|
|
|
|
LEADER |
00000cam a22000003i 4500 |
001 |
ebs13174838e |
003 |
EBZ |
006 |
m o d |||||| |
007 |
cr|unu|||||||| |
008 |
171024t20172017njua ob 001 0 eng d |
020 |
|
|
|z 9781119308805
|
020 |
|
|
|z 9781119309727
|
020 |
|
|
|z 9781119309741
|
020 |
|
|
|a 9781119308959 (online)
|
020 |
|
|
|a 9781119309727 (online)
|
020 |
|
|
|a 9781119309741 (online)
|
035 |
|
|
|a (EBZ)ebs13174838e
|
040 |
|
|
|a YDX
|b eng
|d EBZ
|
042 |
|
|
|a lccopycat
|
050 |
0 |
0 |
|a HD30.38
|b .A58 2017
|
100 |
1 |
|
|a Antonucci, Domenic,
|e author.
|
245 |
1 |
4 |
|a The cyber risk handbook
|h [electronic resource] :
|b creating and measuring effective cybersecurity capabilities /
|c Domenic Antonucci.
|
246 |
2 |
|
|a The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities
|
264 |
|
1 |
|a Hoboken, New Jersey :
|b Wiley,
|c [2017]
|
264 |
|
4 |
|c ©2017
|
490 |
0 |
|
|a Wiley finance series
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a Introduction -- Board cyber risk oversight -- Principles behind cyber risk management -- Cybersecurity policies and procedures -- Cyber strategic performance management -- Standards and frameworks for cybersecurity -- Identifying, analyzing, and evaluating cyber risks -- Treating cyber risks -- Treating cyber risks using process capabilities -- Treating cyber risks - using insurance and finance -- Monitoring and review using key risk indicators (KRIs) -- Cybersecurity incident and crisis management -- Business continuity management and cybersecurity -- External context and supply chain -- Internal organization context -- Culture and human factors -- Legal and compliance -- Assurance and cyber risk management -- Information asset management for cyber -- Physical security -- Cybersecurity for operations and communications -- Access control -- Cybersecurity systems: acquisition, development, and maintenance -- People risk management in the digital age -- Cyber competencies and the cybersecurity officer --Human resources security -- Epilogue.
|
650 |
|
0 |
|a Business enterprises
|x Computer networks
|x Security measures.
|
650 |
|
0 |
|a Business
|x Data processing
|x Security measures.
|
650 |
|
0 |
|a Cyberspace
|x Security measures.
|
650 |
|
0 |
|a Risk management.
|
650 |
|
0 |
|a Computer crimes.
|
773 |
0 |
|
|t Wiley Online Library Online Books
|d Wiley
|
773 |
0 |
|
|t ProQuest Ebook Central - Academic Complete
|d ProQuest Info & Learning Co
|
773 |
0 |
|
|t Wiley Frontlist All Obook 2017
|d Wiley
|
773 |
0 |
|
|t Wiley Obooks 2011 to Present
|d Wiley
|
776 |
1 |
|
|t The cyber risk handbook
|w (OCoLC)ocn958097666
|w (DLC)2017302691
|
856 |
4 |
0 |
|y Access Content Online(from Wiley Online Library Online Books)
|u https://ezproxy.msu.edu/login?url=https://onlinelibrary.wiley.com/doi/book/10.1002/9781119309741
|z Wiley Online Library Online Books: 2017
|
856 |
4 |
0 |
|y Access Content Online(from ProQuest Ebook Central - Academic Complete)
|u https://ezproxy.msu.edu/login?url=https://ebookcentral.proquest.com/lib/michstate-ebooks/detail.action?docID=4837509
|z ProQuest Ebook Central - Academic Complete: 2017
|
856 |
4 |
0 |
|y Access Content Online(from Wiley Frontlist All Obook 2017)
|u https://ezproxy.msu.edu/login?url=https://onlinelibrary.wiley.com/doi/book/10.1002/9781119309741
|z Wiley Frontlist All Obook 2017: 2017
|
856 |
4 |
0 |
|y Access Content Online(from Wiley Obooks 2011 to Present)
|u https://ezproxy.msu.edu/login?url=https://onlinelibrary.wiley.com/doi/book/10.1002/9781119309741
|z Wiley Obooks 2011 to Present: 2017
|