|
|
|
|
LEADER |
00000cam a2200000Ma 4500 |
001 |
OR_ocn652389822 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr zn||||||||| |
008 |
100601s2008 enka ob 001 0 eng d |
010 |
|
|
|z 2008396673
|
040 |
|
|
|a SFB
|b eng
|e pn
|c SFB
|d UMI
|d CEF
|d OCLCQ
|d E7B
|d B24X7
|d DEBSZ
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d COO
|d OCLCO
|d OCLCQ
|d OCLCO
|d AZK
|d OCLCO
|d AGLDB
|d MOR
|d PIFAG
|d LIV
|d ESU
|d OCLCQ
|d OCLCA
|d U3W
|d OCLCF
|d STF
|d WRM
|d INT
|d VT2
|d OCLCQ
|d TKN
|d OCLCQ
|d UAB
|d UKAHL
|d HS0
|d VLY
|d BRF
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 679602776
|a 704517562
|a 764547914
|a 888949851
|a 961539406
|a 962634126
|a 1162394642
|a 1241817017
|a 1295606368
|a 1300696495
|
020 |
|
|
|z 9781905356478
|q (pbk.)
|
020 |
|
|
|z 1905356471
|q (pbk.)
|
020 |
|
|
|a 1282263595
|
020 |
|
|
|a 9781282263598
|
020 |
|
|
|a 9786612263590
|
020 |
|
|
|a 6612263598
|
029 |
1 |
|
|a AU@
|b 000053259403
|
029 |
1 |
|
|a DEBSZ
|b 355450747
|
029 |
1 |
|
|a HEBIS
|b 291520626
|
029 |
1 |
|
|a NZ1
|b 13869762
|
035 |
|
|
|a (OCoLC)652389822
|z (OCoLC)679602776
|z (OCoLC)704517562
|z (OCoLC)764547914
|z (OCoLC)888949851
|z (OCoLC)961539406
|z (OCoLC)962634126
|z (OCoLC)1162394642
|z (OCoLC)1241817017
|z (OCoLC)1295606368
|z (OCoLC)1300696495
|
037 |
|
|
|a CL0500000077
|b Safari Books Online
|
050 |
|
4 |
|a HV6773
|b .M44 2008eb
|
082 |
0 |
4 |
|a 005.802/18
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Mehan, Julie E.
|
245 |
1 |
0 |
|a Cyberwar, cyberterror, cybercrime :
|b a guide to the role of standards in an environment of change and danger /
|c Julie E. Mehan.
|
260 |
|
|
|a Ely, UK :
|b IT Governance,
|c 2008.
|
300 |
|
|
|a 1 online resource (xi, 271 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a data file
|2 rda
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a INTRODUCTION; CHAPTER 1: WHAT TECHNOLOGY GIVETH IT TAKETH AWAY; CHAPTER 2: CYBERATTACK: IT'S A DANGEROUS WORLD FOR INFORMATION SYSTEMS; CHAPTER 3: THE HUMAN FACTOR: THE UNDERRATED THREAT; CHAPTER 4: TRANSITION FROM AN ENVIRONMENT OF 'FUD' TO A STANDARDS-BASED ENVIRONMENT; CHAPTER 5: ESTABLISHING A CULTURE OF CYBERSECURITY; CHAPTER 6: INCREASING INTERNATIONALISM: GOVERNANCE, LAWS, AND ETHICS; CHAPTER 7: STANDARDS: WHAT ARE THEY AND WHY SHOULD WE CARE?; CHAPTER 8: FROM CYBERWAR TO CYBERDEFENCE: APPLYING STANDARDS IN AN ENVIRONMENT OF CHANGE AND DANGER
|
505 |
8 |
|
|a CHAPTER 9: CONCLUSION: WHERE DO WE GO FROM HERE?APPENDIX 1: GAP ANALYSIS AREAS OF INTEREST; APPENDIX 2: STANDARDS CROSSWALK; DEFINITIONS; ACRONYMS; INDEX
|
520 |
|
|
|a CyberWar, CyberTerror, CyberCrime provides a stark and timely analysis of the increasingly hostile online landscape that today's corporate systems inhabit, and gives a practical introduction to the defensive strategies that can be employed in response.
|
546 |
|
|
|a English.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer crimes
|x Prevention.
|
650 |
|
0 |
|a Cyberterrorism
|x Prevention.
|
650 |
|
0 |
|a Computer networks
|x Security measures
|x Standards.
|
650 |
|
0 |
|a Computer networks
|x Security measures
|x Quality control.
|
650 |
|
0 |
|a Internet
|x Security measures.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures
|x Normes.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures
|x Qualité
|x Contrôle.
|
650 |
|
6 |
|a Internet
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a Computer crimes
|x Prevention.
|2 blmlsh
|
650 |
|
7 |
|a Cyberterrorism
|x Prevention.
|2 blmlsh
|
650 |
|
7 |
|a Computer networks
|x Security measures
|x Standards.
|2 blmlsh
|
650 |
|
7 |
|a Computer networks
|x Security measures
|x Quality control.
|2 blmlsh
|
650 |
|
7 |
|a Internet
|x Security measures.
|2 blmlsh
|
650 |
|
7 |
|a Computer crimes
|x Prevention
|2 fast
|
650 |
|
7 |
|a Computer networks
|x Security measures
|x Standards
|2 fast
|
650 |
|
7 |
|a Cyberterrorism
|x Prevention
|2 fast
|
650 |
|
7 |
|a Internet
|x Security measures
|2 fast
|
776 |
0 |
8 |
|i Print version: Mehan, Julie E.
|t Cyberwar, cyberterror, cybercrime.
|d Ely : IT Governance, 2008
|z 9781905356478
|w (OCoLC)232538263
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781905356478/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH25564876
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00034419
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10438090
|
994 |
|
|
|a 92
|b IZTAP
|