Start-up secure baking cybersecurity into your company from founding to exit
"Cybersecurity is of huge concern from start-ups to established businesses. This title provides steps that start-ups can follow to protect their business from a cyberattack The book will cover everything an entrepreneur and venture capitalist should know when building a secure company in today&...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hoboken, New Jersey
John Wiley & Sons, Inc.
[2021]
|
Schlagworte: | |
Online-Zugang: | lizenzpflichtig |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-067584187 | ||
003 | DE-627-1 | ||
005 | 20240228121255.0 | ||
007 | cr uuu---uuuuu | ||
008 | 210811s2021 xx |||||o 00| ||eng c | ||
020 | |a 9781119700753 |c electronic book |9 978-1-119-70075-3 | ||
020 | |a 1119700752 |c electronic book |9 1-119-70075-2 | ||
020 | |a 1119700744 |c electronic book |9 1-119-70074-4 | ||
020 | |a 9781119700746 |c electronic bk. |9 978-1-119-70074-6 | ||
020 | |a 9781394174768 |c electronic bk. |9 978-1-394-17476-8 | ||
020 | |a 1394174764 |c electronic bk. |9 1-394-17476-4 | ||
020 | |a 9781119700739 |9 978-1-119-70073-9 | ||
035 | |a (DE-627-1)067584187 | ||
035 | |a (DE-599)KEP067584187 | ||
035 | |a (ORHE)9781119700739 | ||
035 | |a (DE-627-1)067584187 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Castaldo, Chris |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Start-up secure |b baking cybersecurity into your company from founding to exit |c Chris Castaldo |
264 | 1 | |a Hoboken, New Jersey |b John Wiley & Sons, Inc. |c [2021] | |
300 | |a 1 online resource | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes index. - Description based on online resource; title from digital title page (viewed on April 20, 2021) | ||
520 | |a "Cybersecurity is of huge concern from start-ups to established businesses. This title provides steps that start-ups can follow to protect their business from a cyberattack The book will cover everything an entrepreneur and venture capitalist should know when building a secure company in today's world. It will take them through landing their first A round of funding and then a successful exit. The book describes how to include security and privacy from the start and build a cyber resilient company. It will provide basic cybersecurity concepts, what steps to take at each stage of the startup's life, how baking in security drives the value proposition for the startup's target market, and how to scale cybersecurity within their organization without being an expert."-- | ||
650 | 0 | |a Computer security | |
650 | 0 | |a New business enterprises | |
650 | 2 | |a Computer Security | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Nouvelles entreprises | |
650 | 4 | |a Computer security | |
650 | 4 | |a New business enterprises | |
776 | 1 | |z 9781119700739 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781119700739 |
856 | 4 | 0 | |l TUM01 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781119700739/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-067584187 |
---|---|
_version_ | 1818767263264669696 |
adam_text | |
any_adam_object | |
author | Castaldo, Chris |
author_facet | Castaldo, Chris |
author_role | aut |
author_sort | Castaldo, Chris |
author_variant | c c cc |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)067584187 (DE-599)KEP067584187 (ORHE)9781119700739 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02693cam a22005172 4500</leader><controlfield tag="001">ZDB-30-ORH-067584187</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121255.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">210811s2021 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119700753</subfield><subfield code="c">electronic book</subfield><subfield code="9">978-1-119-70075-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119700752</subfield><subfield code="c">electronic book</subfield><subfield code="9">1-119-70075-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119700744</subfield><subfield code="c">electronic book</subfield><subfield code="9">1-119-70074-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119700746</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-119-70074-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781394174768</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-394-17476-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1394174764</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-394-17476-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119700739</subfield><subfield code="9">978-1-119-70073-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)067584187</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP067584187</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781119700739</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)067584187</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Castaldo, Chris</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Start-up secure</subfield><subfield code="b">baking cybersecurity into your company from founding to exit</subfield><subfield code="c">Chris Castaldo</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, New Jersey</subfield><subfield code="b">John Wiley & Sons, Inc.</subfield><subfield code="c">[2021]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index. - Description based on online resource; title from digital title page (viewed on April 20, 2021)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"Cybersecurity is of huge concern from start-ups to established businesses. This title provides steps that start-ups can follow to protect their business from a cyberattack The book will cover everything an entrepreneur and venture capitalist should know when building a secure company in today's world. It will take them through landing their first A round of funding and then a successful exit. The book describes how to include security and privacy from the start and build a cyber resilient company. It will provide basic cybersecurity concepts, what steps to take at each stage of the startup's life, how baking in security drives the value proposition for the startup's target market, and how to scale cybersecurity within their organization without being an expert."--</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">New business enterprises</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Nouvelles entreprises</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">New business enterprises</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781119700739</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781119700739</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781119700739/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-067584187 |
illustrated | Not Illustrated |
indexdate | 2024-12-18T08:47:06Z |
institution | BVB |
isbn | 9781119700753 1119700752 1119700744 9781119700746 9781394174768 1394174764 9781119700739 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 online resource |
psigel | ZDB-30-ORH |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | John Wiley & Sons, Inc. |
record_format | marc |
spelling | Castaldo, Chris VerfasserIn aut Start-up secure baking cybersecurity into your company from founding to exit Chris Castaldo Hoboken, New Jersey John Wiley & Sons, Inc. [2021] 1 online resource Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes index. - Description based on online resource; title from digital title page (viewed on April 20, 2021) "Cybersecurity is of huge concern from start-ups to established businesses. This title provides steps that start-ups can follow to protect their business from a cyberattack The book will cover everything an entrepreneur and venture capitalist should know when building a secure company in today's world. It will take them through landing their first A round of funding and then a successful exit. The book describes how to include security and privacy from the start and build a cyber resilient company. It will provide basic cybersecurity concepts, what steps to take at each stage of the startup's life, how baking in security drives the value proposition for the startup's target market, and how to scale cybersecurity within their organization without being an expert."-- Computer security New business enterprises Computer Security Sécurité informatique Nouvelles entreprises 9781119700739 Erscheint auch als Druck-Ausgabe 9781119700739 TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9781119700739/?ar X:ORHE Aggregator lizenzpflichtig Volltext |
spellingShingle | Castaldo, Chris Start-up secure baking cybersecurity into your company from founding to exit Computer security New business enterprises Computer Security Sécurité informatique Nouvelles entreprises |
title | Start-up secure baking cybersecurity into your company from founding to exit |
title_auth | Start-up secure baking cybersecurity into your company from founding to exit |
title_exact_search | Start-up secure baking cybersecurity into your company from founding to exit |
title_full | Start-up secure baking cybersecurity into your company from founding to exit Chris Castaldo |
title_fullStr | Start-up secure baking cybersecurity into your company from founding to exit Chris Castaldo |
title_full_unstemmed | Start-up secure baking cybersecurity into your company from founding to exit Chris Castaldo |
title_short | Start-up secure |
title_sort | start up secure baking cybersecurity into your company from founding to exit |
title_sub | baking cybersecurity into your company from founding to exit |
topic | Computer security New business enterprises Computer Security Sécurité informatique Nouvelles entreprises |
topic_facet | Computer security New business enterprises Computer Security Sécurité informatique Nouvelles entreprises |
url | https://learning.oreilly.com/library/view/-/9781119700739/?ar |
work_keys_str_mv | AT castaldochris startupsecurebakingcybersecurityintoyourcompanyfromfoundingtoexit |