Responsive security be ready to be secure
"Technology and business change along with information flows, vulnerabilities, exposures, and risks. Based on real-time practice experience, and research conducted by the author over the past decade, this book addresses the challenges, issues, and dilemmas of managing information security risk...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Boca Raton [Florida]
CRC Press/Taylor & Francis
[2014]
|
Schlagworte: | |
Online-Zugang: | lizenzpflichtig |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047598832 | ||
003 | DE-627-1 | ||
005 | 20240228115359.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2014 xx |||||o 00| ||eng c | ||
020 | |a 9781466584310 |c electronic bk. |9 978-1-4665-8431-0 | ||
020 | |a 1466584319 |c electronic bk. |9 1-4665-8431-9 | ||
020 | |a 129999086X |9 1-299-99086-X | ||
020 | |a 9781299990869 |9 978-1-299-99086-9 | ||
020 | |a 9781315145907 |c eBook |9 978-1-315-14590-7 | ||
020 | |a 1315145901 |9 1-315-14590-1 | ||
035 | |a (DE-627-1)047598832 | ||
035 | |a (DE-599)KEP047598832 | ||
035 | |a (ORHE)9781466584310 | ||
035 | |a (DE-627-1)047598832 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a BUS |2 bisacsh | |
072 | 7 | |a BUS |2 bisacsh | |
072 | 7 | |a BUS |2 bisacsh | |
072 | 7 | |a BUS |2 bisacsh | |
082 | 0 | |a 658.4/78 |2 23 | |
100 | 1 | |a Kang, Meng-Chow |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Responsive security |b be ready to be secure |c Meng-Chow Kang |
264 | 1 | |a Boca Raton [Florida] |b CRC Press/Taylor & Francis |c [2014] | |
264 | 4 | |c ©20 | |
264 | 4 | |c ©2014 | |
300 | |a 1 online resource (xviii, 223 pages) |b illustrations, portrait | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references. - Print version record | ||
520 | |a "Technology and business change along with information flows, vulnerabilities, exposures, and risks. Based on real-time practice experience, and research conducted by the author over the past decade, this book addresses the challenges, issues, and dilemmas of managing information security risk in a constantly changing business, technology, and operating environment. It introduces an approach, known as a Responsive Approach, for addressing these needs from both practitioner and organizational management perspectives"-- | ||
650 | 0 | |a Business enterprises |x Computer networks |x Security measures | |
650 | 0 | |a Electronic data processing departments |x Security measures | |
650 | 0 | |a Information technology |x Security measures | |
650 | 0 | |a Data protection | |
650 | 0 | |a Risk management | |
650 | 2 | |a Risk Management | |
650 | 4 | |a Centres de traitement de l'information ; Sécurité ; Mesures | |
650 | 4 | |a Technologie de l'information ; Sécurité ; Mesures | |
650 | 4 | |a Protection de l'information (Informatique) | |
650 | 4 | |a Gestion du risque | |
650 | 4 | |a risk management | |
650 | 4 | |a BUSINESS & ECONOMICS ; Industrial Management | |
650 | 4 | |a BUSINESS & ECONOMICS ; Management | |
650 | 4 | |a BUSINESS & ECONOMICS ; Management Science | |
650 | 4 | |a BUSINESS & ECONOMICS ; Organizational Behavior | |
650 | 4 | |a Business enterprises ; Computer networks ; Security measures | |
650 | 4 | |a Data protection | |
650 | 4 | |a Electronic data processing departments ; Security measures | |
650 | 4 | |a Information technology ; Security measures | |
650 | 4 | |a Risk management | |
776 | 1 | |z 9781466584303 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781466584303 |
856 | 4 | 0 | |l TUM01 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781466584310/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047598832 |
---|---|
_version_ | 1818767309862338560 |
adam_text | |
any_adam_object | |
author | Kang, Meng-Chow |
author_facet | Kang, Meng-Chow |
author_role | aut |
author_sort | Kang, Meng-Chow |
author_variant | m c k mck |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047598832 (DE-599)KEP047598832 (ORHE)9781466584310 |
dewey-full | 658.4/78 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.4/78 |
dewey-search | 658.4/78 |
dewey-sort | 3658.4 278 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03276cam a22007332 4500</leader><controlfield tag="001">ZDB-30-ORH-047598832</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228115359.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2014 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781466584310</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-4665-8431-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1466584319</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-4665-8431-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">129999086X</subfield><subfield code="9">1-299-99086-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781299990869</subfield><subfield code="9">978-1-299-99086-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781315145907</subfield><subfield code="c">eBook</subfield><subfield code="9">978-1-315-14590-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1315145901</subfield><subfield code="9">1-315-14590-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047598832</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047598832</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781466584310</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047598832</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.4/78</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kang, Meng-Chow</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Responsive security</subfield><subfield code="b">be ready to be secure</subfield><subfield code="c">Meng-Chow Kang</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton [Florida]</subfield><subfield code="b">CRC Press/Taylor & Francis</subfield><subfield code="c">[2014]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©20</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xviii, 223 pages)</subfield><subfield code="b">illustrations, portrait</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references. - Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"Technology and business change along with information flows, vulnerabilities, exposures, and risks. Based on real-time practice experience, and research conducted by the author over the past decade, this book addresses the challenges, issues, and dilemmas of managing information security risk in a constantly changing business, technology, and operating environment. It introduces an approach, known as a Responsive Approach, for addressing these needs from both practitioner and organizational management perspectives"--</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Business