Cybersecurity and cyber-information sharing: legal and economic analyses
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
New York
Nova Publishers, Inc.
[2015]
|
Schriftenreihe: | Internet theory, technology and applications
|
Schlagworte: | |
Online-Zugang: | FLA01 |
Beschreibung: | Includes index Vendor-supplied metadata |
Beschreibung: | 1 online resource |
ISBN: | 9781634831383 1634831381 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV045358681 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 181212s2015 |||| o||u| ||||||eng d | ||
020 | |a 9781634831383 |9 978-1-63483-138-3 | ||
020 | |a 1634831381 |9 1-63483-138-1 | ||
035 | |a (ZDB-4-EBU)ocn913742589 | ||
035 | |a (OCoLC)913742589 | ||
035 | |a (DE-599)BVBBV045358681 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 |2 23 | |
245 | 1 | 0 | |a Cybersecurity and cyber-information sharing |b legal and economic analyses |c Julia M. Morgan, editor |
264 | 1 | |a New York |b Nova Publishers, Inc. |c [2015] | |
300 | |a 1 online resource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Internet theory, technology and applications | |
500 | |a Includes index | ||
500 | |a Vendor-supplied metadata | ||
505 | 8 | |a Over the course of the last year, a host of cyberattacks has been perpetrated on a number of high profile American companies. The high profile cyberattacks of 2014 and early 2015 appear to be indicative of a broader trend: the frequency and ferocity of cyberattacks are increasing, posing grave threats to the national interests of the United States. While considerable debate exists with regard to the best strategies for protecting America's various cyber-systems and promoting cybersecurity, one point of general agreement amongst cyber-analysts is the perceived need for enhanced and timely excha | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Data protection |2 fast | |
650 | 4 | |a Computer networks |x Security measures |a Cyberspace |x Security measures |a Data protection | |
700 | 1 | |a Morgan, Julia M. |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Morgan, Julia M. |t Cybersecurity and Cyber-Information Sharing : Legal and Economic Analyses |d Hauppauge : Nova Science Publishers, Inc., 2015 |z 9781634831376 |
912 | |a ZDB-4-EBU | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-030745272 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1023440 |l FLA01 |p ZDB-4-EBU |q FLA_PDA_EBU |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804179190122020864 |
---|---|
any_adam_object | |
author2 | Morgan, Julia M. |
author2_role | edt |
author2_variant | j m m jm jmm |
author_facet | Morgan, Julia M. |
building | Verbundindex |
bvnumber | BV045358681 |
collection | ZDB-4-EBU |
contents | Over the course of the last year, a host of cyberattacks has been perpetrated on a number of high profile American companies. The high profile cyberattacks of 2014 and early 2015 appear to be indicative of a broader trend: the frequency and ferocity of cyberattacks are increasing, posing grave threats to the national interests of the United States. While considerable debate exists with regard to the best strategies for protecting America's various cyber-systems and promoting cybersecurity, one point of general agreement amongst cyber-analysts is the perceived need for enhanced and timely excha |
ctrlnum | (ZDB-4-EBU)ocn913742589 (OCoLC)913742589 (DE-599)BVBBV045358681 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02235nmm a2200409zc 4500</leader><controlfield tag="001">BV045358681</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">181212s2015 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781634831383</subfield><subfield code="9">978-1-63483-138-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1634831381</subfield><subfield code="9">1-63483-138-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-EBU)ocn913742589</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)913742589</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045358681</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cybersecurity and cyber-information sharing</subfield><subfield code="b">legal and economic analyses</subfield><subfield code="c">Julia M. Morgan, editor</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York</subfield><subfield code="b">Nova Publishers, Inc.</subfield><subfield code="c">[2015]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Internet theory, technology and applications</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Vendor-supplied metadata</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Over the course of the last year, a host of cyberattacks has been perpetrated on a number of high profile American companies. The high profile cyberattacks of 2014 and early 2015 appear to be indicative of a broader trend: the frequency and ferocity of cyberattacks are increasing, posing grave threats to the national interests of the United States. While considerable debate exists with regard to the best strategies for protecting America's various cyber-systems and promoting cybersecurity, one point of general agreement amongst cyber-analysts is the perceived need for enhanced and timely excha</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data protection</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="a">Cyberspace</subfield><subfield code="x">Security measures</subfield><subfield code="a">Data protection</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Morgan, Julia M.