<?xml version="1.0" encoding="UTF-8"?>
<record
    xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
    xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd"
    xmlns="http://www.loc.gov/MARC21/slim">

  <leader>01906nam a2200457 i 4500</leader>
  <controlfield tag="001">ebr10895757</controlfield>
  <controlfield tag="003">CaPaEBR</controlfield>
  <controlfield tag="006">m     o  d        </controlfield>
  <controlfield tag="007">cr cn|||||||||</controlfield>
  <controlfield tag="008">140804t20142014nju     o     001 0 eng d</controlfield>
  <datafield tag="020" ind1=" " ind2=" ">
    <subfield code="z">9781118836354</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
    <subfield code="a">9781118935965 (e-book)</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
    <subfield code="z">9781118935958 (epub)</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
    <subfield code="z">9781118915028 (obook)</subfield>
  </datafield>
  <datafield tag="040" ind1=" " ind2=" ">
    <subfield code="a">CaPaEBR</subfield>
    <subfield code="b">eng</subfield>
    <subfield code="e">rda</subfield>
    <subfield code="e">pn</subfield>
    <subfield code="c">CaPaEBR</subfield>
  </datafield>
  <datafield tag="035" ind1=" " ind2=" ">
    <subfield code="a">(OCoLC)889308033</subfield>
  </datafield>
  <datafield tag="050" ind1="1" ind2="4">
    <subfield code="a">HD30.2</subfield>
    <subfield code="b">.U47 2014eb</subfield>
  </datafield>
  <datafield tag="082" ind1="0" ind2="4">
    <subfield code="a">658.4/78</subfield>
    <subfield code="2">23</subfield>
  </datafield>
  <datafield tag="100" ind1="1" ind2=" ">
    <subfield code="a">Ulsch, N. MacDonnell,</subfield>
    <subfield code="d">1951-</subfield>
    <subfield code="e">author.</subfield>
  </datafield>
  <datafield tag="245" ind1="1" ind2="0">
    <subfield code="a">Cyber threat! :</subfield>
    <subfield code="b">how to manage the growing risk of cyber attacks /</subfield>
    <subfield code="c">N. MacDonnell Ulsch.</subfield>
  </datafield>
  <datafield tag="264" ind1=" " ind2="1">
    <subfield code="a">Hoboken, New Jersey :</subfield>
    <subfield code="b">Wiley,</subfield>
    <subfield code="c">2014.</subfield>
  </datafield>
  <datafield tag="264" ind1=" " ind2="4">
    <subfield code="c">&#xFFFD;2014</subfield>
  </datafield>
  <datafield tag="300" ind1=" " ind2=" ">
    <subfield code="a">1 online resource (227 pages).</subfield>
  </datafield>
  <datafield tag="336" ind1=" " ind2=" ">
    <subfield code="a">text</subfield>
    <subfield code="2">rdacontent</subfield>
  </datafield>
  <datafield tag="337" ind1=" " ind2=" ">
    <subfield code="a">computer</subfield>
    <subfield code="2">rdamedia</subfield>
  </datafield>
  <datafield tag="338" ind1=" " ind2=" ">
    <subfield code="a">online resource</subfield>
    <subfield code="2">rdacarrier</subfield>
  </datafield>
  <datafield tag="490" ind1="1" ind2=" ">
    <subfield code="a">Wiley Corporate F&amp;A</subfield>
  </datafield>
  <datafield tag="500" ind1=" " ind2=" ">
    <subfield code="a">Includes index.</subfield>
  </datafield>
  <datafield tag="588" ind1=" " ind2=" ">
    <subfield code="a">Description based on print version record.</subfield>
  </datafield>
  <datafield tag="590" ind1=" " ind2=" ">
    <subfield code="a">Electronic reproduction. Palo Alto, Calif. : ebrary, 2015. Available via World Wide Web. Access may be limited to ebrary affiliated libraries.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
    <subfield code="a">Corporations</subfield>
    <subfield code="x">Security measures.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
    <subfield code="a">Business enterprises</subfield>
    <subfield code="x">Computer networks</subfield>
    <subfield code="x">Security measures.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
    <subfield code="a">Computer crimes</subfield>
    <subfield code="x">Prevention.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
    <subfield code="a">Computer security.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
    <subfield code="a">Computer networks</subfield>
    <subfield code="x">Security measures.</subfield>
  </datafield>
  <datafield tag="655" ind1=" " ind2="0">
    <subfield code="a">Electronic books.</subfield>
  </datafield>
  <datafield tag="776" ind1="0" ind2="8">
    <subfield code="i">Print version:</subfield>
    <subfield code="a">Ulsch, N. MacDonnell, 1951-</subfield>
    <subfield code="t">Cyber threat! : how to manage the growing risk of cyber attacks.</subfield>
    <subfield code="d">Hoboken, New Jersey : Wiley, c2014 </subfield>
    <subfield code="h">xxi, 202 pages </subfield>
    <subfield code="k">Wiley corporate F &amp; A.</subfield>
    <subfield code="z">9781118836354 </subfield>
    <subfield code="w">2014012281</subfield>
  </datafield>
  <datafield tag="797" ind1="2" ind2=" ">
    <subfield code="a">ebrary.</subfield>
  </datafield>
  <datafield tag="830" ind1=" " ind2="0">
    <subfield code="a">Wiley corporate F &amp; A.</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2="0">
    <subfield code="u">http://site.ebrary.com/lib/rucke/Doc?id=10895757</subfield>
    <subfield code="z">An electronic book accessible through the World Wide Web; click to view</subfield>
  </datafield>
  <datafield tag="999" ind1=" " ind2=" ">
    <subfield code="c">53969</subfield>
    <subfield code="d">53969</subfield>
  </datafield>
</record>
