International guide to cyber security:
Gespeichert in:
Format: | Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Chicago, Ill.
American Bar Association [u.a.]
2004
|
Schlagworte: | |
Online-Zugang: | Table of contents Inhaltsverzeichnis |
Beschreibung: | Includes bibliographical references (p. 277-316) and index |
Beschreibung: | XLIII, 330 S. 23 cm |
ISBN: | 1590313321 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV021556439 | ||
003 | DE-604 | ||
005 | 20060623 | ||
007 | t | ||
008 | 060424s2004 xxu |||| 00||| eng d | ||
010 | |a 2004003931 | ||
020 | |a 1590313321 |c pbk. |9 1-59031-332-1 | ||
035 | |a (OCoLC)54499793 | ||
035 | |a (DE-599)BVBBV021556439 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-12 | ||
050 | 0 | |a TK5105.59 | |
082 | 0 | |a 005.8 |2 22 | |
245 | 1 | 0 | |a International guide to cyber security |c Jody R. Westby, ed. |
264 | 1 | |a Chicago, Ill. |b American Bar Association [u.a.] |c 2004 | |
300 | |a XLIII, 330 S. |c 23 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes bibliographical references (p. 277-316) and index | ||
650 | 4 | |a Criminalité informatique - Prévention | |
650 | 4 | |a Réseaux d'ordinateurs - Sécurité - Mesures | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Computer crimes |x Prevention | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Westby, Jody R. |e Sonstige |4 oth | |
856 | 4 | |u http://www.loc.gov/catdir/toc/ecip0415/2004003931.html |3 Table of contents | |
856 | 4 | 2 | |m HEBIS Datenaustausch Darmstadt |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014772445&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-014772445 |
Datensatz im Suchindex
_version_ | 1804135315342884864 |
---|---|
adam_text | DEFENDING LIBERTY 5 PURSUING JUSTICE % INTERNATIONAL GUIDE TO CYBER
SECURITY AMERICAN BAR ASSOCIATION PRIVACY & COMPUTER CRIME COMMITTEE
SECTION OF SCIENCE & TECHNOLOGY LAW JODY R. WESTBY, PROJECT CHAIR &
EDITOR SECTION OF SCIENCE & TECHNOLOGY LAW ULB DARMSTADT
WLLLLLLLLLLLLLLLLLL 16120944 CONTENTS SUMMARY OF CONTENTS III CONTENTS V
PREFACE XI ABBREVIATIONS XV LIST OF PARTICIPANTS XXV EXECUTIVE SUMMARY
XXXI INTRODUCTION 1 A BACKGROUND 1 B. INTENDED AUDIENCE 7 C. SCOPE OF
THE INTERNATIONAL STRATEGY FOR CYBERSPACE SECURITY PROJECT CHAPTER 1
INFRASTRUCTURE CATEGORIES AND RESPONSIBILITIES 11 A OVERVIEW: ISSUES AND
CATEGORIES 16 B. CATEGORIES OF INFRASTRUCTURE 16 C. RESPONSIBILITIES 19
1. GOVERNMENT ROLES AND RESPONSIBILITIES 20 2. PRIVATE SECTOR ROLES AND
RESPONSIBILITIES 24 3. GOVERNMENT-IMPOSED SECURITY RESPONSIBILITIES 28
D. CONCLUSION 33 CHAPTER 2 INTERNATIONAL LEGAL LANDSCAPE 35 A OVERVIEW
35 B. NATIONAL LEGAL APPROACHES 35 1. NORTH AMERICA 36 A. UNITED STATES
36 B. CANADA 62 VI INTERNATIONAL GUIDE TO CYBER SECURITY 2. EUROPE 64 A.
THE EUROPEAN UNION (EU) 64 B. THE UNITED KINGDOM 71 3. ASIA 72 A. JAPAN
72 B. AUSTRALIA 75 C. MULTINATIONAL ORGANIZATIONS 76 1. COUNCIL OF
EUROPE (COE) 76 2. GROUP OF EIGHT (G8) 78 3. UNITED NATIONS (UN) 82 4.
