H4cker5 wanted :: an examination of the cybersecurity labor market /
The perceived shortage of cybersecurity professionals working on national security may endanger the nation's networks and be a disadvantage in cyberspace conflict. RAND examined the cybersecurity labor market, especially in regard to national defense. Analysis suggests market forces and governm...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Körperschaft: | |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
[Santa Monica, California] :
RAND Corporation,
[2014]
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | The perceived shortage of cybersecurity professionals working on national security may endanger the nation's networks and be a disadvantage in cyberspace conflict. RAND examined the cybersecurity labor market, especially in regard to national defense. Analysis suggests market forces and government programs will draw more workers into the profession in time, and steps taken today would not bear fruit for another five to ten years. |
Beschreibung: | "RAND National Security Research Division." "RR-430"--Page 4 of cover |
Beschreibung: | 1 online resource (xxi, 84 pages) |
Bibliographie: | Includes bibliographical references. |
ISBN: | 9780833085030 0833085034 9780833085016 0833085018 083308500X 9780833085009 |
Internformat
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn881418305 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 140613s2014 cau ob 000 0 eng | ||
010 | |a 2014023419 | ||
040 | |a DLC |b eng |e rda |e pn |c DLC |d YDX |d EBLCP |d N$T |d YDXCP |d MHW |d DEBSZ |d TEFOD |d CUI |d JSTOR |d NUI |d CUS |d COO |d AGLDB |d ZCU |d MERUC |d LND |d OCLCA |d NJR |d VFL |d JBG |d LOA |d ICG |d OCLCF |d VNS |d U3W |d OCLCQ |d VTS |d ICN |d CEF |d VT2 |d EZ9 |d AU@ |d ERL |d OCLCQ |d WYU |d YOU |d STF |d DKC |d CNTRU |d OCLCQ |d NJT |d UX1 |d OCLCQ |d OCLCO |d OCL |d OCLCQ |d OCLCO |d OCLCL |d UEJ |d OCLCO |d OCLCQ | ||
019 | |a 957735460 |a 958081487 |a 959031507 |a 1008950262 |a 1044484683 |a 1055346083 |a 1081242913 |a 1101716941 |a 1115073789 |a 1228606178 | ||
020 | |a 9780833085030 |q (electronic book) | ||
020 | |a 0833085034 |q (electronic book) | ||
020 | |a 9780833085016 |q (electronic book) | ||
020 | |a 0833085018 |q (electronic book) | ||
020 | |a 083308500X | ||
020 | |a 9780833085009 | ||
020 | |z 9780833085023 | ||
020 | |z 0833085026 | ||
020 | |z 9780833085009 | ||
027 | |a RAND/RR-430 | ||
035 | |a (OCoLC)881418305 |z (OCoLC)957735460 |z (OCoLC)958081487 |z (OCoLC)959031507 |z (OCoLC)1008950262 |z (OCoLC)1044484683 |z (OCoLC)1055346083 |z (OCoLC)1081242913 |z (OCoLC)1101716941 |z (OCoLC)1115073789 |z (OCoLC)1228606178 | ||
037 | |a F29EC15D-95F0-45F4-8BBB-713CE711D1CB |b OverDrive, Inc. |n http://www.overdrive.com | ||
037 | |a 22573/ctt72gtt7 |b JSTOR | ||
042 | |a pcc | ||
043 | |a n-us--- | ||
050 | 1 | 0 | |a HV6773 |b .L53 2014 |
072 | 7 | |a BUS |x 038000 |2 bisacsh | |
072 | 7 | |a POL |x 013000 |2 bisacsh | |
072 | 7 | |a POL035000 |2 bisacsh | |
072 | 7 | |a POL012000 |2 bisacsh | |
072 | 7 | |a COM060040 |2 bisacsh | |
082 | 7 | |a 331.7/610058 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Libicki, Martin C., |e author. |1 https://id.oclc.org/worldcat/entity/E39PBJwRP4m6y8fdJYCkrDVwG3 |0 http://id.loc.gov/authorities/names/n88127433 | |
245 | 1 | 0 | |a H4cker5 wanted : |b an examination of the cybersecurity labor market / |c Martin C. Libicki, David Senty, Julia Pollak. |
246 | 3 | |a Hackers wanted | |
264 | 1 | |a [Santa Monica, California] : |b RAND Corporation, |c [2014] | |
300 | |a 1 online resource (xxi, 84 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a text file | ||
347 | |b PDF | ||
500 | |a "RAND National Security Research Division." | ||
500 | |a "RR-430"--Page 4 of cover | ||
504 | |a Includes bibliographical references. | ||
520 | |a The perceived shortage of cybersecurity professionals working on national security may endanger the nation's networks and be a disadvantage in cyberspace conflict. RAND examined the cybersecurity labor market, especially in regard to national defense. Analysis suggests market forces and government programs will draw more workers into the profession in time, and steps taken today would not bear fruit for another five to ten years. | ||
505 | 0 | |a Why has demand risen sharply? -- What others have observed -- Findings from interviews and statistics -- The economics of the cybersecurity labor market -- Upper-tier cybersecurity professionals and policy options -- Conclusions. | |
588 | 0 | |a Online resource; title from digital title page (viewed on July 13, 2016). | |
650 | 0 | |a Computer crimes |x Prevention. | |
650 | 0 | |a Cyber intelligence (Computer security) |0 http://id.loc.gov/authorities/subjects/sh2011005959 | |
650 | 0 | |a Cyberspace |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh2021002499 | |
650 | 0 | |a Professions |x Supply and demand. |0 http://id.loc.gov/authorities/subjects/sh85107274 | |
