Enterprise cybersecurity in digital business : (Record no. 11604)

MARC details
000 -LEADER
fixed length control field 01718nam a22003017i 4500
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250810121052.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250728s2022 nyua fr 000 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780367511494
040 ## - CATALOGING SOURCE
Original cataloging agency EG-GaU‬‬
Transcribing agency EG-GaU‬‬
Modifying agency EG-GaU‬‬
Description conventions rda
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Edition number 23
Classification number 005.8
Item number E.A.E
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Evans, Ariel,
Relator term author.
9 (RLIN) 61874
245 10 - TITLE STATEMENT
Title Enterprise cybersecurity in digital business :
Remainder of title building a cyber resilient organization /
Statement of responsibility, etc. Ariel Evans.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture New York :
Name of producer, publisher, distributor, manufacturer Routledge,
Date of production, publication, distribution, manufacture, or copyright notice 2022.
300 ## - PHYSICAL DESCRIPTION
Extent 530 pages :
Other physical details illustrations ;
Dimensions 24 cm.
336 ## - CONTENT TYPE
Source rdacontent
Content type term text
Content type code txt
337 ## - MEDIA TYPE
Source rdamedia
Media type term unmediated
Media type code n
338 ## - CARRIER TYPE
Source rdacarrier
Carrier type term volume
Carrier type code nc
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note The evolution of cybersecurity -- Cybersecurity basics and tools -- Cybersecurity regulation including GDPR -- Incident response, forensics, and audit -- Cybersecurity insurance -- Risk management and strategy -- Vendor risk management.
520 ## - SUMMARY, ETC.
Summary, etc. A practical guide for business leaders on managing cyber risk and building resilience. Covers maturity levels, roles, regulation, forensics, insurance, and strategies across departments. Based on research from Fortune 1000 companies and the cyber insurance industry. Essential reading for CEOs, CISOs, compliance managers, and students of cybersecurity in business contexts.
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures.
9 (RLIN) 61865
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Business enterprises
General subdivision Computer networks
-- Security measures.
9 (RLIN) 61875
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Risk management.
9 (RLIN) 61867
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Business continuity.
9 (RLIN) 61876
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data protection
General subdivision Law and legislation.
9 (RLIN) 61869
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
    Dewey Decimal Classification     Media and mass communication Library Media and mass communication Library B3 08/19/2025   005.8 E.A.E MA0002562 08/19/2025 08/19/2025 Books