Cyber security :: threats and responses for government and business /
This book focuses on the cyber security threats to government and business, which are imposing unprecedented costs and disruption. At the same time, it takes a forward-looking approach to such emerging industries as automobiles and appliances, the operations of which are becoming more closely tied t...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Santa Barbara, CA :
Praeger, an Imprint of ABC-CLIO, LLC,
[2019]
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | This book focuses on the cyber security threats to government and business, which are imposing unprecedented costs and disruption. At the same time, it takes a forward-looking approach to such emerging industries as automobiles and appliances, the operations of which are becoming more closely tied to the internet. The authors draw on lessons from overseas as well as the United States to show how nations and businesses can combat these threats. "This comprehensive work focuses on the current state of play regarding cyber security threats to government and business, which are imposing unprecedented costs and disruption. At the same time, it aggressively takes a forward-looking approach to such emerging industries as automobiles and appliances, the operations of which are becoming more closely tied to the internet. Revolutionary developments will have security implications unforeseen by manufacturers, and the authors explore these in detail, drawing on lessons from overseas as well as the United States to show how nations and businesses can combat these threats. The book's first section describes existing threats and their consequences. The second section identifies newer cyber challenges across an even broader spectrum, including the internet of things. The concluding section looks at policies and practices in the United States, United Kingdom, and elsewhere that offer ways to mitigate threats to cyber security."--Provided by publisher |
Beschreibung: | 1 online resource (xii, 245 pages) |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9781440861741 1440861749 |
Internformat
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-on1083762954 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 190201s2019 cau ob 001 0 eng d | ||
040 | |a N$T |b eng |e rda |e pn |c N$T |d TEFOD |d YDX |d ORU |d UKAHL |d GGVRL |d VFL |d OCLCO |d OCLCQ |d OCLCO |d NZAUC |d OCLCQ |d OCLCO |d OCLCL | ||
019 | |a 1300507721 | ||
020 | |a 9781440861741 |q (electronic bk.) | ||
020 | |a 1440861749 |q (electronic bk.) | ||
020 | |z 9781440861734 | ||
020 | |z 1440861730 | ||
035 | |a (OCoLC)1083762954 |z (OCoLC)1300507721 | ||
037 | |a 2B8B7343-CDD3-4BDC-B679-F13F14A231F1 |b OverDrive, Inc. |n http://www.overdrive.com | ||
050 | 4 | |a TK5105.59 |b .C364 2019eb | |
072 | 7 | |a BUS |x 082000 |2 bisacsh | |
072 | 7 | |a BUS |x 041000 |2 bisacsh | |
072 | 7 | |a BUS |x 042000 |2 bisacsh | |
072 | 7 | |a BUS |x 085000 |2 bisacsh | |
082 | 7 | |a 658.4/78 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Caravelli, Jack, |d 1952- |e author. |0 http://id.loc.gov/authorities/names/n2007049230 | |
245 | 1 | 0 | |a Cyber security : |b threats and responses for government and business / |c Jack Caravelli and Nigel Jones. |
264 | 1 | |a Santa Barbara, CA : |b Praeger, an Imprint of ABC-CLIO, LLC, |c [2019] | |
300 | |a 1 online resource (xii, 245 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Cyber terrorism and covert action -- Cyber crime -- The geopolitics of cyber and cyber espionage -- The internet of things : systemically vulnerable -- Disruption : big data, artificial intelligence, and quantum computing -- Can we find solutions to the challenges of cyber security? -- Innovation as a driver of cyber security -- International policy : pitfalls and possibilities -- Global strategies : the United Kingdom as a case study. | |
520 | |a This book focuses on the cyber security threats to government and business, which are imposing unprecedented costs and disruption. At the same time, it takes a forward-looking approach to such emerging industries as automobiles and appliances, the operations of which are becoming more closely tied to the internet. The authors draw on lessons from overseas as well as the United States to show how nations and businesses can combat these threats. | ||
520 | |a "This comprehensive work focuses on the current state of play regarding cyber security threats to government and business, which are imposing unprecedented costs and disruption. At the same time, it aggressively takes a forward-looking approach to such emerging industries as automobiles and appliances, the operations of which are becoming more closely tied to the internet. Revolutionary developments will have security implications unforeseen by manufacturers, and the authors explore these in detail, drawing on lessons from overseas as well as the United States to show how nations and businesses can combat these threats. The book's first section describes existing threats and their consequences. The second section identifies newer cyber challenges across an even broader spectrum, including the internet of things. The concluding section looks at policies and practices in the United States, United Kingdom, and elsewhere that offer ways to mitigate threats to cyber security."--Provided by publisher | ||
588 | 0 | |a Print version record. | |
