MARC details
000 -LEADER |
fixed length control field |
03022nam a2200301 i 4500 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20230527193916.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
201206s2018 enka|||| |||| 001 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781526505866 |
Qualifying information |
paperback |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
EG-CaTKH |
Language of cataloging |
eng |
Transcribing agency |
EG-CaTKH |
Modifying agency |
EG-CaTKH |
Description conventions |
rda |
050 ## - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA76.9.A25 |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 MB.C 2018 |
Edition number |
23 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Tse, Helen, |
Dates associated with a name |
1977- |
Relator term |
author. |
245 10 - TITLE STATEMENT |
Title |
Cyber security : |
Remainder of title |
law and guidance / |
Statement of responsibility, etc. |
Helen Wong. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
Place of production, publication, distribution, manufacture |
London : |
Name of producer, publisher, distributor, manufacturer |
Bloomsbury Professional, |
Date of production, publication, distribution, manufacture, or copyright notice |
2018. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xlii, 744 pages : |
Other physical details |
illustrations ; |
Dimensions |
25 cm. |
336 ## - CONTENT TYPE |
Source |
rdacontent |
Content type term |
text |
Content type code |
txt |
337 ## - MEDIA TYPE |
Source |
rdamedia |
Media type term |
unmediated |
Media type code |
n |
338 ## - CARRIER TYPE |
Source |
rdacarrier |
Carrier type term |
volume |
Carrier type code |
nc |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes bibliographical references and index. |
505 ## - FORMATTED CONTENTS NOTE |
Formatted contents note |
Threats - Melanie Oldham and Abigail McAlpine (with "Script Kiddies" by Gary Broadfield) --Vulnerabilities - Melanie Oldham and Abigail McAlpine --The Law - Ria Halme (with "Territorial Scope" by Gary Broadfield) -- How to Defend - Graeme Batsman -- Privacy and Security in The Workplace - Ria Halme --Security in The Built Environment - Nathan Jones -- The Importance of Policy and Guidance in Digital Communications - Ben Silverstone --The C Suite Perspective on Cyber Risk - Klaus Julisch -- Corporate Governance Mind Map - Andrew Constantine-- Industry Specialists In-Depth Reports- Mobile Payments - Rhiannon Lewis- Electric Utilities: Critical Infrastructure Protection and Reliability - E. Rudina and S. <br/> |
520 ## - SUMMARY, ETC. |
Summary, etc. |
"Implementing appropriate security measures will be an advantage when protecting organisations from regulatory action and litigation in cyber security law: can you provide a defensive shield? Cyber Security: Law and Guidance provides an overview of legal developments in cyber security and data protection in the European Union and the United Kingdom, focusing on the key cyber security laws and related legal instruments, including those for data protection and payment services. Additional context is provided through insight into how the law is developed outside the regulatory frameworks, referencing the 'Consensus of Professional Opinion' on cyber security, case law and the role of professional and industry standards for security. With cyber security law destined to become heavily contentious, upholding a robust security framework will become an advantage and organisations will require expert assistance to operationalise matters. Practical in approach, this comprehensive text will be invaluable for legal practitioners and organisations. It covers both the law and its practical application, helping to ensure that advisers and organisations have effective policies and procedures in place to deal with cyber security." -- Back cover. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer security |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer security |
General subdivision |
Law and legislation |
856 41 - ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
<a href="https://ebookcentral.proquest.com/lib/coventry/detail.action?docID=6683657&query=Cyber+security+%3A+law+and+guidance">https://ebookcentral.proquest.com/lib/coventry/detail.action?docID=6683657&query=Cyber+security+%3A+law+and+guidance</a> |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
Books |
998 ## - LOCAL CONTROL INFORMATION (RLIN) |
Cataloger's name |
huda.mahmoud |
Cataloging process |
M |
First Date, FD (RLIN) |
2022027 |
998 ## - LOCAL CONTROL INFORMATION (RLIN) |
Cataloger's name |
mona.romia |
Cataloging process |
R |
First Date, FD (RLIN) |
20220207 |