650 | 0 | |a Hackers. |0 http://id.loc.gov/authorities/subjects/sh94005931 | |
650 | 6 | |a Surveillance des menaces informatiques. | |
650 | 6 | |a Professions libérales |x Offre et demande. | |
650 | 6 | |a Pirates informatiques. | |
650 | 7 | |a BUSINESS & ECONOMICS |x Labor. |2 bisacsh | |
650 | 7 | |a POLITICAL SCIENCE |x Labor & Industrial Relations. |2 bisacsh | |
650 | 7 | |a POLITICAL SCIENCE |x Political Freedom. |2 bisacsh | |
650 | 7 | |a Cyberspace |x Security measures |2 fast | |
650 | 7 | |a Computer crimes |x Prevention |2 fast | |
650 | 7 | |a Cyber intelligence (Computer security) |2 fast | |
650 | 7 | |a Hackers |2 fast | |
650 | 7 | |a Professions |x Supply and demand |2 fast | |
700 | 1 | |a Senty, David, |e author. |1 https://id.oclc.org/worldcat/entity/E39PCjFvxxtF9h7BdtYkdB3hHC |0 http://id.loc.gov/authorities/names/n2014032057 | |
700 | 1 | |a Pollak, Julia, |e author. |1 https://id.oclc.org/worldcat/entity/E39PCjGqRcHvywjWqqGkrB9Gpd |0 http://id.loc.gov/authorities/names/n2014032055 | |
710 | 2 | |a Rand Corporation. |b National Security Research Division. |0 http://id.loc.gov/authorities/names/no95044143 | |
758 | |i has work: |a H4cker5 wanted (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGPhVKTGKfYCHG4r8pVPV3 |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Libicki, Martin C. |t H4cker5 wanted. |d Santa Monica, CA : RAND, [2014] |z 9780833085009 |w (DLC) 2014021897 |w (OCoLC)891144718 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=816525 |3 Volltext |
938 | |a ProQuest Ebook Central |b EBLB |n EBL1746758 | ||
938 | |a EBSCOhost |b EBSC |n 816525 | ||
938 | |a YBP Library Services |b YANK |n 12001874 | ||
938 | |a YBP Library Services |b YANK |n 12006144 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn881418305 |
---|---|
_version_ | 1816882275607904256 |
adam_text | |
any_adam_object | |
author | Libicki, Martin C. Senty, David Pollak, Julia |
author_GND | http://id.loc.gov/authorities/names/n88127433 http://id.loc.gov/authorities/names/n2014032057 http://id.loc.gov/authorities/names/n2014032055 |
author_corporate | Rand Corporation. National Security Research Division |
author_corporate_role | |
author_facet | Libicki, Martin C. Senty, David Pollak, Julia Rand Corporation. National Security Research Division |
author_role | aut aut aut |
author_sort | Libicki, Martin C. |
author_variant | m c l mc mcl d s ds j p jp |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | H - Social Science |
callnumber-label | HV6773 |
callnumber-raw | HV6773 .L53 2014 |
callnumber-search | HV6773 .L53 2014 |
callnumber-sort | HV 46773 L53 42014 |
callnumber-subject | HV - Social Pathology, Criminology |
collection | ZDB-4-EBA |
contents | Why has demand risen sharply? -- What others have observed -- Findings from interviews and statistics -- The economics of the cybersecurity labor market -- Upper-tier cybersecurity professionals and policy options -- Conclusions. |
ctrlnum | (OCoLC)881418305 |
dewey-full | 331.7/610058 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 331 - Labor economics |
dewey-raw | 331.7/610058 |
dewey-search | 331.7/610058 |
dewey-sort | 3331.7 6610058 |
dewey-tens | 330 - Economics |
discipline | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05368cam a2200925 i 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn881418305</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">140613s2014 cau ob 000 0 eng </controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a"> 2014023419</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DLC</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">DLC</subfield><subfield code="d">YDX</subfield><subfield code="d">EBLCP</subfield><subfield code="d">N$T</subfield><subfield code="d">YDXCP</subfield><subfield code="d">MHW</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">TEFOD</subfield><subfield code="d">CUI</subfield><subfield code="d">JSTOR</subfield><subfield code="d">NUI</subfield><subfield code="d">CUS</subfield><subfield code="d">COO</subfield><subfield code="d">AGLDB</subfield><subfield code="d">ZCU</subfield><subfield code="d">MERUC</subfield><subfield code="d">LND</subfield><subfield code="d">OCLCA</subfield><subfield code="d">NJR</subfield><subfield code="d">VFL</subfield><subfield code="d">JBG</subfield><subfield code="d">LOA</subfield><subfield code="d">ICG</subfield><subfield code="d">OCLCF</subfield><subfield code="d">VNS</subfield><subfield code="d">U3W</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VTS</subfield><subfield code="d">ICN</subfield><subfield code="d">CEF</subfield><subfield code="d">VT2</subfield><subfield code="d">EZ9</subfield><subfield code="d">AU@</subfield><subfield code="d">ERL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">WYU</subfield><subfield code="d">YOU</subfield><subfield code="d">STF</subfield><subfield code="d">DKC</subfield><subfield code="d">CNTRU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">NJT</subfield><subfield