Cybersecurity : (Record no. 3603)

MARC details
000 -LEADER
fixed length control field 03147cam a2200349Ii 4500
001 - CONTROL NUMBER
control field 9781439846643
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 180331s2012 fluad ob 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781439846643
Qualifying information (e-book : PDF)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781466541863
Qualifying information (e-book)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781439846636
Qualifying information (hardback)
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1201/b11363
Source of number or code doi
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)773036079
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5105.59
Item number .C927 2012
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 352.379
Item number C994
245 00 - TITLE STATEMENT
Title Cybersecurity :
Remainder of title public sector threats and responses /
Statement of responsibility, etc. [edited by] Kim Andreasson.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Boca Raton, Fla. :
Name of producer, publisher, distributor, manufacturer CRC Press,
Date of production, publication, distribution, manufacture, or copyright notice 2012.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (xxxv, 354 pages)
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term unmediated
Media type code n
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term volume
Carrier type code nc
Source rdacarrier
490 1# - SERIES STATEMENT
Series statement Public administration and public policy ;
Volume/sequential designation 165
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note ch. 1. The global rise of e-government and its security implications / Jeremy Millard -- chapter 2. Understanding cyber threats / Deborah L. Wheeler -- chapter 3. Cybersecurity in east Asia : Japan and the 2009 attacks on South Korea and the United States / Motohiro Tsuchiya -- chapter 4. Toward a global approach to cybersecurity / Marco Obiso and Gary Fowlie -- chapter 5. The cybersecurity policy challenge : the tyranny of geography / Elaine C. Kamarck -- chapter 6. U.S. federal cybersecurity policy / Daniel Castro -- chapter 7. European cybersecurity policy / Neil Robinson -- chapter 8. A local cybersecurity approach : the case of Catalonia / Ignacio Alamillo Domingo and Agusti Cerrillo-I-Martinez -- chapter 9. Securing government transparency : cybersecurity policy issues in a Gov 2.0 environment and beyond / Gregory G. Curtin and Charity C. Tran -- chapter 10. The civilian cyber incident response policies of the U.S. federal government / Chris Bronk -- chapter 11. Cybersecurity health check : a framework to enhance organizational security / Shih Ming Pan. [and others] -- chapter 12. Beyond public-private partnerships : leadership strategies for securing cyberspace / Dave Sulek and Megan Doscher -- chapter 13. Is there a conclusion to cybersecurity? / Kim Andreasson.
520 ## - SUMMARY, ETC.
Summary, etc. Written as a reference, but easily adaptable for classroom use, this book explains the importance of cyber security, why readers should care, and what threats to watch for. It also offers information on how to improve an operating environment and better safeguard the constituents organizations serve. Based on research that claims that cyber security policy is often set at less senior levels of corporations, and left to IT security professionals, this book explains why security should be addressed by senior level management. --
Assigning source Provided by publisher.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures
-- Government policy.
9 (RLIN) 23961
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Government information
General subdivision Security measures.
9 (RLIN) 23962
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer crimes
General subdivision Prevention.
9 (RLIN) 23963
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Andreasson, Kim J.
9 (RLIN) 23964
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
International Standard Book Number 9781439846636
Record control number (DLC) 2011038756
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Public administration and public policy ;
Volume/sequential designation 165.
9 (RLIN) 23965
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://www.taylorfrancis.com/books/9781439846643">https://www.taylorfrancis.com/books/9781439846643</a>
Public note Click here to view.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type E-books

No items available.