|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
EBSCO_ocn947837594 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr ||||||||||| |
008 |
160615s2016 nyu ob 001 0 eng |
010 |
|
|
|a 2019721300
|
040 |
|
|
|a DLC
|b eng
|e rda
|e pn
|c DLC
|d N$T
|d YDX
|d SNK
|d DKU
|d AUW
|d IGB
|d D6H
|d OCLCF
|d VTS
|d AGLDB
|d G3B
|d S8J
|d S9I
|d STF
|d VLY
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 958083983
|a 958392401
|
020 |
|
|
|a 9781634847575
|q (pdf)
|
020 |
|
|
|a 1634847571
|
020 |
|
|
|z 1634847563
|
020 |
|
|
|z 9781634847568
|
029 |
1 |
|
|a AU@
|b 000062420327
|
035 |
|
|
|a (OCoLC)947837594
|z (OCoLC)958083983
|z (OCoLC)958392401
|
043 |
|
|
|a n-us---
|
050 |
|
4 |
|a HV6773.15.C97
|
072 |
|
7 |
|a BUS
|x 032000
|2 bisacsh
|
072 |
|
7 |
|a SOC
|x 000000
|2 bisacsh
|
082 |
0 |
4 |
|a 363.325
|2 23
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a National critical infrastructure policy :
|b background and select cybersecurity issues /
|c Sheldon Yates, editor.
|
264 |
|
1 |
|a New York :
|b Nova Publishers,
|c [2016]
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a data file
|
490 |
1 |
|
|a Defense, security and strategies
|
504 |
|
|
|a Includes bibliographical references and index.
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a NATIONAL CRITICAL INFRASTRUCTURE POLICY BACKGROUND AND SELECT CYBERSECURITY ISSUES ; NATIONAL CRITICAL INFRASTRUCTURE POLICY BACKGROUND AND SELECT CYBERSECURITY ISSUES ; Library of Congress Cataloging-in-Publication Data; CONTENTS ; PREFACE ; Chapter 1 CRITICAL INFRASTRUCTURES: BACKGROUND, POLICY, AND IMPLEMENTATION* ; Summary; Introduction; Federal Critical Infrastructure Protection Policy: In Brief; The President's Commission on Critical Infrastructure Protection; Presidential Decision Directive No. 63; Restructuring by the Bush Administration; Pre-September 11; Post-September 11
|
505 |
8 |
|
|a Executive OrdersNational Strategy for Homeland Security; HSPD-7; The Obama Administration; Initial Efforts; Cybersecurity Legislation and Executive Orders; PPD-21; Department of Homeland Security; Initial Establishment; Second Stage Review Reorganization; Post-Katrina Emergency Management Reform Act of 2006; Continued Organizational Evolution; Policy Implementation; Government-Sector Coordination; National Critical Infrastructure Plan; Information Sharing and Analysis Center (ISAC); Identifying Critical Assets, Assessing Vulnerability and Risk, and Prioritizing Protective Measures
|
505 |
8 |
|
|a Cybersecurity FrameworkIssues and Discussion; Information Sharing; Regulation; Appendix. Funding for Critical Infrastructure; Federal Funding for Critical Infrastructure Protection; FY2016 DHS Budget Request and Prior Year Appropriations for Infrastructure Protection and Information Security Program and Other Relevant DHS Budget Activities; IPIS; Other Infrastructure Related Programs; End Notes; Chapter 2 THE 2013 CYBERSECURITY EXECUTIVE ORDER: OVERVIEW AND CONSIDERATIONS FOR CONGRESS ; Summary; Background: Threats and Consequences; Cyberthreats; Cyberterrorists; Cyberspies; Cyberthieves
|
505 |
8 |
|
|a CyberwarriorsCyberhacktivists; Cyberthreats and Implications for U.S. Policy; Overview of the Executive Order; Information Sharing; Voluntary Cybersecurity Framework; Other Provisions; E.O. 13636 Implementation Deliverables and Deadlines; June 12, 2013; July 12, 2013; October 10, 2013; February 12, 2014; May 13, 2014; February 12, 2016; Relationship of the Executive Order to Presidential Policy Directive 21; PPD 21 Implementation Deliverables and Deadlines; June 12, 2013; July 12, 2013; August 11, 2013; October 10, 2013; February 12, 2015; Scope of Presidential Authority
|
505 |
8 |
|
|a Relationship to Legislative ProposalsReactions to the Executive Order; End Notes; Chapter 3 CYBERSECURITY ISSUES FOR THE BULK POWER SYSTEM* ; Summary; Introduction; Grid Components and Potential Vulnerabilities; Electric Utility Industrial Control Systems; Supervisory Control and Data Acquisition Systems; Distributed Control Systems; Modernization and the Smart Grid; Other Potential Vulnerabilities; Distributed Generation; Smart Meters; Supply Chains; The Grid Is Experiencing Cyber Intrusions; BlackEnergy; HAVEX; Sandworm; Mandatory Bulk Power Cybersecurity Standards
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Cyberterrorism
|z United States
|x Prevention.
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Infrastructure.
|2 bisacsh
|
650 |
|
7 |
|a SOCIAL SCIENCE
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Security measures
|x Government policy
|2 fast
|
650 |
|
7 |
|a Cyberterrorism
|x Prevention
|2 fast
|
651 |
|
7 |
|a United States
|2 fast
|
700 |
1 |
|
|a Yates, Sheldon,
|e editor.
|
776 |
0 |
8 |
|i Print version:
|t National critical infrastructure policy.
|d New York : Nova Publishers, [2016]
|z 1634847563
|w (DLC) 2016302276
|
830 |
|
0 |
|a Defense, security and strategy series.
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1226205
|z Texto completo
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1226205
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 12882098
|
994 |
|
|
|a 92
|b IZTAP
|