code="d">UX1</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">UEJ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">957735460</subfield><subfield code="a">958081487</subfield><subfield code="a">959031507</subfield><subfield code="a">1008950262</subfield><subfield code="a">1044484683</subfield><subfield code="a">1055346083</subfield><subfield code="a">1081242913</subfield><subfield code="a">1101716941</subfield><subfield code="a">1115073789</subfield><subfield code="a">1228606178</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780833085030</subfield><subfield code="q">(electronic book)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0833085034</subfield><subfield code="q">(electronic book)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780833085016</subfield><subfield code="q">(electronic book)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0833085018</subfield><subfield code="q">(electronic book)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">083308500X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780833085009</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9780833085023</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">0833085026</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9780833085009</subfield></datafield><datafield tag="027" ind1=" " ind2=" "><subfield code="a">RAND/RR-430</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)881418305</subfield><subfield code="z">(OCoLC)957735460</subfield><subfield code="z">(OCoLC)958081487</subfield><subfield code="z">(OCoLC)959031507</subfield><subfield code="z">(OCoLC)1008950262</subfield><subfield code="z">(OCoLC)1044484683</subfield><subfield code="z">(OCoLC)1055346083</subfield><subfield code="z">(OCoLC)1081242913</subfield><subfield code="z">(OCoLC)1101716941</subfield><subfield code="z">(OCoLC)1115073789</subfield><subfield code="z">(OCoLC)1228606178</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">F29EC15D-95F0-45F4-8BBB-713CE711D1CB</subfield><subfield code="b">OverDrive, Inc.</subfield><subfield code="n">http://www.overdrive.com</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">22573/ctt72gtt7</subfield><subfield code="b">JSTOR</subfield></datafield><datafield tag="042" ind1=" " ind2=" "><subfield code="a">pcc</subfield></datafield><datafield tag="043" ind1=" " ind2=" "><subfield code="a">n-us---</subfield></datafield><datafield tag="050" ind1="1" ind2="0"><subfield code="a">HV6773</subfield><subfield code="b">.L53 2014</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="x">038000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">POL</subfield><subfield code="x">013000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">POL035000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">POL012000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">331.7/610058</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Libicki, Martin C.,</subfield><subfield code="e">author.</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PBJwRP4m6y8fdJYCkrDVwG3</subfield><subfield code="0">http://id.loc.gov/authorities/names/n88127433</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">H4cker5 wanted :</subfield><subfield code="b">an examination of the cybersecurity labor market /</subfield><subfield code="c">Martin C. Libicki, David Senty, Julia Pollak.</subfield></datafield><datafield tag="246" ind1="3" ind2=" "><subfield code="a">Hackers wanted</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Santa Monica, California] :</subfield><subfield code="b">RAND Corporation,</subfield><subfield code="c">[2014]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxi, 84 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="b">PDF</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"RAND National Security Research Division."</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"RR-430"--Page 4 of cover</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The perceived shortage of cybersecurity professionals working on national security may endanger the nation's networks and be a disadvantage in cyberspace conflict. RAND examined the cybersecurity labor market, especially in regard to national defense. Analysis suggests market forces and government programs will draw more workers into the profession in time, and steps taken today would not bear fruit for another five to ten years.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Why has demand risen sharply? -- What others have observed -- Findings from interviews and statistics -- The economics of the cybersecurity labor market -- Upper-tier cybersecurity professionals and policy options -- Conclusions.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Online resource; title from digital title page (viewed on July 13, 2016).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyber intelligence (Computer security)</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2011005959</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberspace</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2021002499</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Professions</subfield><subfield code="x">Supply and demand.