Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
[Place of publication not identified]
Packt Publishing
2023
|
Ausgabe: | [First edition]. |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781837632220/?ar |
Zusammenfassung: | Get to grips with cybersecurity and privacy laws to protect your company's data and comply with international privacy standards About This Audiobook Comply with cybersecurity standards and protect your data from hackers Find the gaps in your company's security posture with gap analysis and business impact analysis Understand what you need to do with security and privacy without needing to pay consultants In Detail Cybercriminals are incessantly coming up with new ways to compromise online systems and wreak havoc, creating an ever-growing need for cybersecurity practitioners in every organization across the globe who understand international security standards, such as the ISO27k family of standards. If you're looking to ensure that your company's data conforms to these standards, Cybersecurity and Privacy Law Handbook has got you covered. It'll not only equip you with the rudiments of cybersecurity but also guide you through privacy laws and explain how you can ensure compliance to protect yourself from cybercrime and avoid the hefty fines imposed for non-compliance with standards. Assuming that you're new to the field, this book starts by introducing cybersecurity frameworks and concepts used throughout the chapters. You'll understand why privacy is paramount and how to find the security gaps in your company's systems. There's a practical element to the book as well--you'll prepare policies and procedures to prevent your company from being breached. You'll complete your learning journey by exploring cloud security and the complex nature of privacy laws in the US. By the end of this cybersecurity book, you'll be well-placed to protect your company's data and comply with the relevant standards. Audience If you're a seasoned pro with IT security and / or cybersecurity, this book isn't for you. This book is aimed at novices, freshers, students, experts in other fields, and managers, that, are willing to learn, understand, and manage how a security function is working, especially if you need to be. Although the reader will be able, by reading this book, to build and manage a security function on their own, it is highly recommended to supervise a team devoted to implementing cybersecurity and privacy practices in an organization. |
Beschreibung: | Online resource; title from title details screen (O'Reilly, viewed January 31, 2023) |
Umfang: | 1 Online-Ressource (1 sound file (7 hr., 26 min.)) |
ISBN: | 9781837632220 1837632227 |
Internformat
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-089794869 | ||
003 | DE-627-1 | ||
005 | 20240228121916.0 | ||
007 | cr uuu---uuuuu | ||
008 | 230322s2023 xx |||||o 00| ||eng c | ||
020 | |a 9781837632220 |c electronic audio bk. |9 978-1-83763-222-0 | ||
020 | |a 1837632227 |c electronic audio bk. |9 1-83763-222-7 | ||
035 | |a (DE-627-1)089794869 | ||
035 | |a (DE-599)KEP089794869 | ||
035 | |a (ORHE)9781837632220 | ||
035 | |a (DE-627-1)089794869 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 343.0999 |2 23/eng/20230131 | |
100 | 1 | |a Rocchi, Walter |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Cybersecurity and privacy law handbook |b a beginner's guide to dealing with privacy and security while keeping hackers at bay |c Walter Rocchi |
250 | |a [First edition]. | ||
264 | 1 | |a [Place of publication not identified] |b Packt Publishing |c 2023 | |
300 | |a 1 Online-Ressource (1 sound file (7 hr., 26 min.)) | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Online resource; title from title details screen (O'Reilly, viewed January 31, 2023) | ||
520 | |a Get to grips with cybersecurity and privacy laws to protect your company's data and comply with international privacy standards About This Audiobook Comply with cybersecurity standards and protect your data from hackers Find the gaps in your company's security posture with gap analysis and business impact analysis Understand what you need to do with security and privacy without needing to pay consultants In Detail Cybercriminals are incessantly coming up with new ways to compromise online systems and wreak havoc, creating an ever-growing need for cybersecurity practitioners in every organization across the globe who understand international security standards, such as the ISO27k family of standards. If you're looking to ensure that your company's data conforms to these standards, Cybersecurity and Privacy Law Handbook has got you covered. It'll not only equip you with the rudiments of cybersecurity but also guide you through privacy laws and explain how you can ensure compliance to protect yourself from cybercrime and avoid the hefty fines imposed for non-compliance with standards. Assuming that you're new to the field, this book starts by introducing cybersecurity frameworks and concepts used throughout the chapters. You'll understand why privacy is paramount and how to find the security gaps in your company's systems. There's a practical element to the book as well--you'll prepare policies and procedures to prevent your company from being breached. You'll complete your learning journey by exploring cloud security and the complex nature of privacy laws in the US. By the end of this cybersecurity book, you'll be well-placed to protect your company's data and comply with the relevant standards. Audience If you're a seasoned pro with IT security and / or cybersecurity, this book isn't for you. This book is aimed at novices, freshers, students, experts in other fields, and managers, that, are willing to learn, understand, and manage how a security function is working, especially if you need to be. Although the reader will be able, by reading this book, to build and manage a security function on their own, it is highly recommended to supervise a team devoted to implementing cybersecurity and privacy practices in an organization. | ||
