Cyber security policy guidebook
"Drawing upon a wealth of experience from academia, industry, and government service, this book details and dissects current organizational cybersecurity policy issues on a global scale. Using simple language, it includes a thorough description of each issue, lists pros and cons, documents poli...
Saved in:
| Main Author: | |
|---|---|
| Format: | eBook Book |
| Language: | English |
| Published: |
Hoboken, N.J
Wiley
2012
Wiley-Blackwell |
| Edition: | 1st ed. |
| Subjects: | |
| ISBN: | 1118027809, 9781118027806, 9781118241486, 1118241487, 1118241320, 9781118241325, 1118241533, 9781118241530 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | "Drawing upon a wealth of experience from academia, industry, and government service, this book details and dissects current organizational cybersecurity policy issues on a global scale. Using simple language, it includes a thorough description of each issue, lists pros and cons, documents policy alternatives for the sake of clarity with respect to policy alone, and dives into organizational implementation issues. It also equips the reader with descriptions of the impact of specific policy choices, both positive and negative. This book gives students, scholars, and technical decision-makers the necessary knowledge of cybersecurity policy in order to make more informed decisions"--Provided by publisher. |
|---|---|
| AbstractList | "Drawing upon a wealth of experience from academia, industry, and government service, this book details and dissects current organizational cybersecurity policy issues on a global scale. Using simple language, it includes a thorough description of each issue, lists pros and cons, documents policy alternatives for the sake of clarity with respect to policy alone, and dives into organizational implementation issues. It also equips the reader with descriptions of the impact of specific policy choices, both positive and negative. This book gives students, scholars, and technical decision-makers the necessary knowledge of cybersecurity policy in order to make more informed decisions"--Provided by publisher. Drawing upon a wealth of experience from academia, industry, and government service, Cyber Security Policy Guidebook details and dissects, in simple language, current organizational cyber security policy issues on a global scale-taking great care to educate readers on the history and current approaches to the security of cyberspace. It includes thorough descriptions-as well as the pros and cons-of a plethora of issues, and documents policy alternatives for the sake of clarity with respect to policy alone. The Guidebook also delves into organizational implementation issues, and equips readers with descriptions of the positive and negative impact of specific policy choices. Inside are detailed chapters that: Explain what is meant by cyber security and cyber security policy Discuss the process by which cyber security policy goals are set Educate the reader on decision-making processes related to cyber security Describe a new framework and taxonomy for explaining cyber security policy issues Show how the U.S. government is dealing with cyber security policy issues With a glossary that puts cyber security language in layman's terms-and diagrams that help explain complex topics-Cyber Security Policy Guidebook gives students, scholars, and technical decision-makers the necessary knowledge to make informed decisions on cyber security policy. Drawing upon a wealth of experience from academia, industry, and government service, Cyber Security Policy Guidebook details and dissects, in simple language, current organizational cyber security