Cyber security and resiliency policy framework /:
Cyberspace is a ubiquitous realm interconnecting every aspect of modern society, enabled by broadband networks and wireless signals around us, existing within local area networks in our schools, hospitals and businesses, and within the massive grids that power most countries. Securing cyberspace to...
Gespeichert in:
Körperschaften: | , |
---|---|
Weitere Verfasser: | , , |
Format: | Elektronisch Tagungsbericht E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam :
IOS Press,
2014.
|
Schriftenreihe: | NATO science for peace and security series. Information and communication security ;
vol. 38. |
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Cyberspace is a ubiquitous realm interconnecting every aspect of modern society, enabled by broadband networks and wireless signals around us, existing within local area networks in our schools, hospitals and businesses, and within the massive grids that power most countries. Securing cyberspace to ensure the continuation of growing economies and to protect a nation's way of life is a major concern for governments around the globe. This book contains papers presented at the NATO Advanced Research Workshop (ARW) entitled Best Practices and Innovative Approaches to Develop Cyber Security and Res. |
Beschreibung: | "Proceedings of the NATO Advanced Research Workshop on Best Practices and Innovative Approaches to Develop Cyber Security and Resiliency Policy Framework, Ohrid, Former Yugoslav Republic of Macedonia, June 10-12, 2013." International conference proceedings. Includes indexes. |
Beschreibung: | 1 online resource |
Bibliographie: | Includes bibliographical references at the end of each chapters and indexes. |
ISBN: | 9781614994466 1614994463 132221123X 9781322211237 1614994455 9781614994459 |
Internformat
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn895026034 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 141112s2014 ne ob 101 0 eng d | ||
040 | |a IOSPR |b eng |e rda |e pn |c IOSPR |d YDXCP |d OCLCQ |d IDEBK |d N$T |d E7B |d OCLCF |d OCLCO |d OCL |d OCLCO |d OCLCQ |d OCLCO |d EBLCP |d OCLCO |d OCLCQ |d OCLCO |d DEBSZ |d COCUF |d AGLDB |d MOR |d CCO |d PIFAG |d ZCU |d MERUC |d OCLCQ |d OCLCA |d U3W |d STF |d VTS |d ICG |d VT2 |d REC |d OCLCQ |d WYU |d JBG |d TKN |d OCLCA |d DKC |d AU@ |d OCLCQ |d K6U |d OCLCO |d OCLCQ |d OCLCO |d OCLCL | ||
019 | |a 893652459 |a 923709734 |a 1055356333 |a 1066455837 |a 1081291358 |a 1091240424 | ||
020 | |a 9781614994466 |q (electronic bk.) | ||
020 | |a 1614994463 |q (electronic bk.) | ||
020 | |a 132221123X | ||
020 | |a 9781322211237 | ||
020 | |a 1614994455 | ||
020 | |a 9781614994459 | ||
020 | |z 9781614994459 | ||
035 | |a (OCoLC)895026034 |z (OCoLC)893652459 |z (OCoLC)923709734 |z (OCoLC)1055356333 |z (OCoLC)1066455837 |z (OCoLC)1081291358 |z (OCoLC)1091240424 | ||
037 | |a 9781614994466 |b IOS Press |n http://www.iospress.nl | ||
050 | 4 | |a TK5105.59 | |
072 | 7 | |a COM |x COM053000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 23 | |
049 | |a MAIN | ||
111 | 2 | |a NATO Advanced Research Workshop on Best Practices and Innovative Approaches to Develop Cyber Security and Resiliency Policy Framework |d (2013 : |c Ohrid, North Macedonia) | |
245 | 1 | 0 | |a Cyber security and resiliency policy framework / |c edited by Ashok Vaseashta, Philip Susmann and Eric Braman. |
264 | 1 | |a Amsterdam : |b IOS Press, |c 2014. | |
300 | |a 1 online resource | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a NATO Science for Peace and Security Series - D: Information and Communication Security ; |v vol. 38 | |
500 | |a "Proceedings of the NATO Advanced Research Workshop on Best Practices and Innovative Approaches to Develop Cyber Security and Resiliency Policy Framework, Ohrid, Former Yugoslav Republic of Macedonia, June 10-12, 2013." | ||
500 | |a International conference proceedings. | ||
500 | |a Includes indexes. | ||
588 | 0 | |a Online resource; title from PDF title page (IOS Press, viewed November 12, 2014). | |
505 | 0 | |a ""CYBER SECURITY AND RESILIENCY POLICY FRAMEWORK""; ""Preface""; ""Meet the Authors""; ""Contents""; ""Cyber Security � Threat Scenarios, Policy Framework and Cyber Wargames""; ""E-Government 3 Web Security Issues: Who, What, When?""; ""Cyber Security Issues of Telecommunication Infrastructure""; ""Security Issues for Mobile Devices""; ""Strengthening Cyber Security Policy by Means of End-Users Dedicated Training""; ""Toward Effective National Cyber Security Strategy: The Path Forward For Macedonia"" | |
