Cybersecurity :: current writings on threats and protection /
"This handbook of cybersecurity best practices is for public officials and citizens, employers and employees, corporations and consumers. Essays also address the development of state-of-the-art software systems and hardware for public and private organizations."
Gespeichert in:
Weitere Verfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Jefferson, North Carolina :
McFarland & Company, Inc., Publishers,
[2019]
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | "This handbook of cybersecurity best practices is for public officials and citizens, employers and employees, corporations and consumers. Essays also address the development of state-of-the-art software systems and hardware for public and private organizations." |
Beschreibung: | 1 online resource (xiii, 274 pages) |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9781476635415 1476635412 1787857468 9781787857469 |
Internformat
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-on1084268874 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 190204s2019 ncu ob 001 0 eng d | ||
040 | |a N$T |b eng |e rda |e pn |c N$T |d EBLCP |d N$T |d YDX |d WAU |d OCLCF |d UKAHL |d OCLCQ |d HRM |d VLB |d OCLCO |d DST |d OCLCQ |d OCLCO |d BIBBD |d OCLCO |d OCLCQ |d TEFOD |d OCLCO |d OCLCL | ||
019 | |a 1300457589 |a 1303471980 | ||
020 | |a 9781476635415 |q (electronic bk.) | ||
020 | |a 1476635412 |q (electronic bk.) | ||
020 | |a 1787857468 | ||
020 | |a 9781787857469 | ||
020 | |z 9781476674407 | ||
020 | |z 147667440X | ||
035 | |a (OCoLC)1084268874 |z (OCoLC)1300457589 |z (OCoLC)1303471980 | ||
037 | |a 357884D1-0C68-40B8-8EFA-43C86D8E65D0 |b OverDrive, Inc. |n http://www.overdrive.com | ||
050 | 4 | |a QA76.9.A25 |b C925 2019eb | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 23 | |
049 | |a MAIN | ||
245 | 0 | 0 | |a Cybersecurity : |b current writings on threats and protection / |c edited by Joaquin Jay Gonzalez III and Roger L. Kemp. |
264 | 1 | |a Jefferson, North Carolina : |b McFarland & Company, Inc., Publishers, |c [2019] | |
300 | |a 1 online resource (xiii, 274 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
520 | |a "This handbook of cybersecurity best practices is for public officials and citizens, employers and employees, corporations and consumers. Essays also address the development of state-of-the-art software systems and hardware for public and private organizations." | ||
588 | 0 | |a Online resource; title from PDF title page (EBSCO, viewed February 5, 2019) | |
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Part I. An Overview -- Part II. Threats and Risks -- Part III. Prevention, Protection, Partnership: A. Practical Preventive Measures -- [Part] III. B. Technical Protections -- [Part] III. C. Using Partnerships and Networks -- Part IV. Future. | |
650 | 0 | |a Computer security. |0 http://id.loc.gov/authorities/subjects/sh90001862 | |
650 | 0 | |a Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh94001277 | |
650 | 0 | |a Computer crimes |x Economic aspects. | |
650 | 2 | |a Computer Security |0 https://id.nlm.nih.gov/mesh/D016494 | |
650 | 6 | |a Sécurité informatique. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 6 | |a Criminalité informatique |x Aspect économique. | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
700 | 1 | |a Gonzalez, Joaquin Jay, |c III, |e editor. |1 https://id.oclc.org/worldcat/entity/E39PCjy8D4kymG3bdmBrXxq6Dq |0 http://id.loc.gov/authorities/names/n2008062051 | |
700 | 1 | |a Kemp, Roger L., |e editor. | |
758 | |i has work: |a Cybersecurity (Text) |1 https://id.oclc.org/worldcat/entity/E39PCG7DXqYk3YDVBMv77dd7tq |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |z 147667440X |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2011624 |3 Volltext |
938 | |a BiblioBoard |b BIBD |n 93d57153-3454-45f1-be06-9d5c1ef9cd00 | ||
938 | |a Askews and Holts Library Services |b ASKH |n AH35893933 | ||
938 | |a ProQuest Ebook Central |b EBLB |n EBL5650193 | ||
938 | |a EBSCOhost |b EBSC |n 2011624 | ||
938 | |a YBP Library Services |b YANK |n 16023127 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-on1084268874 |
---|---|
_version_ | 1816882483742900224 |
adam_text | |
any_adam_object | |
author2 | Gonzalez, Joaquin Jay, III Kemp, Roger L. |
author2_role | edt edt |
author2_variant | j j g jj jjg r l k rl rlk |
author_GND | http://id.loc.gov/authorities/names/n2008062051 |
author_facet | Gonzalez, Joaquin Jay, III Kemp, Roger L. |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 C925 2019eb |
callnumber-search | QA76.9.A25 C925 2019eb |