enterprises</subfield><subfield code="x">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Electronic data processing departments</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information technology</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Risk management</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Risk Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Centres de traitement de l'information ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Technologie de l'information ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Protection de l'information (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Gestion du risque</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">risk management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">BUSINESS & ECONOMICS ; Industrial Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">BUSINESS & ECONOMICS ; Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">BUSINESS & ECONOMICS ; Management Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">BUSINESS & ECONOMICS ; Organizational Behavior</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business enterprises ; Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic data processing departments ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Risk management</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781466584303</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781466584303</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781466584310/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047598832 |
illustrated | Illustrated |
indexdate | 2024-12-18T08:47:50Z |
institution | BVB |
isbn | 9781466584310 1466584319 129999086X 9781299990869 9781315145907 1315145901 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 online resource (xviii, 223 pages) illustrations, portrait |
psigel | ZDB-30-ORH |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | CRC Press/Taylor & Francis |
record_format | marc |
spelling | Kang, Meng-Chow VerfasserIn aut Responsive security be ready to be secure Meng-Chow Kang Boca Raton [Florida] CRC Press/Taylor & Francis [2014] ©20 ©2014 1 online resource (xviii, 223 pages) illustrations, portrait Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references. - Print version record "Technology and business change along with information flows, vulnerabilities, exposures, and risks. Based on real-time practice experience, and research conducted by the author over the past decade, this book addresses the challenges, issues, and dilemmas of managing information security risk in a constantly changing business, technology, and operating environment. It introduces an approach, known as a Responsive Approach, for addressing these needs from both practitioner and organizational management perspectives"-- Business enterprises Computer networks Security measures Electronic data processing departments Security measures Information technology Security measures Data protection Risk management Risk Management Centres de traitement de l'information ; Sécurité ; Mesures Technologie de l'information ; Sécurité ; Mesures Protection de l'information (Informatique) Gestion du risque risk management BUSINESS & ECONOMICS ; Industrial Management BUSINESS & ECONOMICS ; Management BUSINESS & ECONOMICS ; Management Science BUSINESS & ECONOMICS ; Organizational Behavior Business enterprises ; Computer networks ; Security measures Electronic data processing departments ; Security measures Information technology ; Security measures 9781466584303 Erscheint auch als Druck-Ausgabe 9781466584303 TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9781466584310/?ar X:ORHE Aggregator lizenzpflichtig Volltext |
spellingShingle | Kang, Meng-Chow Responsive security be ready to be secure Business enterprises Computer networks Security measures Electronic data processing departments Security measures Information technology Security measures Data protection Risk management Risk Management Centres de traitement de l'information ; Sécurité ; Mesures Technologie de l'information ; Sécurité ; Mesures Protection de l'information (Informatique) Gestion du risque risk management BUSINESS & ECONOMICS ; Industrial Management BUSINESS & ECONOMICS ; Management BUSINESS & ECONOMICS ; Management Science BUSINESS & ECONOMICS ; Organizational Behavior Business enterprises ; Computer networks ; Security measures Electronic data processing departments ; Security measures Information technology ; Security measures |
title | Responsive security be ready to be secure |
title_auth | Responsive security be ready to be secure |
title_exact_search | Responsive security be ready to be secure |
title_full | Responsive security be ready to be secure Meng-Chow Kang |
title_fullStr | Responsive security be ready to be secure Meng-Chow Kang |
title_full_unstemmed | Responsive security be ready to be secure Meng-Chow Kang |
title_short | Responsive security |
title_sort | responsive security be ready to be secure |
title_sub | be ready to be secure |
topic | Business enterprises Computer networks Security measures Electronic data processing departments Security measures Information technology Security measures Data protection Risk management Risk Management Centres de traitement de l'information ; Sécurité ; Mesures Technologie de l'information ; Sécurité ; Mesures Protection de l'information (Informatique) Gestion du risque risk management BUSINESS & ECONOMICS ; Industrial Management BUSINESS & ECONOMICS ; Management BUSINESS & ECONOMICS ; Management Science BUSINESS & ECONOMICS ; Organizational Behavior Business enterprises ; Computer networks ; Security measures Electronic data processing departments ; Security measures Information technology ; Security measures |
topic_facet | Business enterprises Computer networks Security measures Electronic data processing departments Security measures Information technology Security measures Data protection Risk management Risk Management Centres de traitement de l'information ; Sécurité ; Mesures Technologie de l'information ; Sécurité ; Mesures Protection de l'information (Informatique) Gestion du risque risk management BUSINESS & ECONOMICS ; Industrial Management BUSINESS & ECONOMICS ; Management BUSINESS & ECONOMICS ; Management Science BUSINESS & ECONOMICS ; Organizational Behavior Business enterprises ; Computer networks ; Security measures Electronic data processing departments ; Security measures Information technology ; Security measures |
url | https://learning.oreilly.com/library/view/-/9781466584310/?ar |
work_keys_str_mv | AT kangmengchow responsivesecuritybereadytobesecure |