policy issues on a global scale—taking great care to educate readers on the history and current approaches to the security of cyberspace. It includes thorough descriptions—as well as the pros and cons—of a plethora of issues, and documents policy alternatives for the sake of clarity with respect to policy alone. The Guidebook also delves into organizational implementation issues, and equips readers with descriptions of the positive and negative impact of specific policy choices.Inside are detailed chapters that:Explain what is meant by cyber security and cyber security policyDiscuss the process by which cyber security policy goals are setEducate the reader on decision-making processes related to cyber securityDescribe a new framework and taxonomy for explaining cyber security policy issuesShow how the U.S. government is dealing with cyber security policy issuesWith a glossary that puts cyber security language in layman's terms—and diagrams that help explain complex topics—Cyber Security Policy Guidebook gives students, scholars, and technical decision-makers the necessary knowledge to make informed decisions on cyber security policy. "Drawing upon a wealth of experience from academia, industry, and government service, this book details and dissects current organizational cybersecurity policy issues on a global scale. Using simple language, it includes a thorough description of each issue, lists pros and cons, documents policy alternatives for the sake of clarity with respect to policy alone, and dives into organizational implementation issues. |
| Author | Bayuk, Jennifer L |
| Author_xml | – sequence: 1 fullname: Bayuk, Jennifer L |
| BackLink | https://cir.nii.ac.jp/crid/1130000796699599616$$DView record in CiNii |
| BookMark | eNqNkU1PwkAQhtcoRkCOHo0cvHhAd_Z7j0JQSZp4MRpPzW67hZXaki5g-u8tlkQ9mDiHmUzmybzz0UNHRVk4hM4AXwPG5EZLBQCKMOAUH6DBd86UOES9XYKJVFh3UI9gAEwFBnmMukIzqgUn7AQNQnjDjQlKNeFddDGprauGwSWbyq_r4arMfVIP5xufOluWy1PUyUwe3GAf--j5bvo0eRhFj_ezyW00MoKC5CPnmEqo08QamRHpjGgKTlvmjCUJBgFKKJ1IMCnjWeq4FNJaKTOtswSnjvbRVdvYhKX7CIsyX4d4m38NEeJfu_6bpYQ37GXLBpOZysctsyV_YYX3ceJ3HoDuLiW1EFpzrQX8UPbz1cbmPix8MY9XlX83VR2_zKLp6xg321ICDXvesi73tir3ytNo3LxJUaCf3amCKA |
| ContentType | eBook Book |
| DBID | WIIVT RYH OHILO OODEK |
| DEWEY | 005.8 |
| DOI | 10.1002/9781118241530 |
| DatabaseName | Wiley CiNii Complete O'Reilly Online Learning: Corporate Edition O'Reilly Online Learning: Academic/Public Library Edition |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISBN | 9781118241486 1118241487 9781118027806 1118027809 1118241320 9781118241325 |
| Edition | 1st ed. |
| ExternalDocumentID | 9781118241486 9781118241325 BB14354964 WILEYB0016321 180831 |
| GroupedDBID | -0~ 089 20A 38. 3XM 5VX A4J AABBV AAMRL AARDG ABARN ABBFG ABIAV ABQPW ACBYE ACCPI ACGYG ACIQC ACLGV ACNUM ADVEM AHWGJ AKQZE ALMA_UNASSIGNED_HOLDINGS AMYDA ASVIU AZZ BBABE CZZ GEOUK HF4 I4C IEZ IPJKO J-X JFSCD JHQRR JJU KJBCJ LQKAK LWYJN MYL OHILO OHSWP OODEK PQQKQ T71 UZ6 W1A WIIVT YPLAZ YSPEL ZEEST RYH 6XM ACHKY DRU IVK |
| ID | FETCH-LOGICAL-a63175-ee48c3e92ba7f27ea6a63e9b4eab2c01618689c71ad45fde5767bb77f99fc0de3 |
| ISBN | 1118027809 9781118027806 9781118241486 1118241487 1118241320 9781118241325 1118241533 9781118241530 |
| IngestDate | Tue Dec 17 06:26:36 EST 2024 Mon Apr 21 07:45:39 EDT 2025 Fri Dec 05 18:11:20 EST 2025 Thu Jun 26 23:34:08 EDT 2025 Tue Oct 07 10:40:06 EDT 2025 Wed Dec 10 04:00:20 EST 2025 |
| IsPeerReviewed | false |
| IsScholarly | false |
| LCCN | 2011036017 |
| LCCallNum | QA76.9.A25 C91917 2012 |
| LCCallNum_Ident | QA76.9.A25C91917 |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-a63175-ee48c3e92ba7f27ea6a63e9b4eab2c01618689c71ad45fde5767bb77f99fc0de3 |