ASIA-PACIFIC ECONOMIC COOPERATION FORUM (APEC) 85 5. ORGANIZATION OF
AMERICAN STATES (OAS) 89 6. ORGANIZATION FOR ECONOMIC COOPERATION AND
DEVELOPMENT (OECD) 92 7. INTERPOL 94 8. EUROPOL 96 9. THE WORLD BANK 97
10. BANK FOR INTERNATIONAL SETTLEMENTS 99 D. CONCLUSION 100 CHAPTER 3
PUBLIC/PRIVATE SECTOR COOPERATION 103 A OVERVIEW 103 B. ISSUES RELATED
TO PUBLIC/PRIVATE COOPERATION 105 1. DISCLOSURE OF SHARED INFORMATION
105 2. THE DEPARTMENT OF HOMELAND SECURITY 106 3. FREEDOM OF INFORMATION
ACT ISSUES 109 4. ANTITRUST 112 5. CIVIL LIBERTIES AND HUMAN RIGHTS 112
6. CRIMINAL INVESTIGATIONS & SENTENCING GUIDELINES 116 7. DISRUPTION OF
BUSINESS OPERATIONS 118 8. MANDATORY OR VOLUNTARY REPORTING 118 9.
LIABILITIES, CIVIL, AND CRIMINAL PENALTIES 119 C. THE U.S. MODEL OF
PUBLIC/PRIVATE COOPERATION 120 1. U.S. PROTECTION AND PROVISION OF
COMMUNICATIONS SERVICES 121 2. INFORMATION SHARING AND ANALYSIS CENTERS
(ISACS) 125 D. MULTINATIONAL PUBLIC/PRIVATE COOPERATION 127 1. EUROPEAN
UNION (EU) 127 2. GROUP OF EIGHT (G8) 130 3. COUNCIL OF EUROPE (COE) 132
4. ORGANIZATION FOR ECONOMIC COOPERATION AND DEVELOPMENT (OECD) 132 5.
ASIA-PACIFIC ECONOMIC COOPERATION (APEC) FORUM 133 6. INTERNATIONAL
TELECOMMUNICATIONS UNION (ITU) 134 CONTENTS VII E. ROLE OF
NON-GOVERNMENTAL ORGANIZATIONS 135 1. INTERNATIONAL CHAMBER OF COMMERCE
(ICC) 135 2. GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE (GBDE) 137
3. INFORMATION TECHNOLOGY ASSOCIATION OF AMERICA (ITAA) AND WORLD
INFORMATION TECHNOLOGY SERVICES ALLIANCE (WITSA) 138 4. GLOBAL INTERNET
POLICY INITIATIVE (GIPI) 138 5. GLOBAL INFORMATION INFRASTRUCTURE
COMMISSION (GIIC) 139 F. ASSISTANCE CENTERS 139 1. UNITED
STATES-COMPUTER EMERGENCY READINESS TEAM (US-CERT) 139 2. INFRAGARD 140
3. COMPUTER EMERGENCY RESPONSE TEAM/COORDINATING CENTER (CERT/CC) 141 4.
AUSTRALIAN CERT (AUSCERT) 142 5. FORUM OF INCIDENT RESPONSE AND SECURITY
TEAMS (FIRST) 142 6. NATIONAL INFRASTRUCTURE SECURITY COORDINATING
CENTER (NISCC) 142 7. ADDITIONAL CERTS 143 G. LAW ENFORCEMENT AND
PROSECUTORIAL ASSISTANCE 143 1. NATIONAL CYBER-FORENSICS AND TRAINING
ALLIANCE (NCFTA) 143 2. FBI NATIONAL COMPUTER CRIME SQUAD 144 3. THE
UNITED STATES SECRET SERVICE 144 4. U.S. DEPARTMENT OF JUSTICE COMPUTER
CRIME & INTELLECTUAL PROPERTY SECTION (CCIPS) 145 5. HIGH TECHNOLOGY
