U.S. national cybersecurity :: strategic challenges and opportunities /
Cyber attacks could have a potentially devastating impact on the nation's computer systems and networks, disrupting the operations of government and businesses and the lives of private individuals. Increasingly sophisticated cyber threats have underscored the need to manage and bolster the cybe...
Gespeichert in:
Körperschaften: | , |
---|---|
Weitere Verfasser: | |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
New York :
Nova Publishers,
[2014]
|
Schriftenreihe: | Cryptography, steganography and data security.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Cyber attacks could have a potentially devastating impact on the nation's computer systems and networks, disrupting the operations of government and businesses and the lives of private individuals. Increasingly sophisticated cyber threats have underscored the need to manage and bolster the cybersecurity of key government systems as well as the nation's critical infrastructure. This book identifies challenges faced by the federal government in addressing a strategic approach to cybersecurity, and determines the extent to which the national cybersecurity strategy adheres to desirable characteris. |
Beschreibung: | 1 online resource |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9781633218499 9781633218314 163321849X 1633218317 |
Internformat
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn891142860 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr ||||||||||| | ||
008 | 141204s2014 nyua ob 001 0 eng | ||
010 | |a 2019714117 | ||
040 | |a DLC |b eng |e rda |e pn |c DLC |d N$T |d E7B |d YDXCP |d EBLCP |d DEBSZ |d AGLDB |d OCLCF |d VNS |d VTS |d M8D |d OCLCO |d OCL |d AJS |d OCLCO |d OCLCQ |d OCLCO |d OCLCL | ||
019 | |a 914433505 |a 923676694 |a 928196330 | ||
020 | |a 9781633218499 |q (ebook) | ||
020 | |a 9781633218314 | ||
020 | |a 163321849X |q (electronic bk.) | ||
020 | |a 1633218317 | ||
020 | |a 9781633218499 |q (electronic bk.) | ||
020 | |z 1633218317 | ||
035 | |a (OCoLC)891142860 |z (OCoLC)914433505 |z (OCoLC)923676694 |z (OCoLC)928196330 | ||
043 | |a n-us--- | ||
050 | 0 | 0 | |a HV6773.2 |
072 | 7 | |a POL |x 037000 |2 bisacsh | |
072 | 7 | |a BUS |x 032000 |2 bisacsh | |
072 | 7 | |a SOC |x 000000 |2 bisacsh | |
082 | 7 | |a 363.325 |2 23 | |
049 | |a MAIN | ||
245 | 0 | 0 | |a U.S. national cybersecurity : |b strategic challenges and opportunities / |c Grace Powers, editor. |
246 | 3 | |a United States national cybersecurity | |
264 | 1 | |a New York : |b Nova Publishers, |c [2014] | |
300 | |a 1 online resource | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Cryptography, steganography and data security | |
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Cybersecurity: national strategy, roles, and responsibilities need to be better defined and more effectively implemented / United States Government Accountability Office -- Immediate opportunities for strengthening the nation's cybersecurity / President's Council of Advisors on Science and Technology -- Index. | |
588 | 0 | |a Print version record and CIP data provided by publisher. | |
520 | |a Cyber attacks could have a potentially devastating impact on the nation's computer systems and networks, disrupting the operations of government and businesses and the lives of private individuals. Increasingly sophisticated cyber threats have underscored the need to manage and bolster the cybersecurity of key government systems as well as the nation's critical infrastructure. This book identifies challenges faced by the federal government in addressing a strategic approach to cybersecurity, and determines the extent to which the national cybersecurity strategy adheres to desirable characteris. | ||
650 | 0 | |a Cyberterrorism |z United States |x Prevention. | |
650 | 0 | |a Cyber intelligence (Computer security) |z United States. | |
650 | 0 | |a Internet |x Security measures |x Government policy |z United States. | |
650 | 6 | |a Surveillance des menaces informatiques |z États-Unis. | |
650 | 6 | |a Internet |x Sécurité |x Mesures |x Politique gouvernementale |z États-Unis. | |
650 | 7 | |a POLITICAL SCIENCE |x Political Freedom & Security |x Terrorism. |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS |x Infrastructure. |2 bisacsh | |
650 | 7 | |a SOCIAL SCIENCE |x General. |2 bisacsh | |
650 | 7 | |a Cyberterrorism |x Prevention |2 fast | |
650 | 7 | |a Cyber intelligence (Computer security) |2 fast | |
651 | 7 | |a United States |2 fast |1 https://id.oclc.org/worldcat/entity/E39PBJtxgQXMWqmjMjjwXRHgrq | |
700 | 1 | |a Powers, Grace, |e editor. | |
710 | 1 | 2 | |i Container of (work): |a United States. |b Government Accountability Office. |t Cybersecurity: national strategy, roles, and responsibilities need to be better defined and more effectively implemented. |
710 | 2 | 2 | |i Container of (work): |a President's Council of Advisors on Science and Technology (U.S.). |t Immediate opportunities for strengthening the nation's cybersecurity. |
758 | |i has work: |a U.S. national cybersecurity (Text) |1 https://id.oclc.org/worldcat/entity/E39PCFtKVvvqRtQBgt99Y3F8yd |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |t U.S. national cybersecurity. |d New York : Nova Publishers, [2014] |z 9781633218314 |w (DLC) 2014497080 |
