Search

New technology, new threats, ciber and the quest for digital enablement

<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd">
  <record>
    <leader>00000cab a2200000   4500</leader>
    <controlfield tag="001">MAP20160019414</controlfield>
    <controlfield tag="003">MAP</controlfield>
    <controlfield tag="005">20160617114617.0</controlfield>
    <controlfield tag="008">160615e20160601esp|||p      |0|||b|spa d</controlfield>
    <datafield tag="040" ind1=" " ind2=" ">
      <subfield code="a">MAP</subfield>
      <subfield code="b">spa</subfield>
      <subfield code="d">MAP</subfield>
    </datafield>
    <datafield tag="084" ind1=" " ind2=" ">
      <subfield code="a">86</subfield>
    </datafield>
    <datafield tag="100" ind1="1" ind2=" ">
      <subfield code="0">MAPA20160007800</subfield>
      <subfield code="a">Zhao, Jonathan</subfield>
    </datafield>
    <datafield tag="245" ind1="0" ind2="0">
      <subfield code="a">New technology, new threats, ciber and the quest for digital enablement</subfield>
      <subfield code="c">Jonathan Zhao, Todd Stewart</subfield>
    </datafield>
    <datafield tag="520" ind1=" " ind2=" ">
      <subfield code="a">Recent years have seen an increase in the number of high profile cyber incidents being reported in the news. The sudden nature of how these headlines appear fuels the misconception that these attacks are very quick and are akin to a "snatch and grab" robbery. The reality is that attackers normally breach a network long before they actually get to the point where they take data out </subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20140022700</subfield>
      <subfield code="a">Ciberseguridad</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080603731</subfield>
      <subfield code="a">Seguridad informática</subfield>
    </datafield>
    <datafield tag="700" ind1="1" ind2=" ">
      <subfield code="0">MAPA20160007817</subfield>
      <subfield code="a">Stewart, Todd</subfield>
    </datafield>
    <datafield tag="773" ind1="0" ind2=" ">
      <subfield code="w">MAP20090003767</subfield>
      <subfield code="t">Asia insurance review</subfield>
      <subfield code="d">Singapore : Ins Communications Pte Ltd., 2009-</subfield>
      <subfield code="x">0218-2696</subfield>
      <subfield code="g">01/06/2016 Número 6 - junio 2016 , p. 89-91</subfield>
    </datafield>
  </record>
</collection>