650 | 0 | |a Computer networks |x Security measures |x Government policy. | |
650 | 0 | |a Computer crimes |x Prevention. | |
650 | 0 | |a Security, International. |0 http://id.loc.gov/authorities/subjects/sh85119471 | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures |x Politique gouvernementale. | |
650 | 7 | |a BUSINESS & ECONOMICS |x Industrial Management. |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS |x Management. |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS |x Management Science. |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS |x Organizational Behavior. |2 bisacsh | |
650 | 7 | |a Computer crimes |x Prevention |2 fast | |
650 | 7 | |a Computer networks |x Security measures |x Government policy |2 fast | |
650 | 7 | |a Security, International |2 fast | |
700 | 1 | |a Jones, Nigel, |d 1965- |e author. |0 http://id.loc.gov/authorities/names/n2018058793 | |
758 | |i has work: |a Cyber security (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGGkgfDPcFJ3RBJMQBRBT3 |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Caravelli, Jack, 1952- |t Cyber security. |d Santa Barbara, CA : Praeger, an Imprint of ABC-CLIO, LLC, [2019] |z 9781440861734 |w (DLC) 2018046740 |w (OCoLC)1057238469 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2014189 |3 Volltext |
938 | |a Askews and Holts Library Services |b ASKH |n AH41521939 | ||
938 | |a YBP Library Services |b YANK |n 20345484 | ||
938 | |a Askews and Holts Library Services |b ASKH |n AH35903373 | ||
938 | |a EBSCOhost |b EBSC |n 2014189 | ||
938 | |a Gale Cengage Learning |b GVRL |n GVRL86LI | ||
938 | |a YBP Library Services |b YANK |n 16023112 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-on1083762954 |
---|---|
_version_ | 1816882483659014144 |
adam_text | |
any_adam_object | |
author | Caravelli, Jack, 1952- Jones, Nigel, 1965- |
author_GND | http://id.loc.gov/authorities/names/n2007049230 http://id.loc.gov/authorities/names/n2018058793 |
author_facet | Caravelli, Jack, 1952- Jones, Nigel, 1965- |
author_role | aut aut |
author_sort | Caravelli, Jack, 1952- |
author_variant | j c jc n j nj |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 .C364 2019eb |
callnumber-search | TK5105.59 .C364 2019eb |
callnumber-sort | TK 45105.59 C364 42019EB |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-4-EBA |
contents | Cyber terrorism and covert action -- Cyber crime -- The geopolitics of cyber and cyber espionage -- The internet of things : systemically vulnerable -- Disruption : big data, artificial intelligence, and quantum computing -- Can we find solutions to the challenges of cyber security? -- Innovation as a driver of cyber security -- International policy : pitfalls and possibilities -- Global strategies : the United Kingdom as a case study. |
ctrlnum | (OCoLC)1083762954 |
dewey-full | 658.4/78 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.4/78 |
dewey-search | 658.4/78 |
dewey-sort | 3658.4 278 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05070cam a2200685 i 4500</leader><controlfield tag="001">ZDB-4-EBA-on1083762954</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">190201s2019 cau ob 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">TEFOD</subfield><subfield code="d">YDX</subfield><subfield code="d">ORU</subfield><subfield code="d">UKAHL</subfield><subfield code="d">GGVRL</subfield><subfield code="d">VFL</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">NZAUC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">1300507721</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781440861741</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1440861749</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781440861734</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1440861730</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1083762954</subfield><subfield code="z">(OCoLC)1300507721</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">2B8B7343-CDD3-4BDC-B679-F13F14A231F1</subfield><subfield code="b">OverDrive, Inc.</subfield><subfield code="n">http://www.overdrive.com</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.59</subfield><subfield code="b">.C364 2019eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="x">082000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="x">041000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="x">042000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="x">085000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">658.4/78</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Caravelli, Jack,</subfield><subfield code="d">1952-</subfield><subfield code="e">author.</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2007049230</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber security :</subfield><subfield code="b">threats and responses for government and business /</subfield><subfield code="c">Jack Caravelli and Nigel Jones.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Santa Barbara, CA :</subfield><subfield code="b">Praeger, an Imprint of ABC-CLIO, LLC,</subfield><subfield code="c">[2019]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xii, 245 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cyber terrorism and covert action -- Cyber crime -- The geopolitics of cyber and cyber espionage -- The internet of things : systemically vulnerable -- Disruption : big data, artificial intelligence, and quantum computing -- Can we find solutions to the challenges of cyber security? -- Innovation as a driver of cyber security -- International policy : pitfalls and possibilities -- Global strategies : the United Kingdom as a case study.