CRIMES TASK FORCE 147 H OTHER PUBLIC/PRIVATE ACTIVITIES 148 1. RESOURCE
AND TESTING CENTERS 148 2. SECURITY FREEWARE AND OPEN SOURCE TOOLS 149
3. TRADE AND PROFESSIONAL ASSOCIATIONS, THINK TANKS, ORGANIZATIONS 149
4. CONSUMER AND OTHER CYBER SECURITY INFORMATION 150 I. CONCLUSION 150
CHAPTER4 BEST PRACTICES AND RESOURCES 153 A OVERVIEW 153 B. BEST
PRACTICES 154 1. RECOMMENDED COURSE OF ACTION IN DISCERNING BEST
PRACTICES IN INFORMATION ASSURANCE 158 C. STANDARDS 159 1. STANDARDS
DEFINED 160 2. RATIONALE FOR STANDARDS AND THE ROLE THEY PLAY 161 3.
STANDARDS-ISSUING ORGANIZATIONS 161 VIII INTERNATIONAL GUIDE TO CYBER
SECURITY D. EDUCATIONAL INSTITUTIONS & ORGANIZATIONS 181 1. TRAINING &
CERTIFICATION 182 2. PROFESSIONAL ASSOCIATION CERTIFICATIONS 183 3.
CENTERS OF EXCELLENCE IN INFORMATION ASSURANCE EDUCATION 183 E.
CONCLUSION 186 CHAPTER 5 SECURITY PROGRAM: PLANS, POLICIES, AND
PROCEDURES 187 A OVERVIEW 187 B. DEVELOPMENT OF A SECURITY PLAN 188 1.
GOVERNANCE STRUCTURE 189 A. SENIOR MANAGEMENT & BOARDS OF DIRECTORS 189
B. CROSS-ORGANIZATIONAL SECURITY TEAM 197 C. PERSONNEL 200 D. CHANGE
MANAGEMENT 200 2. ASSESSMENT AND GAP ANALYSIS 201 3. CLASSIFICATION 203
A. DATA CLASSIFICATION 204 B. APPLICATION CLASSIFICATION 205 C. NETWORK
& SYSTEMS CLASSIFICATION 206 4. LEGAL CONSIDERATIONS & RISKS 207 A.
REQUIREMENTS FOR COMPLIANCE WITH LAWS, REGULATIONS, AND STANDARDS 207 B.
JURISDICTIONAL DIFFERENCES 209 C. CONTRACTS AND NON-DISCLOSURE
AGREEMENTS 211 D. CONFIDENTIAL AND PROPRIETARY INFORMATION AND DUE
DILIGENCE 211 E. POLITICAL EXPECTATIONS 212 5. MAIN ELEMENTS OF SECURITY
POLICIES AND PROCEDURES 212 A. KEY ELEMENTS OF POLICIES 214 B. PRACTICAL
TIPS FOR POLICIES 216 C. PROCEDURES 217 D. REVIEWING AND UPDATING
SECURITY PLAN, POLICIES, AND PROCEDURES 217 C. CONCLUSION 219 CHAPTER 6
IMPLEMENTATION AND SCIENCE AND TECHNOLOGY 221 A OVERVIEW 221 B.
IMPLEMENTATION: WHAT IS REQUIRED 226 1. TRAINING 227 2. MONITORING 232
CONTENTS IX 3. COMPLIANCE AND AUDITS 237 A. COMPLIANCE 237 B. ANNUAL
AUDIT 238 C. INTERNAL AND EXTERNAL AUDITS 240 4. ENFORCEMENT AND
REPORTING 246 C. TECHNOLOGICAL CONSIDERATIONS 247 1. SCIENCE AND
TECHNOLOGY CHALLENGES 248 A. NETWORKS 249 B. HARDWARE 252 C. INCIDENT
TYPES 253 D. SOFTWARE AND PATCHES 255 E. WIRELESS SYSTEMS 256 2.