505 | 8 | |a Overview of the Current Situation in Bosnia and Herzegovina with Focus on Cyber Security and Fighting Cyber-Crime by Establishment of BIH CERT BodyTurkey's Approaches on Cyber Security Policy Framework -- Cyber Security Challenges in Smart Homes -- Development of Defense-Oriented Application Software under Fire: The Case of Israel -- Education as a Long-Term Strategy for Cyber Security -- Protecting and Preserving Ground Water with Monitoring Systems and Vulnerability Maps -- Subject Index -- Author Index | |
520 | |a Cyberspace is a ubiquitous realm interconnecting every aspect of modern society, enabled by broadband networks and wireless signals around us, existing within local area networks in our schools, hospitals and businesses, and within the massive grids that power most countries. Securing cyberspace to ensure the continuation of growing economies and to protect a nation's way of life is a major concern for governments around the globe. This book contains papers presented at the NATO Advanced Research Workshop (ARW) entitled Best Practices and Innovative Approaches to Develop Cyber Security and Res. | ||
504 | |a Includes bibliographical references at the end of each chapters and indexes. | ||
650 | 0 | |a Computer networks |x Security measures |v Congresses. | |
650 | 0 | |a Internet |x Security measures |v Congresses. | |
650 | 0 | |a Computer crimes |x Prevention |v Congresses. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures |v Congrès. | |
650 | 6 | |a Internet |x Sécurité |x Mesures |v Congrès. | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer crimes |x Prevention |2 fast | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Internet |x Security measures |2 fast | |
655 | 7 | |a Conference papers and proceedings |2 fast | |
700 | 1 | |a Vaseashta, A. |q (Ashok), |e editor. |1 https://id.oclc.org/worldcat/entity/E39PCjFP69WhR37Dkc8xxRhxH3 |0 http://id.loc.gov/authorities/names/nb2005013860 | |
700 | 1 | |a Susmann, Philip, |e editor. |0 http://id.loc.gov/authorities/names/nb2012003192 | |
700 | 1 | |a Braman, Eric, |e editor. |0 http://id.loc.gov/authorities/names/nb2012003191 | |
710 | 2 | |a IOS Press. |0 http://id.loc.gov/authorities/names/no2015091156 | |
758 | |i has work: |a Cyber security and resiliency policy framework (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGbGQVcyBy3b6QD7gjxftq |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Vaseashta, A. |t Cyber Security and Resiliency Policy Framework. |d Burke : IOS Press, ©2014 |z 9781614994459 |
830 | 0 | |a NATO science for peace and security series. |n Sub-series D, |p Information and communication security ; |v vol. 38. |0 http://id.loc.gov/authorities/names/no2007140990 | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=873948 |3 Volltext |
938 | |a ProQuest Ebook Central |b EBLB |n EBL1818046 | ||
938 | |a ebrary |b EBRY |n ebr10955557 | ||
938 | |a EBSCOhost |b EBSC |n 873948 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n cis29978485 | ||
938 | |a YBP Library Services |b YANK |n 12127096 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn895026034 |
---|---|
_version_ | 1816882293496610816 |
adam_text | |
any_adam_object | |
author2 | Vaseashta, A. (Ashok) Susmann, Philip Braman, Eric |
author2_role | edt edt edt |
author2_variant | a v av p s ps e b eb |
author_GND | http://id.loc.gov/authorities/names/nb2005013860 http://id.loc.gov/authorities/names/nb2012003192 http://id.loc.gov/authorities/names/nb2012003191 |
author_corporate | NATO Advanced Research Workshop on Best Practices and Innovative Approaches to Develop Cyber Security and Resiliency Policy Framework Ohrid, North Macedonia IOS Press |
author_corporate_role | |
author_facet | Vaseashta, A. (Ashok) Susmann, Philip Braman, Eric NATO Advanced Research Workshop on Best Practices and Innovative Approaches to Develop Cyber Security and Resiliency Policy Framework Ohrid, North Macedonia IOS Press |
author_sort | NATO Advanced Research Workshop on Best Practices and Innovative Approaches to Develop Cyber Security and Resiliency Policy Framework Ohrid, North Macedonia |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 |
callnumber-search | TK5105.59 |
callnumber-sort | TK 45105.59 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-4-EBA |