</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Morgan, Julia M.</subfield><subfield code="t">Cybersecurity and Cyber-Information Sharing : Legal and Economic Analyses</subfield><subfield code="d">Hauppauge : Nova Science Publishers, Inc., 2015</subfield><subfield code="z">9781634831376</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBU</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030745272</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1023440</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-4-EBU</subfield><subfield code="q">FLA_PDA_EBU</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV045358681 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:15:55Z |
institution | BVB |
isbn | 9781634831383 1634831381 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030745272 |
oclc_num | 913742589 |
open_access_boolean | |
physical | 1 online resource |
psigel | ZDB-4-EBU ZDB-4-EBU FLA_PDA_EBU |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Nova Publishers, Inc. |
record_format | marc |
series2 | Internet theory, technology and applications |
spelling | Cybersecurity and cyber-information sharing legal and economic analyses Julia M. Morgan, editor New York Nova Publishers, Inc. [2015] 1 online resource txt rdacontent c rdamedia cr rdacarrier Internet theory, technology and applications Includes index Vendor-supplied metadata Over the course of the last year, a host of cyberattacks has been perpetrated on a number of high profile American companies. The high profile cyberattacks of 2014 and early 2015 appear to be indicative of a broader trend: the frequency and ferocity of cyberattacks are increasing, posing grave threats to the national interests of the United States. While considerable debate exists with regard to the best strategies for protecting America's various cyber-systems and promoting cybersecurity, one point of general agreement amongst cyber-analysts is the perceived need for enhanced and timely excha COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Data protection fast Computer networks Security measures Cyberspace Security measures Data protection Morgan, Julia M. edt Erscheint auch als Druck-Ausgabe Morgan, Julia M. Cybersecurity and Cyber-Information Sharing : Legal and Economic Analyses Hauppauge : Nova Science Publishers, Inc., 2015 9781634831376 |
spellingShingle | Cybersecurity and cyber-information sharing legal and economic analyses Over the course of the last year, a host of cyberattacks has been perpetrated on a number of high profile American companies. The high profile cyberattacks of 2014 and early 2015 appear to be indicative of a broader trend: the frequency and ferocity of cyberattacks are increasing, posing grave threats to the national interests of the United States. While considerable debate exists with regard to the best strategies for protecting America's various cyber-systems and promoting cybersecurity, one point of general agreement amongst cyber-analysts is the perceived need for enhanced and timely excha COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Data protection fast Computer networks Security measures Cyberspace Security measures Data protection |
title | Cybersecurity and cyber-information sharing legal and economic analyses |
title_auth | Cybersecurity and cyber-information sharing legal and economic analyses |
title_exact_search | Cybersecurity and cyber-information sharing legal and economic analyses |
title_full | Cybersecurity and cyber-information sharing legal and economic analyses Julia M. Morgan, editor |
title_fullStr | Cybersecurity and cyber-information sharing legal and economic analyses Julia M. Morgan, editor |
title_full_unstemmed | Cybersecurity and cyber-information sharing legal and economic analyses Julia M. Morgan, editor |
title_short | Cybersecurity and cyber-information sharing |
title_sort | cybersecurity and cyber information sharing legal and economic analyses |
title_sub | legal and economic analyses |
topic | COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Data protection fast Computer networks Security measures Cyberspace Security measures Data protection |
topic_facet | COMPUTERS / Security / General Computer networks / Security measures Data protection Computer networks Security measures Cyberspace Security measures Data protection |
work_keys_str_mv | AT morganjuliam cybersecurityandcyberinformationsharinglegalandeconomicanalyses |