Pesquisa de referências

Breaching digital risks

<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd">
  <record>
    <leader>00000cab a2200000   4500</leader>
    <controlfield tag="001">MAP20200013808</controlfield>
    <controlfield tag="003">MAP</controlfield>
    <controlfield tag="005">20230321114253.0</controlfield>
    <controlfield tag="008">200424e20191202gbr|||p      |0|||b|eng d</controlfield>
    <datafield tag="040" ind1=" " ind2=" ">
      <subfield code="a">MAP</subfield>
      <subfield code="b">spa</subfield>
      <subfield code="d">MAP</subfield>
    </datafield>
    <datafield tag="084" ind1=" " ind2=" ">
      <subfield code="a">328.3</subfield>
    </datafield>
    <datafield tag="100" ind1=" " ind2=" ">
      <subfield code="0">MAPA20200009108</subfield>
      <subfield code="a">Cohen-Ifrah, Yaffa</subfield>
    </datafield>
    <datafield tag="245" ind1="1" ind2="0">
      <subfield code="a">Breaching digital risks</subfield>
      <subfield code="c">Yaffa Cohen-Ifrah</subfield>
    </datafield>
    <datafield tag="520" ind1=" " ind2=" ">
      <subfield code="a">As rapid digitisation and data collection comes to define the modern economy, the issue of cybersecurity has come to the fore, with a new breed of innovative software companies marketing their security solutions to enterprises, small and medium businesses and ordinary citizens keen on protecting their assets. However, the cybersecurity industry took root in a very different world to the one we live in now. The magnitude of our cyber vulnerabilities has soared in tandem with the sheer volume of data and assets that now exist in cyberspace. This has given rise to an entirely new market  one designed to better gauge risks and utilise cyber best practices.</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20160007633</subfield>
      <subfield code="a">Ciberriesgos</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20170003779</subfield>
      <subfield code="a">Seguro de ciberriesgos</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080568641</subfield>
      <subfield code="a">Digitalización</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20170006503</subfield>
      <subfield code="a">Transformación digital</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20140022700</subfield>
      <subfield code="a">Ciberseguridad</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080586294</subfield>
      <subfield code="a">Mercado de seguros</subfield>
    </datafield>
    <datafield tag="773" ind1="0" ind2=" ">
      <subfield code="w">MAP20200013259</subfield>
      <subfield code="t">The Actuary : the magazine of the Institute & Faculty of Actuaries</subfield>
      <subfield code="d">London :  Redactive Publishing, 2019-</subfield>
      <subfield code="g">02/12/2019 Número 11 - december 2019 , p. 30</subfield>
    </datafield>
  </record>
</collection>