contents | ""CYBER SECURITY AND RESILIENCY POLICY FRAMEWORK""; ""Preface""; ""Meet the Authors""; ""Contents""; ""Cyber Security � Threat Scenarios, Policy Framework and Cyber Wargames""; ""E-Government 3 Web Security Issues: Who, What, When?""; ""Cyber Security Issues of Telecommunication Infrastructure""; ""Security Issues for Mobile Devices""; ""Strengthening Cyber Security Policy by Means of End-Users Dedicated Training""; ""Toward Effective National Cyber Security Strategy: The Path Forward For Macedonia"" Overview of the Current Situation in Bosnia and Herzegovina with Focus on Cyber Security and Fighting Cyber-Crime by Establishment of BIH CERT BodyTurkey's Approaches on Cyber Security Policy Framework -- Cyber Security Challenges in Smart Homes -- Development of Defense-Oriented Application Software under Fire: The Case of Israel -- Education as a Long-Term Strategy for Cyber Security -- Protecting and Preserving Ground Water with Monitoring Systems and Vulnerability Maps -- Subject Index -- Author Index |
ctrlnum | (OCoLC)895026034 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05893cam a2200757 i 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn895026034</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">141112s2014 ne ob 101 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">IOSPR</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">IOSPR</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">IDEBK</subfield><subfield code="d">N$T</subfield><subfield code="d">E7B</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCL</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">EBLCP</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">COCUF</subfield><subfield code="d">AGLDB</subfield><subfield code="d">MOR</subfield><subfield code="d">CCO</subfield><subfield code="d">PIFAG</subfield><subfield code="d">ZCU</subfield><subfield code="d">MERUC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCA</subfield><subfield code="d">U3W</subfield><subfield code="d">STF</subfield><subfield code="d">VTS</subfield><subfield code="d">ICG</subfield><subfield code="d">VT2</subfield><subfield code="d">REC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">WYU</subfield><subfield code="d">JBG</subfield><subfield code="d">TKN</subfield><subfield code="d">OCLCA</subfield><subfield code="d">DKC</subfield><subfield code="d">AU@</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">K6U</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">893652459</subfield><subfield code="a">923709734</subfield><subfield code="a">1055356333</subfield><subfield code="a">1066455837</subfield><subfield code="a">1081291358</subfield><subfield code="a">1091240424</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781614994466</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1614994463</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">132221123X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781322211237</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1614994455</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781614994459</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781614994459</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)895026034</subfield><subfield code="z">(OCoLC)893652459</subfield><subfield code="z">(OCoLC)923709734</subfield><subfield code="z">(OCoLC)1055356333</subfield><subfield code="z">(OCoLC)1066455837</subfield><subfield code="z">(OCoLC)1081291358</subfield><subfield code="z">(OCoLC)1091240424</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">9781614994466</subfield><subfield code="b">IOS Press</subfield><subfield code="n">http://www.iospress.nl</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.59</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">COM053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">NATO Advanced Research Workshop on Best Practices and Innovative Approaches to Develop Cyber Security and Resiliency Policy Framework</subfield><subfield code="d">(2013 :</subfield><subfield code="c">Ohrid, North Macedonia)</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber security and resiliency policy framework /</subfield><subfield code="c">edited by Ashok Vaseashta, Philip Susmann and Eric Braman.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam :</subfield><subfield code="b">IOS Press,</subfield><subfield code="c">2014.