000 -LEADER |
fixed length control field |
03073nam a22002897a 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
phtghnu |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20230810145953.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
ta |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
230810b2022 enk||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780367511494 (pbk) |
040 ## - CATALOGING SOURCE |
Language of cataloging |
eng |
Transcribing agency |
HNU |
Description conventions |
rda |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
Edition number |
23 |
Placement Code |
GC |
Classification number |
005.8 Ev15 |
Item number |
2022 |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
Evans, Ariel, |
Relator term |
author. |
245 ## - TITLE STATEMENT |
Title |
Enterprise cybersecurity in digital business : |
Remainder of title |
building a cyber resilient organization / |
Statement of responsibility, etc. |
Ariel Evans, author. |
264 ## - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
Place of production, publication, distribution, manufacture |
Abingdon, Oxon, UK : |
Name of producer, publisher, distributor, manufacturer |
Routledge, |
Date of production, publication, distribution, manufacture, or copyright notice |
2022 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxxi, 530 pages : |
Other physical details |
illustrations, charts ; |
Dimensions |
26 cm |
500 ## - GENERAL NOTE |
General note |
Includes index. |
505 ## - FORMATTED CONTENTS NOTE |
Formatted contents note |
Part I: The Evolution of Cybersecurity. 1. Cyber – A business Issue 2. ‘Cyber Risk’ 3. ‘The History of Cybersecurity’ 4. ‘Cyber Consequences’ 5. ‘Cyber Trends and Spending’ 6. ‘Cyber Roles’ Part II: Cybersecurity Basics. 7. ‘Cyber –Attack Surfaces and Digital Asset Inventories’ 8. ‘Cyber Terminology and Statistics’ 9. ‘Enterprise Threats of Today and Cybercriminals’ 10. ‘Cybersecurity Regulations, Standards and Frameworks’ 11. ‘Enterprise Cybersecurity Programs’ 12. ‘Organizational Cyber Maturities’ Part III: Cybersecurity Tools. 13. ‘Cyber Policies’ 14. ‘Cybersecurity Tools Part IV: Cybersecurity Regulation.15. ‘U.S. Federal Regulations’ 16. ‘U.S. State Regulations’ 17. ‘New York State Department of Financial Services Part 500’ 18. ‘Global, Industry or Other Types of Cybersecurity Regulations’ Part V: Incident Response, Forensics and Audit. 19. ‘Incident Response Plans’ 20. ‘Forensic Methods’ 21. ‘IT Audit’ Part VI: Cybersecurity Risk Management. 22. ‘Cybersecurity Financial Exposures’ 23. ‘Digital Asset Cyber Risk Modeling and Scoring’ 24. ‘Mitigating Cybersecurity Scores and Residual Cyber Risk Scores’ Part VII: GDPR and Privacy. 25. ‘GDPR Overview’ 26. ‘GDPR Articles’ 27. ‘GDRP Evidence’ 28. ‘GDPR Privacy Impact Assessment (PIA)’ Part VIII: Cybersecurity Risk Management Strategy. 29. ‘CISO Strategies’ 30. ‘Cyber in the Board Room’ Part IX: Cybersecurity Insurance. 31. ‘Cyber Insurance Overview’ 32. ‘Calculating Limits Adequacy’ 33. ‘Ransomware Strategies’ Part X: Introduction to Cybersecurity Vendor Risk Management. 34. ‘Vendor Risk Overview’ 35. ‘Vendor Cybersecurity Regulations’ |
520 ## - SUMMARY, ETC. |
Summary, etc. |
Enterprise Cybersecurity in Digital Business: Building a Cyber Resilient Organization provides a clear guide for companies to understand cyber from a business perspective rather than a technical perspective, and to build resilience for their business. |
521 ## - TARGET AUDIENCE NOTE |
Target audience note |
College of Engineering and Computer Studies |
Source |
Bachelor of Science in Computer Science |
546 ## - LANGUAGE NOTE |
Language note |
Text in English |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Business enterprises |
Form subdivision |
Security measures. |
General subdivision |
Computer networks |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer crimes |
Form subdivision |
Prevention. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer security. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Koha item type |
Books |
Classification part |
000-099 |