Cybersecurity and cyber-information sharing :: legal and economic analyses /
Over the course of the last year, a host of cyberattacks has been perpetrated on a number of high profile American companies. The high profile cyberattacks of 2014 and early 2015 appear to be indicative of a broader trend: the frequency and ferocity of cyberattacks are increasing, posing grave threa...
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
New York :
Nova Publishers, Inc.,
[2015]
|
Schriftenreihe: | Internet theory, technology and applications.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Over the course of the last year, a host of cyberattacks has been perpetrated on a number of high profile American companies. The high profile cyberattacks of 2014 and early 2015 appear to be indicative of a broader trend: the frequency and ferocity of cyberattacks are increasing, posing grave threats to the national interests of the United States. While considerable debate exists with regard to the best strategies for protecting America's various cyber-systems and promoting cybersecurity, one point of general agreement amongst cyber-analysts is the perceived need for enhanced and timely excha. |
Beschreibung: | Includes index. |
Beschreibung: | 1 online resource |
ISBN: | 9781634831383 1634831381 |
Internformat
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBU-ocn913742589 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu|||unuuu | ||
008 | 150713s2015 nyu o 001 0 eng d | ||
040 | |a N$T |b eng |e rda |e pn |c N$T |d N$T |d YDXCP |d EBLCP |d AGLDB |d OCLCQ |d OCLCF |d STF |d OCLCQ |d OCLCO |d OCL |d OCLCQ |d OCLCO | ||
019 | |a 918623929 | ||
020 | |a 9781634831383 |q (electronic bk.) | ||
020 | |a 1634831381 |q (electronic bk.) | ||
020 | |z 9781634831376 | ||
035 | |a (OCoLC)913742589 |z (OCoLC)918623929 | ||
050 | 4 | |a TK5105.59 | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 23 | |
049 | |a MAIN | ||
245 | 0 | 0 | |a Cybersecurity and cyber-information sharing : |b legal and economic analyses / |c Julia M. Morgan, editor. |
264 | 1 | |a New York : |b Nova Publishers, Inc., |c [2015] | |
300 | |a 1 online resource | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Internet theory, technology and applications | |
500 | |a Includes index. | ||
588 | 0 | |a Vendor-supplied metadata. | |
505 | 0 | |a CYBERSECURITY AND CYBER-INFORMATION SHARING: LEGAL AND ECONOMIC ANALYSES; CYBERSECURITY AND CYBER-INFORMATION SHARING: LEGAL AND ECONOMIC ANALYSES; Library of Congress Cataloging-in-Publication Data; CONTENTS; PREFACE; Chapter 1: CYBERSECURITY AND INFORMATION SHARING: LEGAL CHALLENGES AND SOLUTIONS; Chapter 2: LEGISLATION TO FACILITATE CYBERSECURITY INFORMATION SHARING: ECONOMIC ANALYSIS; Chapter 3: CYBERSECURITY AND INFORMATION SHARING: COMPARISON OF H.R. 1560 AND H.R. 1731; Chapter 4: EXECUTIVE ORDER 13691: PROMOTING PRIVATE SECTOR CYBERSECURITY INFORMATION SHARING; INDEX. | |
520 | |a Over the course of the last year, a host of cyberattacks has been perpetrated on a number of high profile American companies. The high profile cyberattacks of 2014 and early 2015 appear to be indicative of a broader trend: the frequency and ferocity of cyberattacks are increasing, posing grave threats to the national interests of the United States. While considerable debate exists with regard to the best strategies for protecting America's various cyber-systems and promoting cybersecurity, one point of general agreement amongst cyber-analysts is the perceived need for enhanced and timely excha. | ||
650 | 0 | |a Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh94001277 | |
650 | 0 | |a Cyberspace |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh2021002499 | |
650 | 0 | |a Data protection. |0 http://id.loc.gov/authorities/subjects/sh85035859 | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 6 | |a Protection de l'information (Informatique) | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Cyberspace |x Security measures |2 fast | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Data protection |2 fast | |
700 | 1 | |a Morgan, Julia M., |e editor. | |
776 | 0 | 8 | |i Print version: |a Morgan, Julia M. |t Cybersecurity and Cyber-Information Sharing : Legal and Economic Analyses. |d Hauppauge : Nova Science Publishers, Inc., ©2015 |z 9781634831376 |
830 | 0 | |a Internet theory, technology and applications. |0 http://id.loc.gov/authorities/names/no2011192052 | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBU |q FWS_PDA_EBU |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1023440 |3 Volltext |
938 | |a ProQuest Ebook Central |b EBLB |n EBL2130943 | ||
938 | |a EBSCOhost |b EBSC |n 1023440 | ||
938 | |a YBP Library Services |b YANK |n 12457827 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBU | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBU-ocn913742589 |
---|---|
_version_ | 1816796919217782784 |
adam_text | |
any_adam_object | |
author2 | Morgan, Julia M. |
author2_role | edt |
author2_variant | j m m jm jmm |
author_facet | Morgan, Julia M. |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 |
callnumber-search | TK5105.59 |
callnumber-sort | TK 45105.59 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-4-EBU |
