|
|
|
|
LEADER |
00000cam a2200000Mu 4500 |
001 |
JSTOR_ocn609854817 |
003 |
OCoLC |
005 |
20231005004200.0 |
006 |
m o d |
007 |
cr n||---||||| |
008 |
100427s2008 xx o 000 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d MERUC
|d STF
|d IDEBK
|d OCLCQ
|d N$T
|d OCLCQ
|d DEBSZ
|d JSTOR
|d NLGGC
|d OCLCO
|d OCLCQ
|d YDXCP
|d OCLCQ
|d AGLDB
|d CUS
|d ZCU
|d OCLCQ
|d OCLCA
|d IOG
|d OCLCF
|d VNS
|d OCLCQ
|d VTS
|d ICG
|d OCLCQ
|d LVT
|d DKC
|d OCLCQ
|d M8D
|d OCLCQ
|d MM9
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 536370632
|a 741345201
|a 1087381681
|a 1264754405
|a 1297489742
|a 1297571253
|
020 |
|
|
|a 9781905356485
|q (electronic bk.)
|
020 |
|
|
|a 190535648X
|q (electronic bk.)
|
029 |
1 |
|
|a AU@
|b 000054172906
|
029 |
1 |
|
|a DEBBG
|b BV043067171
|
029 |
1 |
|
|a DEBBG
|b BV044141744
|
029 |
1 |
|
|a DEBSZ
|b 396333583
|
029 |
1 |
|
|a DEBSZ
|b 421529555
|
029 |
1 |
|
|a AU@
|b 000073102132
|
035 |
|
|
|a (OCoLC)609854817
|z (OCoLC)536370632
|z (OCoLC)741345201
|z (OCoLC)1087381681
|z (OCoLC)1264754405
|z (OCoLC)1297489742
|z (OCoLC)1297571253
|
037 |
|
|
|a 22573/ctt4k5pjh
|b JSTOR
|
050 |
|
4 |
|a HV6773
|b .M44 2008eb
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Mehan, Julie E.,
|e author.
|
245 |
1 |
0 |
|a CyberWar, CyberTerror, CyberCrime.
|
260 |
|
|
|a Ely :
|b IT Governance Pub.,
|c 2008.
|
300 |
|
|
|a 1 online resource (281 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
505 |
0 |
|
|a Introduction; chapter 1: what technology giveth it taketh away; chapter 2: cyberattack: it's a dangerous world for information systems; chapter 3: the human factor: the underrated threat; chapter 4: transition from an environment of 'fud' to a standards-based environment; chapter 5: establishing a culture of cybersecurity; chapter 6: increasing internationalism: governance, laws, and ethics; chapter 7: standards: what are they and why should we care?; chapter 8: from cyberwar to cyberdefence: applying standards in an environment of change and danger.
|
505 |
8 |
|
|a Chapter 9: conclusion: where do we go from here?appendix 1: gap analysis areas of interest; appendix 2: standards crosswalk; definitions; acronyms; index.
|
520 |
|
|
|a CyberWar, CyberTerror, CyberCrime provides a stark and timely analysis of the increasingly hostile online landscape that today's corporate systems inhabit, and gives a practical introduction to the defensive strategies that can be employed in response.
|
588 |
0 |
|
|a Print version record.
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Evidence Based Acquisitions
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Demand Driven Acquisitions (DDA)
|
590 |
|
|
|a JSTOR
|b Books at JSTOR All Purchased
|
650 |
|
0 |
|a Computer crimes
|x Prevention.
|
650 |
|
0 |
|a Cyberterrorism
|x Prevention.
|
650 |
|
0 |
|a Computer networks
|x Security measures
|x Standards.
|
650 |
|
0 |
|a Computer networks
|x Security measures
|x Quality control.
|
650 |
|
0 |
|a Internet
|x Security measures.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures
|x Normes.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures
|x Qualité
|x Contrôle.
|
650 |
|
6 |
|a Internet
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer crimes
|x Prevention.
|2 fast
|0 (OCoLC)fst00872068
|
650 |
|
7 |
|a Computer networks
|x Security measures
|x Standards.
|2 fast
|0 (OCoLC)fst00872345
|
650 |
|
7 |
|a Cyberterrorism
|x Prevention.
|2 fast
|0 (OCoLC)fst01905567
|
650 |
|
7 |
|a Internet
|x Security measures.
|2 fast
|0 (OCoLC)fst01751426
|
776 |
0 |
8 |
|i Print version:
|z 9781905356478
|
856 |
4 |
0 |
|u https://jstor.uam.elogim.com/stable/10.2307/j.ctt5hh594
|z Texto completo
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL480406
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 391090
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n 226359
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 3163670
|
994 |
|
|
|a 92
|b IZTAP
|