|
|
|
|
LEADER |
00000cam a22000007i 4500 |
001 |
OR_on1370906730 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu|||unuuu |
008 |
230221s2023 maua ob 000 0 eng d |
040 |
|
|
|a ORMDA
|b eng
|e rda
|e pn
|c ORMDA
|d OCLCF
|d OCLCO
|
024 |
8 |
|
|a 53863MIT64301
|
035 |
|
|
|a (OCoLC)1370906730
|
037 |
|
|
|a 53863MIT64301
|b O'Reilly Media
|
050 |
|
4 |
|a QA76.9.A25
|
082 |
0 |
4 |
|a 658.4/78
|2 23/eng/20230221
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Coden, Michael,
|e author.
|
245 |
1 |
3 |
|a An action plan for cyber resilience :
|b it's impossible to avoid all cyber risk. Here's how to make your company more resilient in the face of new threats /
|c Michael Coden, Martin Reeves, Keri Pearlson, Stuart Madnick, and Cheryl Berriman.
|
250 |
|
|
|a [First edition].
|
264 |
|
1 |
|a [Cambridge, Massachusetts] :
|b MIT Sloan Management Review,
|c 2023.
|
300 |
|
|
|a 1 online resource (8 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
500 |
|
|
|a Reprint 64301.
|
504 |
|
|
|a Includes bibliographical references.
|
520 |
|
|
|a Most organizations put more resources toward identification, protection, and detection rather than their ability to respond to and recover from a cyber breach, leaving themselves vulnerable. But because companies can’t protect against every new cyberattack, it’s critical that they reduce the potential impact by putting more focus on cyber resilience. The authors describe how leaders can apply seven biology-inspired adaptive design principles to become more resilient against cyberattacks.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer crimes
|x Prevention.
|
650 |
|
0 |
|a Business
|x Data processing
|x Security measures.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Gestion
|x Informatique
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a Business
|x Data processing
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer crimes
|x Prevention
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
700 |
1 |
|
|a Reeves, Martin,
|e author.
|
700 |
1 |
|
|a Pearlson, Keri,
|e author.
|
700 |
1 |
|
|a Madnick, Stuart,
|e author.
|
700 |
1 |
|
|a Berriman, Cheryl,
|e author.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/53863MIT64301/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|