Cyber Insecurity : (Record no. 3679)

MARC details
000 -LEADER
fixed length control field 04383cam a2200433 i 4500
001 - CONTROL NUMBER
control field 19345057
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240325112937.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 161024s2016 mdua b 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2016041742
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781442272842 (cloth : alk. paper)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1442272848 (cloth : alk. paper)
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Language of cataloging eng
Transcribing agency DLC
Description conventions rda
Modifying agency DLC
042 ## - AUTHENTICATION CODE
Authentication code pcc
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number HV6773
Item number .C91 2016
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 364.4
Edition number 23
245 00 - TITLE STATEMENT
Title Cyber Insecurity :
Remainder of title navigating the perils of the next information age /
Statement of responsibility, etc. edited by Richard M. Harrison and Trey Herr.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Lanham :
Name of producer, publisher, distributor, manufacturer Rowman & Littlefield,
Date of production, publication, distribution, manufacture, or copyright notice [2016].
300 ## - PHYSICAL DESCRIPTION
Extent xx, 391 pages :
Other physical details illustrations ;
Dimensions 24 cm
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term unmediated
Media type code n
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term volume
Carrier type code nc
Source rdacarrier
500 ## - GENERAL NOTE
General note Published in association with The America Foreign Policy Council.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
520 ## - SUMMARY, ETC.
Assigning source Provided by Publisher.
524 ## - PREFERRED CITATION OF DESCRIBED MATERIALS NOTE
Preferred citation of described materials note Foreword / Honorable Richard J. Danzig -- Introduction / Trey Herr and Richard M. Harrison -- Section I: Securing Data, Devices, and Networks. Understanding information assurance / Eric Ormes and Trey Herr -- A path to collective security: information sharing at the state and local level / David Weinstein -- Protecting industrial control systems in critical infrastructure / Robert M. Lee -- Safety at any speed: the roads ahead for automotive cyber safety policy / Joshua Corman and Beau Woods -- Bad code: exploring liability in software development / Jane Chong -- Section II: Combating Cyber Crime. Understanding cyber crime / Sasha Romanosky and Trey Herr -- Disrupting malware markets / Trey Herr and Ryan Ellis -- The Computer Fraud and Abuse Act: structure, controversies, and proposals for reform / Paul Ohm -- Breach notification laws: the policy and practice / Sasha Romanosky -- Cyber insurance: a market-based approach to information assurance / Robert Morgus -- Section III: Governing the Security of the Internet. Understanding internet security governance / Trey Herr and Heather West -- A holistic approach to the encryption debate / Aaron Brantly -- Certificate authorities: modernizing the internet's chain of trust / Adrienne Allen -- Multistakeholder approaches to cybersecurity challenges / Allan Friedman and Jonah F. Hill -- Countering the proliferation of malware / Trey Herr and Paul Rosenzweig -- Section IV: Military Cyber Operations. Understanding military cyber operations / Trey Herr and Drew Herrick -- Government acquisition and use of zero-day software vulnerabilities / Mailyn Fidler -- The Joint Cyber Force: challenges and opportunities / Jason Rivera, Lauren Boas Hayes, Anastasia Mark, Matthew Russell, and Nathaniel Tisa -- The practical impact of classification regarding offensive cyber operations / Herbert S. Lin and Taylor Grossman -- Creating influence through information / Kat Dransfield, Abraham Wagner, and Rand Waltzman -- Concluding remarks / Trey Herr an Richard M. Harrison.
526 ## - STUDY PROGRAM INFORMATION NOTE
Program name Growing dependence on cyberspace for commerce, communication, governance, and military operations has left society vulnerable to a multitude of security threats. Mitigating the inherent risks associated with the use of cyberspace poses a series of thorny public policy problems. In this volume, academics, practitioners from both private sector and government, along with former service members come together to highlight sixteen of the most pressing contemporary challenges in cybersecurity, and to offer recommendations for the future. As internet connectivity continues to spread, this book will offer readers greater awareness of the threats of tomorrow--and serve to inform public debate into the next information age.--
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer crimes
General subdivision Prevention.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Telecommunication
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cyberterrorism
General subdivision Prevention.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Internet governance.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Harrison, Richard M.,
Dates associated with a name 1981-
Relator term editor.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Herr, Trey,
Relator term editor.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Online version:
Title Cyber insecurity
Place, publisher, and date of publication Lanham : Rowman & Littlefield, [2016]
International Standard Book Number 9781442272859
Record control number (DLC) 2016049287
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 7
b cbc
c orignew
d 1
e ecip
f 20
g y-gencatlg
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Library of Congress Classification
Koha item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Shelving location Date acquired Source of acquisition Cost, normal purchase price Total Checkouts Total Renewals Full call number Barcode Date last seen Date checked out Copy number Cost, replacement price Price effective from Koha item type
    Library of Congress Classification     General Collection Rabdan Academy Rabdan Academy General Stacks 03/11/2018 UBH 191.00 1 3 HV6773 .C91 2016 158591 11/22/2021 01/19/2020 1 220.00 03/11/2018 Books


Towards A More Resilient Nation
Follow @RabdanAcademy