Privacy, regulations, and cybersecurity: (Record no. 84985)

000 -LEADER
fixed length control field 03882nam a22002657a 4500
003 - CONTROL NUMBER IDENTIFIER
control field CITU
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20230412092047.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr aa aaaaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 230411b ||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119660156
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title eng
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 658.478 M851 2021
100 1# - MAIN ENTRY--PERSONAL NAME
Preferred name for the person Moschovitis, Chris
245 10 - TITLE STATEMENT
Title Privacy, regulations, and cybersecurity:
Remainder of title the essential business guide /
Statement of responsibility, etc Chris Moschovitis.
264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Hoboken, New Jersey :
Name of publisher, distributor, etc John Wiley & Sons, Inc.,
Date of publication, distribution, etc 2021
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource
336 ## - CONTENT TYPE
Content type term text
Content type code text
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
505 0# - CONTENTS
Formatted contents note Table of contents<br/><br/>Foreword vii<br/><br/>Preface ix<br/><br/>About the Author xiii<br/><br/>Acknowledgments xv<br/><br/>Part One—Privacy 1<br/><br/>Chapter 1 Understanding Privacy 3<br/><br/>Chapter 2 A (Very) Brief History of Privacy 9<br/><br/>Chapter 3 The Legal Case for Privacy (the Finer Print) 21<br/><br/>Part Two—Regulations 45<br/><br/>Chapter 4 Introduction to Regulations 47<br/><br/>Chapter 5 North American Regulations 57<br/><br/>Chapter 6 European Regulations 89<br/><br/>Chapter 7 Asia-Pacific Regulations 119<br/><br/>Chapter 8 African Regulations 145<br/><br/>Chapter 9 South American Regulations 161<br/><br/>Part Three—Privacy and Cybersecurity 171<br/><br/>Chapter 10 Introduction to Cybersecurity 173<br/><br/>Chapter 11 A Cybersecurity Primer 181<br/><br/>Chapter 12 Privacy-Centric Cybersecurity Program Overview 205<br/><br/>Chapter 13 Privacy by Design Overview 221<br/><br/>Chapter 14 Cover Your Assets! 235<br/><br/>Chapter 15 Threat Assessment 261<br/><br/>Chapter 16 Vulnerabilities 275<br/><br/>Chapter 17 Environments 287<br/><br/>Chapter 18 Controls 301<br/><br/>Chapter 19 Incident Response 321<br/><br/>Chapter 20 Welcome to the Future! Now, Go Home! 341<br/><br/>Bibliography 359<br/><br/>Index 377<br/>
520 ## - SUMMARY, ETC.
Summary, etc Privacy, Regulations, and Cybersecurity: The Essential Business Guide is your guide to understanding what “privacy” really means in a corporate environment: how privacy is different from cybersecurity, why privacy is essential for your business, and how to build privacy protections into your overall cybersecurity plan.<br/><br/>First, author Chris Moschovitis walks you through our evolving definitions of privacy, from the ancient world all the way to the General Law on Data Protection (GDPR). He then explains—in friendly, accessible language—how to orient your preexisting cybersecurity program toward privacy, and how to make sure your systems are compliant with current regulations.<br/><br/>This book—a sequel to Moschovitis’ well-received Cybersecurity Program Development for Business—explains which regulations apply in which regions, how they relate to the end goal of privacy, and how to build privacy into both new and existing cybersecurity programs. Keeping up with swiftly changing technology and business landscapes is no easy task. Moschovitis provides down-to-earth, actionable advice on how to avoid dangerous privacy leaks and protect your valuable data assets.<br/><br/> Learn how to design your cybersecurity program with privacy in mind<br/> Apply lessons from the GDPR and other landmark laws<br/> Remain compliant and even get ahead of the curve, as privacy grows from a buzzword to a business must<br/> Learn how to protect what’s of value to your company and your stakeholders, regardless of business size or industry<br/> Understand privacy regulations from a business standpoint, including which regulations apply and what they require<br/> Think through what privacy protections will mean in the post-COVID environment<br/><br/>Whether you’re new to cybersecurity or already have the fundamentals, this book will help you design and build a privacy-centric, regulation-compliant cybersecurity program.
655 #7 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
856 ## - ELECTRONIC LOCATION AND ACCESS
Link text Full text available at Wiley Online Library Click here to view
Uniform Resource Identifier https://onlinelibrary.wiley.com/doi/book/10.1002/9781119660156
942 ## - ADDED ENTRY ELEMENTS
Source of classification or shelving scheme
Item type EBOOK
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent Location Current Location Date acquired Inventory number Full call number Barcode Date last seen Price effective from Item type
          COLLEGE LIBRARY COLLEGE LIBRARY 2023-04-11 52558 658.478 M851 2021 52558 2023-04-11 2023-04-11 EBOOK