| Notes | A John Wiley & Sons, Inc., publication Includes bibliographical references (p. 255-265) and index |
| OCLC | 694396524 |
| PageCount | 288 |
| ParticipantIDs | askewsholts_vlebooks_9781118241486 askewsholts_vlebooks_9781118241325 safari_books_v2_9781118241325 nii_cinii_1130000796699599616 igpublishing_primary_WILEYB0016321 elibro_books_ELB180831 |
| ProviderPackageCode | J-X |
| PublicationCentury | 2000 |
| PublicationDate | [2012] 2012. c2012 2012-04-24T00:00:00 2012-03-28 2012-03-29 |
| PublicationDateYYYYMMDD | 2012-01-01 2012-04-24 2012-03-28 2012-03-29 |
| PublicationDate_xml | – year: 2012 text: [2012] |
| PublicationDecade | 2010 |
| PublicationPlace | Hoboken, N.J |
| PublicationPlace_xml | – name: Hoboken, N.J |
| PublicationYear | 2012 |
| Publisher | Wiley Wiley-Blackwell |
| Publisher_xml | – sequence: 0 name: Wiley-Blackwell – name: Wiley – name: Wiley-Blackwell |
| SSID | ssj0000633925 |
| Score | 2.151767 |
| Snippet | "Drawing upon a wealth of experience from academia, industry, and government service, this book details and dissects current organizational cybersecurity... Drawing upon a wealth of experience from academia, industry, and government service, Cyber Security Policy Guidebook details and dissects, in simple language,... |
| SourceID | askewsholts safari nii igpublishing elibro |
| SourceType | Aggregation Database Publisher |
| SubjectTerms | Computer security Computer security -- Government policy COMPUTERS Data protection Data protection -- Government policy Government policy Information technology Information technology -- Government policy Security |
| SubjectTermsDisplay | COMPUTERS Security |
| Title | Cyber security policy guidebook |
| URI | https://elibro.net/es/ereader/elibrodemo/180831 http://portal.igpublish.com/iglibrary/search/WILEYB0016321.html https://cir.nii.ac.jp/crid/1130000796699599616 https://learning.oreilly.com/library/view/~/9781118241325/?ar https://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9781118241325&uid=none https://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9781118241486 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LT4QwEJ7orge9-I6vVWK8GSKUQrdXzaqJRj2o8UZKKYZocLPsbtx_77RUljUa48FLw6MM5JvJMFOYbwCO0PNJ6QWZKzA610s3oStSQdzIk5wogUZmqvgfr9nNTffpid_ZTpmlaSfAiqL7_s77_6pqPIbK1qWzf1B3LRQP4DYqHUdUO45fIuJ61xINTBJNzWwb0pn2C3Jy_DzKU1XPNGuWk9FL88cWW3hgU3_zD0Uz9Td-YyYf9HW6QDHDib71jhXb6nReaD-JzBJO-13dfWwe2oSGAW1B-6J3-3BVL1xhTIMxVWj5SlHkyYzAJVgS5Qs6aHTew1KXb-m8_00zwT7365U1fJMXea7pWUUmBnnjlX6_Am2l6zxWYU6Va7D82d3Csc5uHQ4Mns4nnk6Fp1PjuQGP5737s0vXtpNAO9RRkqsU7cpAcZIIlhGmRIQnFE-oEgmRtnUAl8wXKQ2zVGEqxpKEsYzzTHqpCjahVbwVagscIf2UEJ6iHIyJmUgoVTRDu_cSmXoq2obDBgrx-NU8WBlPoQpI-PskVOQ2bFYIxtXJ3vVppSC8uolo3K_YSWLDxX6qQ_mA4KQO4hzLXI--_nSJMSFmuJpljkc-Su9UGrDSx2T2EXd-uvsuLE4tcg9aw8FIdWBBjod5Odi3NvMB9tI0ow |
| linkProvider | ProQuest Ebooks |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.title=Cyber+security+policy+guidebook&rft.au=Bayuk%2C+Jennifer+L&rft.date=2012-01-01&rft.pub=Wiley&rft.isbn=9781118241486&rft_id=info:doi/10.1002%2F9781118241530&rft.externalDocID=180831 |
| thumbnail_m | http://cvtisr.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fwww.safaribooksonline.com%2Flibrary%2Fcover%2F9781118241325 http://cvtisr.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fvle.dmmserver.com%2Fmedia%2F640%2F97811182%2F9781118241325.jpg http://cvtisr.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fvle.dmmserver.com%2Fmedia%2F640%2F97811182%2F9781118241486.jpg |
| thumbnail_s | http://cvtisr.summon.serialssolutions.com/2.0.0/image/custom?url=http%3A%2F%2Fportal.igpublish.com%2Figlibrary%2Famazonbuffer%2FWILEYB0016321_null_0_320.png |

