Search

Closing the breach

<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd">
  <record>
    <leader>00000cab a2200000   4500</leader>
    <controlfield tag="001">MAP20110062989</controlfield>
    <controlfield tag="003">MAP</controlfield>
    <controlfield tag="005">20111025164713.0</controlfield>
    <controlfield tag="008">111024e20111003esp|||p      |0|||b|spa d</controlfield>
    <datafield tag="040" ind1=" " ind2=" ">
      <subfield code="a">MAP</subfield>
      <subfield code="b">spa</subfield>
      <subfield code="d">MAP</subfield>
    </datafield>
    <datafield tag="084" ind1=" " ind2=" ">
      <subfield code="a">7</subfield>
    </datafield>
    <datafield tag="100" ind1="1" ind2=" ">
      <subfield code="0">MAPA20110027827</subfield>
      <subfield code="a">Hill, Patrick</subfield>
    </datafield>
    <datafield tag="245" ind1="0" ind2="0">
      <subfield code="a">Closing the breach</subfield>
      <subfield code="c">Patrick Hill, Hans Allnutt</subfield>
    </datafield>
    <datafield tag="520" ind1=" " ind2=" ">
      <subfield code="a">For most organisations, electronic networks and data are no longer optional but are a vital organ in conducting business. Organisations do not simply access the internet, but operate entirely within it. Virtual prívate networks, cloud technology and mobile methods of working mean that organisations have transferred from a commercial "real"  world to an exclusively online existence. </subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="1">
      <subfield code="0">MAPA20080586546</subfield>
      <subfield code="a">Nuevas tecnologías</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="1">
      <subfield code="0">MAPA20080592875</subfield>
      <subfield code="a">Protección de datos</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="1">
      <subfield code="0">MAPA20080622251</subfield>
      <subfield code="a">Seguridad de la información</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="1">
      <subfield code="0">MAPA20080595838</subfield>
      <subfield code="a">Delitos informáticos</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="1">
      <subfield code="0">MAPA20080591182</subfield>
      <subfield code="a">Gerencia de riesgos</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="1">
      <subfield code="0">MAPA20080587581</subfield>
      <subfield code="a">Riesgo informático</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="1">
      <subfield code="0">MAPA20100017982</subfield>
      <subfield code="a">Riesgos emergentes</subfield>
    </datafield>
    <datafield tag="700" ind1="1" ind2=" ">
      <subfield code="0">MAPA20110028060</subfield>
      <subfield code="a">Allnutt, Hans</subfield>
    </datafield>
    <datafield tag="773" ind1="0" ind2=" ">
      <subfield code="w">MAP20077002172</subfield>
      <subfield code="t">IQ : Insider Quarterly</subfield>
      <subfield code="d">London : Informed Publishing Ltd.</subfield>
      <subfield code="x">1475-410X</subfield>
      <subfield code="g">03/10/2011 Número 39  - 2011 , p. 86-87</subfield>
    </datafield>
  </record>
</collection>