<?xml version="1.0" encoding="UTF-8"?>
<mods xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.loc.gov/mods/v3" version="3.1" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-1.xsd">
  <titleInfo>
    <title>Ciberseguridad paso a paso: diseña tu estrategia</title>
  </titleInfo>
  <name type="personal">
    <namePart>Caballero Velasco, María Ángeles</namePart>
    <role>
      <roleTerm authority="marcrelator" type="text">creator</roleTerm>
    </role>
  </name>
  <typeOfResource>text</typeOfResource>
  <originInfo>
    <place>
      <placeTerm type="text">España</placeTerm>
    </place>
    <publisher>Anaya</publisher>
    <dateIssued>2023</dateIssued>
    <issuance>monographic</issuance>
  </originInfo>
  <language>
    <languageTerm authority="iso639-2b" type="code">spa</languageTerm>
  </language>
  <language>
    <languageTerm authority="iso639-2b" type="code">ESP</languageTerm>
  </language>
  <physicalDescription>
    <form authority="marcform">print</form>
    <extent>599 páginas</extent>
  </physicalDescription>
  <subject>
    <topic>SEGURIDAD DE LOS DATOS</topic>
  </subject>
  <subject>
    <topic>CIBERSEGURIDAD</topic>
  </subject>
  <subject>
    <topic>NUEVA ERA DIGITAL</topic>
  </subject>
  <subject>
    <topic>INTERNET</topic>
  </subject>
  <subject>
    <topic>BIG DATA</topic>
  </subject>
  <subject>
    <topic>INTELIGENCIA ARTIFICIAL</topic>
  </subject>
  <subject>
    <topic>TECNOLOGÍAS</topic>
  </subject>
  <subject>
    <topic>HACKER</topic>
  </subject>
  <subject>
    <topic>AMENAZAS</topic>
  </subject>
  <subject>
    <topic>CIBERAMENAZAS</topic>
  </subject>
  <subject>
    <topic>CYBERSECURITY FRAMEWORK</topic>
  </subject>
  <subject>
    <topic>DOMINIOS</topic>
  </subject>
  <subject>
    <topic>NEGOCIOS</topic>
  </subject>
  <subject>
    <topic>ORGANIZACIÓN</topic>
  </subject>
  <subject>
    <topic>PROTECCIÓN DE LA RED</topic>
  </subject>
  <subject>
    <topic>FIREWALLS</topic>
  </subject>
  <subject>
    <topic>PREVENCIÓN DE INTRUSOS</topic>
  </subject>
  <subject>
    <topic>ARQUITECTURA DE SEGURIDAD</topic>
  </subject>
  <subject>
    <topic>PROTECCIÓN DE DATOS</topic>
  </subject>
  <subject>
    <topic>PRIVACIDAD</topic>
  </subject>
  <subject>
    <topic>PROTECCIÓN DE APLICACIONES</topic>
  </subject>
  <subject>
    <topic>PROTECCIÓN DE IDENTIDAD</topic>
  </subject>
  <subject>
    <topic>PROTECCIÓN DE LAS REDES SOCIALES</topic>
  </subject>
  <subject>
    <topic>PLAN DE CIBERSEGURIDAD</topic>
  </subject>
  <subject>
    <topic>MACARENA BAKES</topic>
  </subject>
  <subject>
    <topic>CYBER NEGOCIO</topic>
  </subject>
  <subject>
    <topic>PROTECCIÓN DEL NEGOCIO</topic>
  </subject>
  <subject>
    <topic>CIBERSEGURIDAD EN CLOUD</topic>
  </subject>
  <subject>
    <topic>TIPOS DE NUBE</topic>
  </subject>
  <subject>
    <topic>ESTRATEGIA DE SEGURIDAD</topic>
  </subject>
  <classification authority="ddc">005.8 C112c</classification>
  <identifier type="isbn">9788441548112</identifier>
  <recordInfo>
    <recordCreationDate encoding="marc">260204</recordCreationDate>
    <recordChangeDate encoding="iso8601">20260204123608.0</recordChangeDate>
  </recordInfo>
</mods>