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85107274</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Hackers.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94005931</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Surveillance des menaces informatiques.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Professions libérales</subfield><subfield code="x">Offre et demande.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Pirates informatiques.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS</subfield><subfield code="x">Labor.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE</subfield><subfield code="x">Labor & Industrial Relations.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE</subfield><subfield code="x">Political Freedom.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyberspace</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyber intelligence (Computer security)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Hackers</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Professions</subfield><subfield code="x">Supply and demand</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Senty, David,</subfield><subfield code="e">author.</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjFvxxtF9h7BdtYkdB3hHC</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2014032057</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Pollak, Julia,</subfield><subfield code="e">author.</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjGqRcHvywjWqqGkrB9Gpd</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2014032055</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Rand Corporation.</subfield><subfield code="b">National Security Research Division.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no95044143</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">H4cker5 wanted (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCGPhVKTGKfYCHG4r8pVPV3</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Libicki, Martin C.</subfield><subfield code="t">H4cker5 wanted.</subfield><subfield code="d">Santa Monica, CA : RAND, [2014]</subfield><subfield code="z">9780833085009</subfield><subfield code="w">(DLC) 2014021897</subfield><subfield code="w">(OCoLC)891144718</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=816525</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest Ebook Central</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL1746758</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">816525</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">12001874</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">12006144</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn881418305 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:26:02Z |
institution | BVB |
institution_GND | http://id.loc.gov/authorities/names/no95044143 |
isbn | 9780833085030 0833085034 9780833085016 0833085018 083308500X 9780833085009 |
language | English |
lccn | 2014023419 |
oclc_num | 881418305 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xxi, 84 pages) |
psigel | ZDB-4-EBA |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | RAND Corporation, |
record_format | marc |
spelling | Libicki, Martin C., author. https://id.oclc.org/worldcat/entity/E39PBJwRP4m6y8fdJYCkrDVwG3 http://id.loc.gov/authorities/names/n88127433 H4cker5 wanted : an examination of the cybersecurity labor market / Martin C. Libicki, David Senty, Julia Pollak. Hackers wanted [Santa Monica, California] : RAND Corporation, [2014] 1 online resource (xxi, 84 pages) text txt rdacontent computer c rdamedia online resource cr rdacarrier text file "RAND National Security Research Division." "RR-430"--Page 4 of cover Includes bibliographical references. The perceived shortage of cybersecurity professionals working on national security may endanger the nation's networks and be a disadvantage in cyberspace conflict. RAND examined the cybersecurity labor market, especially in regard to national defense. Analysis suggests market forces and government programs will draw more workers into the profession in time, and steps taken today would not bear fruit for another five to ten years. Why has demand risen sharply? -- What others have observed -- Findings from interviews and statistics -- The economics of the cybersecurity labor market -- Upper-tier cybersecurity professionals and policy options -- Conclusions. Online resource; title from digital title page (viewed on July 13, 2016). Computer crimes Prevention. Cyber intelligence (Computer security) http://id.loc.gov/authorities/subjects/sh2011005959 Cyberspace Security measures. http://id.loc.gov/authorities/subjects/sh2021002499 Professions Supply and demand. http://id.loc.gov/authorities/subjects/sh85107274 Hackers. http://id.loc.gov/authorities/subjects/sh94005931 Surveillance des menaces informatiques. Professions