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book focuses on the cyber security threats to government and business, which are imposing unprecedented costs and disruption. At the same time, it takes a forward-looking approach to such emerging industries as automobiles and appliances, the operations of which are becoming more closely tied to the internet. The authors draw on lessons from overseas as well as the United States to show how nations and businesses can combat these threats.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This comprehensive work focuses on the current state of play regarding cyber security threats to government and business, which are imposing unprecedented costs and disruption. At the same time, it aggressively takes a forward-looking approach to such emerging industries as automobiles and appliances, the operations of which are becoming more closely tied to the internet. Revolutionary developments will have security implications unforeseen by manufacturers, and the authors explore these in detail, drawing on lessons from overseas as well as the United States to show how nations and businesses can combat these threats. The book's first section describes existing threats and their consequences. The second section identifies newer cyber challenges across an even broader spectrum, including the internet of things. The concluding section looks at policies and practices in the United States, United Kingdom, and elsewhere that offer ways to mitigate threats to cyber security."--Provided by publisher</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="x">Government policy.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Security, International.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85119471</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures</subfield><subfield code="x">Politique gouvernementale.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS</subfield><subfield code="x">Industrial Management.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS</subfield><subfield code="x">Management.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS</subfield><subfield code="x">Management Science.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS</subfield><subfield code="x">Organizational Behavior.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="x">Government policy</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Security, International</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Jones, Nigel,</subfield><subfield code="d">1965-</subfield><subfield code="e">author.</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2018058793</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Cyber security (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCGGkgfDPcFJ3RBJMQBRBT3</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Caravelli, Jack, 1952-</subfield><subfield code="t">Cyber security.</subfield><subfield code="d">Santa Barbara, CA : Praeger, an Imprint of ABC-CLIO, LLC, [2019]</subfield><subfield code="z">9781440861734</subfield><subfield code="w">(DLC) 2018046740</subfield><subfield code="w">(OCoLC)1057238469</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2014189</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH41521939</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">20345484</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH35903373</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">2014189</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Gale Cengage Learning</subfield><subfield code="b">GVRL</subfield><subfield code="n">GVRL86LI</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">16023112</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-on1083762954 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:29:20Z |
institution | BVB |
isbn | 9781440861741 1440861749 |
language | English |
oclc_num | 1083762954 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xii, 245 pages) |
psigel | ZDB-4-EBA |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | Praeger, an Imprint of ABC-CLIO, LLC, |
record_format | marc |
spelling | Caravelli, Jack, 1952- author. http://id.loc.gov/authorities/names/n2007049230 Cyber security : threats and responses for government and business / Jack Caravelli and Nigel Jones. Santa Barbara, CA : Praeger, an Imprint of ABC-CLIO, LLC, [2019] 1 online resource (xii, 245 pages) text txt rdacontent computer c rdamedia online resource cr rdacarrier Includes bibliographical references and index. Cyber terrorism and covert action -- Cyber crime -- The geopolitics of cyber and cyber espionage -- The internet of things : systemically vulnerable -- Disruption : big data, artificial intelligence, and quantum computing -- Can we find solutions to the challenges of cyber security? -- Innovation as a driver of cyber security -- International policy : pitfalls and possibilities -- Global strategies : the United Kingdom as a case study. This book focuses on the cyber security threats to government and business, which are imposing unprecedented costs and disruption. At the same time, it takes a forward-looking approach to such emerging industries as automobiles and appliances, the