Cargando…

Cyber threat! : how to manage the growing risk of cyber attacks /

"Conquering cyber attacks requires a multi-sector, multi-modal approachCyber Threat! How to Manage the Growing Risk of Cyber Attacks is an in-depth examination of the very real cyber security risks facing all facets of government and industry, and the various factors that must align to maintain...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Ulsch, N. MacDonnell, 1951-
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Hoboken, New Jersey : Wiley, 2014.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 i 4500
001 OR_ocn881387451
003 OCoLC
005 20231017213018.0
006 m o d
007 cr |||||||||||
008 140404s2014 nju ob 001 0 eng
010 |a  2014013652 
040 |a DLC  |b eng  |e rda  |e pn  |c DLC  |d YDX  |d EBLCP  |d N$T  |d IDEBK  |d YDXCP  |d DG1  |d DEBSZ  |d CDX  |d OCLCF  |d STF  |d E7B  |d OCLCO  |d RECBK  |d TEFOD  |d UMI  |d B24X7  |d COO  |d OCLCO  |d OCLCQ  |d OCLCO  |d DEBBG  |d OCLCO  |d TEFOD  |d VT2  |d BAL  |d COCUF  |d DG1  |d CNNOR  |d LIP  |d PIFBY  |d ZCU  |d LIV  |d MERUC  |d OCLCQ  |d OCLCA  |d U3W  |d OCLCA  |d UCO  |d OCLCQ  |d CEF  |d CRU  |d VTS  |d OCLCQ  |d G3B  |d TKN  |d OCLCQ  |d UAB  |d DKC  |d OCLCQ  |d UKAHL  |d UX1  |d AUD  |d OCLCQ  |d DCT  |d ERF  |d OCLCQ  |d DLC  |d BRF  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 889308033  |a 907398178  |a 915731398  |a 961577741  |a 962611150  |a 992922972  |a 1055364276  |a 1081196800  |a 1100434291  |a 1101730987  |a 1103262243  |a 1124521508  |a 1148146043  |a 1244440672 
020 |a 9781118935965  |q (electronic bk.) 
020 |a 1118935969  |q (electronic bk.) 
020 |a 9781118935958  |q (electronic bk.) 
020 |a 1118935950  |q (electronic bk.) 
020 |a 1118836359 
020 |a 9781118836354 
020 |a 9781306979634 
020 |a 1306979633 
020 |z 9781118836354  |q (hardback) 
020 |z 9781118915028 
020 |z 111891502X 
029 1 |a AU@  |b 000053949949 
029 1 |a AU@  |b 000066260589 
029 1 |a AU@  |b 000066526539 
029 1 |a AU@  |b 000067100643 
029 1 |a CHBIS  |b 010259769 
029 1 |a CHNEW  |b 000943242 
029 1 |a CHVBK  |b 480234639 
029 1 |a DEBBG  |b BV042683136 
029 1 |a DEBBG  |b BV042741885 
029 1 |a DEBBG  |b BV043396888 
029 1 |a DEBBG  |b BV043610998 
029 1 |a DEBSZ  |b 410564842 
029 1 |a DEBSZ  |b 446583413 
029 1 |a DEBSZ  |b 475027310 
029 1 |a DEBSZ  |b 485049678 
029 1 |a DKDLA  |b 820120-katalog:999940559205765 
029 1 |a NZ1  |b 15920749 
035 |a (OCoLC)881387451  |z (OCoLC)889308033  |z (OCoLC)907398178  |z (OCoLC)915731398  |z (OCoLC)961577741  |z (OCoLC)962611150  |z (OCoLC)992922972  |z (OCoLC)1055364276  |z (OCoLC)1081196800  |z (OCoLC)1100434291  |z (OCoLC)1101730987  |z (OCoLC)1103262243  |z (OCoLC)1124521508  |z (OCoLC)1148146043  |z (OCoLC)1244440672 
037 |a 3E370535-94AF-4124-B6CC-EE5680620239  |b OverDrive, Inc.  |n http://www.overdrive.com 
042 |a pcc 
050 0 0 |a HD30.2 
072 7 |a BUS  |x 082000  |2 bisacsh 
072 7 |a BUS  |x 041000  |2 bisacsh 
072 7 |a BUS  |x 042000  |2 bisacsh 
072 7 |a BUS  |x 085000  |2 bisacsh 
082 0 0 |a 658.4/78  |2 23 
084 |a BUS083000  |2 bisacsh 
049 |a UAMI 
100 1 |a Ulsch, N. MacDonnell,  |d 1951- 
245 1 0 |a Cyber threat! :  |b how to manage the growing risk of cyber attacks /  |c N. MacDonnell Ulsch. 
