|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_on1226075831 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr ||||||||||| |
008 |
201201s2021 njuab ob 001 0 eng |
010 |
|
|
|a 2020053850
|
040 |
|
|
|a DLC
|b eng
|e rda
|e pn
|c DLC
|d OCLCO
|d OCLCF
|d YDX
|d N$T
|d YDX
|d DG1
|d UKAHL
|d TEFOD
|d OCLCQ
|d SOE
|d OCLCO
|d IEEEE
|d MUU
|
019 |
|
|
|a 1237818924
|a 1258594614
|
020 |
|
|
|a 9781119660156
|q (electronic book)
|
020 |
|
|
|a 1119660157
|q (electronic book)
|
020 |
|
|
|a 9781119660149
|q (electronic book)
|
020 |
|
|
|a 1119660114
|q (electronic book)
|
020 |
|
|
|a 9781119660118
|q (electronic book)
|
020 |
|
|
|a 1119660149
|q (electronic book)
|
020 |
|
|
|z 9781119658740
|q (hardcover)
|
020 |
|
|
|z 1119658748
|
024 |
7 |
|
|a 10.1002/9781119660156
|2 doi
|
029 |
1 |
|
|a AU@
|b 000068387375
|
029 |
1 |
|
|a AU@
|b 000069703881
|
035 |
|
|
|a (OCoLC)1226075831
|z (OCoLC)1237818924
|z (OCoLC)1258594614
|
037 |
|
|
|a 9DD33288-B50A-446F-A7F5-57DB6F5145F6
|b OverDrive, Inc.
|n http://www.overdrive.com
|
037 |
|
|
|a 9820870
|b IEEE
|
042 |
|
|
|a pcc
|
050 |
0 |
4 |
|a HD61.5
|b .M675 2021eb
|
082 |
0 |
0 |
|a 658.4/78
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Moschovitis, Christos J. P.,
|e author.
|
245 |
1 |
0 |
|a Privacy, regulations, and cybersecurity :
|b the essential business guide /
|c Chris Moschovitis.
|
264 |
|
1 |
|a Hoboken, New Jersey :
|b John Wiley & Sons, Inc.,
|c [2021]
|
300 |
|
|
|a 1 online resource (xvii, 398 pages) :
|b illustrations (some color), color maps
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references and index.
|
520 |
|
|
|a "This book answers the question: How do businesses effectively respond to the evolving definition of privacy through their strategies, operations, cybersecurity posture, and adaptation to new regulations? The book walks the reader through privacy, it's definitions and implications; data regulation, and its increasing impact on business; and cybersecurity as a newly critical business practice. In addition, the book addresses the overarching significance of privacy for companies' overall strategies. There will be numerous examples and case studies that break down every element of the privacy -- regulation -- cybersecurity triad for the executive. It will help executives understand the concepts of privacy, personally identifiable information, definitions and world-wide regulations. The book walks through how to use core risk management principles, evaluate threats, deploy policies and standards, and identify the right tools, roles, and methods for companies to employ."--
|c Provided by publisher
|
588 |
0 |
|
|a Description based on online resource; title from digital title page (ProQuest Ebook Central, viewed on January 17, 2023).
|
505 |
0 |
|
|a Foreword vii -- Preface ix -- About the Author xiii -- Acknowledgments xv -- Part One--Privacy 1 -- Chapter 1 Understanding Privacy 3 -- Chapter 2 A (Very) Brief History of Privacy 9 -- Chapter 3 The Legal Case for Privacy (the Finer Print) 21 -- Part Two--Regulations 45 -- Chapter 4 Introduction to Regulations 47 -- Chapter 5 North American Regulations 57 -- Chapter 6 European Regulations 89 -- Chapter 7 Asia-Pacific Regulations 119 -- Chapter 8 African Regulations 145 -- Chapter 9 South American Regulations 161 -- Part Three--Privacy and Cybersecurity 171 -- Chapter 10 Introduction to Cybersecurity 173 -- Chapter 11 A Cybersecurity Primer 181 -- Chapter 12 Privacy-Centric Cybersecurity Program Overview 205 -- Chapter 13 Privacy by Design Overview 221 -- Chapter 14 Cover Your Assets! 235 -- Chapter 15 Threat Assessment 261 -- Chapter 16 Vulnerabilities 275 -- Chapter 17 Environments 287 -- Chapter 18 Controls 301 -- Chapter 19 Incident Response 321 -- Chapter 20 Welcome to the Future! Now, Go Home! 341 -- Bibliography 359 -- Index 377.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Business enterprises
|x Security measures.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Entreprises
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a Business enterprises
|x Security measures.
|2 fast
|0 (OCoLC)fst00842623
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a Data protection.
|2 fast
|0 (OCoLC)fst00887958
|
776 |
0 |
8 |
|i Print version:
|a Moschovitis, Christos J. P.
|t Privacy, regulations, and cybersecurity.
|d Hoboken, New Jersey : John Wiley & Sons, Inc., [2021]
|z 9781119658740
|w (DLC) 2020053849
|w (OCoLC)1136874336
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781119658740/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH37737119
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 2746557
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 301921813
|
994 |
|
|
|a 92
|b IZTAP
|