Pesquisa de referências

Latest on cyber risk : special report

<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd">
  <record>
    <leader>00000cab a2200000   4500</leader>
    <controlfield tag="001">MAP20160005110</controlfield>
    <controlfield tag="003">MAP</controlfield>
    <controlfield tag="005">20160222122923.0</controlfield>
    <controlfield tag="008">160222e20151217esp|||p      |0|||b|spa d</controlfield>
    <datafield tag="040" ind1=" " ind2=" ">
      <subfield code="a">MAP</subfield>
      <subfield code="b">spa</subfield>
      <subfield code="d">MAP</subfield>
    </datafield>
    <datafield tag="084" ind1=" " ind2=" ">
      <subfield code="a">7</subfield>
    </datafield>
    <datafield tag="245" ind1="0" ind2="0">
      <subfield code="a">Latest on cyber risk</subfield>
      <subfield code="b"> : special report</subfield>
    </datafield>
    <datafield tag="520" ind1=" " ind2=" ">
      <subfield code="a">Tapping in to online risk: coming to terms with growth of cyber crime - Leaving the door ajar: employees' own devices can often unwittingly facilitate unwanted data breaches - Change of mindset: keeping up with the pace of the Internet's growth - In it together: rapidly-changing threat for all involved</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080557515</subfield>
      <subfield code="a">Cibernética</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20140022700</subfield>
      <subfield code="a">Ciberseguridad</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20140023066</subfield>
      <subfield code="a">Ciberataques</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080585266</subfield>
      <subfield code="a">Factores de riesgo</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20100017982</subfield>
      <subfield code="a">Riesgos emergentes</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080587581</subfield>
      <subfield code="a">Riesgo informático</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080601522</subfield>
      <subfield code="a">Evaluación de riesgos</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080591182</subfield>
      <subfield code="a">Gerencia de riesgos</subfield>
    </datafield>
    <datafield tag="773" ind1="0" ind2=" ">
      <subfield code="w">MAP20077002059</subfield>
      <subfield code="t">Strategic risk</subfield>
      <subfield code="d">Southhall : NewsQuest, 2005-2012</subfield>
      <subfield code="g">01/12/2015 Número 103 - diciembre 2015 , p. 22-25</subfield>
    </datafield>
  </record>
</collection>