Business continuity in a cyber world : (Record no. 72790)

MARC details
000 -LEADER
fixed length control field 04224nam a2200649 i 4500
001 - CONTROL NUMBER
control field 9781947441477
003 - CONTROL NUMBER IDENTIFIER
control field BEP
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20241023114904.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m eo d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cn |||m|||a
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 180721s2018 nyua foab 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781947441477
Qualifying information
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)1045429075
035 ## - SYSTEM CONTROL NUMBER
System control number (CaBNVSL)swl000408570
040 ## - CATALOGING SOURCE
Original cataloging agency CaBNVSL
Language of cataloging eng
Description conventions rda
Transcribing agency CaBNVSL
Modifying agency CaBNVSL
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number HV6773.15.C97
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Sutton, David
Titles and words associated with a name (Information security practitioner),
Relator term
245 10 - TITLE STATEMENT
Title Business continuity in a cyber world :
Remainder of title surviving cyberattacks /
Statement of responsibility, etc. David Sutton.
250 ## - EDITION STATEMENT
Edition statement First edition.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture New York, New York (222 East 46th Street, New York, NY 10017) :
Name of producer, publisher, distributor, manufacturer Business Expert Press,
Date of production, publication, distribution, manufacture, or copyright notice [(c)2018.]
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (xix, 182 pages) :
Other physical details illustrations.
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
347 ## - DIGITAL FILE CHARACTERISTICS
File type data file
Source rda
490 1# - SERIES STATEMENT
Series statement Information systems collection,
ISBN 2156-6593
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note 1. The practice of business continuity management --
Title 2. A brief overview of the risk management process --
-- 3. The main cybersecurity issues --
-- 4. Information assets and impacts --
-- 5. Vulnerabilities and threats --
-- 6. Selecting strategic, tactical, and operational solutions --
-- 7. Business continuity activities and solutions --
-- 8. Testing, exercising, and maintaining plans --
-- 9. Embedding cybersecurity and business continuity --
-- Appendix A. Information on cybersecurity controls --
-- Appendix B. Standards and good practice guidelines --
-- Glossary --
-- Bibliography --
-- About the author --
-- Index.
506 ## - RESTRICTIONS ON ACCESS NOTE
Terms governing access Access restricted to authorized users and institutions.
520 3# - SUMMARY, ETC.
Summary, etc. Until recently, if it has been considered at all in the context of business continuity, cybersecurity may have been thought of in terms of disaster recovery and little else. Recent events have shown that cyberattacks are now an everyday occurrence, and it is becoming clear that the impact of these can have devastating effects on organizations whether large and small, and whether in the public or the private sector. Cybersecurity is one aspect of information security, since the impacts or consequences of a cyberattack will inevitably damage one or more of the three pillars of information security: the confidentiality, integrity, or availability of an organization's information assets. The main difference between information security and cybersecurity is that while information security deals with all types of information assets, cybersecurity deals purely with those that are accessible by means of interconnected electronic networks, including the Internet. Many responsible organizations now have robust information security, business continuity, and disaster recovery programs in place, and it is not the intention of this book to rewrite those, but to inform organizations about the kind of precautions they should take to stave off successful cyberattacks and how they should deal with them when they arise in order to protect their day-to-day business.
530 ## - COPYRIGHT INFORMATION:
COPYRIGHT INFORMATION COPYRIGHT NOT covered - Click this link to request copyright permission:
Uniform Resource Identifier <a href="b">b</a>
530 ## - COPYRIGHT INFORMATION:
COPYRIGHT INFORMATION
538 ## - SYSTEM DETAILS NOTE
System details note Mode of access: World Wide Web.
538 ## - SYSTEM DETAILS NOTE
System details note System requirements: Adobe Acrobat reader.
588 ## - SOURCE OF DESCRIPTION NOTE
Source of description note Title from PDF title page (viewed on July 21, 2018).
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cyberterrorism.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Risk management.
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term availability
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term compromise
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term confidentiality
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term continuity
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term cyber
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term cyber threat
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term cyberattack
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term cybersecurity
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term denial of service
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term information security
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term integrity
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term prevention
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term response
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term risk
655 #0 - INDEX TERM--GENRE/FORM
Genre/form data or focus term [genre]
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
International Standard Book Number 9781947441460
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Information systems collection.
International Standard Serial Number 2156-6593
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://go.openathens.net/redirector/ciu.edu?url=https://portal.igpublish.com/iglibrary/search/BEPB0000763.html">https://go.openathens.net/redirector/ciu.edu?url=https://portal.igpublish.com/iglibrary/search/BEPB0000763.html</a>
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Library of Congress Classification
Usage before 2021-2022 CIU
Koha item type Online Book (LOGIN USING YOUR MY CIU LOGIN AND PASSWORD)
VENDOR Business Expert Press
LOCATION ONLINE
Barecode BEP9781947441477
902 ## - LOCAL DATA ELEMENT B, LDB (RLIN)
c 1
d Cynthia Snell
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Source of acquisition Total Checkouts Full call number Date last seen Uniform Resource Identifier Price effective from Koha item type Collection Barcode
          G. Allen Fleece Library G. Allen Fleece Library ONLINE 02/27/2023 Business Expert Press   HV 02/27/2023 https://go.openathens.net/redirector/ciu.edu?url=https://portal.igpublish.com/iglibrary/search/BEPB0000763.html 02/27/2023 Online Book (LOGIN USING YOUR MY CIU LOGIN AND PASSWORD)    
          G. Allen Fleece Library G. Allen Fleece Library ONLINE 02/27/2023 Business Expert Press   HV 02/27/2023 https://go.openathens.net/redirector/ciu.edu?url=https://portal.igpublish.com/iglibrary/search/BEPB0000763.html 02/27/2023 Online Book (LOGIN USING YOUR MY CIU LOGIN AND PASSWORD)    
          G. Allen Fleece Library G. Allen Fleece Library ONLINE 02/27/2023 Business Expert Press   HV 02/27/2023 https://go.openathens.net/redirector/ciu.edu?url=https://portal.igpublish.com/iglibrary/search/BEPB0000763.html 02/27/2023 Online Book (LOGIN USING YOUR MY CIU LOGIN AND PASSWORD)    
          G. Allen Fleece Library G. Allen Fleece Library ONLINE 02/27/2023 Business Expert Press   HV 02/27/2023 https://go.openathens.net/redirector/ciu.edu?url=https://portal.igpublish.com/iglibrary/search/BEPB0000763.html 02/27/2023 Online Book (LOGIN USING YOUR MY CIU LOGIN AND PASSWORD)    
          G. Allen Fleece Library G. Allen Fleece Library   03/20/2023 Business Expert Press   HV6773.15.C97 03/20/2023 https://go.openathens.net/redirector/ciu.edu?url=https://portal.igpublish.com/iglibrary/search/BEPB0000763.html 03/20/2023 Online Book (LOGIN USING YOUR MY CIU LOGIN AND PASSWORD) Non-fiction 9781947441477
    Library of Congress Classification     G. Allen Fleece Library G. Allen Fleece Library ONLINE 10/23/2024 Business Expert Press   HV6773.15.C97 10/23/2024 https://go.openathens.net/redirector/ciu.edu?url=https://portal.igpublish.com/iglibrary/search/BEPB0000763.html 10/23/2024 Online Book (LOGIN USING YOUR MY CIU LOGIN AND PASSWORD)   BEP9781947441477