TECHNOLOGY SECURITY TOOLS 258 A. IPV4 VERSUS IPV6 258 B. FIREWALLS 260
C. INTRUSION DETECTION 261 D. MALICIOUS CODE DETECTION 262 E.
STEGANOGRAPHY DETECTION SOFTWARE 263 F. ENCRYPTION 263 G. AUTHORIZATION
AND ACCESS CONTROL 266 H. DIGITAL SIGNATURES, OTHER CERTIFICATION
TECHNOLOGY 270 I. LOGS 272 J. NATIONAL SECURITY TECHNOLOGIES/PACKET
INSPECTION AND MODIFICATION TECHNOLOGIES 272 K. OTHER TECHNICAL TOOLS
273 D. CONCLUSION 274 BIBLIOGRAPHY 277 INDEX 317
|
adam_txt |
DEFENDING LIBERTY 5 PURSUING JUSTICE % INTERNATIONAL GUIDE TO CYBER
SECURITY AMERICAN BAR ASSOCIATION PRIVACY & COMPUTER CRIME COMMITTEE
SECTION OF SCIENCE & TECHNOLOGY LAW JODY R. WESTBY, PROJECT CHAIR &
EDITOR SECTION OF SCIENCE & TECHNOLOGY LAW ULB DARMSTADT
WLLLLLLLLLLLLLLLLLL 16120944 CONTENTS SUMMARY OF CONTENTS III CONTENTS V
PREFACE XI ABBREVIATIONS XV LIST OF PARTICIPANTS XXV EXECUTIVE SUMMARY
XXXI INTRODUCTION 1 A BACKGROUND 1 B. INTENDED AUDIENCE 7 C. SCOPE OF
THE INTERNATIONAL STRATEGY FOR CYBERSPACE SECURITY PROJECT CHAPTER 1
INFRASTRUCTURE CATEGORIES AND RESPONSIBILITIES 11 A OVERVIEW: ISSUES AND
CATEGORIES 16 B. CATEGORIES OF INFRASTRUCTURE 16 C. RESPONSIBILITIES 19
1. GOVERNMENT ROLES AND RESPONSIBILITIES 20 2. PRIVATE SECTOR ROLES AND
RESPONSIBILITIES 24 3. GOVERNMENT-IMPOSED SECURITY RESPONSIBILITIES 28
D. CONCLUSION 33 CHAPTER 2 INTERNATIONAL LEGAL LANDSCAPE 35 A OVERVIEW
35 B. NATIONAL LEGAL APPROACHES 35 1. NORTH AMERICA 36 A. UNITED STATES
36 B. CANADA 62 VI INTERNATIONAL GUIDE TO CYBER SECURITY 2. EUROPE 64 A.
THE EUROPEAN UNION (EU) 64 B. THE UNITED KINGDOM 71 3. ASIA 72 A. JAPAN
72 B. AUSTRALIA 75 C. MULTINATIONAL ORGANIZATIONS 76 1. COUNCIL OF
EUROPE (COE) 76 2. GROUP OF EIGHT (G8) 78 3. UNITED NATIONS (UN) 82 4.
ASIA-PACIFIC ECONOMIC COOPERATION FORUM (APEC) 85 5. ORGANIZATION OF
AMERICAN STATES (OAS) 89 6. ORGANIZATION FOR ECONOMIC COOPERATION AND
DEVELOPMENT (OECD) 92 7. INTERPOL 94 8. EUROPOL 96 9. THE WORLD BANK 97
10. BANK FOR INTERNATIONAL SETTLEMENTS 99 D. CONCLUSION 100 CHAPTER 3
PUBLIC/PRIVATE SECTOR COOPERATION 103 A OVERVIEW 103 B. ISSUES RELATED
TO PUBLIC/PRIVATE COOPERATION 105 1. DISCLOSURE OF SHARED INFORMATION
105 2. THE DEPARTMENT OF HOMELAND SECURITY 106 3. FREEDOM OF INFORMATION
ACT ISSUES 109 4. ANTITRUST 112 5. CIVIL LIBERTIES AND HUMAN RIGHTS 112
6. CRIMINAL INVESTIGATIONS & SENTENCING GUIDELINES 116 7. DISRUPTION OF
BUSINESS OPERATIONS 118 8. MANDATORY OR VOLUNTARY REPORTING 118 9.
