000 02971cam a2200481 i 4500
999 _c200452123
_d70335
001 200452123
003 TR-AnTOB
005 20230915001313.0
006 m o d
007 cr |||||||||||
008 201201s2021 njuab ob 001 0 eng d
020 _a9781119660156
_qelectronic book
020 _a1119660157
_qelectronic book
020 _a9781119660149
_qelectronic book
020 _a1119660114
_qelectronic book
020 _a9781119660118
_qelectronic book
020 _a1119660149
_qelectronic book
020 _z9781119658740
_qhardcover
020 _z1119658748
035 _a(OCoLC)1226075831
_z(OCoLC)1237818924
040 _aDLC
_beng
_erda
_cDLC
_dOCLCO
_dOCLCF
_dYDX
_dN$T
_dYDX
_dDG1
_dUKAHL
_dTR-AnTOB
041 0 _aeng
042 _apcc
050 0 4 _aHD61.5
_b.M675 2021
090 _aHD61.5
_b.M675 2021EBK
100 1 _aMoschovitis, Christos J. P.,
_0http://id.loc.gov/authorities/names/n99012950
_eauthor
245 1 0 _aPrivacy, regulations, and cybersecurity :
_bthe essential business guide /
_cChris Moschovitis
264 1 _aHoboken, New Jersey :
_bJohn Wiley & Sons, Inc.,
_c[2021]
300 _a1 online resource (xvii, 398 pages) :
_billustrations (some color), color maps
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
504 _aBIBINDX
520 _a"This book answers the question: How do businesses effectively respond to the evolving definition of privacy through their strategies, operations, cybersecurity posture, and adaptation to new regulations? The book walks the reader through privacy, it's definitions and implications; data regulation, and its increasing impact on business; and cybersecurity as a newly critical business practice. In addition, the book addresses the overarching significance of privacy for companies' overall strategies. There will be numerous examples and case studies that break down every element of the privacy -- regulation -- cybersecurity triad for the executive. It will help executives understand the concepts of privacy, personally identifiable information, definitions and world-wide regulations. The book walks through how to use core risk management principles, evaluate threats, deploy policies and standards, and identify the right tools, roles, and methods for companies to employ."--
_cProvided by publisher
650 0 _aBusiness enterprises
_0http://id.loc.gov/authorities/subjects/sh85018285
_xSecurity measures.
_0http://id.loc.gov/authorities/subjects/sh99005297
_9108889
650 7 _aData protection
_0http://id.loc.gov/authorities/subjects/sh85035859
_91313
650 0 _aComputer security
_0http://id.loc.gov/authorities/subjects/sh90001862
_9912
655 0 _aElectronic books
_92032
856 4 0 _3Wiley Online Library
_zConnect to resource
_uhttps://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156
942 _2lcc
_cEBK