|
|
|
|
LEADER |
00000cam a2200000Mi 4500 |
001 |
KNOVEL_on1128417557 |
003 |
OCoLC |
005 |
20231027140348.0 |
006 |
m o d |
007 |
cr ||||||||||| |
008 |
191123s2019 xx o 000 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d JSTOR
|d EBLCP
|d OCLCF
|d OCLCQ
|d VT2
|d UX1
|d COO
|d OCLCO
|d FZL
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 1153022044
|a 1175627830
|a 1192346237
|a 1202553781
|a 1235828052
|a 1351582486
|
020 |
|
|
|a 9781787781962
|q (electronic bk.)
|
020 |
|
|
|a 1787781968
|q (electronic bk.)
|
020 |
|
|
|a 9781787781955
|
020 |
|
|
|a 178778195X
|q (Trade Paper)
|
020 |
|
|
|a 9781787781979
|
020 |
|
|
|a 1787781976
|
024 |
3 |
|
|a 9781787781955
|
024 |
8 |
|
|a 9781787781979
|
029 |
1 |
|
|a AU@
|b 000066261106
|
029 |
1 |
|
|a CHNEW
|b 001074482
|
029 |
1 |
|
|a CHVBK
|b 57947299X
|
035 |
|
|
|a (OCoLC)1128417557
|z (OCoLC)1153022044
|z (OCoLC)1175627830
|z (OCoLC)1192346237
|z (OCoLC)1202553781
|z (OCoLC)1235828052
|z (OCoLC)1351582486
|
037 |
|
|
|a 22573/ctvrng7h6
|b JSTOR
|
050 |
|
4 |
|a QA76.9.A25
|
082 |
0 |
4 |
|a 005.8
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Wright, Christopher.
|
245 |
1 |
0 |
|a How Cyber Security Can Protect Your Business :
|b a Guide for All Stakeholders.
|
260 |
|
|
|a Ely :
|b IT Governance Ltd,
|c 2019.
|
300 |
|
|
|a 1 online resource (68 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
347 |
|
|
|a text file
|2 rda
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Cover; Title; Copyright; Foreword; Preface; About the Author; Acknowledgements; Contents; Chapter 1: Introduction to cyber security GRC; Background to GRC; The three lines of defence model; What is the relevance of GRC to cyber?; Chapter 2: Cyber security governance; Introduction and overview; Culture and awareness; Threat and risk awareness; Risk management; Responding to cyber incidents; Cyber SOX; Summary: key cyber security questions for directors to ask; Chapter 3: Cyber security risk management; Introduction and overview; Risk management scoping; Process and control mapping
|
505 |
8 |
|
|a Risk assessmentDesigning and implementing controls; Testing of controls; Summary; Chapter 4: Cyber risks and controls; Introduction and overview; Identifying cyber risks and controls; Third-party service providers; Protecting against cyber risks; Summary; Chapter 5: Responding to an attack; Introduction and overview; Preparing for cyber attacks; Detecting potential cyber attacks; Recovery following a cyber attack; Summary; Chapter 6: Cyber compliance; Overview and introduction; Cyber compliance requirements; Summary; Books by the same author; Further reading
|
520 |
|
|
|a How Cyber Security Can Protect your Business - A guide for all stakeholders provides an effective and efficient framework for managing cyber governance, risk and compliance, which organisations can adapt to meet their own risk appetite and synchronise with their people, processes and technology.
|
542 |
|
|
|f © IT Governance Publishing
|g 2019
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Demand Driven Acquisitions (DDA)
|
590 |
|
|
|a Knovel
|b ACADEMIC - Software Engineering
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Evidence Based Acquisitions
|
590 |
|
|
|a Knovel
|b ACADEMIC - General Engineering & Project Administration
|
650 |
|
0 |
|a Computer security.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a Computer security
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a Wright, Christopher.
|t How Cyber Security Can Protect Your Business : A Guide for All Stakeholders.
|d Ely : IT Governance Ltd, ©2019
|z 9781787781955
|
856 |
4 |
0 |
|u https://appknovel.uam.elogim.com/kn/resources/kpHCSCPYB7/toc
|z Texto completo
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL5979597
|
994 |
|
|
|a 92
|b IZTAP
|