000 | 02745cam a2200493Ii 4500 | ||
---|---|---|---|
001 | ocn951749478 | ||
003 | OCoLC | ||
005 | 20190328114815.0 | ||
006 | m o d | ||
007 | cr mn||||||||| | ||
008 | 160615t20162016maua ob 001 0 eng d | ||
040 |
_aN$T _beng _erda _epn _cN$T _dIDEBK _dOPELS _dN$T _dEBLCP _dOCLCF _dYDXCP _dYDX _dOSU _dGGVRL _dDEBSZ _dIDB _dVGM _dMERUC _dOCLCQ _dOCLCO _dCNCGM _dU3W _dOCLCA _dUUM _dWRM _dD6H _dOCLCQ _dWYU _dOCLCQ |
||
019 |
_a951835894 _a951978012 _a956735903 _a958861530 _a959424131 _a964290259 |
||
020 |
_a9780128034507 _q(electronic bk.) |
||
020 |
_a0128034505 _q(electronic bk.) |
||
020 |
_z9780128034514 _q(pbk.) |
||
020 |
_z0128034513 _q(pbk.) |
||
035 |
_a(OCoLC)951749478 _z(OCoLC)951835894 _z(OCoLC)951978012 _z(OCoLC)956735903 _z(OCoLC)958861530 _z(OCoLC)959424131 _z(OCoLC)964290259 |
||
050 | 4 |
_aTK5105.59 _b.F68 2016eb |
|
072 | 7 |
_aCOM _x043050 _2bisacsh |
|
082 | 0 | 4 |
_a005.8 _223 |
100 | 1 |
_aFowler, Kevvie, _eauthor. |
|
245 | 1 | 0 |
_aData breach preparation and response : breaches are certain, impact is not / _h[electronic resource] _cKevvie Fowler ; Curtis Rose, technical editor. |
264 | 1 |
_aCambridge, MA : _bSyngress is an imprint of Elsevier, _c2016. |
|
264 | 4 | _c�2016 | |
300 |
_a1 online resource (xiii, 240 pages) : _billustrations |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
500 | _aIncludes index. | ||
505 | 0 | _aAn overview of data breaches -- Preparing to develop a computer security incident response plan -- Developing a computer security incident response plan -- Qualifying and investigating a breach -- Containing a breach -- Precisely determining the scope of a breach -- Communicating before, during and after a breach -- Restoring trust and business services after breach -- Preparing for data breach litigation. | |
588 | 0 | _aPrint version record. | |
504 | _aIncludes bibliographical references and index. | ||
520 | _aProvides guidance on how to proactively prepare for and manage the business, technology, legal and communications aspects of a data breach and limit impact. | ||
650 | 0 |
_aComputer networks _xSecurity measures. |
|
650 | 0 | _aComputer security. | |
650 | 7 |
_aCOMPUTERS _xSecurity _xNetworking. _2bisacsh |
|
650 | 7 |
_aComputer networks _xSecurity measures. _2fast _0(OCoLC)fst00872341 |
|
650 | 7 |
_aComputer security. _2fast _0(OCoLC)fst00872484 |
|
655 | 4 | _aElectronic books. | |
655 | 0 | _aElectronic books. | |
776 | 0 | 8 |
_iPrint version: _aFowler, Kevvie. _tData breach preparation and response. _dCambridge, MA : Syngress, [2016] _z9780128034514 _w(OCoLC)956636007 |
856 | 4 | 0 |
_3ScienceDirect _uhttp://www.sciencedirect.com/science/book/9780128034514 |
999 |
_c247351 _d247351 |