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">NATO Science for Peace and Security Series - D: Information and Communication Security ;</subfield><subfield code="v">vol. 38</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Proceedings of the NATO Advanced Research Workshop on Best Practices and Innovative Approaches to Develop Cyber Security and Resiliency Policy Framework, Ohrid, Former Yugoslav Republic of Macedonia, June 10-12, 2013."</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">International conference proceedings.</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes indexes.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Online resource; title from PDF title page (IOS Press, viewed November 12, 2014).</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">""CYBER SECURITY AND RESILIENCY POLICY FRAMEWORK""; ""Preface""; ""Meet the Authors""; ""Contents""; ""Cyber Security â€? Threat Scenarios, Policy Framework and Cyber Wargames""; ""E-Government 3 Web Security Issues: Who, What, When?""; ""Cyber Security Issues of Telecommunication Infrastructure""; ""Security Issues for Mobile Devices""; ""Strengthening Cyber Security Policy by Means of End-Users Dedicated Training""; ""Toward Effective National Cyber Security Strategy: The Path Forward For Macedonia""</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Overview of the Current Situation in Bosnia and Herzegovina with Focus on Cyber Security and Fighting Cyber-Crime by Establishment of BIH CERT BodyTurkey's Approaches on Cyber Security Policy Framework -- Cyber Security Challenges in Smart Homes -- Development of Defense-Oriented Application Software under Fire: The Case of Israel -- Education as a Long-Term Strategy for Cyber Security -- Protecting and Preserving Ground Water with Monitoring Systems and Vulnerability Maps -- Subject Index -- Author Index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Cyberspace is a ubiquitous realm interconnecting every aspect of modern society, enabled by broadband networks and wireless signals around us, existing within local area networks in our schools, hospitals and businesses, and within the massive grids that power most countries. Securing cyberspace to ensure the continuation of growing economies and to protect a nation's way of life is a major concern for governments around the globe. This book contains papers presented at the NATO Advanced Research Workshop (ARW) entitled Best Practices and Innovative Approaches to Develop Cyber Security and Res.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references at the end of each chapters and indexes.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="v">Congresses.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet</subfield><subfield code="x">Security measures</subfield><subfield code="v">Congresses.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention</subfield><subfield code="v">Congresses.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures</subfield><subfield code="v">Congrès.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Internet</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures</subfield><subfield code="v">Congrès.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Conference papers and proceedings</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Vaseashta, A.</subfield><subfield code="q">(Ashok),</subfield><subfield code="e">editor.</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjFP69WhR37Dkc8xxRhxH3</subfield><subfield code="0">http://id.loc.gov/authorities/names/nb2005013860</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Susmann, Philip,</subfield><subfield code="e">editor.</subfield><subfield code="0">http://id.loc.gov/authorities/names/nb2012003192</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Braman, Eric,</subfield><subfield code="e">editor.</subfield><subfield code="0">http://id.loc.gov/authorities/names/nb2012003191</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IOS Press.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2015091156</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Cyber security and resiliency policy framework (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCGbGQVcyBy3b6QD7gjxftq</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Vaseashta, A.</subfield><subfield code="t">Cyber Security and Resiliency Policy Framework.</subfield><subfield code="d">Burke : IOS Press, ©2014</subfield><subfield code="z">9781614994459</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">NATO science for peace and security series.