830 | 0 | |a Cryptography, steganography and data security. |0 http://id.loc.gov/authorities/names/no2013133786 | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=844878 |3 Volltext |
938 | |a ProQuest Ebook Central |b EBLB |n EBL2097254 | ||
938 | |a ebrary |b EBRY |n ebr10929376 | ||
938 | |a EBSCOhost |b EBSC |n 844878 | ||
938 | |a YBP Library Services |b YANK |n 12042586 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn891142860 |
---|---|
_version_ | 1816882287282749440 |
adam_text | |
any_adam_object | |
author2 | Powers, Grace |
author2_role | edt |
author2_variant | g p gp |
author_corporate | United States. Government Accountability Office President's Council of Advisors on Science and Technology (U.S.) |
author_corporate_role | |
author_facet | Powers, Grace United States. Government Accountability Office President's Council of Advisors on Science and Technology (U.S.) |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | H - Social Science |
callnumber-label | HV6773 |
callnumber-raw | HV6773.2 |
callnumber-search | HV6773.2 |
callnumber-sort | HV 46773.2 |
callnumber-subject | HV - Social Pathology, Criminology |
collection | ZDB-4-EBA |
contents | Cybersecurity: national strategy, roles, and responsibilities need to be better defined and more effectively implemented / United States Government Accountability Office -- Immediate opportunities for strengthening the nation's cybersecurity / President's Council of Advisors on Science and Technology -- Index. |
ctrlnum | (OCoLC)891142860 |
dewey-full | 363.325 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 363 - Other social problems and services |
dewey-raw | 363.325 |
dewey-search | 363.325 |
dewey-sort | 3363.325 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Soziologie |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04397cam a2200721 i 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn891142860</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr |||||||||||</controlfield><controlfield tag="008">141204s2014 nyua ob 001 0 eng </controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a"> 2019714117</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DLC</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">DLC</subfield><subfield code="d">N$T</subfield><subfield code="d">E7B</subfield><subfield code="d">YDXCP</subfield><subfield code="d">EBLCP</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">AGLDB</subfield><subfield code="d">OCLCF</subfield><subfield code="d">VNS</subfield><subfield code="d">VTS</subfield><subfield code="d">M8D</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCL</subfield><subfield code="d">AJS</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">914433505</subfield><subfield code="a">923676694</subfield><subfield code="a">928196330</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781633218499</subfield><subfield code="q">(ebook)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781633218314</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">163321849X</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1633218317</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781633218499</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1633218317</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)891142860</subfield><subfield code="z">(OCoLC)914433505</subfield><subfield code="z">(OCoLC)923676694</subfield><subfield code="z">(OCoLC)928196330</subfield></datafield><datafield tag="043" ind1=" " ind2=" "><subfield code="a">n-us---</subfield></datafield><datafield tag="050" ind1="0" ind2="0"><subfield code="a">HV6773.2</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">POL</subfield><subfield code="x">037000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="x">032000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">SOC</subfield><subfield code="x">000000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">363.325</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">U.S. national cybersecurity :</subfield><subfield code="b">strategic challenges and opportunities /</subfield><subfield code="c">Grace Powers, editor.</subfield></datafield><datafield tag="246" ind1="3" ind2=" "><subfield code="a">United States national cybersecurity</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York :</subfield><subfield code="b">Nova Publishers,</subfield><subfield code="c">[2014]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Cryptography, steganography and data security</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cybersecurity: national strategy, roles, and responsibilities need to be better defined and more effectively implemented / United States Government Accountability Office -- Immediate opportunities for strengthening the nation's cybersecurity / President's Council of Advisors on Science and Technology -- Index.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record and CIP data provided by publisher.