|
|
|
|
LEADER |
02983nmm a2200541 u 4500 |
001 |
EB001916158 |
003 |
EBX01000000000000001079060 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
210123 ||| eng |
020 |
|
|
|a 9781282263598
|
020 |
|
|
|a 9786612263590
|
020 |
|
|
|a 1282263595
|
050 |
|
4 |
|a HV6773
|
100 |
1 |
|
|a Mehan, Julie E.
|
245 |
0 |
0 |
|a Cyberwar, cyberterror, cybercrime
|b a guide to the role of standards in an environment of change and danger
|c Julie E. Mehan
|
260 |
|
|
|a Ely, UK
|b IT Governance
|c 2008
|
300 |
|
|
|a xi, 271 pages
|b illustrations
|
505 |
0 |
|
|a Includes bibliographical references and index
|
505 |
0 |
|
|a INTRODUCTION; CHAPTER 1: WHAT TECHNOLOGY GIVETH IT TAKETH AWAY; CHAPTER 2: CYBERATTACK: IT'S A DANGEROUS WORLD FOR INFORMATION SYSTEMS; CHAPTER 3: THE HUMAN FACTOR: THE UNDERRATED THREAT; CHAPTER 4: TRANSITION FROM AN ENVIRONMENT OF 'FUD' TO A STANDARDS-BASED ENVIRONMENT; CHAPTER 5: ESTABLISHING A CULTURE OF CYBERSECURITY; CHAPTER 6: INCREASING INTERNATIONALISM: GOVERNANCE, LAWS, AND ETHICS; CHAPTER 7: STANDARDS: WHAT ARE THEY AND WHY SHOULD WE CARE?; CHAPTER 8: FROM CYBERWAR TO CYBERDEFENCE: APPLYING STANDARDS IN AN ENVIRONMENT OF CHANGE AND DANGER
|
505 |
0 |
|
|a CHAPTER 9: CONCLUSION: WHERE DO WE GO FROM HERE?APPENDIX 1: GAP ANALYSIS AREAS OF INTEREST; APPENDIX 2: STANDARDS CROSSWALK; DEFINITIONS; ACRONYMS; INDEX
|
653 |
|
|
|a Cyberterrorism / Prevention
|
653 |
|
|
|a Computer crimes / Prevention / blmlsh
|
653 |
|
|
|a Computer networks / Security measures / Standards / blmlsh
|
653 |
|
|
|a Computer networks / Security measures / Standards / fast
|
653 |
|
|
|a Réseaux d'ordinateurs / Sécurité / Mesures / Qualité / Contrôle
|
653 |
|
|
|a Computer networks / Security measures / Standards
|
653 |
|
|
|a Internet / Sécurité / Mesures
|
653 |
|
|
|a Cyberterrorism / Prevention / blmlsh
|
653 |
|
|
|a Internet / Security measures
|
653 |
|
|
|a Internet / Security measures / fast
|
653 |
|
|
|a Computer crimes / Prevention
|
653 |
|
|
|a Réseaux d'ordinateurs / Sécurité / Mesures / Normes
|
653 |
|
|
|a Computer networks / Security measures / Quality control / blmlsh
|
653 |
|
|
|a Computer networks / Security measures / Quality control
|
653 |
|
|
|a Cyberterrorism / Prevention / fast
|
653 |
|
|
|a Computer crimes / Prevention / fast
|
653 |
|
|
|a Internet / Security measures / blmlsh
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b OREILLY
|a O'Reilly
|
776 |
|
|
|z 1905356471
|
776 |
|
|
|z 9781905356478
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781905356478/?ar
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 331
|
082 |
0 |
|
|a 658.4013
|
082 |
0 |
|
|a 005.802/18
|
082 |
0 |
|
|a 364.1
|
520 |
|
|
|a CyberWar, CyberTerror, CyberCrime provides a stark and timely analysis of the increasingly hostile online landscape that today's corporate systems inhabit, and gives a practical introduction to the defensive strategies that can be employed in response
|