The Locator -- [(title = "Safe harbor")]

105 records matched your query       


Record 1 | Previous Record | Long Display | Next Record
02760aam a22003738i 4500
001 3022CC102BC711EBA3EFBDE54DECA4DB
003 SILO
005 20201121010006
008 200203t20202020bcc      b    001 0 eng  
020    $a 1989603424
020    $a 9781989603420
035    $a (OCoLC)1138681667
040    $a NLC $b eng $e rda $c YDX $d BDX $d OCLCQ $d NLC $d OCLCF $d GRC $d QX7 $d VP@ $d IOU $d SILO
042    $a lac
050  4 $a HD30.38 $b .S36 2020
055  0 $a HD30.38 $b .S36 2020
082 0  $a 658.4/78 $2 23
084    $a cci1icc $2 lacc
100 1  $a Sangster, Mark, $e author.
245 10 $a No safe harbor : $b the inside truth about cybercrime -- and how to protect your business / $c Mark Sangster.
246 30 $a Inside truth about cybercrime -- and how to protect your business
264  1 $a Vancouver, British Columbia : $b Page Two Books, $c [2020]
300    $a 176 pages ; $c 23 cm
504    $a Includes bibliographic references (pages 161-169) and index.
520    $a "Stories of massive data breaches litter the 24-hour newsday headlines. Hackers and cybercrime syndicates are hitting a who's who of banks, retailers, law firms, and healthcare organizations: companies with sophisticated security systems designed to stop crime before it starts. They're also hitting companies that thought they were too small to matter. So how do cybercriminals continue to breach the defenses of the big companies--and why do they go after the small ones? And, most importantly, how can companies of all sizes protect themselves? Cybersecurity expert Mark Sangster deftly weaves together real-life cases in a thrilling narrative that illustrates the human complexities behind the scenes that can lead to companies throwing their digital front doors open to criminals. Within a security context, deep social engineering is the newest and biggest means of breaching our systems. Sangster shows readers that cybersecurity is not an IT problem to solve--it is a business risk to manage. Organizations need to shift the security discussion away from technology gates alone toward a focus on leadership, team behaviors, and mutual support. Sangster punctuates his eye-opening narratives with sets of questions businesspeople at all levels need to ask themselves, facts they need to know, and principles they need to follow to keep their companies secure."-- $c Provided by publisher.
530    $a Issued also in electronic format.
650  0 $a Business enterprises $x Security measures. $x Security measures.
650  0 $a Computer security.
650  0 $a Computer crimes.
941    $a 2
952    $l FXPH314 $d 20220909063350.0
952    $l BAPH771 $d 20201121010049.0
956    $a http://locator.silo.lib.ia.us/search.cgi?index_0=id&term_0=3022CC102BC711EBA3EFBDE54DECA4DB
994    $a C0 $b IOU

Initiate Another SILO Locator Search

This resource is supported by the Institute of Museum and Library Services under the provisions of the Library Services and Technology Act as administered by State Library of Iowa.