callnumber-sort | QA 276.9 A25 C925 42019EB |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Part I. An Overview -- Part II. Threats and Risks -- Part III. Prevention, Protection, Partnership: A. Practical Preventive Measures -- [Part] III. B. Technical Protections -- [Part] III. C. Using Partnerships and Networks -- Part IV. Future. |
ctrlnum | (OCoLC)1084268874 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03466cam a2200637 i 4500</leader><controlfield tag="001">ZDB-4-EBA-on1084268874</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">190204s2019 ncu ob 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">EBLCP</subfield><subfield code="d">N$T</subfield><subfield code="d">YDX</subfield><subfield code="d">WAU</subfield><subfield code="d">OCLCF</subfield><subfield code="d">UKAHL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">HRM</subfield><subfield code="d">VLB</subfield><subfield code="d">OCLCO</subfield><subfield code="d">DST</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">BIBBD</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">TEFOD</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">1300457589</subfield><subfield code="a">1303471980</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781476635415</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1476635412</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1787857468</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781787857469</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781476674407</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">147667440X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1084268874</subfield><subfield code="z">(OCoLC)1300457589</subfield><subfield code="z">(OCoLC)1303471980</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">357884D1-0C68-40B8-8EFA-43C86D8E65D0</subfield><subfield code="b">OverDrive, Inc.</subfield><subfield code="n">http://www.overdrive.com</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">C925 2019eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Cybersecurity :</subfield><subfield code="b">current writings on threats and protection /</subfield><subfield code="c">edited by Joaquin Jay Gonzalez III and Roger L. Kemp.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Jefferson, North Carolina :</subfield><subfield code="b">McFarland & Company, Inc., Publishers,</subfield><subfield code="c">[2019]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xiii, 274 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This handbook of cybersecurity best practices is for public officials and citizens, employers and employees, corporations and consumers. Essays also address the development of state-of-the-art software systems and hardware for public and private organizations."</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Online resource; title from PDF title page (EBSCO, viewed February 5, 2019)</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Part I. An Overview -- Part II. Threats and Risks -- Part III. Prevention, Protection, Partnership: A. Practical Preventive Measures -- [Part] III. B. Technical Protections -- [Part] III. C. Using Partnerships and Networks -- Part IV. Future.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh90001862</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001277</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield><subfield code="x">Economic aspects.</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield><subfield code="0">https://id.nlm.nih.gov/mesh/D016494</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Criminalité informatique</subfield><subfield code="x">Aspect économique.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gonzalez, Joaquin Jay,</subfield><subfield code="c">III,</subfield><subfield code="e">editor.</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjy8D4kymG3bdmBrXxq6Dq</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2008062051</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kemp, Roger L.,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Cybersecurity (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCG7DXqYk3YDVBMv77dd7tq</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">147667440X</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2011624</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">BiblioBoard</subfield><subfield code="b">BIBD</subfield><subfield code="n">93d57153-3454-45f1-be06-9d5c1ef9cd00</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH35893933</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest Ebook Central</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL5650193</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">2011624</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">16023127</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-on1084268874 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:29:20Z |
