|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
EBOOKCENTRAL_on1020319459 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
180125s2018 mau ob 001 0 eng d |
040 |
|
|
|a N$T
|b eng
|e rda
|e pn
|c N$T
|d YDX
|d EBLCP
|d COO
|d CNCGM
|d IDB
|d MNW
|d XUN
|d CEF
|d CUY
|d OCLCQ
|d STF
|d UAB
|d MERUC
|d MITPR
|d OCLCQ
|d U3W
|d LEAUB
|d TEFOD
|d S2H
|d OCLCO
|d OCLCQ
|d K6U
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCL
|
019 |
|
|
|a 1021095171
|a 1030718111
|a 1030796424
|a 1031331876
|a 1031877365
|a 1032573195
|a 1032649761
|
020 |
|
|
|a 9780262346641
|q (electronic bk.)
|
020 |
|
|
|a 0262346648
|q (electronic bk.)
|
020 |
|
|
|a 9780262346658
|q (electronic bk.)
|
020 |
|
|
|a 0262346656
|q (electronic bk.)
|
020 |
|
|
|z 9780262535373
|
020 |
|
|
|z 0262535378
|
029 |
1 |
|
|a AU@
|b 000062613877
|
029 |
1 |
|
|a AU@
|b 000065060171
|
029 |
1 |
|
|a AU@
|b 000068876424
|
035 |
|
|
|a (OCoLC)1020319459
|z (OCoLC)1021095171
|z (OCoLC)1030718111
|z (OCoLC)1030796424
|z (OCoLC)1031331876
|z (OCoLC)1031877365
|z (OCoLC)1032573195
|z (OCoLC)1032649761
|
037 |
|
|
|a 11636
|b MIT Press
|
037 |
|
|
|a 9780262346641
|b MIT Press
|
037 |
|
|
|a 2C73B089-4565-484A-AC49-7CC8546782F6
|b OverDrive, Inc.
|n http://www.overdrive.com
|
050 |
|
4 |
|a TK5105.59
|b .N3464 2018eb
|
072 |
|
7 |
|a BUS
|x 082000
|2 bisacsh
|
072 |
|
7 |
|a BUS
|x 041000
|2 bisacsh
|
072 |
|
7 |
|a BUS
|x 042000
|2 bisacsh
|
072 |
|
7 |
|a BUS
|x 085000
|2 bisacsh
|
082 |
0 |
4 |
|a 658.4/78
|2 23
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a New solutions for cybersecurity /
|c edited by Howard Shrobe, David L. Shrier, and Alex Pentland.
|
264 |
|
1 |
|a Cambridge, MA :
|b MIT Press,
|c [2018]
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a data file
|
347 |
|
|
|a text file
|
347 |
|
|
|b PDF
|
490 |
1 |
|
|a MIT Connection Science and Engineering Ser.
|
504 |
|
|
|a Includes bibliographical references and index.
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Intro; CONTENTS; INTRODUCTION: Cybersecurity and Society; SECTION I MANAGEMENT, ORGANIZATIONS & STRATEGY; CHAPTER 1 Institutions for Cybersecurity: International Responses and Data Sharing Initiatives; CHAPTER 2 Cybersafety: A Systems Theory Approach to Managing Cybersecurity Risksâ#x80;#x94;Applied to TJX Cyberattack; CHAPTER 3 Measuring Stakeholdersâ#x80;#x99; Perceptions of Cybersecurity for Renewable Energy Systems; CHAPTER 4 Fixing a Hole: The Labor Market for Bugs; SECTION II ARCHITECTURE; CHAPTER 5 Balancing Disruption and Deployability in the CHERI Instruction-Set Architecture (ISA).
|
505 |
8 |
|
|a CHAPTER 6 Fundamental Trustworthiness Principles in CHERICHAPTER 7 ISPâ#x80;#x94;Hardware Enforcement of Security Policies; CHAPTER 8 Stealing Reality: When Criminals Become Data Scientists; CHAPTER 9 Moving Target Techniques: Cyber Resilience through Randomization, Diversity, and Dynamism; SECTION III SYSTEMS; CHAPTER 10 Who's Afraid of the Dark Web?; CHAPTER 11 Social Physics and Cybercrime; CHAPTER 12 Behavioral Biometrics; CHAPTER 14 Owner Centric Access Management for IoT Data; CHAPTER 15 Enigma: Decentralized Computation Platform with Guaranteed Privacy.
|
505 |
8 |
|
|a CHAPTER 16 The Trust::Data Framework as a Solution to the Cybersecurity ChallengeConclusion; Contributor Biographies.
|
520 |
|
|
|a Experts from MIT explore recent advances in cybersecurity, bringing together management, technical, and sociological perspectives.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Internet
|x Security measures.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Internet
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Industrial Management.
|2 bisacsh
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Management.
|2 bisacsh
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Management Science.
|2 bisacsh
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Organizational Behavior.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Internet
|x Security measures
|2 fast
|
653 |
|
|
|a INFORMATION SCIENCE/Information Systems
|
700 |
1 |
|
|a Shrobe, Howard E.,
|e editor.
|
700 |
1 |
|
|a Shrier, David L.,
|e editor.
|
700 |
1 |
|
|a Pentland, Alex,
|d 1952-
|e editor.
|1 https://id.oclc.org/worldcat/entity/E39PBJx4vg6bb9qGyQc64994bd
|
758 |
|
|
|i has work:
|a New solutions for cybersecurity (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCFtWmw4THWDHGTDcRymGHC
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|t New solutions for cybersecurity.
|d Cambridge, MA : MIT Press, [2018]
|z 9780262535373
|w (DLC) 2017040417
|w (OCoLC)1003255394
|
830 |
|
0 |
|a MIT Connection Science and Engineering Ser.
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=5240456
|z Texto completo
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL5240456
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1694039
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 15111609
|
994 |
|
|
|a 92
|b IZTAP
|