264 1 |a Hoboken, New Jersey :  |b Wiley,  |c 2014. 
264 4 |c ©2014 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
500 |a Includes index. 
520 |a "Conquering cyber attacks requires a multi-sector, multi-modal approachCyber Threat! How to Manage the Growing Risk of Cyber Attacks is an in-depth examination of the very real cyber security risks facing all facets of government and industry, and the various factors that must align to maintain information integrity. Written by one of the nation's most highly respected cyber risk analysts, the book describes how businesses and government agencies must protect their most valuable assets to avoid potentially catastrophic consequences. Much more than just cyber security, the necessary solutions require government and industry to work cooperatively and intelligently. This resource reveals the extent of the problem, and provides a plan to change course and better manage and protect critical information. Recent news surrounding cyber hacking operations show how intellectual property theft is now a matter of national security, as well as economic and commercial security. Consequences are far-reaching, and can have enormous effects on national economies and international relations. Aggressive cyber forces in China, Russia, Eastern Europe and elsewhere, the rise of global organized criminal networks, and inattention to vulnerabilities throughout critical infrastructures converge to represent an abundantly clear threat. Managing the threat and keeping information safe is now a top priority for global businesses and government agencies. Cyber Threat! breaks the issue down into real terms, and proposes an approach to effective defense. Topics include: The information at risk The true extent of the threat The potential consequences across sectors The multifaceted approach to defense The growing cyber threat is fundamentally changing the nation's economic, diplomatic, military, and intelligence operations, and will extend into future technological, scientific, and geopolitical influence. The only effective solution will be expansive and complex, encompassing every facet of government and industry. Cyber Threat! details the situation at hand, and provides the information that can help keep the nation safe"--  |c Provided by publisher 
520 |a "Cyber Threat! is an in-depth examination of the very real risks facing all facets of government and industry, and the various factors that must align to maintain information integrity. The book describes how businesses and government agencies must protect their most valuable assets to avoid potentially catastrophic consequences"--  |c Provided by publisher 
588 0 |a Print version record and CIP data provided by publisher. 
504 |a Includes bibliographical references and index. 
505 0 |a The Cyber Threat to the Corporate Brand: How It Will Impact Your Company -- The Rise of Cyber Organized Crime and Its Global Impact -- The Emergence of the Cyber Nation-State and Technology Espionage: Red China Rising and Its Global Cyber Theft Strategy -- Cyber Al Qaeda Poses a Threat to Critical Infrastructure -- Corporate Vulnerabilities in the Digital Society: Prepare to Defend Yourself and Your Brand -- What Is the True Cost of a Cyber Attack? -- U.S. Cyber Public Policy: Don't Rely on It to Protect the Brand -- Four Trends Driving Cyber Breaches and Increasing Corporate Risk: Technological, Cultural, Economic, and Geopolitical Shifts -- Social Media and Digital Protest -- Protecting the Brand : Actions Executive Management Must Take to Reduce Cyber Risk -- Managing the Brand When the Worst Occurs -- Managing the Big Risk: Third-Party Vendors -- Creating Executive Cyber Risk Councils -- Early Warnings: Something Bad Is on the Way. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Corporations  |x Security measures. 
650 0 |a Business enterprises  |x Computer networks  |x Security measures. 
650 0 |a Computer crimes  |x Prevention. 
650 0 |a Computer security. 
650 0 |a Computer networks  |x Security measures. 
650 6 |a Sociétés  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 7 |a BUSINESS & ECONOMICS  |x Information Management.  |2 bisacsh 
650 7 |a Business enterprises  |x Computer networks  |x Security measures  |2 fast 
650 7 |a Computer crimes  |x Prevention  |2 fast 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Corporations  |x Security measures  |2 fast 
776 0 8 |i Print version:  |a Ulsch, N. MacDonnell, 1951-  |t Cyber threat!  |d Hoboken, New Jersey : Wiley, [2014]  |z 9781118836354  |w (DLC) 2014012281  |w (OCoLC)864093082 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781118935958/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH26918940 
938 |a Books 24x7  |b B247  |n bks00063511 
938 |a Coutts Information Services  |b COUT  |n 28422649 
938 |a EBL - Ebook Library  |b EBLB  |n EBL4040012 
938 |a ebrary  |b EBRY  |n ebr10895757 
938 |a EBSCOhost  |b EBSC  |n 814647 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis28680694 
938 |a Recorded Books, LLC  |b RECE  |n rbeEB00595859 
938 |a YBP Library Services  |b YANK  |n 11632346 
938 |a YBP Library Services  |b YANK  |n 11986406 
994 |a 92  |b IZTAP