Responsive security be ready to be secure

"Technology and business change along with information flows, vulnerabilities, exposures, and risks. Based on real-time practice experience, and research conducted by the author over the past decade, this book addresses the challenges, issues, and dilemmas of managing information security risk...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Kang, Meng-Chow (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Boca Raton [Florida] CRC Press/Taylor & Francis [2014]
Schlagworte:
Online-Zugang:lizenzpflichtig
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000cam a22000002 4500
001 ZDB-30-ORH-047598832
003 DE-627-1
005 20240228115359.0
007 cr uuu---uuuuu
008 191023s2014 xx |||||o 00| ||eng c
020 |a 9781466584310  |c electronic bk.  |9 978-1-4665-8431-0 
020 |a 1466584319  |c electronic bk.  |9 1-4665-8431-9 
020 |a 129999086X  |9 1-299-99086-X 
020 |a 9781299990869  |9 978-1-299-99086-9 
020 |a 9781315145907  |c eBook  |9 978-1-315-14590-7 
020 |a 1315145901  |9 1-315-14590-1 
035 |a (DE-627-1)047598832 
035 |a (DE-599)KEP047598832 
035 |a (ORHE)9781466584310 
035 |a (DE-627-1)047598832 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
072 7 |a BUS  |2 bisacsh 
072 7 |a BUS  |2 bisacsh 
072 7 |a BUS  |2 bisacsh 
072 7 |a BUS  |2 bisacsh 
082 0 |a 658.4/78  |2 23 
100 1 |a Kang, Meng-Chow  |e VerfasserIn  |4 aut 
245 1 0 |a Responsive security  |b be ready to be secure  |c Meng-Chow Kang 
264 1 |a Boca Raton [Florida]  |b CRC Press/Taylor & Francis  |c [2014] 
264 4 |c ©20 
264 4 |c ©2014 
300 |a 1 online resource (xviii, 223 pages)  |b illustrations, portrait 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
500 |a Includes bibliographical references. - Print version record 
520 |a "Technology and business change along with information flows, vulnerabilities, exposures, and risks. Based on real-time practice experience, and research conducted by the author over the past decade, this book addresses the challenges, issues, and dilemmas of managing information security risk in a constantly changing business, technology, and operating environment. It introduces an approach, known as a Responsive Approach, for addressing these needs from both practitioner and organizational management perspectives"-- 
650 0 |a Business enterprises  |x Computer networks  |x Security measures 
650 0 |a Electronic data processing departments  |x Security measures 
650 0 |a Information technology  |x Security measures 
650 0 |a Data protection 
650 0 |a Risk management 
650 2 |a Risk Management 
650 4 |a Centres de traitement de l'information ; Sécurité ; Mesures 
650 4 |a Technologie de l'information ; Sécurité ; Mesures 
650 4 |a Protection de l'information (Informatique) 
650 4 |a Gestion du risque 
650 4 |a risk management 
650 4 |a BUSINESS & ECONOMICS ; Industrial Management 
650 4 |a BUSINESS & ECONOMICS ; Management 
650 4 |a BUSINESS & ECONOMICS ; Management Science 
650 4 |a BUSINESS & ECONOMICS ; Organizational Behavior 
650 4 |a Business enterprises ; Computer networks ; Security measures 
650 4 |a Data protection 
650 4 |a Electronic data processing departments ; Security measures 
650 4 |a Information technology ; Security measures 
650 4 |a Risk management 
776 1 |z 9781466584303 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 9781466584303 
856 4 0 |l TUM01  |p ZDB-30-ORH  |q TUM_PDA_ORH  |u https://learning.oreilly.com/library/view/-/9781466584310/?ar  |m X:ORHE  |x Aggregator  |z lizenzpflichtig  |3 Volltext 
912 |a ZDB-30-ORH 
912 |a ZDB-30-ORH 
951 |a BO 
912 |a ZDB-30-ORH 
049 |a DE-91 

