Pesquisa de referências

The Small business cybersecurity blindspot

<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd">
  <record>
    <leader>00000cab a2200000   4500</leader>
    <controlfield tag="001">MAP20140027897</controlfield>
    <controlfield tag="003">MAP</controlfield>
    <controlfield tag="005">20140801121221.0</controlfield>
    <controlfield tag="008">140730e20140602esp|||p      |0|||b|spa d</controlfield>
    <datafield tag="040" ind1=" " ind2=" ">
      <subfield code="a">MAP</subfield>
      <subfield code="b">spa</subfield>
      <subfield code="d">MAP</subfield>
    </datafield>
    <datafield tag="084" ind1=" " ind2=" ">
      <subfield code="a">86</subfield>
    </datafield>
    <datafield tag="100" ind1="1" ind2=" ">
      <subfield code="0">MAPA20140012848</subfield>
      <subfield code="a">Thompson, Richard</subfield>
    </datafield>
    <datafield tag="245" ind1="1" ind2="4">
      <subfield code="a">The Small business cybersecurity blindspot</subfield>
      <subfield code="c">Richard Thompson</subfield>
    </datafield>
    <datafield tag="520" ind1=" " ind2=" ">
      <subfield code="a">Many believe that large corporations are more likely to be at risk from cyberattacks and IT system compromises than small or medium enterprises. The data from bigger businesses is more desirable simply because of the scale of operations, they reason</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080546991</subfield>
      <subfield code="a">Empresas</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080620080</subfield>
      <subfield code="a">Pequeñas y medianas empresas</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080603731</subfield>
      <subfield code="a">Seguridad informática</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080557515</subfield>
      <subfield code="a">Cibernética</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080587581</subfield>
      <subfield code="a">Riesgo informático</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080620790</subfield>
      <subfield code="a">Actitud de los trabajadores</subfield>
    </datafield>
    <datafield tag="773" ind1="0" ind2=" ">
      <subfield code="w">MAP20077000291</subfield>
      <subfield code="t">Risk Management Magazine</subfield>
      <subfield code="d">New York : Risk and Insurance Management Society, 1982-</subfield>
      <subfield code="x">0035-5593</subfield>
      <subfield code="g">02/06/2014 Volumen 61 Número 5 - junio 2014 , p. 8-9</subfield>
    </datafield>
  </record>
</collection>