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Cyber attacks could have a potentially devastating impact on the nation's computer systems and networks, disrupting the operations of government and businesses and the lives of private individuals. Increasingly sophisticated cyber threats have underscored the need to manage and bolster the cybersecurity of key government systems as well as the nation's critical infrastructure. This book identifies challenges faced by the federal government in addressing a strategic approach to cybersecurity, and determines the extent to which the national cybersecurity strategy adheres to desirable characteris.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberterrorism</subfield><subfield code="z">United States</subfield><subfield code="x">Prevention.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyber intelligence (Computer security)</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet</subfield><subfield code="x">Security measures</subfield><subfield code="x">Government policy</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Surveillance des menaces informatiques</subfield><subfield code="z">États-Unis.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Internet</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures</subfield><subfield code="x">Politique gouvernementale</subfield><subfield code="z">États-Unis.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE</subfield><subfield code="x">Political Freedom & Security</subfield><subfield code="x">Terrorism.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS</subfield><subfield code="x">Infrastructure.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">SOCIAL SCIENCE</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyberterrorism</subfield><subfield code="x">Prevention</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyber intelligence (Computer security)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">United States</subfield><subfield code="2">fast</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PBJtxgQXMWqmjMjjwXRHgrq</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Powers, Grace,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="710" ind1="1" ind2="2"><subfield code="i">Container of (work):</subfield><subfield code="a">United States.</subfield><subfield code="b">Government Accountability Office.</subfield><subfield code="t">Cybersecurity: national strategy, roles, and responsibilities need to be better defined and more effectively implemented.</subfield></datafield><datafield tag="710" ind1="2" ind2="2"><subfield code="i">Container of (work):</subfield><subfield code="a">President's Council of Advisors on Science and Technology (U.S.).</subfield><subfield code="t">Immediate opportunities for strengthening the nation's cybersecurity.</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">U.S. national cybersecurity (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCFtKVvvqRtQBgt99Y3F8yd</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="t">U.S. national cybersecurity.</subfield><subfield code="d">New York : Nova Publishers, [2014]</subfield><subfield code="z">9781633218314</subfield><subfield code="w">(DLC) 2014497080</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Cryptography, steganography and data security.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2013133786</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=844878</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest Ebook Central</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL2097254</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10929376</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">844878</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">12042586</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
geographic | United States fast https://id.oclc.org/worldcat/entity/E39PBJtxgQXMWqmjMjjwXRHgrq |
geographic_facet | United States |
id | ZDB-4-EBA-ocn891142860 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:26:13Z |
institution | BVB |
isbn | 9781633218499 9781633218314 163321849X 1633218317 |
language | English |
lccn | 2019714117 |
oclc_num | 891142860 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource |
psigel | ZDB-4-EBA |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Nova Publishers, |
record_format | marc |
series | Cryptography, steganography and data security. |
series2 | Cryptography, steganography and data security |
spelling | U.S. national cybersecurity : strategic challenges and opportunities / Grace Powers, editor. United States national cybersecurity New York : Nova Publishers, [2014] 1 online resource text txt rdacontent computer c rdamedia online resource cr rdacarrier Cryptography, steganography and data security Includes bibliographical references and index. Cybersecurity: national strategy, roles, and responsibilities need to be better defined and more effectively implemented / United States Government Accountability Office -- Immediate opportunities for strengthening the nation's cybersecurity / President's Council of Advisors on Science and Technology -- Index. Print version record and CIP data provided by publisher. Cyber attacks could have a potentially devastating impact on the nation's computer systems and networks, disrupting the operations of government and businesses and the lives of private individuals. Increasingly sophisticated cyber threats have