|
|
|
|
LEADER |
00000cam a2200000Ii 4500 |
001 |
OR_ocn981912077 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu|||unuuu |
008 |
170407s2017 nyu ob 001 0 eng d |
010 |
|
|
|a 2017302691
|
040 |
|
|
|a N$T
|b eng
|e rda
|e pn
|c N$T
|d N$T
|d YDX
|d EBLCP
|d DG1
|d IDEBK
|d UMI
|d CNCGM
|d STF
|d TOH
|d COO
|d OTZ
|d OCLCQ
|d VT2
|d OCLCO
|d DEBSZ
|d UCO
|d OCLCQ
|d OCLCO
|d MERUC
|d OCLCF
|d CEF
|d KSU
|d OCLCQ
|d Z@L
|d BRX
|d UKMGB
|d OCLCQ
|d WYU
|d RECBK
|d LVT
|d U3W
|d OCLCQ
|d UAB
|d UKAHL
|d OL$
|d OCLCQ
|d DG1
|d OCLCO
|d OCL
|d OCLCQ
|d OCLCO
|
016 |
7 |
|
|a 018296605
|2 Uk
|
019 |
|
|
|a 982105017
|a 982141719
|a 982231336
|a 982325754
|a 982394588
|a 985460556
|a 1017889470
|a 1066582378
|a 1103274729
|a 1111151093
|a 1129361278
|a 1152978796
|a 1192340581
|a 1228569153
|a 1240520663
|a 1244446622
|a 1244449038
|a 1249244725
|
020 |
|
|
|a 9781119308959
|q (electronic bk.)
|
020 |
|
|
|a 111930895X
|q (electronic bk.)
|
020 |
|
|
|a 9781119309741
|q (electronic bk.)
|
020 |
|
|
|a 1119309743
|q (electronic bk.)
|
020 |
|
|
|a 9781119309727
|
020 |
|
|
|a 1119309727
|
020 |
|
|
|z 9781119308805
|
020 |
|
|
|z 1119308801
|
029 |
1 |
|
|a AU@
|b 000060076016
|
029 |
1 |
|
|a AU@
|b 000060098393
|
029 |
1 |
|
|a AU@
|b 000065314129
|
029 |
1 |
|
|a AU@
|b 000066232381
|
029 |
1 |
|
|a CHBIS
|b 011081406
|
029 |
1 |
|
|a CHNEW
|b 000951784
|
029 |
1 |
|
|a CHVBK
|b 484206796
|
029 |
1 |
|
|a CHVBK
|b 502847492
|
029 |
1 |
|
|a DEBSZ
|b 491140843
|
029 |
1 |
|
|a GBVCP
|b 1004858787
|
029 |
1 |
|
|a UKMGB
|b 018296605
|
029 |
1 |
|
|a AU@
|b 000066526313
|
035 |
|
|
|a (OCoLC)981912077
|z (OCoLC)982105017
|z (OCoLC)982141719
|z (OCoLC)982231336
|z (OCoLC)982325754
|z (OCoLC)982394588
|z (OCoLC)985460556
|z (OCoLC)1017889470
|z (OCoLC)1066582378
|z (OCoLC)1103274729
|z (OCoLC)1111151093
|z (OCoLC)1129361278
|z (OCoLC)1152978796
|z (OCoLC)1192340581
|z (OCoLC)1228569153
|z (OCoLC)1240520663
|z (OCoLC)1244446622
|z (OCoLC)1244449038
|z (OCoLC)1249244725
|
037 |
|
|
|a CL0500000854
|b Safari Books Online
|
050 |
|
4 |
|a HV6773
|
050 |
|
4 |
|a HD30.38
|b .A58 2017
|
072 |
|
7 |
|a COM
|x 000000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Antonucci, Domenic,
|e author.
|
245 |
1 |
4 |
|a The cyber risk handbook :
|b creating and measuring effective cybersecurity capabilities /
|c Domenic Antonucci.
|
264 |
|
1 |
|a Hoboken, New Jersey :
|b John Wiley and Sons, Inc.,
|c 2017.
|
264 |
|
4 |
|c ©2017
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
0 |
|
|a Wiley finance series
|
500 |
|
|
|a Includes index.
|
588 |
0 |
|
|a Vendor-supplied metadata.
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a Introduction -- Board cyber risk oversight -- Principles behind cyber risk management -- Cybersecurity policies and procedures -- Cyber strategic performance management -- Standards and frameworks for cybersecurity -- Identifying, analyzing, and evaluating cyber risks -- Treating cyber risks -- Treating cyber risks using process capabilities -- Treating cyber risks -- using insurance and finance -- Monitoring and review using key risk indicators (KRIs) -- Cybersecurity incident and crisis management -- Business continuity management and cybersecurity -- External context and supply chain -- Internal organization context -- Culture and human factors -- Legal and compliance -- Assurance and cyber risk management -- Information asset management for cyber -- Physical security -- Cybersecurity for operations and communications -- Access control -- Cybersecurity systems: acquisition, development, and maintenance -- People risk management in the digital age -- Cyber competencies and the cybersecurity officer -- Human resources security -- Epilogue.
|
520 |
|
|
|a "The Cyber Risk Handbook is the practitioner's guide to implementing, measuring and improving the counter-cyber capabilities of the modern enterprise. The first resource of its kind, this book provides authoritative guidance for real-world situations, and cross-functional solutions for enterprise-wide improvement. Beginning with an overview of counter-cyber evolution, the discussion quickly turns practical with design and implementation guidance for the range of capabilities expected of a robust cyber risk management system that is integrated with the enterprise risk management (ERM) system. Expert contributors from around the globe weigh in on specialized topics with tools and techniques to help any type or size of organization create a robust system tailored to its needs. Chapter summaries of required capabilities are aggregated to provide a new cyber risk maturity model used to benchmark capabilities and to road-map gap-improvement. Cyber risk is a fast-growing enterprise risk, not just an IT risk. Yet seldom is guidance provided as to what this means. This book is the first to tackle in detail those enterprise-wide capabilities expected by Board, CEO and Internal Audit, of the diverse executive management functions that need to team up with the Information Security function in order to provide integrated solutions."--Publisher's description.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer crimes.
|
650 |
|
0 |
|a Business enterprises
|x Computer networks
|x Security measures.
|
650 |
|
0 |
|a Cyberspace
|x Security measures.
|
650 |
|
0 |
|a Business
|x Data processing
|x Security measures.
|
650 |
|
0 |
|a Risk management.
|
650 |
|
2 |
|a Risk Management
|
650 |
|
6 |
|a Criminalité informatique.
|
650 |
|
6 |
|a Gestion
|x Informatique
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Gestion du risque.
|
650 |
|
7 |
|a risk management.
|2 aat
|
650 |
|
7 |
|a COMPUTER SCIENCE
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Cyberspace
|x Security measures
|2 fast
|
650 |
|
7 |
|a Business
|x Data processing
|x Security measures
|2 fast
|
650 |
|
7 |
|a Business enterprises
|x Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer crimes
|2 fast
|
650 |
|
7 |
|a Risk management
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a Antonucci, Domenic.
|t Cyber risk handbook.
|d Hoboken, New Jersey : John Wiley & Sons, [2017]
|z 1119308801
|w (DLC) 2017302691
|w (OCoLC)958097666
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781119308805/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH32064666
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH32064667
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL4837509
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1498557
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n cis36383218
|
938 |
|
|
|a Recorded Books, LLC
|b RECE
|n rbeEB00742942
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 14241730
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 13967605
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 13960416
|
994 |
|
|
|a 92
|b IZTAP
|