MARC details
000 -LEADER |
fixed length control field |
04224nam a2200649 i 4500 |
001 - CONTROL NUMBER |
control field |
9781947441477 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
BEP |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20241023114904.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS |
fixed length control field |
m eo d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
cr cn |||m|||a |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
180721s2018 nyua foab 001 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781947441477 |
Qualifying information |
|
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(OCoLC)1045429075 |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(CaBNVSL)swl000408570 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
CaBNVSL |
Language of cataloging |
eng |
Description conventions |
rda |
Transcribing agency |
CaBNVSL |
Modifying agency |
CaBNVSL |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
HV6773.15.C97 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Sutton, David |
Titles and words associated with a name |
(Information security practitioner), |
Relator term |
|
245 10 - TITLE STATEMENT |
Title |
Business continuity in a cyber world : |
Remainder of title |
surviving cyberattacks / |
Statement of responsibility, etc. |
David Sutton. |
250 ## - EDITION STATEMENT |
Edition statement |
First edition. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
Place of production, publication, distribution, manufacture |
New York, New York (222 East 46th Street, New York, NY 10017) : |
Name of producer, publisher, distributor, manufacturer |
Business Expert Press, |
Date of production, publication, distribution, manufacture, or copyright notice |
[(c)2018.] |
300 ## - PHYSICAL DESCRIPTION |
Extent |
1 online resource (xix, 182 pages) : |
Other physical details |
illustrations. |
336 ## - CONTENT TYPE |
Content type term |
text |
Content type code |
txt |
Source |
rdacontent |
337 ## - MEDIA TYPE |
Media type term |
computer |
Media type code |
c |
Source |
rdamedia |
338 ## - CARRIER TYPE |
Carrier type term |
online resource |
Carrier type code |
cr |
Source |
rdacarrier |
347 ## - DIGITAL FILE CHARACTERISTICS |
File type |
data file |
Source |
rda |
490 1# - SERIES STATEMENT |
Series statement |
Information systems collection, |
ISBN |
2156-6593 |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
|
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
1. The practice of business continuity management -- |
Title |
2. A brief overview of the risk management process -- |
-- |
3. The main cybersecurity issues -- |
-- |
4. Information assets and impacts -- |
-- |
5. Vulnerabilities and threats -- |
-- |
6. Selecting strategic, tactical, and operational solutions -- |
-- |
7. Business continuity activities and solutions -- |
-- |
8. Testing, exercising, and maintaining plans -- |
-- |
9. Embedding cybersecurity and business continuity -- |
-- |
Appendix A. Information on cybersecurity controls -- |
-- |
Appendix B. Standards and good practice guidelines -- |
-- |
Glossary -- |
-- |
Bibliography -- |
-- |
About the author -- |
-- |
Index. |
506 ## - RESTRICTIONS ON ACCESS NOTE |
Terms governing access |
Access restricted to authorized users and institutions. |
520 3# - SUMMARY, ETC. |
Summary, etc. |
Until recently, if it has been considered at all in the context of business continuity, cybersecurity may have been thought of in terms of disaster recovery and little else. Recent events have shown that cyberattacks are now an everyday occurrence, and it is becoming clear that the impact of these can have devastating effects on organizations whether large and small, and whether in the public or the private sector. Cybersecurity is one aspect of information security, since the impacts or consequences of a cyberattack will inevitably damage one or more of the three pillars of information security: the confidentiality, integrity, or availability of an organization's information assets. The main difference between information security and cybersecurity is that while information security deals with all types of information assets, cybersecurity deals purely with those that are accessible by means of interconnected electronic networks, including the Internet. Many responsible organizations now have robust information security, business continuity, and disaster recovery programs in place, and it is not the intention of this book to rewrite those, but to inform organizations about the kind of precautions they should take to stave off successful cyberattacks and how they should deal with them when they arise in order to protect their day-to-day business. |
530 ## - COPYRIGHT INFORMATION: |
COPYRIGHT INFORMATION |
COPYRIGHT NOT covered - Click this link to request copyright permission: |
Uniform Resource Identifier |
<a href="b">b</a> |
530 ## - COPYRIGHT INFORMATION: |
COPYRIGHT INFORMATION |
|
538 ## - SYSTEM DETAILS NOTE |
System details note |
Mode of access: World Wide Web. |
538 ## - SYSTEM DETAILS NOTE |
System details note |
System requirements: Adobe Acrobat reader. |
588 ## - SOURCE OF DESCRIPTION NOTE |
Source of description note |
Title from PDF title page (viewed on July 21, 2018). |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Cyberterrorism. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Risk management. |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
availability |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
compromise |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
confidentiality |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
continuity |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
cyber |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
cyber threat |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
cyberattack |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
cybersecurity |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
denial of service |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
information security |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
integrity |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
prevention |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
response |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
risk |
655 #0 - INDEX TERM--GENRE/FORM |
Genre/form data or focus term |
[genre] |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
Relationship information |
Print version: |
International Standard Book Number |
9781947441460 |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE |
Uniform title |
Information systems collection. |
International Standard Serial Number |
2156-6593 |
856 40 - ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
<a href="https://go.openathens.net/redirector/ciu.edu?url=https://portal.igpublish.com/iglibrary/search/BEPB0000763.html">https://go.openathens.net/redirector/ciu.edu?url=https://portal.igpublish.com/iglibrary/search/BEPB0000763.html</a> |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Library of Congress Classification |
Usage before 2021-2022 |
CIU |
Koha item type |
Online Book (LOGIN USING YOUR MY CIU LOGIN AND PASSWORD) |
VENDOR |
Business Expert Press |
LOCATION |
ONLINE |
Barecode |
BEP9781947441477 |
902 ## - LOCAL DATA ELEMENT B, LDB (RLIN) |
c |
1 |
d |
Cynthia Snell |