contents | CYBERSECURITY AND CYBER-INFORMATION SHARING: LEGAL AND ECONOMIC ANALYSES; CYBERSECURITY AND CYBER-INFORMATION SHARING: LEGAL AND ECONOMIC ANALYSES; Library of Congress Cataloging-in-Publication Data; CONTENTS; PREFACE; Chapter 1: CYBERSECURITY AND INFORMATION SHARING: LEGAL CHALLENGES AND SOLUTIONS; Chapter 2: LEGISLATION TO FACILITATE CYBERSECURITY INFORMATION SHARING: ECONOMIC ANALYSIS; Chapter 3: CYBERSECURITY AND INFORMATION SHARING: COMPARISON OF H.R. 1560 AND H.R. 1731; Chapter 4: EXECUTIVE ORDER 13691: PROMOTING PRIVATE SECTOR CYBERSECURITY INFORMATION SHARING; INDEX. |
ctrlnum | (OCoLC)913742589 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03561cam a2200553 i 4500</leader><controlfield tag="001">ZDB-4-EBU-ocn913742589</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu|||unuuu</controlfield><controlfield tag="008">150713s2015 nyu o 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">N$T</subfield><subfield code="d">YDXCP</subfield><subfield code="d">EBLCP</subfield><subfield code="d">AGLDB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCF</subfield><subfield code="d">STF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">918623929</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781634831383</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1634831381</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781634831376</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)913742589</subfield><subfield code="z">(OCoLC)918623929</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.59</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Cybersecurity and cyber-information sharing :</subfield><subfield code="b">legal and economic analyses /</subfield><subfield code="c">Julia M. Morgan, editor.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York :</subfield><subfield code="b">Nova Publishers, Inc.,</subfield><subfield code="c">[2015]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Internet theory, technology and applications</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Vendor-supplied metadata.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">CYBERSECURITY AND CYBER-INFORMATION SHARING: LEGAL AND ECONOMIC ANALYSES; CYBERSECURITY AND CYBER-INFORMATION SHARING: LEGAL AND ECONOMIC ANALYSES; Library of Congress Cataloging-in-Publication Data; CONTENTS; PREFACE; Chapter 1: CYBERSECURITY AND INFORMATION SHARING: LEGAL CHALLENGES AND SOLUTIONS; Chapter 2: LEGISLATION TO FACILITATE CYBERSECURITY INFORMATION SHARING: ECONOMIC ANALYSIS; Chapter 3: CYBERSECURITY AND INFORMATION SHARING: COMPARISON OF H.R. 1560 AND H.R. 1731; Chapter 4: EXECUTIVE ORDER 13691: PROMOTING PRIVATE SECTOR CYBERSECURITY INFORMATION SHARING; INDEX.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Over the course of the last year, a host of cyberattacks has been perpetrated on a number of high profile American companies. The high profile cyberattacks of 2014 and early 2015 appear to be indicative of a broader trend: the frequency and ferocity of cyberattacks are increasing, posing grave threats to the national interests of the United States. While considerable debate exists with regard to the best strategies for protecting America's various cyber-systems and promoting cybersecurity, one point of general agreement amongst cyber-analysts is the perceived need for enhanced and timely excha.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001277</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberspace</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2021002499</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85035859</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Protection de l'information (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyberspace</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data protection</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Morgan, Julia M.,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Morgan, Julia M.</subfield><subfield code="t">Cybersecurity and Cyber-Information Sharing : Legal and Economic Analyses.</subfield><subfield code="d">Hauppauge : Nova Science Publishers, Inc., ©2015</subfield><subfield code="z">9781634831376</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Internet theory, technology and applications.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2011192052</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBU</subfield><subfield code="q">FWS_PDA_EBU</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1023440</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest Ebook Central</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL2130943</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">1023440</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">12457827</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBU</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBU-ocn913742589 |
illustrated | Not Illustrated |
indexdate | 2024-11-26T14:49:19Z |
institution | BVB |
isbn | 9781634831383 1634831381 |
language | English |
oclc_num | 913742589 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource |
psigel | ZDB-4-EBU |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Nova Publishers, Inc., |
record_format | marc |
series | Internet theory, technology and applications. |
series2 | Internet theory, technology and applications |
