Critical information infrastructure protection and the law: an overview of key issues
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Washington, D.C.
National Academies Press
c2003
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | "Committee on Critical Information Infrastructure and the Law, Computer Science and Telecommunications Board, National Academy of Engineering, National Research Council of the National Academies." Includes bibliographical references 1. Introduction and context -- 2. Increasing the flow of information -- 3. Liability for unsecured systems and networks -- 4. Moving forward |
Beschreibung: | 1 Online-Ressource (xvi, 86 p.) |
ISBN: | 0309506379 0309513847 9780309506373 9780309513845 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043148357 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2003 |||| o||u| ||||||eng d | ||
020 | |a 0309506379 |c PDF |9 0-309-50637-9 | ||
020 | |a 0309513847 |c electronic bk. |9 0-309-51384-7 | ||
020 | |a 9780309506373 |c PDF |9 978-0-309-50637-3 | ||
020 | |a 9780309513845 |c electronic bk. |9 978-0-309-51384-5 | ||
035 | |a (OCoLC)53990141 | ||
035 | |a (DE-599)BVBBV043148357 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 658.478 |2 22 | |
245 | 1 | 0 | |a Critical information infrastructure protection and the law |b an overview of key issues |c Stewart D. Personick and Cynthia A. Patterson, editors |
264 | 1 | |a Washington, D.C. |b National Academies Press |c c2003 | |
300 | |a 1 Online-Ressource (xvi, 86 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a "Committee on Critical Information Infrastructure and the Law, Computer Science and Telecommunications Board, National Academy of Engineering, National Research Council of the National Academies." | ||
500 | |a Includes bibliographical references | ||
500 | |a 1. Introduction and context -- 2. Increasing the flow of information -- 3. Liability for unsecured systems and networks -- 4. Moving forward | ||
650 | 7 | |a BUSINESS & ECONOMICS / Workplace Culture |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS / Corporate Governance |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS / Leadership |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS / Organizational Development |2 bisacsh | |
650 | 7 | |a Computer security / Law and legislation |2 fast | |
650 | 7 | |a Computers / Access control |2 fast | |
650 | 7 | |a Confidential communications |2 fast | |
650 | 7 | |a Privacy, Right of |2 fast | |
650 | 4 | |a Privacy / legislation & jurisprudence | |
650 | 4 | |a Information Services | |
650 | 4 | |a Confidentiality / legislation & jurisprudence | |
650 | 4 | |a Führung | |
650 | 4 | |a Recht | |
650 | 4 | |a Wirtschaft | |
650 | 4 | |a Computer security |x Law and legislation |z United States | |
650 | 4 | |a Confidential communications |z United States | |
650 | 4 | |a Computers |x Access control |z United States | |
650 | 4 | |a Privacy, Right of |z United States | |
651 | 4 | |a USA | |
700 | 1 | |a Personick, Stewart D. |e Sonstige |4 oth | |
700 | 1 | |a Patterson, Cynthia A. |e Sonstige |4 oth | |
710 | 2 | |a National Research Council (U.S.) |b Committee on Critical Information Infrastructure Protection and the Law |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 0-309-08878-X |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-0-309-08878-7 |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=101975 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028572548 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=101975 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=101975 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175605073182720 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV043148357 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)53990141 (DE-599)BVBBV043148357 |
dewey-full | 658.478 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.478 |
dewey-search | 658.478 |
dewey-sort | 3658.478 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03225nmm a2200661zc 4500</leader><controlfield tag="001">BV043148357</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2003 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0309506379</subfield><subfield code="c">PDF</subfield><subfield code="9">0-309-50637-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0309513847</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-309-51384-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780309506373</subfield><subfield code="c">PDF</subfield><subfield code="9">978-0-309-50637-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780309513845</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-309-51384-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)53990141</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043148357</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.478</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Critical information infrastructure protection and the law</subfield><subfield code="b">an overview of key issues</subfield><subfield code="c">Stewart D. Personick and Cynthia A. Patterson, editors</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Washington, D.C.</subfield><subfield code="b">National Academies Press</subfield><subfield code="c">c2003</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xvi, 86 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Committee on Critical Information Infrastructure and the Law, Computer Science and Telecommunications Board, National Academy of Engineering, National Research Council of the National Academies."</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">1. Introduction and context -- 2. Increasing the flow of information -- 3. Liability for unsecured systems and networks -- 4. Moving forward</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Workplace Culture</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Corporate Governance</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Leadership</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Organizational Development</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security / Law and legislation</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computers / Access control</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Confidential communications</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Privacy, Right of</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Privacy / legislation & jurisprudence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information Services</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Confidentiality / legislation & jurisprudence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Führung</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Recht</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wirtschaft</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="x">Law and legislation</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Confidential communications</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield><subfield code="x">Access control</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Privacy, Right of</subfield><subfield code="z">United States</subfield></datafield><datafield tag="651" ind1=" " ind2="4"><subfield code="a">USA</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Personick, Stewart D.