</subfield><subfield code="n">Sub-series D,</subfield><subfield code="p">Information and communication security ;</subfield><subfield code="v">vol. 38.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2007140990</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=873948</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest Ebook Central</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL1818046</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10955557</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">873948</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest MyiLibrary Digital eBook Collection</subfield><subfield code="b">IDEB</subfield><subfield code="n">cis29978485</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">12127096</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | Conference papers and proceedings fast |
genre_facet | Conference papers and proceedings |
id | ZDB-4-EBA-ocn895026034 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:26:19Z |
institution | BVB |
institution_GND | http://id.loc.gov/authorities/names/no2015091156 |
isbn | 9781614994466 1614994463 132221123X 9781322211237 1614994455 9781614994459 |
language | English |
oclc_num | 895026034 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource |
psigel | ZDB-4-EBA |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | IOS Press, |
record_format | marc |
series | NATO science for peace and security series. Information and communication security ; |
series2 | NATO Science for Peace and Security Series - D: Information and Communication Security ; |
spelling | NATO Advanced Research Workshop on Best Practices and Innovative Approaches to Develop Cyber Security and Resiliency Policy Framework (2013 : Ohrid, North Macedonia) Cyber security and resiliency policy framework / edited by Ashok Vaseashta, Philip Susmann and Eric Braman. Amsterdam : IOS Press, 2014. 1 online resource text txt rdacontent computer c rdamedia online resource cr rdacarrier NATO Science for Peace and Security Series - D: Information and Communication Security ; vol. 38 "Proceedings of the NATO Advanced Research Workshop on Best Practices and Innovative Approaches to Develop Cyber Security and Resiliency Policy Framework, Ohrid, Former Yugoslav Republic of Macedonia, June 10-12, 2013." International conference proceedings. Includes indexes. Online resource; title from PDF title page (IOS Press, viewed November 12, 2014). ""CYBER SECURITY AND RESILIENCY POLICY FRAMEWORK""; ""Preface""; ""Meet the Authors""; ""Contents""; ""Cyber Security â€? Threat Scenarios, Policy Framework and Cyber Wargames""; ""E-Government 3 Web Security Issues: Who, What, When?""; ""Cyber Security Issues of Telecommunication Infrastructure""; ""Security Issues for Mobile Devices""; ""Strengthening Cyber Security Policy by Means of End-Users Dedicated Training""; ""Toward Effective National Cyber Security Strategy: The Path Forward For Macedonia"" Overview of the Current Situation in Bosnia and Herzegovina with Focus on Cyber Security and Fighting Cyber-Crime by Establishment of BIH CERT BodyTurkey's Approaches on Cyber Security Policy Framework -- Cyber Security Challenges in Smart Homes -- Development of Defense-Oriented Application Software under Fire: The Case of Israel -- Education as a Long-Term Strategy for Cyber Security -- Protecting and Preserving Ground Water with Monitoring Systems and Vulnerability Maps -- Subject Index -- Author Index Cyberspace is a ubiquitous realm interconnecting every aspect of modern society, enabled by broadband networks and wireless signals around us, existing within local area networks in our schools, hospitals and businesses, and within the massive grids that power most countries. Securing cyberspace to ensure the continuation of growing economies and to protect a nation's way of life is a major concern for governments around the globe. This book contains papers presented at the NATO Advanced Research Workshop (ARW) entitled Best Practices and Innovative Approaches to Develop Cyber Security and Res. Includes bibliographical references at the end of each chapters and indexes. Computer networks Security measures Congresses. Internet Security measures Congresses. Computer crimes Prevention Congresses. Réseaux d'ordinateurs Sécurité Mesures Congrès. Internet Sécurité Mesures Congrès. COMPUTERS Security General. bisacsh Computer