Cargando…

What is cybersecurity? /

"Creating and implementing an effective online security plan is vital in keeping a business safe, but how can the non-technical business manager participate in such planning without the language and understanding required to do so? In this course, Emmanuel Henri explores the basics of cybersecu...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Formato: Electrónico Video
Idioma:Inglés
Publicado: [Place of publication not identified] : O'Reilly, [2018]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cgm a2200000 i 4500
001 OR_on1085513946
003 OCoLC
005 20231017213018.0
006 m o c
007 cr cna||||||||
007 vz czazuu
008 190212s2018 xx 023 o vleng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d OCLCF  |d ERF  |d OCLCO  |d OCLCQ  |d OCLCO 
035 |a (OCoLC)1085513946 
037 |a CL0501000025  |b Safari Books Online 
050 4 |a QA76.9.A25 
049 |a UAMI 
100 1 |a Henri, Emmanuel,  |e on-screen presenter. 
245 1 0 |a What is cybersecurity? /  |c with Emmanuel Henri. 
264 1 |a [Place of publication not identified] :  |b O'Reilly,  |c [2018] 
300 |a 1 online resource (1 streaming video file (22 min., 59 sec.)) 
336 |a two-dimensional moving image  |b tdi  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
337 |a video  |b v  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
500 |a Title from title screen (Safari, viewed February 11, 2019). 
500 |a Release date from resource description page (Safari, viewed February 11, 2019). 
511 0 |a Presenter, Emmanuel Henri. 
520 |a "Creating and implementing an effective online security plan is vital in keeping a business safe, but how can the non-technical business manager participate in such planning without the language and understanding required to do so? In this course, Emmanuel Henri explores the basics of cybersecurity from a layman's perspective. He discusses what cybersecurity is and why it's important; he details the conversations managers must have with their teams to set the proper security initiatives and hire the proper staff; he explores the cybersecurity resources managers can easily tap into; and finishes by demonstrating the ways cybersecurity measures are applied in real life."--Resource description page 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 0 |a Data protection. 
650 2 |a Computer Security 
650 6 |a Sécurité informatique. 
650 6 |a Protection de l'information (Informatique) 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Data protection.  |2 fast  |0 (OCoLC)fst00887958 
655 4 |a Electronic videos. 
856 4 0 |u https://learning.oreilly.com/videos/~/9781492046585/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP