Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Business continuity in a cyber world : surviving cyberattackes
by
Sutton, David, author
, Power, Daniel J., editor
in
Cyberspace Security measures.
/ Computer networks Security measures.
/ Associations, institutions, etc.
/ Business.
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Business continuity in a cyber world : surviving cyberattackes
by
Sutton, David, author
, Power, Daniel J., editor
in
Cyberspace Security measures.
/ Computer networks Security measures.
/ Associations, institutions, etc.
/ Business.
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Business continuity in a cyber world : surviving cyberattackes
Book
Business continuity in a cyber world : surviving cyberattackes
Available to read in the library!
Request Book From Autostore
and Choose the Collection Method
Overview
\"Until recently, if it has been considered at all in the context of business continuity, cyber security may have been thought of in terms of disaster recovery and little else. Recent events have shown that cyberattacks are now an everyday occurrence, and it is becoming clear that the impact of these can have devastating effects on organizations whether large or small, public or private sector. Cybersecurity is one aspect of information security, since the impacts or consequences of a cyberattack will inevitably damage one or more of the three pillars of information security: the confidentiality, integrity or availability of an organization's information assets. The main difference between information security and cyber security is that while information security deals with all types of information assets, cyber security deals purely with those which are accessible by means of interconnected electronic net- works, including the Internet. Many responsible organizations now have robust information security, business continuity and disaster recovery programs in place, and it is not the intention of this book to re-write those, but to inform organizations about the kind of precautions they should take to stave off successful cyberattacks and how they should deal with them when they arise in order to protect the day-to-day businesses.\"--Publisher website.
Publisher
Business Expert Press
Subject
ISBN
9781947441460, 1947441469
Item info:
1
item available
1
item total in all locations
| Call Number | Copies | Material | Location |
|---|---|---|---|
| QA76.9.A25 S88 2018 | 1 | BOOK | AUTOSTORE |
This website uses cookies to ensure you get the best experience on our website.