650 | 0 | |a Computer security |x Law and legislation | |
650 | 0 | |a Privacy, Right of | |
650 | 4 | |a Computer security ; Law and legislation | |
650 | 4 | |a Privacy, Right of | |
650 | 4 | |a Audiobooks | |
650 | 4 | |a Audiobooks | |
650 | 4 | |a Livres audio | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781837632220/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-089794869 |
---|---|
_version_ | 1835903132707586048 |
adam_text | |
any_adam_object | |
author | Rocchi, Walter |
author_facet | Rocchi, Walter |
author_role | aut |
author_sort | Rocchi, Walter |
author_variant | w r wr |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)089794869 (DE-599)KEP089794869 (ORHE)9781837632220 |
dewey-full | 343.0999 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 343 - Military, tax, trade & industrial law |
dewey-raw | 343.0999 |
dewey-search | 343.0999 |
dewey-sort | 3343.0999 |
dewey-tens | 340 - Law |
discipline | Rechtswissenschaft |
edition | [First edition]. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03907cam a22004452c 4500</leader><controlfield tag="001">ZDB-30-ORH-089794869</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121916.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">230322s2023 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781837632220</subfield><subfield code="c">electronic audio bk.</subfield><subfield code="9">978-1-83763-222-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1837632227</subfield><subfield code="c">electronic audio bk.</subfield><subfield code="9">1-83763-222-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)089794869</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP089794869</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781837632220</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)089794869</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">343.0999</subfield><subfield code="2">23/eng/20230131</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Rocchi, Walter</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cybersecurity and privacy law handbook</subfield><subfield code="b">a beginner's guide to dealing with privacy and security while keeping hackers at bay</subfield><subfield code="c">Walter Rocchi</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">[First edition].</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Place of publication not identified]</subfield><subfield code="b">Packt Publishing</subfield><subfield code="c">2023</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 sound file (7 hr., 26 min.))</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Online resource; title from title details screen (O'Reilly, viewed January 31, 2023)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Get to grips with cybersecurity and privacy laws to protect your company's data and comply with international privacy standards About This Audiobook Comply with cybersecurity standards and protect your data from hackers Find the gaps in your company's security posture with gap analysis and business impact analysis Understand what you need to do with security and privacy without needing to pay consultants In Detail Cybercriminals are incessantly coming up with new ways to compromise online systems and wreak havoc, creating an ever-growing need for cybersecurity practitioners in every organization across the globe who understand international security standards, such as the ISO27k family of standards. If you're looking to ensure that your company's data conforms to these standards, Cybersecurity and Privacy Law Handbook has got you covered. It'll not only equip you with the rudiments of cybersecurity but also guide you through privacy laws and explain how you can ensure compliance to protect yourself from cybercrime and avoid the hefty fines imposed for non-compliance with standards. Assuming that you're new to the field, this book starts by introducing cybersecurity frameworks and concepts used throughout the chapters. You'll understand why privacy is paramount and how to find the security gaps in your company's systems. There's a practical element to the book as well--you'll prepare policies and procedures to prevent your company from being breached. You'll complete your learning journey by exploring cloud security and the complex nature of privacy laws in the US. By the end of this cybersecurity book, you'll be well-placed to protect your company's data and comply with the relevant standards. Audience If you're a seasoned pro with IT security and / or cybersecurity, this book isn't for you. This book is aimed at novices, freshers, students, experts in other fields, and managers, that, are willing to learn, understand, and manage how a security function is working, especially if you need to be. Although the reader will be able, by reading this book, to build and manage a security function on their own, it is highly recommended to supervise a team devoted to implementing cybersecurity and privacy practices in an organization.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="x">Law and legislation</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Privacy, Right of</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security ; Law and legislation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Privacy, Right of</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Audiobooks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Audiobooks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Livres audio</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781837632220/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-089794869 |
