000 -LEADER |
fixed length control field |
03882nam a22002657a 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
CITU |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20230412092047.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
cr aa aaaaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
230411b ||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781119660156 |
041 ## - LANGUAGE CODE |
Language code of text/sound track or separate title |
eng |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
658.478 M851 2021 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Preferred name for the person |
Moschovitis, Chris |
245 10 - TITLE STATEMENT |
Title |
Privacy, regulations, and cybersecurity: |
Remainder of title |
the essential business guide / |
Statement of responsibility, etc |
Chris Moschovitis. |
264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
Hoboken, New Jersey : |
Name of publisher, distributor, etc |
John Wiley & Sons, Inc., |
Date of publication, distribution, etc |
2021 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
1 online resource |
336 ## - CONTENT TYPE |
Content type term |
text |
Content type code |
text |
Source |
rdacontent |
337 ## - MEDIA TYPE |
Media type term |
computer |
Media type code |
c |
Source |
rdamedia |
338 ## - CARRIER TYPE |
Carrier type term |
online resource |
Carrier type code |
cr |
Source |
rdacarrier |
505 0# - CONTENTS |
Formatted contents note |
Table of contents<br/><br/>Foreword vii<br/><br/>Preface ix<br/><br/>About the Author xiii<br/><br/>Acknowledgments xv<br/><br/>Part One—Privacy 1<br/><br/>Chapter 1 Understanding Privacy 3<br/><br/>Chapter 2 A (Very) Brief History of Privacy 9<br/><br/>Chapter 3 The Legal Case for Privacy (the Finer Print) 21<br/><br/>Part Two—Regulations 45<br/><br/>Chapter 4 Introduction to Regulations 47<br/><br/>Chapter 5 North American Regulations 57<br/><br/>Chapter 6 European Regulations 89<br/><br/>Chapter 7 Asia-Pacific Regulations 119<br/><br/>Chapter 8 African Regulations 145<br/><br/>Chapter 9 South American Regulations 161<br/><br/>Part Three—Privacy and Cybersecurity 171<br/><br/>Chapter 10 Introduction to Cybersecurity 173<br/><br/>Chapter 11 A Cybersecurity Primer 181<br/><br/>Chapter 12 Privacy-Centric Cybersecurity Program Overview 205<br/><br/>Chapter 13 Privacy by Design Overview 221<br/><br/>Chapter 14 Cover Your Assets! 235<br/><br/>Chapter 15 Threat Assessment 261<br/><br/>Chapter 16 Vulnerabilities 275<br/><br/>Chapter 17 Environments 287<br/><br/>Chapter 18 Controls 301<br/><br/>Chapter 19 Incident Response 321<br/><br/>Chapter 20 Welcome to the Future! Now, Go Home! 341<br/><br/>Bibliography 359<br/><br/>Index 377<br/> |
520 ## - SUMMARY, ETC. |
Summary, etc |
Privacy, Regulations, and Cybersecurity: The Essential Business Guide is your guide to understanding what “privacy” really means in a corporate environment: how privacy is different from cybersecurity, why privacy is essential for your business, and how to build privacy protections into your overall cybersecurity plan.<br/><br/>First, author Chris Moschovitis walks you through our evolving definitions of privacy, from the ancient world all the way to the General Law on Data Protection (GDPR). He then explains—in friendly, accessible language—how to orient your preexisting cybersecurity program toward privacy, and how to make sure your systems are compliant with current regulations.<br/><br/>This book—a sequel to Moschovitis’ well-received Cybersecurity Program Development for Business—explains which regulations apply in which regions, how they relate to the end goal of privacy, and how to build privacy into both new and existing cybersecurity programs. Keeping up with swiftly changing technology and business landscapes is no easy task. Moschovitis provides down-to-earth, actionable advice on how to avoid dangerous privacy leaks and protect your valuable data assets.<br/><br/> Learn how to design your cybersecurity program with privacy in mind<br/> Apply lessons from the GDPR and other landmark laws<br/> Remain compliant and even get ahead of the curve, as privacy grows from a buzzword to a business must<br/> Learn how to protect what’s of value to your company and your stakeholders, regardless of business size or industry<br/> Understand privacy regulations from a business standpoint, including which regulations apply and what they require<br/> Think through what privacy protections will mean in the post-COVID environment<br/><br/>Whether you’re new to cybersecurity or already have the fundamentals, this book will help you design and build a privacy-centric, regulation-compliant cybersecurity program. |
655 #7 - INDEX TERM--GENRE/FORM |
Genre/form data or focus term |
Electronic books. |
856 ## - ELECTRONIC LOCATION AND ACCESS |
Link text |
Full text available at Wiley Online Library Click here to view |
Uniform Resource Identifier |
https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156 |
942 ## - ADDED ENTRY ELEMENTS |
Source of classification or shelving scheme |
|
Item type |
EBOOK |