LIABILITIES, CIVIL, AND CRIMINAL PENALTIES 119 C. THE U.S. MODEL OF
PUBLIC/PRIVATE COOPERATION 120 1. U.S. PROTECTION AND PROVISION OF
COMMUNICATIONS SERVICES 121 2. INFORMATION SHARING AND ANALYSIS CENTERS
(ISACS) 125 D. MULTINATIONAL PUBLIC/PRIVATE COOPERATION 127 1. EUROPEAN
UNION (EU) 127 2. GROUP OF EIGHT (G8) 130 3. COUNCIL OF EUROPE (COE) 132
4. ORGANIZATION FOR ECONOMIC COOPERATION AND DEVELOPMENT (OECD) 132 5.
ASIA-PACIFIC ECONOMIC COOPERATION (APEC) FORUM 133 6. INTERNATIONAL
TELECOMMUNICATIONS UNION (ITU) 134 CONTENTS VII E. ROLE OF
NON-GOVERNMENTAL ORGANIZATIONS 135 1. INTERNATIONAL CHAMBER OF COMMERCE
(ICC) 135 2. GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE (GBDE) 137
3. INFORMATION TECHNOLOGY ASSOCIATION OF AMERICA (ITAA) AND WORLD
INFORMATION TECHNOLOGY SERVICES ALLIANCE (WITSA) 138 4. GLOBAL INTERNET
POLICY INITIATIVE (GIPI) 138 5. GLOBAL INFORMATION INFRASTRUCTURE
COMMISSION (GIIC) 139 F. ASSISTANCE CENTERS 139 1. UNITED
STATES-COMPUTER EMERGENCY READINESS TEAM (US-CERT) 139 2. INFRAGARD 140
3. COMPUTER EMERGENCY RESPONSE TEAM/COORDINATING CENTER (CERT/CC) 141 4.
AUSTRALIAN CERT (AUSCERT) 142 5. FORUM OF INCIDENT RESPONSE AND SECURITY
TEAMS (FIRST) 142 6. NATIONAL INFRASTRUCTURE SECURITY COORDINATING
CENTER (NISCC) 142 7. ADDITIONAL CERTS 143 G. LAW ENFORCEMENT AND
PROSECUTORIAL ASSISTANCE 143 1. NATIONAL CYBER-FORENSICS AND TRAINING
ALLIANCE (NCFTA) 143 2. FBI NATIONAL COMPUTER CRIME SQUAD 144 3. THE
UNITED STATES SECRET SERVICE 144 4. U.S. DEPARTMENT OF JUSTICE COMPUTER
CRIME & INTELLECTUAL PROPERTY SECTION (CCIPS) 145 5. HIGH TECHNOLOGY
CRIMES TASK FORCE 147 H OTHER PUBLIC/PRIVATE ACTIVITIES 148 1. RESOURCE
AND TESTING CENTERS 148 2. SECURITY FREEWARE AND OPEN SOURCE TOOLS 149
3. TRADE AND PROFESSIONAL ASSOCIATIONS, THINK TANKS, ORGANIZATIONS 149
4. CONSUMER AND OTHER CYBER SECURITY INFORMATION 150 I. CONCLUSION 150
CHAPTER4 BEST PRACTICES AND RESOURCES 153 A OVERVIEW 153 B. BEST
PRACTICES 154 1. RECOMMENDED COURSE OF ACTION IN DISCERNING BEST
PRACTICES IN INFORMATION ASSURANCE 158 C. STANDARDS 159 1. "STANDARDS"
DEFINED 160 2. RATIONALE FOR STANDARDS AND THE ROLE THEY PLAY 161 3.
