Cybersecurity and decision makers : (Record no. 68392)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 05146cam a2200589Ii 4500 |
001 - CONTROL NUMBER | |
control field | on1150959452 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20220711203158.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 200415s2020 enka o ||| 0 eng d |
019 ## - | |
-- | 1151192901 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 1119720354 |
-- | electronic book |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9781119720355 |
-- | electronic book |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
-- | hardcover |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9781119720362 |
-- | (electronic bk. : oBook) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 1119720362 |
-- | (electronic bk. : oBook) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9781119720379 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 1119720370 |
082 04 - CLASSIFICATION NUMBER | |
Call Number | 658.478 |
082 04 - CLASSIFICATION NUMBER | |
Call Number | 005.8 |
100 1# - AUTHOR NAME | |
Author | Fréminville, Marie de, |
245 10 - TITLE STATEMENT | |
Title | Cybersecurity and decision makers : |
Sub Title | data security and digital trust / |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | 1 online resource : |
490 1# - SERIES STATEMENT | |
Series statement | Information systems, web and pervasive computing series |
505 0# - FORMATTED CONTENTS NOTE | |
Remark 2 | Cover -- Half-Title Page -- Title Page -- Copyright Page -- Contents -- Foreword -- Preface -- Introduction: Financial and Cyber Performance -- 1. An Increasingly Vulnerable World -- 1.1. The context -- 1.1.1. Technological disruptions and globalization -- 1.1.2. Data at the heart of industrial productivity -- 1.1.3. Cyberspace, an area without boundaries -- 1.1.4. IT resources -- 1.2. Cybercrime -- 1.2.1. The concept of cybercrime -- 1.2.2. Five types of threats -- 1.2.3. Five types of attackers -- 1.3. The cybersecurity market -- 1.3.1. The size of the market and its evolution |
505 8# - FORMATTED CONTENTS NOTE | |
Remark 2 | 1.3.2. The market by sector of activity -- 1.3.3. Types of purchases and investments -- 1.3.4. Geographical distribution -- 1.4. Cyber incidents -- 1.4.1. The facts -- 1.4.2. Testimonials versus silence -- 1.4.3. Trends -- 1.4.4. Examples -- 1.5. Examples of particularly exposed sectors of activity -- 1.5.1. Cinema -- 1.5.2. Banks -- 1.5.3. Health -- 1.5.4. Tourism and business hotels -- 1.5.5. Critical national infrastructure -- 1.6. Responsibilities of officers and directors -- 2. Corporate Governance and Digital Responsibility -- 2.1. Corporate governance and stakeholders |
505 8# - FORMATTED CONTENTS NOTE | |
Remark 2 | 2.2. The shareholders -- 2.2.1. Valuation of the company -- 2.2.2. Cyber rating agencies -- 2.2.3. Insider trading -- 2.2.4. Activist shareholders -- 2.2.5. The stock exchange authorities -- 2.2.6. The annual report -- 2.3. The board of directors -- 2.3.1. The facts -- 2.3.2. The four missions of the board of directors -- 2.3.3. Civil and criminal liability -- 2.3.4. The board of directors and cybersecurity -- 2.3.5. The board of directors and data protection -- 2.3.6. The statutory auditors -- 2.3.7. The numerical responsibility of the board of directors -- 2.4. Customers and suppliers |
505 8# - FORMATTED CONTENTS NOTE | |
Remark 2 | 2.5. Operational management -- 2.5.1. The impacts of digital transformation -- 2.5.2. The digital strategy -- 2.5.3. The consequences of poor digital performance -- 2.5.4. Cybersecurity -- 2.5.5. Merger and acquisition transactions -- 2.5.6. Governance and data protection, cybersecurity -- 3. Risk Mapping -- 3.1. Cyber-risks -- 3.2. The context -- 3.3. Vulnerabilities -- 3.3.1. Fraud against the president -- 3.3.2. Supplier fraud -- 3.3.3. Other economic impacts -- 3.4. Legal risks -- 3.4.1. Class actions -- 3.4.2. Sanctions by the CNIL and the ICO -- 3.5. The objectives of risk mapping |
505 8# - FORMATTED CONTENTS NOTE | |
Remark 2 | 3.6. The different methods of risk analysis -- 3.7. Risk assessment (identify) -- 3.7.1. The main actors -- 3.7.2. The steps -- 3.8. Protecting -- 3.9. Detecting -- 3.10. Reacting -- 3.11. Restoring -- 3.12. Decentralized mapping -- 3.12.1. The internal threat -- 3.12.2. Industrial risks -- 3.12.3. Suppliers, subcontractors and service providers -- 3.12.4. Connected objects -- 3.13. Insurance -- 3.14. Non-compliance risks and ethics -- 4. Regulations -- 4.1. The context -- 4.1.1. Complaints filed with the CNIL -- 4.1.2. Vectaury -- 4.1.3. Optical Center -- 4.1.4. Dailymotion |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
General subdivision | Data processing |
-- | Security measures. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
General subdivision | Management. |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | https://doi.org/10.1002/9781119720362 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks |
264 #1 - | |
-- | London : |
-- | ISTE Ltd ; |
-- | Hoboken, NJ : |
-- | John Wiley & Sons, Inc., |
-- | 2020. |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
336 ## - | |
-- | still image |
-- | sti |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | c |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | cr |
-- | rdacarrier |
588 ## - | |
-- | Description based on online resource; title from digital title page (viewed on May 14, 2020). |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Business |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer security |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer security. |
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer security. |
-- | (OCoLC)fst00872484 |
994 ## - | |
-- | 92 |
-- | DG1 |
No items available.