|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
JSTOR_ocn888035950 |
003 |
OCoLC |
005 |
20231005004200.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
140820s2014 enka ob 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e pn
|c UMI
|d CAUOI
|d B24X7
|d DEBBG
|d DEBSZ
|d JSTOR
|d COO
|d YDXCP
|d N$T
|d OCLCF
|d EBLCP
|d IDEBK
|d OCLCQ
|d TEFOD
|d OCLCQ
|d AGLDB
|d CUS
|d CUI
|d JBG
|d MERUC
|d OCLCQ
|d IOG
|d OCLCA
|d VTS
|d CEF
|d WAU
|d OCLCQ
|d LVT
|d STF
|d M8D
|d OCLCQ
|d AJS
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 890529932
|a 907519119
|
020 |
|
|
|a 9781849285728
|q (electronic bk.)
|
020 |
|
|
|a 1849285721
|q (electronic bk.)
|
020 |
|
|
|z 1849285713
|
020 |
|
|
|z 9781849285711
|
029 |
1 |
|
|a AU@
|b 000056008057
|
029 |
1 |
|
|a AU@
|b 000067040230
|
029 |
1 |
|
|a CHNEW
|b 000888590
|
029 |
1 |
|
|a CHVBK
|b 374475067
|
029 |
1 |
|
|a DEBBG
|b BV042182348
|
029 |
1 |
|
|a DEBSZ
|b 415542944
|
029 |
1 |
|
|a DEBSZ
|b 417230273
|
029 |
1 |
|
|a DEBSZ
|b 472838954
|
029 |
1 |
|
|a GBVCP
|b 804971714
|
035 |
|
|
|a (OCoLC)888035950
|z (OCoLC)890529932
|z (OCoLC)907519119
|
037 |
|
|
|a CL0500000466
|b Safari Books Online
|
037 |
|
|
|a 22573/ctt7z4f4c
|b JSTOR
|
037 |
|
|
|a F64A6000-ECF8-4944-9F65-EF5E8314D43F
|b OverDrive, Inc.
|n http://www.overdrive.com
|
050 |
|
4 |
|a HV6773
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.802/18
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Mehan, Julie E.,
|e author.
|
245 |
1 |
0 |
|a Cyberwar, cyberterror, cybercrime and cyberactivism :
|b an in-depth guide to the role of standards in cybersecurity environment /
|c Julie E. Mehan.
|
250 |
|
|
|a 2nd ed.
|
260 |
|
|
|a Ely, Cambridge, UK :
|b IT Governance Pub.,
|c 2014.
|
300 |
|
|
|a 1 online resource (348 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Online resource; title from title page (Safari, viewed August 7, 2014).
|
520 |
|
|
|a This book encourages cybersecurity professionals to take a wider view of what cybersecurity means, and to make the most of international standards and best practice to create a culture of cybersecurity awareness that complements technology-based defenses. This second edition analyzes the changing threats in the cyber landscape, and includes an updated body of knowledge that describes how to acquire, develop, and sustain a secure information environment that goes beyond technology and how to create a cyber-aware organizational culture that is more robust and better able to deal with a wider range of threats. --
|c Edited summary from book.
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a Cover; Title; Copyright; Preface; About the Author; Contents; Introduction; Chapter 1: Technology Is a Double-Edged Sword; From the printing press to the information age; The ''dark side of high tech''; Chapter 2: Cyber Attack: It''s A Dangerous World for Information Systems; Cyberwar; Cyberterror; Cybercrime; CyberEspionage (and Information Exfiltration) -- It''s midnight; do you know where your data is?; Social Media -- an opportunity and a challenge; Supply Chain (In- ) security; The blended threat; The asymmetric effects of cyber attacks; Porous perimeters, compromisable software -- or both?
|
505 |
8 |
|
|a If we know about the vulnerabilities, why are exploits still successful?Chapter 3: The Human Factor: The Underrated Threat; Are people the problem?; Who are the attackers?; Most likely forms of attack; Sometimes it''s just human error; People can also be the solution!; Chapter 4: Transition from an Environment of ''FUD'' to a Standards-Based Environment; Chapter 5: Establishing a Culture of Cybersecurity; Chapter 6: Increasing Internationalism: Governance, Laws, and Ethics; Information globalism equals increased exposure; Following the lead of good governance; The proliferation of laws.
|
505 |
8 |
|
|a Ethics in an information society and a minimum standard of due care in cybersecurityCybersecurity and privacy; Chapter 7: Standards: What Are They and Why Should We Care?; What are standards?; How and by whom are standards developed?; The importance of terminology; Standards-based process improvement; Focus on consensus-based cybersecurity; Standards provide a level playing-field for co-ordination and co-operation; If standards are so good, then why is it so hard?; Chapter 8: From Reaction to Proaction: Applying Standards in an Environment of Change and Danger.
|
505 |
8 |
|
|a Moving beyond compliance and reactionA quick look at relevant standards; Take four steps forward; The future is ''ROSI''; Making the case for cybersecurity assurance; Chapter 9: Conclusion: Where Do We Go From Here?; Cybersecurity program roadmap; Appendix 1: Gap Analysis Areas of Interest; Appendix 2: Standards Crosswalk; Definitions; Acronyms; Index; A; B; C; D; E; F; G; H; I; J; K; L; M; N; O; P; Q; R; S; T; U; V; W; X; Y; ITG Resources.
|
590 |
|
|
|a JSTOR
|b Books at JSTOR All Purchased
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Evidence Based Acquisitions
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Demand Driven Acquisitions (DDA)
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Hacking.
|
650 |
|
0 |
|a Electronics in military engineering.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Piratage informatique.
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Electronics in military engineering
|2 fast
|
650 |
|
7 |
|a Hacking
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a Mehan, Julie.
|t Cyberwar, Cyberterror, Cybercrime & Cyberactivism (2nd Edition) : An in-depth guide to the role of standards in the cybersecurity environment.
|d Ely : IT Governance Ltd, ©2014
|
856 |
4 |
0 |
|u https://jstor.uam.elogim.com/stable/10.2307/j.ctt7zsxqq
|z Texto completo
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00069065
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL1778762
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 838730
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n cis28005361
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 12069029
|
994 |
|
|
|a 92
|b IZTAP
|