Cybersecurity : (Record no. 7040)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 02427cam a2200325 i 4500 |
| 001 - CONTROL NUMBER | |
| control field | 18707358 |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20230825125520.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 150721s2015 flua b 001 0 eng |
| 010 ## - LIBRARY OF CONGRESS CONTROL NUMBER | |
| LC control number | 2015297283 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9781482239225 (hardback) |
| 040 ## - CATALOGING SOURCE | |
| Original cataloging agency | DLC |
| Language of cataloging | eng |
| Description conventions | rda |
| Transcribing agency | DLC |
| Modifying agency | D LC |
| 042 ## - AUTHENTICATION CODE | |
| Authentication code | pcc |
| 050 00 - LIBRARY OF CONGRESS CALL NUMBER | |
| Classification number | QA76.9.A25 |
| Item number | C957 2015 |
| 082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 364.16/8 |
| Edition number | 23 |
| 245 00 - TITLE STATEMENT | |
| Title | Cybersecurity : |
| Remainder of title | protecting critical infrastructures from cyber attack and cyber warfare / |
| Statement of responsibility, etc | edited by Thomas A. Johnson, Webster University, St. Louis, Missouri, USA. |
| 246 3# - VARYING FORM OF TITLE | |
| Title proper/short title | Cyber security |
| 264 #1 - | |
| -- | Boca Raton : |
| -- | CRC Press/Taylor & Francis Group, |
| -- | [2015] |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | xvi, 347 pages : |
| Other physical details | illustrations ; |
| Dimensions | 25 cm |
| 336 ## - | |
| -- | text |
| -- | txt |
| -- | rdacontent |
| 337 ## - | |
| -- | unmediated |
| -- | n |
| -- | rdamedia |
| 338 ## - | |
| -- | volume |
| -- | nc |
| -- | rdacarrier |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE | |
| Bibliography, etc | Includes bibliographical references and index. |
| 505 0# - FORMATTED CONTENTS NOTE | |
| Formatted contents note | Historical reference points in the computer industry and emerging challenges in cybersecurity / Thomas A. Johnson -- Critical infrastructures, key assets : a target-rich environment / Thomas A. Johnson -- Protection and engineering design issues in critical infrastructures / Fred Cohen -- Cyber intelligence, cyber conflicts, and cyber warfare / Thoams A. Johnson -- Cybersecurity : a primer of U.S. and international legal aspects / Julie Lowrie -- Economic cost of cybersecurity / Thomas A. Johnson -- Cybersecurity Threat landscape and future trends / Thomas A. Johnson. |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc | The World Economic Forum regards the threat of cyber attack as one of the top five global risks confronting nations of the world today. Cyber attacks are increasingly targeting the core functions of the economies in nations throughout the world. The threat to attack critical infrastructures, disrupt critical services, and induce a wide range of damage is becoming more difficult to defend against. Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare examines the current cyber threat landscape and discusses the strategies being used by governments and corporations. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Computer security. |
| 9 (RLIN) | 7483 |
| 700 1# - ADDED ENTRY--PERSONAL NAME | |
| Personal name | Johnson, Thomas A., |
| Relator term | editor. |
| 906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) | |
| a | 7 |
| b | cbc |
| c | origres |
| d | 2 |
| e | ncip |
| f | 20 |
| g | y-gencatlg |
| 925 0# - | |
| -- | Acquire |
| -- | 1 shelf copy |
| -- | policy default |
| 955 ## - COPY-LEVEL INFORMATION (RLIN) | |
| -- | rl01 2015-10-22 to CALM |
| -- | xl03 2015-10-23; |
No items available.
