|
|
|
|
LEADER |
03052nmm a2200553 u 4500 |
001 |
EB001916150 |
003 |
EBX01000000000000001079052 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
210123 ||| eng |
020 |
|
|
|a 1299189326
|
020 |
|
|
|a 1118241533
|
020 |
|
|
|a 9781118241530
|
020 |
|
|
|a 1118241487
|
020 |
|
|
|a 1118241320
|
020 |
|
|
|a 9781299189324
|
020 |
|
|
|a 9781118241325
|
020 |
|
|
|a 9781118241486
|
050 |
|
4 |
|a QA76.9.A25
|
100 |
1 |
|
|a Bayuk, Jennifer L.
|
245 |
0 |
0 |
|a Cyber security policy guidebook
|c Jennifer L. Bayuk [and others]
|
260 |
|
|
|a Hoboken, N.J.
|b Wiley
|c 2012
|
300 |
|
|
|a xvi, 270 pages
|b illustrations
|
505 |
0 |
|
|a Includes bibliographical references and index
|
505 |
0 |
|
|a Frontmatter -- Introduction -- Cyber Security Evolution -- Cyber Security Objectives -- Guidance for Decision Makers -- The Catalog Approach -- Cyber Security Policy Catalog -- One Government's Approach to Cyber Security Policy -- Conclusion -- Glossary -- References -- Index
|
653 |
|
|
|a Data protection / Government policy / fast
|
653 |
|
|
|a Computer security / Government policy / fast
|
653 |
|
|
|a Sécurité informatique / Politique gouvernementale
|
653 |
|
|
|a Data protection / Government policy
|
653 |
|
|
|a Technologie de l'information / Politique gouvernementale
|
653 |
|
|
|a Protection de l'information (Informatique) / Politique gouvernementale
|
653 |
|
|
|a Information technology / Government policy
|
653 |
|
|
|a Information technology / Government policy / fast
|
653 |
|
|
|a Computer security / Government policy
|
653 |
|
|
|a COMPUTERS / Security / General / bisacsh
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b OREILLY
|a O'Reilly
|
776 |
|
|
|z 9781118027806
|
776 |
|
|
|z 9781118241486
|
776 |
|
|
|z 1118027809
|
776 |
|
|
|z 9781118241325
|
776 |
|
|
|z 9781118241530
|
776 |
|
|
|z 1118241320
|
776 |
|
|
|z 1118241487
|
776 |
|
|
|z 1118241533
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781118241325/?ar
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 005.8
|
520 |
|
|
|a "This book is a taxonomy and thesaurus of current cybersecurity policy issues, including a thorough description of each issue and a corresponding list of pros and cons with respect to identified stances on each issue"--Provided by publisher
|
520 |
|
|
|a "Drawing upon a wealth of experience from academia, industry, and government service, this book details and dissects current organizational cybersecurity policy issues on a global scale. Using simple language, it includes a thorough description of each issue, lists pros and cons, documents policy alternatives for the sake of clarity with respect to policy alone, and dives into organizational implementation issues. It also equips the reader with descriptions of the impact of specific policy choices, both positive and negative. This book gives students, scholars, and technical decision-makers the necessary knowledge of cybersecurity policy in order to make more informed decisions"--Provided by publisher
|