underscored the need to manage and bolster the cybersecurity of key government systems as well as the nation's critical infrastructure. This book identifies challenges faced by the federal government in addressing a strategic approach to cybersecurity, and determines the extent to which the national cybersecurity strategy adheres to desirable characteris. Cyberterrorism United States Prevention. Cyber intelligence (Computer security) United States. Internet Security measures Government policy United States. Surveillance des menaces informatiques États-Unis. Internet Sécurité Mesures Politique gouvernementale États-Unis. POLITICAL SCIENCE Political Freedom & Security Terrorism. bisacsh BUSINESS & ECONOMICS Infrastructure. bisacsh SOCIAL SCIENCE General. bisacsh Cyberterrorism Prevention fast Cyber intelligence (Computer security) fast United States fast https://id.oclc.org/worldcat/entity/E39PBJtxgQXMWqmjMjjwXRHgrq Powers, Grace, editor. Container of (work): United States. Government Accountability Office. Cybersecurity: national strategy, roles, and responsibilities need to be better defined and more effectively implemented. Container of (work): President's Council of Advisors on Science and Technology (U.S.). Immediate opportunities for strengthening the nation's cybersecurity. has work: U.S. national cybersecurity (Text) https://id.oclc.org/worldcat/entity/E39PCFtKVvvqRtQBgt99Y3F8yd https://id.oclc.org/worldcat/ontology/hasWork Print version: U.S. national cybersecurity. New York : Nova Publishers, [2014] 9781633218314 (DLC) 2014497080 Cryptography, steganography and data security. http://id.loc.gov/authorities/names/no2013133786 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=844878 Volltext |
spellingShingle | U.S. national cybersecurity : strategic challenges and opportunities / Cryptography, steganography and data security. Cybersecurity: national strategy, roles, and responsibilities need to be better defined and more effectively implemented / United States Government Accountability Office -- Immediate opportunities for strengthening the nation's cybersecurity / President's Council of Advisors on Science and Technology -- Index. Cyberterrorism United States Prevention. Cyber intelligence (Computer security) United States. Internet Security measures Government policy United States. Surveillance des menaces informatiques États-Unis. Internet Sécurité Mesures Politique gouvernementale États-Unis. POLITICAL SCIENCE Political Freedom & Security Terrorism. bisacsh BUSINESS & ECONOMICS Infrastructure. bisacsh SOCIAL SCIENCE General. bisacsh Cyberterrorism Prevention fast Cyber intelligence (Computer security) fast |
title | U.S. national cybersecurity : strategic challenges and opportunities / |
title_alt | United States national cybersecurity Cybersecurity: national strategy, roles, and responsibilities need to be better defined and more effectively implemented. Immediate opportunities for strengthening the nation's cybersecurity. |
title_auth | U.S. national cybersecurity : strategic challenges and opportunities / |
title_exact_search | U.S. national cybersecurity : strategic challenges and opportunities / |
title_full | U.S. national cybersecurity : strategic challenges and opportunities / Grace Powers, editor. |
title_fullStr | U.S. national cybersecurity : strategic challenges and opportunities / Grace Powers, editor. |
title_full_unstemmed | U.S. national cybersecurity : strategic challenges and opportunities / Grace Powers, editor. |
title_short | U.S. national cybersecurity : |
title_sort | u s national cybersecurity strategic challenges and opportunities |
title_sub | strategic challenges and opportunities / |
topic | Cyberterrorism United States Prevention. Cyber intelligence (Computer security) United States. Internet Security measures Government policy United States. Surveillance des menaces informatiques États-Unis. Internet Sécurité Mesures Politique gouvernementale États-Unis. POLITICAL SCIENCE Political Freedom & Security Terrorism. bisacsh BUSINESS & ECONOMICS Infrastructure. bisacsh SOCIAL SCIENCE General. bisacsh Cyberterrorism Prevention fast Cyber intelligence (Computer security) fast |
topic_facet | Cyberterrorism United States Prevention. Cyber intelligence (Computer security) United States. Internet Security measures Government policy United States. Surveillance des menaces informatiques États-Unis. Internet Sécurité Mesures Politique gouvernementale États-Unis. POLITICAL SCIENCE Political Freedom & Security Terrorism. BUSINESS & ECONOMICS Infrastructure. SOCIAL SCIENCE General. Cyberterrorism Prevention Cyber intelligence (Computer security) United States |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=844878 |
work_keys_str_mv | AT powersgrace usnationalcybersecuritystrategicchallengesandopportunities AT unitedstatesgovernmentaccountabilityoffice usnationalcybersecuritystrategicchallengesandopportunities AT presidentscouncilofadvisorsonscienceandtechnologyus usnationalcybersecuritystrategicchallengesandopportunities AT powersgrace unitedstatesnationalcybersecurity AT unitedstatesgovernmentaccountabilityoffice unitedstatesnationalcybersecurity AT presidentscouncilofadvisorsonscienceandtechnologyus unitedstatesnationalcybersecurity |