|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
SCIDIR_ocn951749478 |
003 |
OCoLC |
005 |
20231120112115.0 |
006 |
m o d |
007 |
cr mn||||||||| |
008 |
160615t20162016maua ob 001 0 eng d |
040 |
|
|
|a N$T
|b eng
|e rda
|e pn
|c N$T
|d IDEBK
|d OPELS
|d N$T
|d EBLCP
|d OCLCF
|d YDXCP
|d YDX
|d OSU
|d GGVRL
|d DEBSZ
|d IDB
|d VGM
|d MERUC
|d OCLCQ
|d OCLCO
|d CNCGM
|d U3W
|d OCLCA
|d UUM
|d WRM
|d D6H
|d OCLCQ
|d WYU
|d OCLCQ
|d UKMGB
|d OCLCQ
|d UMI
|d S2H
|d OCLCO
|d LVT
|d DST
|d OCLCQ
|d OCLCO
|
015 |
|
|
|a GBB684805
|2 bnb
|
016 |
7 |
|
|a 017889109
|2 Uk
|
019 |
|
|
|a 951835894
|a 951978012
|a 956735903
|a 958861530
|a 959424131
|a 964290259
|a 1162405911
|a 1202027430
|a 1229893293
|a 1300595214
|a 1303378484
|
020 |
|
|
|a 9780128034507
|q (electronic bk.)
|
020 |
|
|
|a 0128034505
|q (electronic bk.)
|
020 |
|
|
|z 9780128034514
|q (pbk.)
|
020 |
|
|
|z 0128034513
|q (pbk.)
|
035 |
|
|
|a (OCoLC)951749478
|z (OCoLC)951835894
|z (OCoLC)951978012
|z (OCoLC)956735903
|z (OCoLC)958861530
|z (OCoLC)959424131
|z (OCoLC)964290259
|z (OCoLC)1162405911
|z (OCoLC)1202027430
|z (OCoLC)1229893293
|z (OCoLC)1300595214
|z (OCoLC)1303378484
|
050 |
|
4 |
|a TK5105.59
|b .F68 2016eb
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
100 |
1 |
|
|a Fowler, Kevvie,
|e author.
|
245 |
1 |
0 |
|a Data breach preparation and response :
|b breaches are certain, impact is not /
|c Kevvie Fowler ; Curtis Rose, technical editor.
|
264 |
|
1 |
|a Cambridge, MA :
|b Syngress is an imprint of Elsevier,
|c [2016]
|
264 |
|
4 |
|c �2016
|
300 |
|
|
|a 1 online resource (xiii, 240 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
500 |
|
|
|a Includes index.
|
505 |
0 |
|
|a An overview of data breaches -- Preparing to develop a computer security incident response plan -- Developing a computer security incident response plan -- Qualifying and investigating a breach -- Containing a breach -- Precisely determining the scope of a breach -- Communicating before, during and after a breach -- Restoring trust and business services after breach -- Preparing for data breach litigation.
|
588 |
0 |
|
|a Print version record.
|
504 |
|
|
|a Includes bibliographical references and index.
|
520 |
|
|
|a Provides guidance on how to proactively prepare for and manage the business, technology, legal and communications aspects of a data breach and limit impact.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
2 |
|a Computer Security
|0 (DNLM)D016494
|
650 |
|
6 |
|a R�eseaux d'ordinateurs
|x S�ecurit�e
|x Mesures.
|0 (CaQQLa)201-0263812
|
650 |
|
6 |
|a S�ecurit�e informatique.
|0 (CaQQLa)201-0061152
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x Networking.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
7 |
|a Computer security
|2 fast
|0 (OCoLC)fst00872484
|
776 |
0 |
8 |
|i Print version:
|a Fowler, Kevvie.
|t Data breach preparation and response.
|d Cambridge, MA : Syngress, [2016]
|z 9780128034514
|w (OCoLC)956636007
|
856 |
4 |
0 |
|u https://sciencedirect.uam.elogim.com/science/book/9780128034514
|z Texto completo
|