Cyberwar, cyberterror, cybercrime : a guide to the role of standards in an environment of change and danger /
CyberWar, CyberTerror, CyberCrime provides a stark and timely analysis of the increasingly hostile online landscape that today's corporate systems inhabit, and gives a practical introduction to the defensive strategies that can be employed in response.
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Ely, UK :
IT Governance,
2008.
|
Temas: | |
Acceso en línea: | Texto completo Texto completo |
MARC
LEADER | 00000cam a2200000Ma 4500 | ||
---|---|---|---|
001 | EBOOKCENTRAL_ocn652389822 | ||
003 | OCoLC | ||
005 | 20240329122006.0 | ||
006 | m o d | ||
007 | cr zn||||||||| | ||
008 | 100601s2008 enka ob 001 0 eng d | ||
010 | |z 2008396673 | ||
040 | |a SFB |b eng |e pn |c SFB |d UMI |d CEF |d OCLCQ |d E7B |d B24X7 |d DEBSZ |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d COO |d OCLCO |d OCLCQ |d OCLCO |d AZK |d OCLCO |d AGLDB |d MOR |d PIFAG |d LIV |d ESU |d OCLCQ |d OCLCA |d U3W |d OCLCF |d STF |d WRM |d INT |d VT2 |d OCLCQ |d TKN |d OCLCQ |d UAB |d UKAHL |d HS0 |d VLY |d BRF |d OCLCO |d OCLCQ |d OCLCO | ||
019 | |a 679602776 |a 704517562 |a 764547914 |a 888949851 |a 961539406 |a 962634126 |a 1162394642 |a 1241817017 |a 1295606368 |a 1300696495 | ||
020 | |z 9781905356478 |q (pbk.) | ||
020 | |z 1905356471 |q (pbk.) | ||
020 | |a 1282263595 | ||
020 | |a 9781282263598 | ||
020 | |a 9786612263590 | ||
020 | |a 6612263598 | ||
029 | 1 | |a AU@ |b 000053259403 | |
029 | 1 | |a DEBSZ |b 355450747 | |
029 | 1 | |a HEBIS |b 291520626 | |
029 | 1 | |a NZ1 |b 13869762 | |
035 | |a (OCoLC)652389822 |z (OCoLC)679602776 |z (OCoLC)704517562 |z (OCoLC)764547914 |z (OCoLC)888949851 |z (OCoLC)961539406 |z (OCoLC)962634126 |z (OCoLC)1162394642 |z (OCoLC)1241817017 |z (OCoLC)1295606368 |z (OCoLC)1300696495 | ||
037 | |a CL0500000077 |b Safari Books Online | ||
050 | 4 | |a HV6773 |b .M44 2008eb | |
082 | 0 | 4 | |a 005.802/18 |2 22 |
049 | |a UAMI | ||
100 | 1 | |a Mehan, Julie E. | |
245 | 1 | 0 | |a Cyberwar, cyberterror, cybercrime : |b a guide to the role of standards in an environment of change and danger / |c Julie E. Mehan. |
260 | |a Ely, UK : |b IT Governance, |c 2008. | ||
300 | |a 1 online resource (xi, 271 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a data file |2 rda | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a INTRODUCTION; CHAPTER 1: WHAT TECHNOLOGY GIVETH IT TAKETH AWAY; CHAPTER 2: CYBERATTACK: IT'S A DANGEROUS WORLD FOR INFORMATION SYSTEMS; CHAPTER 3: THE HUMAN FACTOR: THE UNDERRATED THREAT; CHAPTER 4: TRANSITION FROM AN ENVIRONMENT OF 'FUD' TO A STANDARDS-BASED ENVIRONMENT; CHAPTER 5: ESTABLISHING A CULTURE OF CYBERSECURITY; CHAPTER 6: INCREASING INTERNATIONALISM: GOVERNANCE, LAWS, AND ETHICS; CHAPTER 7: STANDARDS: WHAT ARE THEY AND WHY SHOULD WE CARE?; CHAPTER 8: FROM CYBERWAR TO CYBERDEFENCE: APPLYING STANDARDS IN AN ENVIRONMENT OF CHANGE AND DANGER | |
505 | 8 | |a CHAPTER 9: CONCLUSION: WHERE DO WE GO FROM HERE?APPENDIX 1: GAP ANALYSIS AREAS OF INTEREST; APPENDIX 2: STANDARDS CROSSWALK; DEFINITIONS; ACRONYMS; INDEX | |
520 | |a CyberWar, CyberTerror, CyberCrime provides a stark and timely analysis of the increasingly hostile online landscape that today's corporate systems inhabit, and gives a practical introduction to the defensive strategies that can be employed in response. | ||
546 | |a English. | ||
590 | |a ProQuest Ebook Central |b Ebook Central Academic Complete | ||
590 | |a O'Reilly |b O'Reilly Online Learning: Academic/Public Library Edition | ||
650 | 0 | |a Computer crimes |x Prevention. | |
650 | 0 | |a Cyberterrorism |x Prevention. | |
650 | 0 | |a Computer networks |x Security measures |x Standards. | |
650 | 0 | |a Computer networks |x Security measures |x Quality control. | |
650 | 0 | |a Internet |x Security measures. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures |x Normes. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures |x Qualité |x Contrôle. | |
650 | 6 | |a Internet |x Sécurité |x Mesures. | |
650 | 7 | |a Computer crimes |x Prevention. |2 blmlsh | |
650 | 7 | |a Cyberterrorism |x Prevention. |2 blmlsh | |
650 | 7 | |a Computer networks |x Security measures |x Standards. |2 blmlsh | |
650 | 7 | |a Computer networks |x Security measures |x Quality control. |2 blmlsh | |
650 | 7 | |a Internet |x Security measures. |2 blmlsh | |
650 | 7 | |a Computer crimes |x Prevention |2 fast | |
650 | 7 | |a Computer networks |x Security measures |x Standards |2 fast | |
650 | 7 | |a Cyberterrorism |x Prevention |2 fast | |
650 | 7 | |a Internet |x Security measures |2 fast | |
776 | 0 | 8 | |i Print version: Mehan, Julie E. |t Cyberwar, cyberterror, cybercrime. |d Ely : IT Governance, 2008 |z 9781905356478 |w (OCoLC)232538263 |
856 | 4 | 0 | |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=480406 |z Texto completo |
856 | 4 | 0 | |u https://learning.oreilly.com/library/view/~/9781905356478/?ar |z Texto completo |
938 | |a Askews and Holts Library Services |b ASKH |n AH25564876 | ||
938 | |a Books 24x7 |b B247 |n bks00034419 | ||
938 | |a ebrary |b EBRY |n ebr10438090 | ||
994 | |a 92 |b IZTAP |