illustrated | Not Illustrated |
indexdate | 2025-06-25T12:14:25Z |
institution | BVB |
isbn | 9781837632220 1837632227 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (1 sound file (7 hr., 26 min.)) |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | Packt Publishing |
record_format | marc |
spelling | Rocchi, Walter VerfasserIn aut Cybersecurity and privacy law handbook a beginner's guide to dealing with privacy and security while keeping hackers at bay Walter Rocchi [First edition]. [Place of publication not identified] Packt Publishing 2023 1 Online-Ressource (1 sound file (7 hr., 26 min.)) Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Online resource; title from title details screen (O'Reilly, viewed January 31, 2023) Get to grips with cybersecurity and privacy laws to protect your company's data and comply with international privacy standards About This Audiobook Comply with cybersecurity standards and protect your data from hackers Find the gaps in your company's security posture with gap analysis and business impact analysis Understand what you need to do with security and privacy without needing to pay consultants In Detail Cybercriminals are incessantly coming up with new ways to compromise online systems and wreak havoc, creating an ever-growing need for cybersecurity practitioners in every organization across the globe who understand international security standards, such as the ISO27k family of standards. If you're looking to ensure that your company's data conforms to these standards, Cybersecurity and Privacy Law Handbook has got you covered. It'll not only equip you with the rudiments of cybersecurity but also guide you through privacy laws and explain how you can ensure compliance to protect yourself from cybercrime and avoid the hefty fines imposed for non-compliance with standards. Assuming that you're new to the field, this book starts by introducing cybersecurity frameworks and concepts used throughout the chapters. You'll understand why privacy is paramount and how to find the security gaps in your company's systems. There's a practical element to the book as well--you'll prepare policies and procedures to prevent your company from being breached. You'll complete your learning journey by exploring cloud security and the complex nature of privacy laws in the US. By the end of this cybersecurity book, you'll be well-placed to protect your company's data and comply with the relevant standards. Audience If you're a seasoned pro with IT security and / or cybersecurity, this book isn't for you. This book is aimed at novices, freshers, students, experts in other fields, and managers, that, are willing to learn, understand, and manage how a security function is working, especially if you need to be. Although the reader will be able, by reading this book, to build and manage a security function on their own, it is highly recommended to supervise a team devoted to implementing cybersecurity and privacy practices in an organization. Computer security Law and legislation Privacy, Right of Computer security ; Law and legislation Audiobooks Livres audio |
spellingShingle | Rocchi, Walter Cybersecurity and privacy law handbook a beginner's guide to dealing with privacy and security while keeping hackers at bay Computer security Law and legislation Privacy, Right of Computer security ; Law and legislation Audiobooks Livres audio |
title | Cybersecurity and privacy law handbook a beginner's guide to dealing with privacy and security while keeping hackers at bay |
title_auth | Cybersecurity and privacy law handbook a beginner's guide to dealing with privacy and security while keeping hackers at bay |
title_exact_search | Cybersecurity and privacy law handbook a beginner's guide to dealing with privacy and security while keeping hackers at bay |
title_full | Cybersecurity and privacy law handbook a beginner's guide to dealing with privacy and security while keeping hackers at bay Walter Rocchi |
title_fullStr | Cybersecurity and privacy law handbook a beginner's guide to dealing with privacy and security while keeping hackers at bay Walter Rocchi |
title_full_unstemmed | Cybersecurity and privacy law handbook a beginner's guide to dealing with privacy and security while keeping hackers at bay Walter Rocchi |
title_short | Cybersecurity and privacy law handbook |
title_sort | cybersecurity and privacy law handbook a beginner s guide to dealing with privacy and security while keeping hackers at bay |
title_sub | a beginner's guide to dealing with privacy and security while keeping hackers at bay |
topic | Computer security Law and legislation Privacy, Right of Computer security ; Law and legislation Audiobooks Livres audio |
topic_facet | Computer security Law and legislation Privacy, Right of Computer security ; Law and legislation Audiobooks Livres audio |
work_keys_str_mv | AT rocchiwalter cybersecurityandprivacylawhandbookabeginnersguidetodealingwithprivacyandsecuritywhilekeepinghackersatbay |