|
|
|
|
LEADER |
00000cam a2200000Ia 4500 |
001 |
EBSCO_ocn144618603 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
050324s2000 dcu o 000 0 eng d |
040 |
|
|
|a COCUF
|b eng
|e pn
|c COCUF
|d OCLCQ
|d N$T
|d YDXCP
|d OCLCQ
|d DKDLA
|d MERUC
|d CCO
|d E7B
|d OCLCQ
|d FVL
|d OCLCQ
|d TFW
|d OCLCQ
|d OCLCF
|d OCLCQ
|d EBLCP
|d OCLCQ
|d AGLDB
|d MOR
|d PIFBR
|d ZCU
|d OCLCQ
|d U3W
|d OCLCA
|d BUF
|d STF
|d OCLCQ
|d VTS
|d COCUF
|d ICG
|d AU@
|d OCLCQ
|d WYU
|d LVT
|d TKN
|d G3B
|d DKC
|d OCLCQ
|d K6U
|d OCLCQ
|d OCLCO
|d AAU
|d OCLCQ
|
019 |
|
|
|a 58596250
|a 481900855
|a 488738662
|a 560258042
|a 646728111
|a 722334230
|a 728012273
|a 923271799
|
020 |
|
|
|a 0309580226
|q (electronic bk.)
|
020 |
|
|
|a 9780309580229
|q (electronic bk.)
|
029 |
1 |
|
|a AU@
|b 000025090378
|
029 |
1 |
|
|a AU@
|b 000050983464
|
029 |
1 |
|
|a DEBBG
|b BV043140895
|
029 |
1 |
|
|a DEBBG
|b BV044108193
|
029 |
1 |
|
|a DEBSZ
|b 422347914
|
029 |
1 |
|
|a GBVCP
|b 802298524
|
029 |
1 |
|
|a NZ1
|b 12047050
|
035 |
|
|
|a (OCoLC)144618603
|z (OCoLC)58596250
|z (OCoLC)481900855
|z (OCoLC)488738662
|z (OCoLC)560258042
|z (OCoLC)646728111
|z (OCoLC)722334230
|z (OCoLC)728012273
|z (OCoLC)923271799
|
037 |
|
|
|b 00017961
|
043 |
|
|
|a n-us---
|
050 |
|
4 |
|a QA76.9.A25
|b S86 2000eb
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Summary of discussions at a planning meeting on cyber-security and the insider threat to classified information /
|c Computer Science and Telecommunications Board.
|
260 |
|
|
|a Washington, D.C. :
|b National Academies Press,
|c 2000.
|
300 |
|
|
|a 1 online resource (16 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a SUMMARY OF DISCUSSIONS AT A PLANNING MEETING ON CYBER-SECURITY AND THE INSIDER THREAT TO CLASSIFIED INFORMATION -- 1. INTRODUCTION -- 2. HIGH-GRADE THREATS AND HIGH-VALUE TARGETS -- 3. PSYCHOLOGICAL, SOCIAL, LEGAL AND MANAGERIAL ASPECTS OF THE INSIDER THREAT -- Differing Categories of and Motivations for Insiders -- Need for Data and Modeling Techniques -- Management Issues -- Legal Issues -- 4. TECHNOLOGY, PRESENT AND FUTURE -- Technologies in Use and Their Limitations -- Emerging Tools -- 5. OPTIONS FOR CSTB -- NEXT STEPS
|
505 |
8 |
|
|a APPENDIX A ON THE NATIONAL ACADEMIESAPPENDIX B PLANNING MEETING ON CYBER-SECURITY AND THE INSIDER THREAT TO CLASSIFIEDINFORMATION-NOVEMBER 1�2, 2000LIST OF� -- APPENDIX C MEETING AGENDA
|
520 |
|
|
|a OF DISCUSSIONS AT A PLANNING MEETING ON CYBER-SECURITY AND THE INSIDER THREAT TO CLASSIFIED INFORMATION -- 1. INTRODUCTION -- 2. HIGH-GRADE THREATS AND HIGH-VALUE TARGETS -- 3. PSYCHOLOGICAL, SOCIAL, LEGAL AND MANAGERIAL ASPECTS OF THE INSIDER THREAT -- Differing Categories of and Motivations for Insiders -- Need for Data and Modeling Techniques -- Management Issues -- Legal Issues -- 4. TECHNOLOGY, PRESENT AND FUTURE -- Technologies in Use and Their Limitations -- Emerging Tools -- 5. OPTIONS FOR CSTB -- NEXT STEPS: -- APPENDIX A ON THE NATIONAL ACADEMIES.
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Information warfare.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Guerre de l'information.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a Information warfare.
|2 fast
|0 (OCoLC)fst00973186
|
710 |
2 |
|
|a National Research Council (U.S.).
|b Computer Science and Telecommunications Board.
|
776 |
0 |
8 |
|i Print version:
|a Council, National Research.
|t Summary of Discussions at a Planning Meeting on Cyber-Security and the Insider Threat to Classified Information.
|d Washington : National Academies Press, ©1900
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=123514
|z Texto completo
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL3377658
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10071977
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 123514
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 2293969
|
994 |
|
|
|a 92
|b IZTAP
|