|
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910583042403321 |
|
|
Autore |
Moskowitz Sanford L |
|
|
Titolo |
Cybercrime and business : strategies for global corporate security / / Sanford L. Moskowitz |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Oxford, United Kingdom : , : Butterworth-Heinemann, an imprint of Elsevier, , [2017] |
|
�2017 |
|
|
|
|
|
|
|
|
|
ISBN |
|
0-12-800388-X |
0-12-800353-7 |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (xvii, 226 pages) : illustrations |
|
|
|
|
|
|
Collana |
|
|
|
|
|
|
Classificazione |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computer crimes - Prevention |
Electronic commerce - Security measures |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references at the end of each chapters and index. |
|
|
|
|
|
|
|
|
Nota di contenuto |
|
; Preface -- The global cybercrime industry -- The startup and spinoff firm -- The small and medium-sized enterprise (SME) -- The large corporation -- Mergers and acquisitions -- Joint ventures and strategic partnerships -- The subsidiary -- Franchising -- IP, licensing, and outsourcing -- Cybercrime and business : emerging themes and strategic directions. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
"[This book] examines the three most prevalent cybercrimes afflicting today's corporate security professionals: piracy, espionage, and computer hacking. By demonstrating how each of these threats evolved separately and then converged to form an ultra-dangerous composite threat, the book discusses the impact the threats pose and how the very technologies that created the problem can help solve it. [The book] then offers viable strategies for how different types of businesses--from large multinationals to small start-ups--can respond to these threats to both minimize their losses and gain a competitive advantage. The book concludes by identifying future technological threats and how the models presented in the book can be applied to handling them. [This book:] demonstrates how to ... handle corporate cyber security |
|
|
|
|
|
|
|
|
|
|
issues using case studies from a wide range of companies around the globe; highlights the regulatory, economic, cultural, and demographic trends businesses encounter when facing security issues; and profiles corporate security issues in major industrialized, developing, and emerging countries throughout North America, Europe, Asia, Latin America, Africa, and the Middle East."-- |
|
|
|
|
|
| |