Cargando…

Privacy, regulations, and cybersecurity : the essential business guide /

"This book answers the question: How do businesses effectively respond to the evolving definition of privacy through their strategies, operations, cybersecurity posture, and adaptation to new regulations? The book walks the reader through privacy, it's definitions and implications; data re...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Moschovitis, Christos J. P. (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Hoboken, New Jersey : John Wiley & Sons, Inc., [2021]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 i 4500
001 OR_on1226075831
003 OCoLC
005 20231017213018.0
006 m o d
007 cr |||||||||||
008 201201s2021 njuab ob 001 0 eng
010 |a  2020053850 
040 |a DLC  |b eng  |e rda  |e pn  |c DLC  |d OCLCO  |d OCLCF  |d YDX  |d N$T  |d YDX  |d DG1  |d UKAHL  |d TEFOD  |d OCLCQ  |d SOE  |d OCLCO  |d IEEEE  |d MUU 
019 |a 1237818924  |a 1258594614 
020 |a 9781119660156  |q (electronic book) 
020 |a 1119660157  |q (electronic book) 
020 |a 9781119660149  |q (electronic book) 
020 |a 1119660114  |q (electronic book) 
020 |a 9781119660118  |q (electronic book) 
020 |a 1119660149  |q (electronic book) 
020 |z 9781119658740  |q (hardcover) 
020 |z 1119658748 
024 7 |a 10.1002/9781119660156  |2 doi 
029 1 |a AU@  |b 000068387375 
029 1 |a AU@  |b 000069703881 
035 |a (OCoLC)1226075831  |z (OCoLC)1237818924  |z (OCoLC)1258594614 
037 |a 9DD33288-B50A-446F-A7F5-57DB6F5145F6  |b OverDrive, Inc.  |n http://www.overdrive.com 
037 |a 9820870  |b IEEE 
042 |a pcc 
050 0 4 |a HD61.5  |b .M675 2021eb 
082 0 0 |a 658.4/78  |2 23 
049 |a UAMI 
100 1 |a Moschovitis, Christos J. P.,  |e author. 
245 1 0 |a Privacy, regulations, and cybersecurity :  |b the essential business guide /  |c Chris Moschovitis. 
264 1 |a Hoboken, New Jersey :  |b John Wiley & Sons, Inc.,  |c [2021] 
300 |a 1 online resource (xvii, 398 pages) :  |b illustrations (some color), color maps 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references and index. 
520 |a "This book answers the question: How do businesses effectively respond to the evolving definition of privacy through their strategies, operations, cybersecurity posture, and adaptation to new regulations? The book walks the reader through privacy, it's definitions and implications; data regulation, and its increasing impact on business; and cybersecurity as a newly critical business practice. In addition, the book addresses the overarching significance of privacy for companies' overall strategies. There will be numerous examples and case studies that break down every element of the privacy -- regulation -- cybersecurity triad for the executive. It will help executives understand the concepts of privacy, personally identifiable information, definitions and world-wide regulations. The book walks through how to use core risk management principles, evaluate threats, deploy policies and standards, and identify the right tools, roles, and methods for companies to employ."--  |c Provided by publisher 
588 0 |a Description based on online resource; title from digital title page (ProQuest Ebook Central, viewed on January 17, 2023). 
505 0 |a Foreword vii -- Preface ix -- About the Author xiii -- Acknowledgments xv -- Part One--Privacy 1 -- Chapter 1 Understanding Privacy 3 -- Chapter 2 A (Very) Brief History of Privacy 9 -- Chapter 3 The Legal Case for Privacy (the Finer Print) 21 -- Part Two--Regulations 45 -- Chapter 4 Introduction to Regulations 47 -- Chapter 5 North American Regulations 57 -- Chapter 6 European Regulations 89 -- Chapter 7 Asia-Pacific Regulations 119 -- Chapter 8 African Regulations 145 -- Chapter 9 South American Regulations 161 -- Part Three--Privacy and Cybersecurity 171 -- Chapter 10 Introduction to Cybersecurity 173 -- Chapter 11 A Cybersecurity Primer 181 -- Chapter 12 Privacy-Centric Cybersecurity Program Overview 205 -- Chapter 13 Privacy by Design Overview 221 -- Chapter 14 Cover Your Assets! 235 -- Chapter 15 Threat Assessment 261 -- Chapter 16 Vulnerabilities 275 -- Chapter 17 Environments 287 -- Chapter 18 Controls 301 -- Chapter 19 Incident Response 321 -- Chapter 20 Welcome to the Future! Now, Go Home! 341 -- Bibliography 359 -- Index 377. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Business enterprises  |x Security measures. 
650 0 |a Data protection. 
650 0 |a Computer security. 
650 2 |a Computer Security 
650 6 |a Entreprises  |x Sécurité  |x Mesures. 
650 6 |a Protection de l'information (Informatique) 
650 6 |a Sécurité informatique. 
650 7 |a Business enterprises  |x Security measures.  |2 fast  |0 (OCoLC)fst00842623 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Data protection.  |2 fast  |0 (OCoLC)fst00887958 
776 0 8 |i Print version:  |a Moschovitis, Christos J. P.  |t Privacy, regulations, and cybersecurity.  |d Hoboken, New Jersey : John Wiley & Sons, Inc., [2021]  |z 9781119658740  |w (DLC) 2020053849  |w (OCoLC)1136874336 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781119658740/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH37737119 
938 |a EBSCOhost  |b EBSC  |n 2746557 
938 |a YBP Library Services  |b YANK  |n 301921813 
994 |a 92  |b IZTAP