000 | 02971cam a2200481 i 4500 | ||
---|---|---|---|
999 |
_c200452123 _d70335 |
||
001 | 200452123 | ||
003 | TR-AnTOB | ||
005 | 20230915001313.0 | ||
006 | m o d | ||
007 | cr ||||||||||| | ||
008 | 201201s2021 njuab ob 001 0 eng d | ||
020 |
_a9781119660156 _qelectronic book |
||
020 |
_a1119660157 _qelectronic book |
||
020 |
_a9781119660149 _qelectronic book |
||
020 |
_a1119660114 _qelectronic book |
||
020 |
_a9781119660118 _qelectronic book |
||
020 |
_a1119660149 _qelectronic book |
||
020 |
_z9781119658740 _qhardcover |
||
020 | _z1119658748 | ||
035 |
_a(OCoLC)1226075831 _z(OCoLC)1237818924 |
||
040 |
_aDLC _beng _erda _cDLC _dOCLCO _dOCLCF _dYDX _dN$T _dYDX _dDG1 _dUKAHL _dTR-AnTOB |
||
041 | 0 | _aeng | |
042 | _apcc | ||
050 | 0 | 4 |
_aHD61.5 _b.M675 2021 |
090 |
_aHD61.5 _b.M675 2021EBK |
||
100 | 1 |
_aMoschovitis, Christos J. P., _0http://id.loc.gov/authorities/names/n99012950 _eauthor |
|
245 | 1 | 0 |
_aPrivacy, regulations, and cybersecurity : _bthe essential business guide / _cChris Moschovitis |
264 | 1 |
_aHoboken, New Jersey : _bJohn Wiley & Sons, Inc., _c[2021] |
|
300 |
_a1 online resource (xvii, 398 pages) : _billustrations (some color), color maps |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
504 | _aBIBINDX | ||
520 |
_a"This book answers the question: How do businesses effectively respond to the evolving definition of privacy through their strategies, operations, cybersecurity posture, and adaptation to new regulations? The book walks the reader through privacy, it's definitions and implications; data regulation, and its increasing impact on business; and cybersecurity as a newly critical business practice. In addition, the book addresses the overarching significance of privacy for companies' overall strategies. There will be numerous examples and case studies that break down every element of the privacy -- regulation -- cybersecurity triad for the executive. It will help executives understand the concepts of privacy, personally identifiable information, definitions and world-wide regulations. The book walks through how to use core risk management principles, evaluate threats, deploy policies and standards, and identify the right tools, roles, and methods for companies to employ."-- _cProvided by publisher |
||
650 | 0 |
_aBusiness enterprises _0http://id.loc.gov/authorities/subjects/sh85018285 _xSecurity measures. _0http://id.loc.gov/authorities/subjects/sh99005297 _9108889 |
|
650 | 7 |
_aData protection _0http://id.loc.gov/authorities/subjects/sh85035859 _91313 |
|
650 | 0 |
_aComputer security _0http://id.loc.gov/authorities/subjects/sh90001862 _9912 |
|
655 | 0 |
_aElectronic books _92032 |
|
856 | 4 | 0 |
_3Wiley Online Library _zConnect to resource _uhttps://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156 |
942 |
_2lcc _cEBK |