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Patterson, Cynthia A.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">National Research Council (U.S.)</subfield><subfield code="b">Committee on Critical Information Infrastructure Protection and the Law</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">0-309-08878-X</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-0-309-08878-7</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=101975</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028572548</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=101975</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=101975</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
geographic | USA |
geographic_facet | USA |
id | DE-604.BV043148357 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:18:56Z |
institution | BVB |
isbn | 0309506379 0309513847 9780309506373 9780309513845 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028572548 |
oclc_num | 53990141 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (xvi, 86 p.) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2003 |
publishDateSearch | 2003 |
publishDateSort | 2003 |
publisher | National Academies Press |
record_format | marc |
spelling | Critical information infrastructure protection and the law an overview of key issues Stewart D. Personick and Cynthia A. Patterson, editors Washington, D.C. National Academies Press c2003 1 Online-Ressource (xvi, 86 p.) txt rdacontent c rdamedia cr rdacarrier "Committee on Critical Information Infrastructure and the Law, Computer Science and Telecommunications Board, National Academy of Engineering, National Research Council of the National Academies." Includes bibliographical references 1. Introduction and context -- 2. Increasing the flow of information -- 3. Liability for unsecured systems and networks -- 4. Moving forward BUSINESS & ECONOMICS / Workplace Culture bisacsh BUSINESS & ECONOMICS / Corporate Governance bisacsh BUSINESS & ECONOMICS / Leadership bisacsh BUSINESS & ECONOMICS / Organizational Development bisacsh Computer security / Law and legislation fast Computers / Access control fast Confidential communications fast Privacy, Right of fast Privacy / legislation & jurisprudence Information Services Confidentiality / legislation & jurisprudence Führung Recht Wirtschaft Computer security Law and legislation United States Confidential communications United States Computers Access control United States Privacy, Right of United States USA Personick, Stewart D. Sonstige oth Patterson, Cynthia A. Sonstige oth National Research Council (U.S.) Committee on Critical Information Infrastructure Protection and the Law Sonstige oth Erscheint auch als Druckausgabe 0-309-08878-X Erscheint auch als Druckausgabe 978-0-309-08878-7 http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=101975 Aggregator Volltext |
spellingShingle | Critical information infrastructure protection and the law an overview of key issues BUSINESS & ECONOMICS / Workplace Culture bisacsh BUSINESS & ECONOMICS / Corporate Governance bisacsh BUSINESS & ECONOMICS / Leadership bisacsh BUSINESS & ECONOMICS / Organizational Development bisacsh Computer security / Law and legislation fast Computers / Access control fast Confidential communications fast Privacy, Right of fast Privacy / legislation & jurisprudence Information Services Confidentiality / legislation & jurisprudence Führung Recht Wirtschaft Computer security Law and legislation United States Confidential communications United States Computers Access control United States Privacy, Right of United States |
title | Critical information infrastructure protection and the law an overview of key issues |
title_auth | Critical information infrastructure protection and the law an overview of key issues |
title_exact_search | Critical information infrastructure protection and the law an overview of key issues |
title_full | Critical information infrastructure protection and the law an overview of key issues Stewart D. Personick and Cynthia A. Patterson, editors |
title_fullStr | Critical information infrastructure protection and the law an overview of key issues Stewart D. Personick and Cynthia A. Patterson, editors |
title_full_unstemmed | Critical information infrastructure protection and the law an overview of key issues Stewart D. Personick and Cynthia A. Patterson, editors |
title_short | Critical information infrastructure protection and the law |
title_sort | critical information infrastructure protection and the law an overview of key issues |
title_sub | an overview of key issues |
topic | BUSINESS & ECONOMICS / Workplace Culture bisacsh BUSINESS & ECONOMICS / Corporate Governance bisacsh BUSINESS & ECONOMICS / Leadership bisacsh BUSINESS & ECONOMICS / Organizational Development bisacsh Computer security / Law and legislation fast Computers / Access control fast Confidential communications fast Privacy, Right of fast Privacy / legislation & jurisprudence Information Services Confidentiality / legislation & jurisprudence Führung Recht Wirtschaft Computer security Law and legislation United States Confidential communications United States Computers Access control United States Privacy, Right of United States |
topic_facet | BUSINESS & ECONOMICS / Workplace Culture BUSINESS & ECONOMICS / Corporate Governance BUSINESS & ECONOMICS / Leadership BUSINESS & ECONOMICS / Organizational Development Computer security / Law and legislation Computers / Access control Confidential communications Privacy, Right of Privacy / legislation & jurisprudence Information Services Confidentiality / legislation & jurisprudence Führung Recht Wirtschaft Computer security Law and legislation United States Confidential communications United States Computers Access control United States Privacy, Right of United States USA |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=101975 |
work_keys_str_mv | AT personickstewartd criticalinformationinfrastructureprotectionandthelawanoverviewofkeyissues AT pattersoncynthiaa criticalinformationinfrastructureprotectionandthelawanoverviewofkeyissues AT nationalresearchcounciluscommitteeoncriticalinformationinfrastructureprotectionandthelaw criticalinformationinfrastructureprotectionandthelawanoverviewofkeyissues |