000 02197cam a2200565Ii 4500
005 20250919132331.0
006 m o d
007 cr cnu|||unuuu
008 190918s2017 nyu o 001 0 eng d
020 _a9781119308959
_q(electronic bk.)
020 _a111930895X
_q(electronic bk.)
020 _a9781119309741
_q(electronic bk.)
020 _a1119309743
_q(electronic bk.)
020 _z9781119308805
020 _z1119308801
035 _a(OCoLC)981912077
_z(OCoLC)982105017
_z(OCoLC)982141719
_z(OCoLC)982231336
_z(OCoLC)982325754
_z(OCoLC)982394588
_z(OCoLC)985460556
035 _a(OCoLC)ocn981912077
037 _aCL0500000854
_bSafari Books Online
039 9 _a201911041640
_bros
_y09-18-2019
_zhafiz
_wUKM UBCM Wiley MARC (363 titles).mrc
_x258
040 _aNST
_beng
_erda
_epn
_cNST
_dNST
_dYDX
_dEBLCP
_dDG1
_dIDEBK
_dUMI
_dCNCGM
_dSTF
049 _aMAIN
050 4 _aHV6773
072 7 _aCOM
_x000000
_2bisacsh
082 0 4 _a005.8
_223
100 1 _aAntonucci, Domenic,
_eauthor.
245 1 4 _aThe cyber risk handbook :
_bcreating and measuring effective cybersecurity capabilities /
_cDomenic Antonucci.
264 1 _aHoboken, New Jersey :
_bJohn Wiley and Sons, Inc.,
_c2017.
300 _a1 online resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
500 _aIncludes index.
504 _aIncludes bibliographical references and index.
588 0 _aVendor-supplied metadata.
650 7 _aCOMPUTER SCIENCE / General
_2bisacsh
650 0 _aComputer crimes.
650 0 _aCyberspace
_xSecurity measures.
650 0 _aBusiness
_xData processing
_xSecurity measures.
650 0 _aRisk management.
655 4 _aElectronic books.
773 0 _tWiley e-books
776 0 8 _iPrint version:
_z1119308801
_z9781119308805
_w(OCoLC)958097666
856 4 0 _uhttps://eresourcesptsl.ukm.remotexs.co/user/login?url=https://doi.org/10.1002/9781119309741
_zWiley Online Library
907 _a.b16757555
_b2022-11-02
_c2019-11-12
942 _n0
914 _avtls003651412
998 _ae
_b2019-05-09
_cm
_dz
_feng
_gnyu
_y0
_z.b16757555
999 _c643642
_d643642