Privacy, regulations, and cybersecurity : (Record no. 7840)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 01647cam a22002178i 4500 |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20251223131828.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 201201s2021 nju ob 001 0 eng c |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| ISBN | 9781119660118 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| ISBN | 9781119660149 |
| 041 ## - LANGUAGE CODE | |
| Language code of text/sound track or separate title | eng |
| 082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 658.4/78 |
| 100 1# - MAIN ENTRY--AUTHOR NAME | |
| Personal name | Moschovitis, Christos J. P., |
| 245 10 - TITLE STATEMENT | |
| Title | Privacy, regulations, and cybersecurity : |
| Remainder of title | the essential business guide / |
| Statement of responsibility, etc | Chris Moschovitis. |
| 300 ## - PHYSICAL DESCRIPTION | |
| Number of Pages | 1 online resource |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc | "This book answers the question: How do businesses effectively respond to the evolving definition of privacy through their strategies, operations, cybersecurity posture, and adaptation to new regulations? The book walks the reader through privacy, it's definitions and implications; data regulation, and its increasing impact on business; and cybersecurity as a newly critical business practice. In addition, the book addresses the overarching significance of privacy for companies' overall strategies. There will be numerous examples and case studies that break down every element of the privacy -- regulation -- cybersecurity triad for the executive. It will help executives understand the concepts of privacy, personally identifiable information, definitions and world-wide regulations. The book walks through how to use core risk management principles, evaluate threats, deploy policies and standards, and identify the right tools, roles, and methods for companies to employ."-- |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical Term | Business enterprises |
| General subdivision | Security measures. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical Term | Data protection. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical Term | Computer security. |
| 856 ## - ELECTRONIC LOCATION AND ACCESS | |
| Uniform Resource Identifier | https://ieeexplore.ieee.org/servlet/opac?bknumber=9820870 |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Koha item type | E-Books |
| Withdrawn status | Lost status | Damaged status | Home library | Current library | Date acquired | Full call number | Accession Number | Bill Date/Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|
| Indian Institute of Technology Tirupati | Indian Institute of Technology Tirupati | 23/12/2025 | 658.4/78 | EB00783 | 23/12/2025 | E-Books |