crimes Prevention fast Computer networks Security measures fast Internet Security measures fast Conference papers and proceedings fast Vaseashta, A. (Ashok), editor. https://id.oclc.org/worldcat/entity/E39PCjFP69WhR37Dkc8xxRhxH3 http://id.loc.gov/authorities/names/nb2005013860 Susmann, Philip, editor. http://id.loc.gov/authorities/names/nb2012003192 Braman, Eric, editor. http://id.loc.gov/authorities/names/nb2012003191 IOS Press. http://id.loc.gov/authorities/names/no2015091156 has work: Cyber security and resiliency policy framework (Text) https://id.oclc.org/worldcat/entity/E39PCGbGQVcyBy3b6QD7gjxftq https://id.oclc.org/worldcat/ontology/hasWork Print version: Vaseashta, A. Cyber Security and Resiliency Policy Framework. Burke : IOS Press, ©2014 9781614994459 NATO science for peace and security series. Sub-series D, Information and communication security ; vol. 38. http://id.loc.gov/authorities/names/no2007140990 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=873948 Volltext |
spellingShingle | Cyber security and resiliency policy framework / NATO science for peace and security series. Information and communication security ; ""CYBER SECURITY AND RESILIENCY POLICY FRAMEWORK""; ""Preface""; ""Meet the Authors""; ""Contents""; ""Cyber Security â€? Threat Scenarios, Policy Framework and Cyber Wargames""; ""E-Government 3 Web Security Issues: Who, What, When?""; ""Cyber Security Issues of Telecommunication Infrastructure""; ""Security Issues for Mobile Devices""; ""Strengthening Cyber Security Policy by Means of End-Users Dedicated Training""; ""Toward Effective National Cyber Security Strategy: The Path Forward For Macedonia"" Overview of the Current Situation in Bosnia and Herzegovina with Focus on Cyber Security and Fighting Cyber-Crime by Establishment of BIH CERT BodyTurkey's Approaches on Cyber Security Policy Framework -- Cyber Security Challenges in Smart Homes -- Development of Defense-Oriented Application Software under Fire: The Case of Israel -- Education as a Long-Term Strategy for Cyber Security -- Protecting and Preserving Ground Water with Monitoring Systems and Vulnerability Maps -- Subject Index -- Author Index Computer networks Security measures Congresses. Internet Security measures Congresses. Computer crimes Prevention Congresses. Réseaux d'ordinateurs Sécurité Mesures Congrès. Internet Sécurité Mesures Congrès. COMPUTERS Security General. bisacsh Computer crimes Prevention fast Computer networks Security measures fast Internet Security measures fast |
title | Cyber security and resiliency policy framework / |
title_auth | Cyber security and resiliency policy framework / |
title_exact_search | Cyber security and resiliency policy framework / |
title_full | Cyber security and resiliency policy framework / edited by Ashok Vaseashta, Philip Susmann and Eric Braman. |
title_fullStr | Cyber security and resiliency policy framework / edited by Ashok Vaseashta, Philip Susmann and Eric Braman. |
title_full_unstemmed | Cyber security and resiliency policy framework / edited by Ashok Vaseashta, Philip Susmann and Eric Braman. |
title_short | Cyber security and resiliency policy framework / |
title_sort | cyber security and resiliency policy framework |
topic | Computer networks Security measures Congresses. Internet Security measures Congresses. Computer crimes Prevention Congresses. Réseaux d'ordinateurs Sécurité Mesures Congrès. Internet Sécurité Mesures Congrès. COMPUTERS Security General. bisacsh Computer crimes Prevention fast Computer networks Security measures fast Internet Security measures fast |
topic_facet | Computer networks Security measures Congresses. Internet Security measures Congresses. Computer crimes Prevention Congresses. Réseaux d'ordinateurs Sécurité Mesures Congrès. Internet Sécurité Mesures Congrès. COMPUTERS Security General. Computer crimes Prevention Computer networks Security measures Internet Security measures Conference papers and proceedings |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=873948 |
work_keys_str_mv | AT natoadvancedresearchworkshoponbestpracticesandinnovativeapproachestodevelopcybersecurityandresiliencypolicyframeworkohridnorthmacedonia cybersecurityandresiliencypolicyframework AT vaseashtaa cybersecurityandresiliencypolicyframework AT susmannphilip cybersecurityandresiliencypolicyframework AT bramaneric cybersecurityandresiliencypolicyframework AT iospress cybersecurityandresiliencypolicyframework |