operations of which are becoming more closely tied to the internet. The authors draw on lessons from overseas as well as the United States to show how nations and businesses can combat these threats. "This comprehensive work focuses on the current state of play regarding cyber security threats to government and business, which are imposing unprecedented costs and disruption. At the same time, it aggressively takes a forward-looking approach to such emerging industries as automobiles and appliances, the operations of which are becoming more closely tied to the internet. Revolutionary developments will have security implications unforeseen by manufacturers, and the authors explore these in detail, drawing on lessons from overseas as well as the United States to show how nations and businesses can combat these threats. The book's first section describes existing threats and their consequences. The second section identifies newer cyber challenges across an even broader spectrum, including the internet of things. The concluding section looks at policies and practices in the United States, United Kingdom, and elsewhere that offer ways to mitigate threats to cyber security."--Provided by publisher Print version record. Computer networks Security measures Government policy. Computer crimes Prevention. Security, International. http://id.loc.gov/authorities/subjects/sh85119471 Réseaux d'ordinateurs Sécurité Mesures Politique gouvernementale. BUSINESS & ECONOMICS Industrial Management. bisacsh BUSINESS & ECONOMICS Management. bisacsh BUSINESS & ECONOMICS Management Science. bisacsh BUSINESS & ECONOMICS Organizational Behavior. bisacsh Computer crimes Prevention fast Computer networks Security measures Government policy fast Security, International fast Jones, Nigel, 1965- author. http://id.loc.gov/authorities/names/n2018058793 has work: Cyber security (Text) https://id.oclc.org/worldcat/entity/E39PCGGkgfDPcFJ3RBJMQBRBT3 https://id.oclc.org/worldcat/ontology/hasWork Print version: Caravelli, Jack, 1952- Cyber security. Santa Barbara, CA : Praeger, an Imprint of ABC-CLIO, LLC, [2019] 9781440861734 (DLC) 2018046740 (OCoLC)1057238469 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2014189 Volltext |
spellingShingle | Caravelli, Jack, 1952- Jones, Nigel, 1965- Cyber security : threats and responses for government and business / Cyber terrorism and covert action -- Cyber crime -- The geopolitics of cyber and cyber espionage -- The internet of things : systemically vulnerable -- Disruption : big data, artificial intelligence, and quantum computing -- Can we find solutions to the challenges of cyber security? -- Innovation as a driver of cyber security -- International policy : pitfalls and possibilities -- Global strategies : the United Kingdom as a case study. Computer networks Security measures Government policy. Computer crimes Prevention. Security, International. http://id.loc.gov/authorities/subjects/sh85119471 Réseaux d'ordinateurs Sécurité Mesures Politique gouvernementale. BUSINESS & ECONOMICS Industrial Management. bisacsh BUSINESS & ECONOMICS Management. bisacsh BUSINESS & ECONOMICS Management Science. bisacsh BUSINESS & ECONOMICS Organizational Behavior. bisacsh Computer crimes Prevention fast Computer networks Security measures Government policy fast Security, International fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh85119471 |
title | Cyber security : threats and responses for government and business / |
title_auth | Cyber security : threats and responses for government and business / |
title_exact_search | Cyber security : threats and responses for government and business / |
title_full | Cyber security : threats and responses for government and business / Jack Caravelli and Nigel Jones. |
title_fullStr | Cyber security : threats and responses for government and business / Jack Caravelli and Nigel Jones. |
title_full_unstemmed | Cyber security : threats and responses for government and business / Jack Caravelli and Nigel Jones. |
title_short | Cyber security : |
title_sort | cyber security threats and responses for government and business |
title_sub | threats and responses for government and business / |
topic | Computer networks Security measures Government policy. Computer crimes Prevention. Security, International. http://id.loc.gov/authorities/subjects/sh85119471 Réseaux d'ordinateurs Sécurité Mesures Politique gouvernementale. BUSINESS & ECONOMICS Industrial Management. bisacsh BUSINESS & ECONOMICS Management. bisacsh BUSINESS & ECONOMICS Management Science. bisacsh BUSINESS & ECONOMICS Organizational Behavior. bisacsh Computer crimes Prevention fast Computer networks Security measures Government policy fast Security, International fast |
topic_facet | Computer networks Security measures Government policy. Computer crimes Prevention. Security, International. Réseaux d'ordinateurs Sécurité Mesures Politique gouvernementale. BUSINESS & ECONOMICS Industrial Management. BUSINESS & ECONOMICS Management. BUSINESS & ECONOMICS Management Science. BUSINESS & ECONOMICS Organizational Behavior. Computer crimes Prevention Computer networks Security measures Government policy Security, International |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2014189 |
work_keys_str_mv | AT caravellijack cybersecuritythreatsandresponsesforgovernmentandbusiness AT jonesnigel cybersecuritythreatsandresponsesforgovernmentandbusiness |