Datensatz im Suchindex

DE-BY-TUM_katkey ZDB-30-ORH-047598832
_version_ 1818767309862338560
adam_text
any_adam_object
author Kang, Meng-Chow
author_facet Kang, Meng-Chow
author_role aut
author_sort Kang, Meng-Chow
author_variant m c k mck
building Verbundindex
bvnumber localTUM
collection ZDB-30-ORH
ctrlnum (DE-627-1)047598832
(DE-599)KEP047598832
(ORHE)9781466584310
dewey-full 658.4/78
dewey-hundreds 600 - Technology (Applied sciences)
dewey-ones 658 - General management
dewey-raw 658.4/78
dewey-search 658.4/78
dewey-sort 3658.4 278
dewey-tens 650 - Management and auxiliary services
discipline Wirtschaftswissenschaften
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03276cam a22007332 4500</leader><controlfield tag="001">ZDB-30-ORH-047598832</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228115359.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2014 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781466584310</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-4665-8431-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1466584319</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-4665-8431-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">129999086X</subfield><subfield code="9">1-299-99086-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781299990869</subfield><subfield code="9">978-1-299-99086-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781315145907</subfield><subfield code="c">eBook</subfield><subfield code="9">978-1-315-14590-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1315145901</subfield><subfield code="9">1-315-14590-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047598832</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047598832</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781466584310</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047598832</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.4/78</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kang, Meng-Chow</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Responsive security</subfield><subfield code="b">be ready to be secure</subfield><subfield code="c">Meng-Chow Kang</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton [Florida]</subfield><subfield code="b">CRC Press/Taylor &amp; Francis</subfield><subfield code="c">[2014]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©20</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xviii, 223 pages)</subfield><subfield code="b">illustrations, portrait</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references. - Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"Technology and business change along with information flows, vulnerabilities, exposures, and risks. Based on real-time practice experience, and research conducted by the author over the past decade, this book addresses the challenges, issues, and dilemmas of managing information security risk in a constantly changing business, technology, and operating environment. It introduces an approach, known as a Responsive Approach, for addressing these needs from both practitioner and organizational management perspectives"--</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Business enterprises</subfield><subfield code="x">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Electronic data processing departments</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information technology</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Risk management</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Risk Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Centres de traitement de l'information ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Technologie de l'information ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Protection de l'information (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Gestion du risque</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">risk management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">BUSINESS &amp; ECONOMICS ; Industrial Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">BUSINESS &amp; ECONOMICS ; Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">BUSINESS &amp; ECONOMICS ; Management Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">BUSINESS &amp; ECONOMICS ; Organizational Behavior</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business enterprises ; Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic data processing departments ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Risk management</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781466584303</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781466584303</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781466584310/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection>
id ZDB-30-ORH-047598832
illustrated Illustrated
indexdate 2024-12-18T08:47:50Z
institution BVB
isbn 9781466584310
1466584319
129999086X
9781299990869
9781315145907
1315145901
language English
open_access_boolean
owner DE-91
DE-BY-TUM
owner_facet DE-91
DE-BY-TUM
physical 1 online resource (xviii, 223 pages) illustrations, portrait
psigel ZDB-30-ORH
publishDate 2014
publishDateSearch 2014
publishDateSort 2014
publisher CRC Press/Taylor & Francis
record_format marc
spelling Kang, Meng-Chow VerfasserIn aut
Responsive security be ready to be secure Meng-Chow Kang
Boca Raton [Florida] CRC Press/Taylor & Francis [2014]
©20
©2014
1 online resource (xviii, 223 pages) illustrations, portrait
Text txt rdacontent
Computermedien c rdamedia
Online-Ressource cr rdacarrier
Includes bibliographical references. - Print version record
"Technology and business change along with information flows, vulnerabilities, exposures, and risks. Based on real-time practice experience, and research conducted by the author over the past decade, this book addresses the challenges, issues, and dilemmas of managing information security risk in a constantly changing business, technology, and operating environment. It introduces an approach, known as a Responsive Approach, for addressing these needs from both practitioner and organizational management perspectives"--
Business enterprises Computer networks Security measures
Electronic data processing departments Security measures
Information technology Security measures
Data protection
Risk management
Risk Management
Centres de traitement de l'information ; Sécurité ; Mesures
Technologie de l'information ; Sécurité ; Mesures
Protection de l'information (Informatique)
Gestion du risque
risk management
BUSINESS & ECONOMICS ; Industrial Management
BUSINESS & ECONOMICS ; Management
BUSINESS & ECONOMICS ; Management Science
BUSINESS & ECONOMICS ; Organizational Behavior
Business enterprises ; Computer networks ; Security measures
Electronic data processing departments ; Security measures
Information technology ; Security measures
9781466584303
Erscheint auch als Druck-Ausgabe 9781466584303
TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9781466584310/?ar X:ORHE Aggregator lizenzpflichtig Volltext
spellingShingle Kang, Meng-Chow
Responsive security be ready to be secure
Business enterprises Computer networks Security measures
Electronic data processing departments Security measures
Information technology Security measures
Data protection
Risk management
Risk Management
Centres de traitement de l'information ; Sécurité ; Mesures
Technologie de l'information ; Sécurité ; Mesures
Protection de l'information (Informatique)
Gestion du risque
risk management
BUSINESS & ECONOMICS ; Industrial Management
BUSINESS & ECONOMICS ; Management
BUSINESS & ECONOMICS ; Management Science
BUSINESS & ECONOMICS ; Organizational Behavior
Business enterprises ; Computer networks ; Security measures
Electronic data processing departments ; Security measures
Information technology ; Security measures
title Responsive security be ready to be secure
title_auth Responsive security be ready to be secure
title_exact_search Responsive security be ready to be secure
title_full Responsive security be ready to be secure Meng-Chow Kang
title_fullStr Responsive security be ready to be secure Meng-Chow Kang
title_full_unstemmed Responsive security be ready to be secure Meng-Chow Kang
title_short Responsive security
title_sort responsive security be ready to be secure
title_sub be ready to be secure
topic Business enterprises Computer networks Security measures
Electronic data processing departments Security measures
Information technology Security measures
Data protection
Risk management
Risk Management
Centres de traitement de l'information ; Sécurité ; Mesures
Technologie de l'information ; Sécurité ; Mesures
Protection de l'information (Informatique)
Gestion du risque
risk management
BUSINESS & ECONOMICS ; Industrial Management
BUSINESS & ECONOMICS ; Management
BUSINESS & ECONOMICS ; Management Science
BUSINESS & ECONOMICS ; Organizational Behavior
Business enterprises ; Computer networks ; Security measures
Electronic data processing departments ; Security measures
Information technology ; Security measures
topic_facet Business enterprises Computer networks Security measures
Electronic data processing departments Security measures
Information technology Security measures
Data protection
Risk management
Risk Management
Centres de traitement de l'information ; Sécurité ; Mesures
Technologie de l'information ; Sécurité ; Mesures
Protection de l'information (Informatique)
Gestion du risque
risk management
BUSINESS & ECONOMICS ; Industrial Management
BUSINESS & ECONOMICS ; Management
BUSINESS & ECONOMICS ; Management Science
BUSINESS & ECONOMICS ; Organizational Behavior
Business enterprises ; Computer networks ; Security measures
Electronic data processing departments ; Security measures
Information technology ; Security measures
url https://learning.oreilly.com/library/view/-/9781466584310/?ar
work_keys_str_mv AT kangmengchow responsivesecuritybereadytobesecure