رکورد قبلیرکورد بعدی

" Understanding cyber risk : "


Document Type : BL
Record Number : 850403
Main Entry : Koehler, Thomas R.,1968-
Title & Author : Understanding cyber risk : : protecting your corporate assets /\ Thomas R. Koehler.
Publication Statement : Abingdon, Oxon ;New York, NY :: Routledge,, 2018.
Page. NO : 1 online resource
ISBN : 1317005058
: : 1472477804
: : 9781317005056
: : 9781472477804
: 1472477790
: 9781472477798
Notes : "A Gower book."
Bibliographies/Indexes : Includes bibliographical references and index.
Abstract : A myriad of security vulnerabilities in the software and hardware we use today can be exploited by an attacker, any attacker. The knowledge necessary to successfully intercept your data and voice links and bug your computers is widespread and not limited to the intelligence apparatus. Consequently, the knowledge required can - at least in part - also easily be accessed by criminals trying to 'transfer your wealth' and competitors looking for your trade secrets. The temptation to use these easily accessible resources to the disadvantage of a rival company grows as global competition gets fiercer. Corporate espionage is nothing new, but since the dawn of the Internet Age the rules have changed. It is no longer necessary to be on-site to steal proprietary information. Cyberattacks today are cheap and attackers run a very low risk of getting caught, as attacks can be executed from anywhere in the world - an ideal breeding ground for criminal activities - and the consequences can be disastrous. In Understanding Cyber Risk: Protecting your Corporate Assets the author provides a wealth of real world examples from diverse industries from all over the world on how company assets are attacked via the cyber world. The cases clearly show that every organization can fall victim to a cyberattack, regardless of the size or country of origin. He also offers specific advice on how to protect core assets and company secrets. This book is essential reading for anyone interested in cyber security, and the use of cyberattacks in corporate espionage.
Subject : Business enterprises-- Computer networks-- Security measures.
Subject : Business intelligence.
Subject : Computer crimes-- Prevention.
Subject : Data protection.
Subject : BUSINESS ECONOMICS-- Industrial Management.
Subject : BUSINESS ECONOMICS-- Management Science.
Subject : BUSINESS ECONOMICS-- Management.
Subject : BUSINESS ECONOMICS-- Organizational Behavior.
Subject : Business enterprises-- Computer networks-- Security measures.
Subject : Business intelligence.
Subject : Computer crimes-- Prevention.
Subject : Data protection.
Dewey Classification : ‭658.4/78‬
LC Classification : ‭HF5548.37‬‭.K64 2018‬
کپی لینک

پیشنهاد خرید
پیوستها
Search result is zero
نظرسنجی
نظرسنجی منابع دیجیتال

1 - آیا از کیفیت منابع دیجیتال راضی هستید؟