spelling | Cybersecurity and cyber-information sharing : legal and economic analyses / Julia M. Morgan, editor. New York : Nova Publishers, Inc., [2015] 1 online resource text txt rdacontent computer c rdamedia online resource cr rdacarrier Internet theory, technology and applications Includes index. Vendor-supplied metadata. CYBERSECURITY AND CYBER-INFORMATION SHARING: LEGAL AND ECONOMIC ANALYSES; CYBERSECURITY AND CYBER-INFORMATION SHARING: LEGAL AND ECONOMIC ANALYSES; Library of Congress Cataloging-in-Publication Data; CONTENTS; PREFACE; Chapter 1: CYBERSECURITY AND INFORMATION SHARING: LEGAL CHALLENGES AND SOLUTIONS; Chapter 2: LEGISLATION TO FACILITATE CYBERSECURITY INFORMATION SHARING: ECONOMIC ANALYSIS; Chapter 3: CYBERSECURITY AND INFORMATION SHARING: COMPARISON OF H.R. 1560 AND H.R. 1731; Chapter 4: EXECUTIVE ORDER 13691: PROMOTING PRIVATE SECTOR CYBERSECURITY INFORMATION SHARING; INDEX. Over the course of the last year, a host of cyberattacks has been perpetrated on a number of high profile American companies. The high profile cyberattacks of 2014 and early 2015 appear to be indicative of a broader trend: the frequency and ferocity of cyberattacks are increasing, posing grave threats to the national interests of the United States. While considerable debate exists with regard to the best strategies for protecting America's various cyber-systems and promoting cybersecurity, one point of general agreement amongst cyber-analysts is the perceived need for enhanced and timely excha. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Cyberspace Security measures. http://id.loc.gov/authorities/subjects/sh2021002499 Data protection. http://id.loc.gov/authorities/subjects/sh85035859 Réseaux d'ordinateurs Sécurité Mesures. Protection de l'information (Informatique) COMPUTERS Security General. bisacsh Cyberspace Security measures fast Computer networks Security measures fast Data protection fast Morgan, Julia M., editor. Print version: Morgan, Julia M. Cybersecurity and Cyber-Information Sharing : Legal and Economic Analyses. Hauppauge : Nova Science Publishers, Inc., ©2015 9781634831376 Internet theory, technology and applications. http://id.loc.gov/authorities/names/no2011192052 FWS01 ZDB-4-EBU FWS_PDA_EBU https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1023440 Volltext |
spellingShingle | Cybersecurity and cyber-information sharing : legal and economic analyses / Internet theory, technology and applications. CYBERSECURITY AND CYBER-INFORMATION SHARING: LEGAL AND ECONOMIC ANALYSES; CYBERSECURITY AND CYBER-INFORMATION SHARING: LEGAL AND ECONOMIC ANALYSES; Library of Congress Cataloging-in-Publication Data; CONTENTS; PREFACE; Chapter 1: CYBERSECURITY AND INFORMATION SHARING: LEGAL CHALLENGES AND SOLUTIONS; Chapter 2: LEGISLATION TO FACILITATE CYBERSECURITY INFORMATION SHARING: ECONOMIC ANALYSIS; Chapter 3: CYBERSECURITY AND INFORMATION SHARING: COMPARISON OF H.R. 1560 AND H.R. 1731; Chapter 4: EXECUTIVE ORDER 13691: PROMOTING PRIVATE SECTOR CYBERSECURITY INFORMATION SHARING; INDEX. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Cyberspace Security measures. http://id.loc.gov/authorities/subjects/sh2021002499 Data protection. http://id.loc.gov/authorities/subjects/sh85035859 Réseaux d'ordinateurs Sécurité Mesures. Protection de l'information (Informatique) COMPUTERS Security General. bisacsh Cyberspace Security measures fast Computer networks Security measures fast Data protection fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh94001277 http://id.loc.gov/authorities/subjects/sh2021002499 http://id.loc.gov/authorities/subjects/sh85035859 |
title | Cybersecurity and cyber-information sharing : legal and economic analyses / |
title_auth | Cybersecurity and cyber-information sharing : legal and economic analyses / |
title_exact_search | Cybersecurity and cyber-information sharing : legal and economic analyses / |
title_full | Cybersecurity and cyber-information sharing : legal and economic analyses / Julia M. Morgan, editor. |
title_fullStr | Cybersecurity and cyber-information sharing : legal and economic analyses / Julia M. Morgan, editor. |
title_full_unstemmed | Cybersecurity and cyber-information sharing : legal and economic analyses / Julia M. Morgan, editor. |
title_short | Cybersecurity and cyber-information sharing : |
title_sort | cybersecurity and cyber information sharing legal and economic analyses |
title_sub | legal and economic analyses / |
topic | Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Cyberspace Security measures. http://id.loc.gov/authorities/subjects/sh2021002499 Data protection. http://id.loc.gov/authorities/subjects/sh85035859 Réseaux d'ordinateurs Sécurité Mesures. Protection de l'information (Informatique) COMPUTERS Security General. bisacsh Cyberspace Security measures fast Computer networks Security measures fast Data protection fast |
topic_facet | Computer networks Security measures. Cyberspace Security measures. Data protection. Réseaux d'ordinateurs Sécurité Mesures. Protection de l'information (Informatique) COMPUTERS Security General. Cyberspace Security measures Computer networks Security measures Data protection |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1023440 |
work_keys_str_mv | AT morganjuliam cybersecurityandcyberinformationsharinglegalandeconomicanalyses |