|
|
|
|
LEADER |
00000cam a2200000Ia 4500 |
001 |
JSTOR_ocn679603868 |
003 |
OCoLC |
005 |
20231005004200.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
101108s2009 enk o 000 0 eng d |
040 |
|
|
|a UMI
|b eng
|e pn
|c UMI
|d CEF
|d OCLCQ
|d E7B
|d DEBSZ
|d N$T
|d OCLCQ
|d B24X7
|d OCLCF
|d JSTOR
|d OCLCQ
|d AGLDB
|d LIV
|d OCLCQ
|d IOG
|d VTS
|d COO
|d LVT
|d STF
|d UAB
|d M8D
|d UKAHL
|d CNCEN
|d RDF
|d UX1
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 1175621715
|
020 |
|
|
|a 9781905356973
|q (electronic bk.)
|
020 |
|
|
|a 1905356978
|q (electronic bk.)
|
020 |
|
|
|z 9781905356966
|q (Paper)
|
020 |
|
|
|z 190535696X
|q (Paper)
|
029 |
1 |
|
|a DEBBG
|b BV043044692
|
029 |
1 |
|
|a DEBSZ
|b 355450798
|
029 |
1 |
|
|a DEBSZ
|b 421529202
|
029 |
1 |
|
|a HEBIS
|b 291520677
|
029 |
1 |
|
|a AU@
|b 000054176564
|
035 |
|
|
|a (OCoLC)679603868
|z (OCoLC)1175621715
|
037 |
|
|
|a 22573/ctt4k57mn
|b JSTOR
|
050 |
|
4 |
|a QA76.9.D314
|b M58 2009
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Mitchell, Stewart.
|
245 |
1 |
0 |
|a How to survive a data breach :
|b a pocket guide /
|c Stewart Mitchell.
|
260 |
|
|
|a Ely, U.K. :
|b IT Governance Pub.,
|c ©2009.
|
300 |
|
|
|a 1 online resource (44 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Print version record.
|
520 |
|
|
|a This handy pocket guide tells you what you need to do to prepare for a data breach. It explains the key measures you need to take to handle the situation and to minimise the damage. The information is drawn from various regulatory publications, and interviews with security experts, lawyers and software suppliers.
|
505 |
0 |
|
|a INTRODUCTION; CHAPTER 1: ASSESSMENT AND CONTAINMENT; Hit the ground running; The penny drops; Dissecting the data; Severity assessment; Let the response fit the crime; Gathering evidence; CHAPTER 2: NOTIFICATION; The disclosure conundrum; Data notification and UK law; Data notification and US law; Who to inform; Notification infrastructure; Public relations considerations; CHAPTER 3: WINNING HEARTS AND MINDS; Formulating a media strategy; Keeping customers onside; CHAPTER 4: POST-BREACH REVIEW; Learning from mistakes; Red alert for IT; Forming a data breach recovery plan
|
505 |
8 |
|
|a Planning privacy into the systemEnforce policy; APPENDIX
|
504 |
|
|
|a Includes bibliographical references.
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Demand Driven Acquisitions (DDA)
|
590 |
|
|
|a JSTOR
|b Books at JSTOR All Purchased
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Evidence Based Acquisitions
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Database security.
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|
650 |
|
6 |
|a Bases de données
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Data protection.
|2 fast
|0 (OCoLC)fst00887958
|
650 |
|
7 |
|a Database security.
|2 fast
|0 (OCoLC)fst00888063
|
856 |
4 |
0 |
|u https://jstor.uam.elogim.com/stable/10.2307/j.ctt5hh753
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH26079668
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00056011
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10496556
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 391130
|
994 |
|
|
|a 92
|b IZTAP
|