000 04561cam a2200853Ia 4500
001 ocn793103968
003 OCoLC
005 20171114095957.0
006 m o d
007 cr cn|||||||||
008 120504s2012 njua ob 001 0 eng d
020 _a9781118241530
_q(electronic bk.)
020 _a1118241533
_q(electronic bk.)
020 _a9781299189324
_q(MyiLibrary)
020 _a1299189326
_q(MyiLibrary)
020 _a9781118241486
_q(electronic bk.)
020 _a1118241487
_q(electronic bk.)
020 _a9781118241325
_q(electronic bk.)
020 _a1118241320
_q(electronic bk.)
020 _z9781118027806
_q(hardback)
020 _z1118027809
_q(hardback)
028 0 1 _aEB00063197
_bRecorded Books
029 1 _aAU@
_b000049569302
029 1 _aAU@
_b000058044058
029 1 _aCHNEW
_b000721048
029 1 _aDEBBG
_bBV040884851
029 1 _aDEBBG
_bBV042032114
029 1 _aDEBSZ
_b397179367
029 1 _aDEBSZ
_b414175816
029 1 _aDEBSZ
_b425884554
029 1 _aDEBSZ
_b431068224
029 1 _aDEBSZ
_b449273040
029 1 _aNZ1
_b15915664
035 _a(OCoLC)793103968
_z(OCoLC)784883605
_z(OCoLC)839375200
_z(OCoLC)864909227
_z(OCoLC)876046653
_z(OCoLC)961516430
_z(OCoLC)962633879
037 _a10.1002/9781118241530
_bWiley InterScience
_nhttp://www3.interscience.wiley.com
037 _aA9764CBA-2719-4E3F-A4E6-B346B9891F34
_bOverDrive, Inc.
_nhttp://www.overdrive.com
040 _aDG1
_beng
_epn
_cDG1
_dWAU
_dYDXCP
_dOCLCQ
_dE7B
_dCDX
_dCOO
_dIDEBK
_dOCLCF
_dNLGGC
_dEBLCP
_dN$T
_dTEFOD
_dANG
_dDEBSZ
_dUMI
_dUKDOC
_dDEBBG
_dOCLCQ
_dRECBK
_dTEFOD
_dOCLCQ
_dLWU
_dOCLCQ
_dAZK
_dDG1
049 _aMAIN
050 4 _aQA76.9.A25
_bC91917 2012
072 7 _aCOM
_x060040
_2bisacsh
072 7 _aCOM
_x043050
_2bisacsh
072 7 _aCOM
_x053000
_2bisacsh
082 0 4 _a005.8
_223
084 _a54.84
_2bcl
084 _a54.62
_2bcl
084 _a54.32
_2bcl
245 0 0 _aCyber security policy guidebook /
_cJennifer L. Bayuk [and others].
_h[electronic resource]
260 _aHoboken, N.J. :
_bWiley,
_c©2012.
300 _a1 online resource (xvi, 270 pages) :
_billustrations
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _adata file
_2rda
380 _aBibliography
504 _aIncludes bibliographical references and index.
505 0 _aFrontmatter -- Introduction -- Cyber Security Evolution -- Cyber Security Objectives -- Guidance for Decision Makers -- The Catalog Approach -- Cyber Security Policy Catalog -- One Government's Approach to Cyber Security Policy -- Conclusion -- Glossary -- References -- Index.
520 _a"Drawing upon a wealth of experience from academia, industry, and government service, this book details and dissects current organizational cybersecurity policy issues on a global scale. Using simple language, it includes a thorough description of each issue, lists pros and cons, documents policy alternatives for the sake of clarity with respect to policy alone, and dives into organizational implementation issues. It also equips the reader with descriptions of the impact of specific policy choices, both positive and negative. This book gives students, scholars, and technical decision-makers the necessary knowledge of cybersecurity policy in order to make more informed decisions"--Provided by publisher.
520 _a"This book is a taxonomy and thesaurus of current cybersecurity policy issues, including a thorough description of each issue and a corresponding list of pros and cons with respect to identified stances on each issue"--Provided by publisher.
588 0 _aPrint version record.
650 0 _aInformation technology
_xGovernment policy.
650 0 _aComputer security
_xGovernment policy.
650 0 _aData protection
_xGovernment policy.
650 4 _aCOMPUTERS
_eSecurity
_xGeneral.
650 4 _aElectronic books.
650 7 _aCOMPUTERS
_xSecurity
_xGeneral.
_2bisacsh
650 7 _aComputer security
_xGovernment policy.
_2fast
_0(OCoLC)fst00872490
650 7 _aData protection
_xGovernment policy.
_2fast
_0(OCoLC)fst00887961
650 7 _aInformation technology
_xGovernment policy.
_2fast
_0(OCoLC)fst00973106
655 4 _aElectronic books.
700 1 _aBayuk, Jennifer L.
776 0 8 _iPrint version:
_tCyber security policy guidebook.
_dHoboken, N.J. : Wiley, ©2012
_z9781118027806
_w(DLC) 2011036017
_w(OCoLC)694396524
856 4 0 _uhttp://onlinelibrary.wiley.com/book/10.1002/9781118241530
_zWiley Online Library
942 _2ddc
_cBK
999 _c205886
_d205886