF
|d EBLCP
|d UKAHL
|d OCLCQ
|d OCL
|d OCLCO
|d OCLCQ
|d OCLCO
|d K6U
|d OCL
|d OCLCQ
|d TYFRS
|d OCLCO
|
019 |
|
|
|a 1066037184
|a 1088205724
|
020 |
|
|
|a 9788793609136
|q (Hardback)
|
020 |
|
|
|a 8793609132
|q (Hardback)
|
020 |
|
|
|a 8793609124
|q (Ebook)
|
020 |
|
|
|a 9788793609129
|q (Ebook)
|
020 |
|
|
|a 8770220794
|q (electronic bk.)
|
020 |
|
|
|a 9788770220798
|q (electronic bk.)
|
020 |
|
|
|a 9781003338253
|q (electronic bk.)
|
020 |
|
|
|a 1003338259
|q (electronic bk.)
|
020 |
|
|
|a 9781000799347
|q (electronic bk. : PDF)
|
020 |
|
|
|a 1000799344
|q (electronic bk. : PDF)
|
020 |
|
|
|a 9781000799484
|q (electronic bk. : EPUB)
|
020 |
|
|
|a 1000799484
|q (electronic bk. : EPUB)
|
024 |
7 |
|
|a 10.1201/9781003338253
|2 doi
|
035 |
|
|
|a (OCoLC)1062396762
|z (OCoLC)1066037184
|z (OCoLC)1088205724
|
037 |
|
|
|a 9781003338253
|b Taylor & Francis
|
043 |
|
|
|a e------
|
050 |
|
4 |
|a KJE6071.A432016
|b G63 2018
|
072 |
|
7 |
|a LAW
|x 068000
|2 bisacsh
|
072 |
|
7 |
|a SCI
|x 024000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 bicssc
|
082 |
0 |
4 |
|a 343.240999
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Gobeo, Antoni,
|e author.
|
245 |
1 |
0 |
|a GDPR and cyber security for business information systems /
|c Antoni Gobeo, Connor Fowler, William J. Buchanan.
|
264 |
|
1 |
|a Denmark :
|b River Publishers,
|c [2018]
|
264 |
|
4 |
|c ©2018
|
300 |
|
|
|a 1 online resource (xviii, 264 pages) :
|b color illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a River Publishers series in security and digital forensics
|
504 |
|
|
|a Includes bibliographical references and index.
|
520 |
|
|
|a This book is designed to present specific and practical information on the key areas of compliance with the GDPR relevant to business information systems in a global context. Key areas covered include: principles and rights within the GDPR, information security, data protection by design and default, policies and procedures, encryption methods, incident response and management, data breaches.
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Front Cover; Half Title Page; RIVER PUBLISHERS SERIES IN SECURITY AND DIGITAL FORENSICS; Title Page; Copyright Page; Contents; Preface; Acknowledgements; List of Figures; List of Abbreviations; Part One: Introduction; Chapter 1: The GDPR Fundamentals; A Brief History of Data Collection and Data Protection; The GDPR; To Whom Does It Apply?; Who Is Exempt?; Personal Data: Why it's Worth Protecting; The Privacy Argument; The Economic Argument; Consequences to Individuals of Data Misuse; The Heart of the GDPR; The Six Principles; The Six Lawful Bases; The Rights of Natural Persons in the GDPR
|
505 |
8 |
|
|a The Three ExceptionsChapter Review; References; Appendix; Chapter 2: Organisations, Institutions, and Roles; Introduction; Quis Custodiet Ipsos Custodes?; European Union; Duties of the EDPB; Supervisory Authorities; The ICO in Action; Organisations Under the GDPR; Public Authorities; Types of Public Authorities; NGO's and Charities; NGO's and Charities as Data Controllers; Institutions and Agencies; Court of Justice of the European Union; European Union Agency for Network and Information Security: ENISA; The United Kingdom; Government Communications Headquarters
|
505 |
8 |
|
|a The National Cyber Security CentreThe GCHQ Bude: GCHQ Composite Signals Organisation Morwenstow; Investigatory Powers Commissioner's Office; Investigatory Powers Tribunal; Chapter Review; References; Appendix; Chapter 3: Information Systems Management and the GDPR; Introduction; Information Systems in Organisations; Processes and Essential Systems; Types of Information Systems; Information Management; What is IM; Stakeholders; Data Management through the Ages; Functions of Information Management; Information Systems Theory; Data Flow Mapping; Data Flow Mapping Techniques
|
505 |
8 |
|
|a Data Controller and Data ProcessorData Controller; Data Processor; Distinguishing the Difference Between the Data Controller and the Data Processor; Chapter Review; References; Chapter 4: CyberSecurity and the GDPR; Introduction; Cyber Security as a Function of Compliance; Privacy; Protection; Process; Cyber Attacks; Malware; Social Engineering; Phishing; Countermeasures; Encryption; Chapter Review; References; Part Two: Preparatory Steps; Chapter 5: Data Protection by Design and Default; Introduction; Data Protection is a Program; not a Project; What is Privacy?
|
505 |
8 |
|
|a Privacy and Protection by Design and DefaultThe Security Principle: Appropriate Technical and Organisational Measures; Organisational: A Corporate Culture of Data Protection; Staff Awareness of Security; Organisational Responsibility for Security; Technical Measures; Physical Security; Hardware Security; Computer Security: Design; Computer Security: Measures; Open Web Application Security Project (OWASP); Assessing Information Assets: Value and Risk; Information Classification and Labelling; Special Category Data: Sensitive and Very Sensitive Personal Data; Criminal Offence Data
|
545 |
0 |
|
|a Antoni Gobeo, Connor Fowler, William J. Buchanan
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Data protection
|x Law and legislation
|z European Union countries.
|
650 |
|
0 |
|a Cyberspace
|x Security measures.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Database security.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Bases de données
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a LAW
|x Military.
|2 bisacsh
|
650 |
|
7 |
|a SCIENCE / Energy
|2 bisacsh
|
650 |
|
7 |
|a Cyberspace
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Data protection
|x Law and legislation
|2 fast
|
650 |
|
7 |
|a Database security
|2 fast
|
651 |
|
7 |
|a European Union countries
|2 fast
|
700 |
1 |
|
|a Fowler, Connor,
|e author.
|
700 |
1 |
|
|a Buchanan, William,
|e author.
|
776 |
0 |
8 |
|i Print version:
|a Gobeo, Antoni.
|t GDPR and cyber security for business information systems.
|d Denmark : River Publishers, [2018]
|z 9788793609136
|w (OCoLC)1029796346
|
830 |
|
0 |
|a River Publishers series in security and digital forensics.
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1874788
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH40583900
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 18126435
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH35946334
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1874788
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 16065773
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 18105924
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 14943651
|
994 |
|
|
|a 92
|b IZTAP
|