libérales Offre et demande. Pirates informatiques. BUSINESS & ECONOMICS Labor. bisacsh POLITICAL SCIENCE Labor & Industrial Relations. bisacsh POLITICAL SCIENCE Political Freedom. bisacsh Cyberspace Security measures fast Computer crimes Prevention fast Cyber intelligence (Computer security) fast Hackers fast Professions Supply and demand fast Senty, David, author. https://id.oclc.org/worldcat/entity/E39PCjFvxxtF9h7BdtYkdB3hHC http://id.loc.gov/authorities/names/n2014032057 Pollak, Julia, author. https://id.oclc.org/worldcat/entity/E39PCjGqRcHvywjWqqGkrB9Gpd http://id.loc.gov/authorities/names/n2014032055 Rand Corporation. National Security Research Division. http://id.loc.gov/authorities/names/no95044143 has work: H4cker5 wanted (Text) https://id.oclc.org/worldcat/entity/E39PCGPhVKTGKfYCHG4r8pVPV3 https://id.oclc.org/worldcat/ontology/hasWork Print version: Libicki, Martin C. H4cker5 wanted. Santa Monica, CA : RAND, [2014] 9780833085009 (DLC) 2014021897 (OCoLC)891144718 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=816525 Volltext |
spellingShingle | Libicki, Martin C. Senty, David Pollak, Julia H4cker5 wanted : an examination of the cybersecurity labor market / Why has demand risen sharply? -- What others have observed -- Findings from interviews and statistics -- The economics of the cybersecurity labor market -- Upper-tier cybersecurity professionals and policy options -- Conclusions. Computer crimes Prevention. Cyber intelligence (Computer security) http://id.loc.gov/authorities/subjects/sh2011005959 Cyberspace Security measures. http://id.loc.gov/authorities/subjects/sh2021002499 Professions Supply and demand. http://id.loc.gov/authorities/subjects/sh85107274 Hackers. http://id.loc.gov/authorities/subjects/sh94005931 Surveillance des menaces informatiques. Professions libérales Offre et demande. Pirates informatiques. BUSINESS & ECONOMICS Labor. bisacsh POLITICAL SCIENCE Labor & Industrial Relations. bisacsh POLITICAL SCIENCE Political Freedom. bisacsh Cyberspace Security measures fast Computer crimes Prevention fast Cyber intelligence (Computer security) fast Hackers fast Professions Supply and demand fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh2011005959 http://id.loc.gov/authorities/subjects/sh2021002499 http://id.loc.gov/authorities/subjects/sh85107274 http://id.loc.gov/authorities/subjects/sh94005931 |
title | H4cker5 wanted : an examination of the cybersecurity labor market / |
title_alt | Hackers wanted |
title_auth | H4cker5 wanted : an examination of the cybersecurity labor market / |
title_exact_search | H4cker5 wanted : an examination of the cybersecurity labor market / |
title_full | H4cker5 wanted : an examination of the cybersecurity labor market / Martin C. Libicki, David Senty, Julia Pollak. |
title_fullStr | H4cker5 wanted : an examination of the cybersecurity labor market / Martin C. Libicki, David Senty, Julia Pollak. |
title_full_unstemmed | H4cker5 wanted : an examination of the cybersecurity labor market / Martin C. Libicki, David Senty, Julia Pollak. |
title_short | H4cker5 wanted : |
title_sort | h4cker5 wanted an examination of the cybersecurity labor market |
title_sub | an examination of the cybersecurity labor market / |
topic | Computer crimes Prevention. Cyber intelligence (Computer security) http://id.loc.gov/authorities/subjects/sh2011005959 Cyberspace Security measures. http://id.loc.gov/authorities/subjects/sh2021002499 Professions Supply and demand. http://id.loc.gov/authorities/subjects/sh85107274 Hackers. http://id.loc.gov/authorities/subjects/sh94005931 Surveillance des menaces informatiques. Professions libérales Offre et demande. Pirates informatiques. BUSINESS & ECONOMICS Labor. bisacsh POLITICAL SCIENCE Labor & Industrial Relations. bisacsh POLITICAL SCIENCE Political Freedom. bisacsh Cyberspace Security measures fast Computer crimes Prevention fast Cyber intelligence (Computer security) fast Hackers fast Professions Supply and demand fast |
topic_facet | Computer crimes Prevention. Cyber intelligence (Computer security) Cyberspace Security measures. Professions Supply and demand. Hackers. Surveillance des menaces informatiques. Professions libérales Offre et demande. Pirates informatiques. BUSINESS & ECONOMICS Labor. POLITICAL SCIENCE Labor & Industrial Relations. POLITICAL SCIENCE Political Freedom. Cyberspace Security measures Computer crimes Prevention Hackers Professions Supply and demand |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=816525 |
work_keys_str_mv | AT libickimartinc h4cker5wantedanexaminationofthecybersecuritylabormarket AT sentydavid h4cker5wantedanexaminationofthecybersecuritylabormarket AT pollakjulia h4cker5wantedanexaminationofthecybersecuritylabormarket AT randcorporationnationalsecurityresearchdivision h4cker5wantedanexaminationofthecybersecuritylabormarket AT libickimartinc hackerswanted AT sentydavid hackerswanted AT pollakjulia hackerswanted AT randcorporationnationalsecurityresearchdivision hackerswanted |