|
|
|
|
LEADER |
00000cam a2200000Mi 4500 |
001 |
EBOOKCENTRAL_on1099983084 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr |n|---||||| |
008 |
190504s2019 xx o 000 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d OCLCQ
|d AJB
|d OCLCQ
|d OCLCO
|d OCLCL
|
020 |
|
|
|a 9781119085201
|
020 |
|
|
|a 1119085209
|
029 |
1 |
|
|a AU@
|b 000065307424
|
035 |
|
|
|a (OCoLC)1099983084
|
050 |
0 |
0 |
|a QA76.9.A25
|b RA36 2019
|
082 |
0 |
4 |
|a 005.8
|q OCoLC
|2 23/eng/20230216
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Ellis, Ryan.
|
245 |
1 |
0 |
|a Rewired :
|b the Past, Present, and Future of Cybersecurity.
|
260 |
|
|
|a Somerset :
|b John Wiley & Sons, Incorporated,
|c 2019.
|
300 |
|
|
|a 1 online resource (354 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Intro; Title Page; Copyright Page; Contents; Notes on Contributors: Introduction; Acknowledgments; Introduction; Chapter 1 Cybersecurity Information-Sharing Governance Structures: An Ecosystem of Diversity, Trust, and Trade-offs; 1.1 Introduction; 1.2 Taxonomy of Information-sharing Governance Structures and Policies; 1.2.1 Government-centric Sharing Models; 1.2.2 Government-Prompted, Industry-Centric Sharing Models; 1.2.3 Corporate-initiated, Peer-based Groups; 1.2.4 Small, Highly Vetted, Individual-based Groups; 1.2.5 Open Communities and Platforms
|
505 |
8 |
|
|a 1.2.6 Proprietary Products and Commercialized Services1.3 Discussion and Conclusions; 1.3.1 Trust and the Trade-offs; 1.3.2 The Ecosystem and the Role of the Federal Government; Acknowledgments; Notes; Chapter 2 Cybersecurity Governance in the GCC; 2.1 Introduction; 2.2 Why the GCC?; 2.3 Key Cybersecurity Incidents; 2.4 Government Organizations; 2.5 Strategies, Laws, and Standards; 2.6 The Cybersecurity Industry; 2.7 Conclusion; Acknowlegments; Notes; Chapter 3 The United Kingdom's Emerging Internet of Things (IoT) Policy Landscape; 3.1 Introduction; 3.2 The IoT's Risks and Uncertainties
|
505 |
8 |
|
|a 3.3 Adaptive Policymaking in the Context of IoT3.4 The UK Policy Landscape; 3.5 The IoT and its Governance Challenges; 3.6 Conclusion; Notes; Chapter 4 Birds of a Feather: Strategies for Collective Cybersecurity in the Aviation Ecosystem; 4.1 Introduction: The Challenge of Ecosystem Risk; 4.1.1 Aviation Is a National and Global Target; 4.1.1.1 The Cyber Harm; 4.1.1.2 Economic Harm; 4.1.1.3 Political/Governmental Harm; 4.1.1.4 Reputational Harm; 4.1.1.5 Physical Harm; 4.1.1.6 Psychological and Emotional Harm; 4.1.2 Domestic and International Challenges of Aviation Governance
|
505 |
8 |
|
|a 4.2 Progress So Far4.2.1 The AIAA's Decision Paper, "The Connectivity Challenge: Protecting Critical Assets in a Networked World" (August 2013); 4.2.2 The Aviation Information Sharing and Analysis Center (A-ISAC) (September 2014); 4.2.3 The Civil Aviation Cybersecurity Action Plan (December 2014); 4.2.4 Connecting the Dots on Connectivity (2015); 4.2.5 Hackers Allege Aircraft Vulnerabilities (2015); 4.2.6 United Airlines Opens Bug Bounty Program (2015); 4.2.7 Aviation Security World Conference (2015); 4.2.8 Conferences and Organizations Mature (2015 and Beyond)
|
505 |
8 |
|
|a 4.2.9 Industry Takes the Lead (2017)4.3 Aviation's Tools for Cyber Risk Governance; 4.4 The Path Forward; 4.4.1 Collective Third-Party Risk Management; 4.4.2 Secure Design; 4.4.3 Information Sharing, "Plus"; 4.4.4 International Norms and Standards; 4.5 Conclusion; Notes; Chapter 5 An Incident-Based Conceptualization of Cybersecurity Governance; 5.1 Introduction; 5.2 Conceptualizing Cybersecurity Governance; 5.3 Case Studies; 5.3.1 RUAG; 5.3.1.1 Background; 5.3.1.2 Events; 5.3.1.3 Learnings; 5.3.2 The Conficker Working Group; 5.3.2.1 Background; 5.3.2.2 Events; 5.3.2.3 Learnings
|
500 |
|
|
|a 5.3.3 Symantec's Cybersecurity Practices
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
700 |
1 |
|
|a Mohan, Vivek.
|
758 |
|
|
|i has work:
|a Rewired (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCYWYdqRGwwmHBFBpGpYkQm
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|a Ellis, Ryan.
|t Rewired : The Past, Present, and Future of Cybersecurity.
|d Somerset : John Wiley & Sons, Incorporated, ©2019
|z 9781118888216
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=5761058
|z Texto completo
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL5761058
|
994 |
|
|
|a 92
|b IZTAP
|