Cybersecurity: public sector threats and responses
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Boca Raton, Fla.
CRC Press
2012
|
Schriftenreihe: | Public administration and public policy
165 |
Schlagworte: | |
Beschreibung: | "K12093." Includes bibliographical references and index "Written as a reference, but easily adaptable for classroom use, this book explains the importance of cyber security, why readers should care, and what threats to watch for. It also offers information on how to improve an operating environment and better safeguard the constituents organizations serve. Based on research that claims that cyber security policy is often set at less senior levels of corporations, and left to IT security professionals, this book explains why security should be addressed by senior level management. "-- |
Beschreibung: | 1 Online-Ressource (xxxv, 338 p.) |
ISBN: | 9781439846636 9781439846643 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV041135268 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 130709s2012 |||| o||u| ||||||eng d | ||
020 | |a 9781439846636 |9 978-1-4398-4663-6 | ||
020 | |a 9781439846643 |9 978-1-4398-4664-3 | ||
035 | |a (OCoLC)773036079 | ||
035 | |a (DE-599)BVBBV041135268 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-355 | ||
082 | 0 | |a 352.3/79 |2 23 | |
245 | 1 | 0 | |a Cybersecurity |b public sector threats and responses |c Kim Andreasson [editor] |
264 | 1 | |a Boca Raton, Fla. |b CRC Press |c 2012 | |
300 | |a 1 Online-Ressource (xxxv, 338 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Public administration and public policy |v 165 | |
500 | |a "K12093." | ||
500 | |a Includes bibliographical references and index | ||
500 | |a "Written as a reference, but easily adaptable for classroom use, this book explains the importance of cyber security, why readers should care, and what threats to watch for. It also offers information on how to improve an operating environment and better safeguard the constituents organizations serve. Based on research that claims that cyber security policy is often set at less senior levels of corporations, and left to IT security professionals, this book explains why security should be addressed by senior level management. "-- | ||
650 | 4 | |a Politik | |
650 | 4 | |a Computer networks / Security measures / Government policy | |
650 | 4 | |a Government information / Security measures | |
650 | 4 | |a Computer crimes / Prevention | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internet |0 (DE-588)4308416-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computerkriminalität |0 (DE-588)4010452-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a E-Government |0 (DE-588)4728387-7 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Computerkriminalität |0 (DE-588)4010452-7 |D s |
689 | 0 | 2 | |a Internet |0 (DE-588)4308416-3 |D s |
689 | 0 | 3 | |a E-Government |0 (DE-588)4728387-7 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Andreasson, Kim J. |e Sonstige |4 oth | |
912 | |a ZDB-38-EBR |a ZDB-4-EOAC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-026111007 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804150530143944704 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV041135268 |
collection | ZDB-38-EBR ZDB-4-EOAC |
ctrlnum | (OCoLC)773036079 (DE-599)BVBBV041135268 |
dewey-full | 352.3/79 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 352 - General considerations of public administration |
dewey-raw | 352.3/79 |
dewey-search | 352.3/79 |
dewey-sort | 3352.3 279 |
dewey-tens | 350 - Public administration and military science |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02373nmm a2200505zcb4500</leader><controlfield tag="001">BV041135268</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">130709s2012 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781439846636</subfield><subfield code="9">978-1-4398-4663-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781439846643</subfield><subfield code="9">978-1-4398-4664-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)773036079</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV041135268</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">352.3/79</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cybersecurity</subfield><subfield code="b">public sector threats and responses</subfield><subfield code="c">Kim Andreasson [editor]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton, Fla.</subfield><subfield code="b">CRC Press</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxxv, 338 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Public administration and public policy</subfield><subfield code="v">165</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"K12093."</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Written as a reference, but easily adaptable for classroom use, this book explains the importance of cyber security, why readers should care, and what threats to watch for. It also offers information on how to improve an operating environment and better safeguard the constituents organizations serve. Based on research that claims that cyber security policy is often set at less senior levels of corporations, and left to IT security professionals, this book explains why security should be addressed by senior level management. "--</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Politik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures / Government policy</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Government information / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes / Prevention</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">E-Government</subfield><subfield code="0">(DE-588)4728387-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">E-Government</subfield><subfield code="0">(DE-588)4728387-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Andreasson, Kim J.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-38-EBR</subfield><subfield code="a">ZDB-4-EOAC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-026111007</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
id | DE-604.BV041135268 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T00:40:23Z |
institution | BVB |
isbn | 9781439846636 9781439846643 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-026111007 |
oclc_num | 773036079 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR |
owner_facet | DE-355 DE-BY-UBR |
physical | 1 Online-Ressource (xxxv, 338 p.) |
psigel | ZDB-38-EBR ZDB-4-EOAC |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | CRC Press |
record_format | marc |
series2 | Public administration and public policy |
spelling | Cybersecurity public sector threats and responses Kim Andreasson [editor] Boca Raton, Fla. CRC Press 2012 1 Online-Ressource (xxxv, 338 p.) txt rdacontent c rdamedia cr rdacarrier Public administration and public policy 165 "K12093." Includes bibliographical references and index "Written as a reference, but easily adaptable for classroom use, this book explains the importance of cyber security, why readers should care, and what threats to watch for. It also offers information on how to improve an operating environment and better safeguard the constituents organizations serve. Based on research that claims that cyber security policy is often set at less senior levels of corporations, and left to IT security professionals, this book explains why security should be addressed by senior level management. "-- Politik Computer networks / Security measures / Government policy Government information / Security measures Computer crimes / Prevention Computersicherheit (DE-588)4274324-2 gnd rswk-swf Internet (DE-588)4308416-3 gnd rswk-swf Computerkriminalität (DE-588)4010452-7 gnd rswk-swf E-Government (DE-588)4728387-7 gnd rswk-swf Computersicherheit (DE-588)4274324-2 s Computerkriminalität (DE-588)4010452-7 s Internet (DE-588)4308416-3 s E-Government (DE-588)4728387-7 s 1\p DE-604 Andreasson, Kim J. Sonstige oth 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Cybersecurity public sector threats and responses Politik Computer networks / Security measures / Government policy Government information / Security measures Computer crimes / Prevention Computersicherheit (DE-588)4274324-2 gnd Internet (DE-588)4308416-3 gnd Computerkriminalität (DE-588)4010452-7 gnd E-Government (DE-588)4728387-7 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4308416-3 (DE-588)4010452-7 (DE-588)4728387-7 |
title | Cybersecurity public sector threats and responses |
title_auth | Cybersecurity public sector threats and responses |
title_exact_search | Cybersecurity public sector threats and responses |
title_full | Cybersecurity public sector threats and responses Kim Andreasson [editor] |
title_fullStr | Cybersecurity public sector threats and responses Kim Andreasson [editor] |
title_full_unstemmed | Cybersecurity public sector threats and responses Kim Andreasson [editor] |
title_short | Cybersecurity |
title_sort | cybersecurity public sector threats and responses |
title_sub | public sector threats and responses |
topic | Politik Computer networks / Security measures / Government policy Government information / Security measures Computer crimes / Prevention Computersicherheit (DE-588)4274324-2 gnd Internet (DE-588)4308416-3 gnd Computerkriminalität (DE-588)4010452-7 gnd E-Government (DE-588)4728387-7 gnd |
topic_facet | Politik Computer networks / Security measures / Government policy Government information / Security measures Computer crimes / Prevention Computersicherheit Internet Computerkriminalität E-Government |
work_keys_str_mv | AT andreassonkimj cybersecuritypublicsectorthreatsandresponses |