It looks like you're offline.
Open Library logo
additional options menu

MARC Record from Library of Congress

Record ID marc_loc_updates/v40.i07.records.utf8:8532033:1706
Source Library of Congress
Download Link /show-records/marc_loc_updates/v40.i07.records.utf8:8532033:1706?format=raw

LEADER: 01706cam a2200313 a 4500
001 2011038756
003 DLC
005 20120208162332.0
008 111024s2012 flua b 001 0 eng
010 $a 2011038756
020 $a9781439846636 (pbk.)
040 $aDLC$cDLC$dDLC
042 $apcc
050 00 $aTK5105.59$b.C927 2012
082 00 $a352.3/79$223
084 $aCOM053000$aPOL002000$aPOL028000$2bisacsh
245 00 $aCybersecurity :$bpublic sector threats and responses /$cKim Andreasson.
260 $aBoca Raton, FL :$bCRC Press,$cc2012.
300 $axxxv, 354 p. :$bill. ;$c25 cm.
490 0 $aPublic administration and public policy
520 $a"Written as a reference, but easily adaptable for classroom use, this book explains the importance of cyber security, why readers should care, and what threats to watch for. It also offers information on how to improve an operating environment and better safeguard the constituents organizations serve. Based on research that claims that cyber security policy is often set at less senior levels of corporations, and left to IT security professionals, this book explains why security should be addressed by senior level management. "--$cProvided by publisher.
504 $aIncludes bibliographical references and index.
650 0 $aComputer networks$xSecurity measures$xGovernment policy.
650 0 $aGovernment information$xSecurity measures.
650 0 $aComputer crimes$xPrevention.
650 7 $aCOMPUTERS / Security / General.$2bisacsh
650 7 $aPOLITICAL SCIENCE / Public Policy / City Planning & Urban Development.$2bisacsh
650 7 $aPOLITICAL SCIENCE / Public Policy / General.$2bisacsh
700 1 $aAndreasson, Kim J.