STANDARDS-ISSUING ORGANIZATIONS 161 VIII INTERNATIONAL GUIDE TO CYBER
SECURITY D. EDUCATIONAL INSTITUTIONS & ORGANIZATIONS 181 1. TRAINING &
CERTIFICATION 182 2. PROFESSIONAL ASSOCIATION CERTIFICATIONS 183 3.
CENTERS OF EXCELLENCE IN INFORMATION ASSURANCE EDUCATION 183 E.
CONCLUSION 186 CHAPTER 5 SECURITY PROGRAM: PLANS, POLICIES, AND
PROCEDURES 187 A OVERVIEW 187 B. DEVELOPMENT OF A SECURITY PLAN 188 1.
GOVERNANCE STRUCTURE 189 A. SENIOR MANAGEMENT & BOARDS OF DIRECTORS 189
B. CROSS-ORGANIZATIONAL SECURITY TEAM 197 C. PERSONNEL 200 D. CHANGE
MANAGEMENT 200 2. ASSESSMENT AND GAP ANALYSIS 201 3. CLASSIFICATION 203
A. DATA CLASSIFICATION 204 B. APPLICATION CLASSIFICATION 205 C. NETWORK
& SYSTEMS CLASSIFICATION 206 4. LEGAL CONSIDERATIONS & RISKS 207 A.
REQUIREMENTS FOR COMPLIANCE WITH LAWS, REGULATIONS, AND STANDARDS 207 B.
JURISDICTIONAL DIFFERENCES 209 C. CONTRACTS AND NON-DISCLOSURE
AGREEMENTS 211 D. CONFIDENTIAL AND PROPRIETARY INFORMATION AND DUE
DILIGENCE 211 E. POLITICAL EXPECTATIONS 212 5. MAIN ELEMENTS OF SECURITY
POLICIES AND PROCEDURES 212 A. KEY ELEMENTS OF POLICIES 214 B. PRACTICAL
TIPS FOR POLICIES 216 C. PROCEDURES 217 D. REVIEWING AND UPDATING
SECURITY PLAN, POLICIES, AND PROCEDURES 217 C. CONCLUSION 219 CHAPTER 6
IMPLEMENTATION AND SCIENCE AND TECHNOLOGY 221 A OVERVIEW 221 B.
IMPLEMENTATION: WHAT IS REQUIRED 226 1. TRAINING 227 2. MONITORING 232
CONTENTS IX 3. COMPLIANCE AND AUDITS 237 A. COMPLIANCE 237 B. ANNUAL
AUDIT 238 C. INTERNAL AND EXTERNAL AUDITS 240 4. ENFORCEMENT AND
REPORTING 246 C. TECHNOLOGICAL CONSIDERATIONS 247 1. SCIENCE AND
TECHNOLOGY CHALLENGES 248 A. NETWORKS 249 B. HARDWARE 252 C. INCIDENT
TYPES 253 D. SOFTWARE AND PATCHES 255 E. WIRELESS SYSTEMS 256 2.
