Cyber security policy guidebook / Jennifer L. Bayuk ... [et al.].
"Drawing upon a wealth of experience from academia, industry, and government service, this book details and dissects current organizational cybersecurity policy issues on a global scale. Using simple language, it includes a thorough description of each issue, lists pros and cons, documents poli...
Saved in:
: | |
---|---|
TeilnehmendeR: | |
Year of Publication: | 2012 |
Language: | English |
Online Access: | |
Physical Description: | xvi, 270 p. :; ill. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
500818205 |
---|---|
ctrlnum |
(MiAaPQ)500818205 (Au-PeEL)EBL818205 (CaPaEBR)ebr10630610 (CaONFJC)MIL450182 (OCoLC)793103968 |
collection |
bib_alma |
record_format |
marc |
spelling |
Cyber security policy guidebook [electronic resource] / Jennifer L. Bayuk ... [et al.]. Hoboken, N.J. : Wiley, c2012. xvi, 270 p. : ill. Includes bibliographical references (p. 255-265) and index. "Drawing upon a wealth of experience from academia, industry, and government service, this book details and dissects current organizational cybersecurity policy issues on a global scale. Using simple language, it includes a thorough description of each issue, lists pros and cons, documents policy alternatives for the sake of clarity with respect to policy alone, and dives into organizational implementation issues. It also equips the reader with descriptions of the impact of specific policy choices, both positive and negative. This book gives students, scholars, and technical decision-makers the necessary knowledge of cybersecurity policy in order to make more informed decisions"--Provided by publisher. Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries. Information technology Government policy. Computer security Government policy. Data protection Government policy. Electronic books. Bayuk, Jennifer L. ProQuest (Firm) https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=818205 Click to View |
language |
English |
format |
Electronic eBook |
author2 |
Bayuk, Jennifer L. ProQuest (Firm) |
author_facet |
Bayuk, Jennifer L. ProQuest (Firm) ProQuest (Firm) |
author2_variant |
j l b jl jlb |
author2_role |
TeilnehmendeR TeilnehmendeR |
author_corporate |
ProQuest (Firm) |
author_sort |
Bayuk, Jennifer L. |
title |
Cyber security policy guidebook |
spellingShingle |
Cyber security policy guidebook |
title_full |
Cyber security policy guidebook [electronic resource] / Jennifer L. Bayuk ... [et al.]. |
title_fullStr |
Cyber security policy guidebook [electronic resource] / Jennifer L. Bayuk ... [et al.]. |
title_full_unstemmed |
Cyber security policy guidebook [electronic resource] / Jennifer L. Bayuk ... [et al.]. |
title_auth |
Cyber security policy guidebook |
title_new |
Cyber security policy guidebook |
title_sort |
cyber security policy guidebook |
publisher |
Wiley, |
publishDate |
2012 |
physical |
xvi, 270 p. : ill. |
isbn |
9781118241486 (electronic bk.) |
callnumber-first |
Q - Science |
callnumber-subject |
QA - Mathematics |
callnumber-label |
QA76 |
callnumber-sort |
QA 276.9 A25 C91917 42012 |
genre |
Electronic books. |
genre_facet |
Electronic books. |
url |
https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=818205 |
illustrated |
Illustrated |
dewey-hundreds |
000 - Computer science, information & general works |
dewey-tens |
000 - Computer science, knowledge & systems |
dewey-ones |
005 - Computer programming, programs & data |
dewey-full |
005.8 |
dewey-sort |
15.8 |
dewey-raw |
005.8 |
dewey-search |
005.8 |
oclc_num |
793103968 |
work_keys_str_mv |
AT bayukjenniferl cybersecuritypolicyguidebook AT proquestfirm cybersecuritypolicyguidebook |
status_str |
n |
ids_txt_mv |
(MiAaPQ)500818205 (Au-PeEL)EBL818205 (CaPaEBR)ebr10630610 (CaONFJC)MIL450182 (OCoLC)793103968 |
is_hierarchy_title |
Cyber security policy guidebook |
author2_original_writing_str_mv |
noLinkedField noLinkedField |
_version_ |
1792330723323019266 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02163nam a2200397 a 4500</leader><controlfield tag="001">500818205</controlfield><controlfield tag="003">MiAaPQ</controlfield><controlfield tag="005">20200520144314.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">110824s2012 njua sb 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2011036017</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781118027806 (hardback)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1118027809 (hardback)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118241486 (electronic bk.)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)500818205</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL818205</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaPaEBR)ebr10630610</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaONFJC)MIL450182</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)793103968</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">C91917 2012</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Cyber security policy guidebook</subfield><subfield code="h">[electronic resource] /</subfield><subfield code="c">Jennifer L. Bayuk ... [et al.].</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Hoboken, N.J. :</subfield><subfield code="b">Wiley,</subfield><subfield code="c">c2012.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xvi, 270 p. :</subfield><subfield code="b">ill.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (p. 255-265) and index.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"Drawing upon a wealth of experience from academia, industry, and government service, this book details and dissects current organizational cybersecurity policy issues on a global scale. Using simple language, it includes a thorough description of each issue, lists pros and cons, documents policy alternatives for the sake of clarity with respect to policy alone, and dives into organizational implementation issues. It also equips the reader with descriptions of the impact of specific policy choices, both positive and negative. This book gives students, scholars, and technical decision-makers the necessary knowledge of cybersecurity policy in order to make more informed decisions"--Provided by publisher.</subfield></datafield><datafield tag="533" ind1=" " ind2=" "><subfield code="a">Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information technology</subfield><subfield code="x">Government policy.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="x">Government policy.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection</subfield><subfield code="x">Government policy.</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bayuk, Jennifer L.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">ProQuest (Firm)</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=818205</subfield><subfield code="z">Click to View</subfield></datafield></record></collection> |