Intelligent security : defending the digital business
Contenido multimedia no disponible por derechos de autor o por acceso restringido. Contacte con la institución para más información.
Tag | 1 | 2 | Value |
---|---|---|---|
LDR | 00000cam a22000004b 4500 | ||
001 | MAP20160000795 | ||
003 | MAP | ||
005 | 20200708141153.0 | ||
008 | 160912e20150731usa|||| ||| ||eng d | ||
040 | $aMAP$bspa$dMAP | ||
084 | $a7 | ||
245 | 0 | 0 | $aIntelligent security$b: defending the digital business |
260 | $a[S. l.]$bAccenture$c2015 | ||
520 | $aCompanies need to move their cyber security efforts away from traditional defensive approaches toward a proactive stance aligned with the organization¿s business objectives.Despite all the effort and resources that organizations invest in traditional information security approaches, many still fall prey to cyber threats, or find they are unprepared to deal with rapidly blurring enterprise boundaries. | ||
650 | 4 | $0MAPA20080603724$aSeguridad empresarial | |
650 | 4 | $0MAPA20080578053$aSeguridad activa | |
650 | 4 | $0MAPA20140022700$aCiberseguridad | |
650 | 4 | $0MAPA20160007633$aCiberriesgos | |
650 | 4 | $0MAPA20080587628$aRiesgo tecnológico | |
650 | 4 | $0MAPA20080591182$aGerencia de riesgos | |
650 | 4 | $0MAPA20140023066$aCiberataques | |
650 | 4 | $0MAPA20080622251$aSeguridad de la información | |
650 | 4 | $0MAPA20140010615$aEvolución tecnológica | |
650 | 4 | $0MAPA20080623791$aTecnología de la información | |
710 | 2 | $0MAPA20080436353$aAccenture |