MARC details
000 -LEADER |
fixed length control field |
02013nam a22003857i 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
JRU |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20161023093559.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
151105t2014 xxu||||| |||| 00| 0 eng d |
011 ## - LINKING LIBRARY OF CONGRESS CONTROL NUMBER [OBSOLETE] |
LC control number |
181312 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781118836354 |
Qualifying information |
Hardback |
|
International Standard Book Number |
9781118935958 (epub) |
|
International Standard Book Number |
97811189359695 (epdf) |
|
International Standard Book Number |
9781118915028 (ebook) |
040 ## - CATALOGING SOURCE |
Description conventions |
rda |
Transcribing agency |
|
Language of cataloging |
eng |
|
Description conventions |
rda |
Language of cataloging |
eng |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
658.478 |
Item number |
.Ul46 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Ulsch, N. MacDonnell, |
Dates associated with a name |
1951- |
Relator term |
author. |
9 (RLIN) |
118538 |
245 ## - TITLE STATEMENT |
Title |
Cyber threat! : how to manage the growing risk of cyber attacks / |
Statement of responsibility, etc. |
N. MacDonnell Ulsch. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
Place of production, publication, distribution, manufacture |
New Jersey : |
Name of producer, publisher, distributor, manufacturer |
John Wiley and Sons, |
Date of production, publication, distribution, manufacture, or copyright notice |
2014. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxi, 202 pages ; |
Dimensions |
24 cm |
336 ## - CONTENT TYPE |
Content type term |
text |
337 ## - MEDIA TYPE |
Media type term |
unmediated |
338 ## - CARRIER TYPE |
Carrier type term |
volume |
440 ## - SERIES STATEMENT/ADDED ENTRY--TITLE |
Title |
Wiley corporate F&A series |
9 (RLIN) |
12914 |
500 ## - GENERAL NOTE |
General note |
Includes index. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
"Cyber Threat! was written to guide that process with strategies for assessing risk and tips for managing your brand should an attack occur. It approaches the issue of information security from a one-of-a-kind global perspective. Because data can easily cross borders in the hands of cyber criminals, information security is geopolitical issue. Internet-based organized crime, cyber activism hacking groups like Anonymous, and national strategies of cyber theft are all real threats to the technological infrastructure that business rely on. This book gives an eye-opening explanation of these complexities, providing readers with the global foundation they need to take action." -- Book jacket |
521 ## - TARGET AUDIENCE NOTE |
Target audience note |
|
546 ## - LANGUAGE NOTE |
Language note |
Text in English |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Corporations |
General subdivision |
Security measures. |
9 (RLIN) |
118539 |
|
Topical term or geographic name as entry element |
Business enterprises |
General subdivision |
Computer networks |
-- |
Security measures. |
9 (RLIN) |
83133 |
|
Topical term or geographic name as entry element |
Computer crimes |
General subdivision |
Prevention. |
9 (RLIN) |
118540 |
|
Topical term or geographic name as entry element |
Computer security. |
9 (RLIN) |
63403 |
|
Topical term or geographic name as entry element |
Computer networks |
General subdivision |
Security measures. |
9 (RLIN) |
48412 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
Print Materials |
Classification part |
658.478 |
Item part |
.Ul46 |
Call number prefix |
G |
Call number suffix |
2014 |