TECHNOLOGY SECURITY TOOLS 258 A. IPV4 VERSUS IPV6 258 B. FIREWALLS 260
C. INTRUSION DETECTION 261 D. MALICIOUS CODE DETECTION 262 E.
STEGANOGRAPHY DETECTION SOFTWARE 263 F. ENCRYPTION 263 G. AUTHORIZATION
AND ACCESS CONTROL 266 H. DIGITAL SIGNATURES, OTHER CERTIFICATION
TECHNOLOGY 270 I. LOGS 272 J. NATIONAL SECURITY TECHNOLOGIES/PACKET
INSPECTION AND MODIFICATION TECHNOLOGIES 272 K. OTHER TECHNICAL TOOLS
273 D. CONCLUSION 274 BIBLIOGRAPHY 277 INDEX 317 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
building | Verbundindex |
bvnumber | BV021556439 |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 |
callnumber-search | TK5105.59 |
callnumber-sort | TK 45105.59 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
ctrlnum | (OCoLC)54499793 (DE-599)BVBBV021556439 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01739nam a2200445zc 4500</leader><controlfield tag="001">BV021556439</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20060623 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">060424s2004 xxu |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2004003931</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1590313321</subfield><subfield code="c">pbk.</subfield><subfield code="9">1-59031-332-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)54499793</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV021556439</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK5105.59</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">International guide to cyber security</subfield><subfield code="c">Jody R. Westby, ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Chicago, Ill.</subfield><subfield code="b">American Bar Association [u.a.]</subfield><subfield code="c">2004</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XLIII, 330 S.</subfield><subfield code="c">23 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (p. 277-316) and index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Criminalité informatique - Prévention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs - Sécurité - Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Westby, Jody R.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://www.loc.gov/catdir/toc/ecip0415/2004003931.html</subfield><subfield code="3">Table of contents</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HEBIS Datenaustausch Darmstadt</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014772445&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-014772445</subfield></datafield></record></collection> |
id | DE-604.BV021556439 |
illustrated | Not Illustrated |
index_date | 2024-07-02T14:33:15Z |
indexdate | 2024-07-09T20:38:33Z |
institution | BVB |
isbn | 1590313321 |
language | English |
lccn | 2004003931 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-014772445 |
oclc_num | 54499793 |
open_access_boolean | |
owner | DE-12 |
owner_facet | DE-12 |
physical | XLIII, 330 S. 23 cm |
publishDate | 2004 |
publishDateSearch | 2004 |
publishDateSort | 2004 |
publisher | American Bar Association [u.a.] |
record_format | marc |
spelling | International guide to cyber security Jody R. Westby, ed. Chicago, Ill. American Bar Association [u.a.] 2004 XLIII, 330 S. 23 cm txt rdacontent n rdamedia nc rdacarrier Includes bibliographical references (p. 277-316) and index Criminalité informatique - Prévention Réseaux d'ordinateurs - Sécurité - Mesures Computer networks Security measures Computer crimes Prevention Computersicherheit (DE-588)4274324-2 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Datensicherung (DE-588)4011144-1 s Computersicherheit (DE-588)4274324-2 s DE-604 Westby, Jody R. Sonstige oth http://www.loc.gov/catdir/toc/ecip0415/2004003931.html Table of contents HEBIS Datenaustausch Darmstadt application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014772445&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | International guide to cyber security Criminalité informatique - Prévention Réseaux d'ordinateurs - Sécurité - Mesures Computer networks Security measures Computer crimes Prevention Computersicherheit (DE-588)4274324-2 gnd Datensicherung (DE-588)4011144-1 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4011144-1 |
title | International guide to cyber security |
title_auth | International guide to cyber security |
title_exact_search | International guide to cyber security |
title_exact_search_txtP | International guide to cyber security |
title_full | International guide to cyber security Jody R. Westby, ed. |
title_fullStr | International guide to cyber security Jody R. Westby, ed. |
title_full_unstemmed | International guide to cyber security Jody R. Westby, ed. |
title_short | International guide to cyber security |
title_sort | international guide to cyber security |
topic | Criminalité informatique - Prévention Réseaux d'ordinateurs - Sécurité - Mesures Computer networks Security measures Computer crimes Prevention Computersicherheit (DE-588)4274324-2 gnd Datensicherung (DE-588)4011144-1 gnd |
topic_facet | Criminalité informatique - Prévention Réseaux d'ordinateurs - Sécurité - Mesures Computer networks Security measures Computer crimes Prevention Computersicherheit Datensicherung |
url | http://www.loc.gov/catdir/toc/ecip0415/2004003931.html http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014772445&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT westbyjodyr internationalguidetocybersecurity |