institution | BVB |
isbn | 9781476635415 1476635412 1787857468 9781787857469 |
language | English |
oclc_num | 1084268874 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xiii, 274 pages) |
psigel | ZDB-4-EBA |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | McFarland & Company, Inc., Publishers, |
record_format | marc |
spelling | Cybersecurity : current writings on threats and protection / edited by Joaquin Jay Gonzalez III and Roger L. Kemp. Jefferson, North Carolina : McFarland & Company, Inc., Publishers, [2019] 1 online resource (xiii, 274 pages) text txt rdacontent computer c rdamedia online resource cr rdacarrier "This handbook of cybersecurity best practices is for public officials and citizens, employers and employees, corporations and consumers. Essays also address the development of state-of-the-art software systems and hardware for public and private organizations." Online resource; title from PDF title page (EBSCO, viewed February 5, 2019) Includes bibliographical references and index. Part I. An Overview -- Part II. Threats and Risks -- Part III. Prevention, Protection, Partnership: A. Practical Preventive Measures -- [Part] III. B. Technical Protections -- [Part] III. C. Using Partnerships and Networks -- Part IV. Future. Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Computer crimes Economic aspects. Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. Réseaux d'ordinateurs Sécurité Mesures. Criminalité informatique Aspect économique. COMPUTERS Security General. bisacsh Computer networks Security measures fast Computer security fast Gonzalez, Joaquin Jay, III, editor. https://id.oclc.org/worldcat/entity/E39PCjy8D4kymG3bdmBrXxq6Dq http://id.loc.gov/authorities/names/n2008062051 Kemp, Roger L., editor. has work: Cybersecurity (Text) https://id.oclc.org/worldcat/entity/E39PCG7DXqYk3YDVBMv77dd7tq https://id.oclc.org/worldcat/ontology/hasWork Print version: 147667440X FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2011624 Volltext |
spellingShingle | Cybersecurity : current writings on threats and protection / Part I. An Overview -- Part II. Threats and Risks -- Part III. Prevention, Protection, Partnership: A. Practical Preventive Measures -- [Part] III. B. Technical Protections -- [Part] III. C. Using Partnerships and Networks -- Part IV. Future. Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Computer crimes Economic aspects. Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. Réseaux d'ordinateurs Sécurité Mesures. Criminalité informatique Aspect économique. COMPUTERS Security General. bisacsh Computer networks Security measures fast Computer security fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh90001862 http://id.loc.gov/authorities/subjects/sh94001277 https://id.nlm.nih.gov/mesh/D016494 |
title | Cybersecurity : current writings on threats and protection / |
title_auth | Cybersecurity : current writings on threats and protection / |
title_exact_search | Cybersecurity : current writings on threats and protection / |
title_full | Cybersecurity : current writings on threats and protection / edited by Joaquin Jay Gonzalez III and Roger L. Kemp. |
title_fullStr | Cybersecurity : current writings on threats and protection / edited by Joaquin Jay Gonzalez III and Roger L. Kemp. |
title_full_unstemmed | Cybersecurity : current writings on threats and protection / edited by Joaquin Jay Gonzalez III and Roger L. Kemp. |
title_short | Cybersecurity : |
title_sort | cybersecurity current writings on threats and protection |
title_sub | current writings on threats and protection / |
topic | Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Computer crimes Economic aspects. Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. Réseaux d'ordinateurs Sécurité Mesures. Criminalité informatique Aspect économique. COMPUTERS Security General. bisacsh Computer networks Security measures fast Computer security fast |
topic_facet | Computer security. Computer networks Security measures. Computer crimes Economic aspects. Computer Security Sécurité informatique. Réseaux d'ordinateurs Sécurité Mesures. Criminalité informatique Aspect économique. COMPUTERS Security General. Computer networks Security measures Computer security |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2011624 |
work_keys_str_mv | AT gonzalezjoaquinjay cybersecuritycurrentwritingsonthreatsandprotection AT kemprogerl cybersecuritycurrentwritingsonthreatsandprotection |