Cyber security policy guidebook

"Drawing upon a wealth of experience from academia, industry, and government service, this book details and dissects current organizational cybersecurity policy issues on a global scale. Using simple language, it includes a thorough description of each issue, lists pros and cons, documents poli...

Full description

Saved in:
Bibliographic Details
Main Author: Bayuk, Jennifer L
Format: eBook Book
Language:English
Published: Hoboken, N.J Wiley 2012
Wiley-Blackwell
Edition:1st ed.
Subjects:
ISBN:1118027809, 9781118027806, 9781118241486, 1118241487, 1118241320, 9781118241325, 1118241533, 9781118241530
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract "Drawing upon a wealth of experience from academia, industry, and government service, this book details and dissects current organizational cybersecurity policy issues on a global scale. Using simple language, it includes a thorough description of each issue, lists pros and cons, documents policy alternatives for the sake of clarity with respect to policy alone, and dives into organizational implementation issues. It also equips the reader with descriptions of the impact of specific policy choices, both positive and negative. This book gives students, scholars, and technical decision-makers the necessary knowledge of cybersecurity policy in order to make more informed decisions"--Provided by publisher.
AbstractList "Drawing upon a wealth of experience from academia, industry, and government service, this book details and dissects current organizational cybersecurity policy issues on a global scale. Using simple language, it includes a thorough description of each issue, lists pros and cons, documents policy alternatives for the sake of clarity with respect to policy alone, and dives into organizational implementation issues. It also equips the reader with descriptions of the impact of specific policy choices, both positive and negative. This book gives students, scholars, and technical decision-makers the necessary knowledge of cybersecurity policy in order to make more informed decisions"--Provided by publisher.
Drawing upon a wealth of experience from academia, industry, and government service, Cyber Security Policy Guidebook details and dissects, in simple language, current organizational cyber security policy issues on a global scale-taking great care to educate readers on the history and current approaches to the security of cyberspace. It includes thorough descriptions-as well as the pros and cons-of a plethora of issues, and documents policy alternatives for the sake of clarity with respect to policy alone. The Guidebook also delves into organizational implementation issues, and equips readers with descriptions of the positive and negative impact of specific policy choices. Inside are detailed chapters that: Explain what is meant by cyber security and cyber security policy Discuss the process by which cyber security policy goals are set Educate the reader on decision-making processes related to cyber security Describe a new framework and taxonomy for explaining cyber security policy issues Show how the U.S. government is dealing with cyber security policy issues With a glossary that puts cyber security language in layman's terms-and diagrams that help explain complex topics-Cyber Security Policy Guidebook gives students, scholars, and technical decision-makers the necessary knowledge to make informed decisions on cyber security policy.
Drawing upon a wealth of experience from academia, industry, and government service, Cyber Security Policy Guidebook details and dissects, in simple language, current organizational cyber security policy issues on a global scale—taking great care to educate readers on the history and current approaches to the security of cyberspace. It includes thorough descriptions—as well as the pros and cons—of a plethora of issues, and documents policy alternatives for the sake of clarity with respect to policy alone. The Guidebook also delves into organizational implementation issues, and equips readers with descriptions of the positive and negative impact of specific policy choices.Inside are detailed chapters that:Explain what is meant by cyber security and cyber security policyDiscuss the process by which cyber security policy goals are setEducate the reader on decision-making processes related to cyber securityDescribe a new framework and taxonomy for explaining cyber security policy issuesShow how the U.S. government is dealing with cyber security policy issuesWith a glossary that puts cyber security language in layman's terms—and diagrams that help explain complex topics—Cyber Security Policy Guidebook gives students, scholars, and technical decision-makers the necessary knowledge to make informed decisions on cyber security policy.
"Drawing upon a wealth of experience from academia, industry, and government service, this book details and dissects current organizational cybersecurity policy issues on a global scale. Using simple language, it includes a thorough description of each issue, lists pros and cons, documents policy alternatives for the sake of clarity with respect to policy alone, and dives into organizational implementation issues.
Author Bayuk, Jennifer L
Author_xml – sequence: 1
  fullname: Bayuk, Jennifer L
BackLink https://cir.nii.ac.jp/crid/1130000796699599616$$DView record in CiNii
BookMark eNqNkU1PwkAQhtcoRkCOHo0cvHhAd_Z7j0JQSZp4MRpPzW67hZXaki5g-u8tlkQ9mDiHmUzmybzz0UNHRVk4hM4AXwPG5EZLBQCKMOAUH6DBd86UOES9XYKJVFh3UI9gAEwFBnmMukIzqgUn7AQNQnjDjQlKNeFddDGprauGwSWbyq_r4arMfVIP5xufOluWy1PUyUwe3GAf--j5bvo0eRhFj_ezyW00MoKC5CPnmEqo08QamRHpjGgKTlvmjCUJBgFKKJ1IMCnjWeq4FNJaKTOtswSnjvbRVdvYhKX7CIsyX4d4m38NEeJfu_6bpYQ37GXLBpOZysctsyV_YYX3ceJ3HoDuLiW1EFpzrQX8UPbz1cbmPix8MY9XlX83VR2_zKLp6xg321ICDXvesi73tir3ytNo3LxJUaCf3amCKA
ContentType eBook
Book
DBID WIIVT
RYH
OHILO
OODEK
DEWEY 005.8
DOI 10.1002/9781118241530
DatabaseName Wiley
CiNii Complete
O'Reilly Online Learning: Corporate Edition
O'Reilly Online Learning: Academic/Public Library Edition
DatabaseTitleList




DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISBN 9781118241486
1118241487
9781118027806
1118027809
1118241320
9781118241325
Edition 1st ed.
ExternalDocumentID 9781118241486
9781118241325
BB14354964
WILEYB0016321
180831
GroupedDBID -0~
089
20A
38.
3XM
5VX
A4J
AABBV
AAMRL
AARDG
ABARN
ABBFG
ABIAV
ABQPW
ACBYE
ACCPI
ACGYG
ACIQC
ACLGV
ACNUM
ADVEM
AHWGJ
AKQZE
ALMA_UNASSIGNED_HOLDINGS
AMYDA
ASVIU
AZZ
BBABE
CZZ
GEOUK
HF4
I4C
IEZ
IPJKO
J-X
JFSCD
JHQRR
JJU
KJBCJ
LQKAK
LWYJN
MYL
OHILO
OHSWP
OODEK
PQQKQ
T71
UZ6
W1A
WIIVT
YPLAZ
YSPEL
ZEEST
RYH
6XM
ACHKY
DRU
IVK
ID FETCH-LOGICAL-a63175-ee48c3e92ba7f27ea6a63e9b4eab2c01618689c71ad45fde5767bb77f99fc0de3
ISBN 1118027809
9781118027806
9781118241486
1118241487
1118241320
9781118241325
1118241533
9781118241530
IngestDate Tue Dec 17 06:26:36 EST 2024
Mon Apr 21 07:45:39 EDT 2025
Fri Dec 05 18:11:20 EST 2025
Thu Jun 26 23:34:08 EDT 2025
Tue Oct 07 10:40:06 EDT 2025
Wed Dec 10 04:00:20 EST 2025
IsPeerReviewed false
IsScholarly false
LCCN 2011036017
LCCallNum QA76.9.A25 C91917 2012
LCCallNum_Ident QA76.9.A25C91917
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-a63175-ee48c3e92ba7f27ea6a63e9b4eab2c01618689c71ad45fde5767bb77f99fc0de3
Notes A John Wiley & Sons, Inc., publication
Includes bibliographical references (p. 255-265) and index
OCLC 694396524
PageCount 288
ParticipantIDs askewsholts_vlebooks_9781118241486
askewsholts_vlebooks_9781118241325
safari_books_v2_9781118241325
nii_cinii_1130000796699599616
igpublishing_primary_WILEYB0016321
elibro_books_ELB180831
ProviderPackageCode J-X
PublicationCentury 2000
PublicationDate [2012]
2012.
c2012
2012-04-24T00:00:00
2012-03-28
2012-03-29
PublicationDateYYYYMMDD 2012-01-01
2012-04-24
2012-03-28
2012-03-29
PublicationDate_xml – year: 2012
  text: [2012]
PublicationDecade 2010
PublicationPlace Hoboken, N.J
PublicationPlace_xml – name: Hoboken, N.J
PublicationYear 2012
Publisher Wiley
Wiley-Blackwell
Publisher_xml – sequence: 0
  name: Wiley-Blackwell
– name: Wiley
– name: Wiley-Blackwell
SSID ssj0000633925
Score 2.151767
Snippet "Drawing upon a wealth of experience from academia, industry, and government service, this book details and dissects current organizational cybersecurity...
Drawing upon a wealth of experience from academia, industry, and government service, Cyber Security Policy Guidebook details and dissects, in simple language,...
SourceID askewsholts
safari
nii
igpublishing
elibro
SourceType Aggregation Database
Publisher
SubjectTerms Computer security
Computer security -- Government policy
COMPUTERS
Data protection
Data protection -- Government policy
Government policy
Information technology
Information technology -- Government policy
Security
SubjectTermsDisplay COMPUTERS
Security
Title Cyber security policy guidebook
URI https://elibro.net/es/ereader/elibrodemo/180831
http://portal.igpublish.com/iglibrary/search/WILEYB0016321.html
https://cir.nii.ac.jp/crid/1130000796699599616
https://learning.oreilly.com/library/view/~/9781118241325/?ar
https://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9781118241325&uid=none
https://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9781118241486
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LT4QwEJ7orge9-I6vVWK8GSKUQrdXzaqJRj2o8UZKKYZocLPsbtx_77RUljUa48FLw6MM5JvJMFOYbwCO0PNJ6QWZKzA610s3oStSQdzIk5wogUZmqvgfr9nNTffpid_ZTpmlaSfAiqL7_s77_6pqPIbK1qWzf1B3LRQP4DYqHUdUO45fIuJ61xINTBJNzWwb0pn2C3Jy_DzKU1XPNGuWk9FL88cWW3hgU3_zD0Uz9Td-YyYf9HW6QDHDib71jhXb6nReaD-JzBJO-13dfWwe2oSGAW1B-6J3-3BVL1xhTIMxVWj5SlHkyYzAJVgS5Qs6aHTew1KXb-m8_00zwT7365U1fJMXea7pWUUmBnnjlX6_Am2l6zxWYU6Va7D82d3Csc5uHQ4Mns4nnk6Fp1PjuQGP5737s0vXtpNAO9RRkqsU7cpAcZIIlhGmRIQnFE-oEgmRtnUAl8wXKQ2zVGEqxpKEsYzzTHqpCjahVbwVagscIf2UEJ6iHIyJmUgoVTRDu_cSmXoq2obDBgrx-NU8WBlPoQpI-PskVOQ2bFYIxtXJ3vVppSC8uolo3K_YSWLDxX6qQ_mA4KQO4hzLXI--_nSJMSFmuJpljkc-Su9UGrDSx2T2EXd-uvsuLE4tcg9aw8FIdWBBjod5Odi3NvMB9tI0ow
linkProvider ProQuest Ebooks
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.title=Cyber+security+policy+guidebook&rft.au=Bayuk%2C+Jennifer+L&rft.date=2012-01-01&rft.pub=Wiley&rft.isbn=9781118241486&rft_id=info:doi/10.1002%2F9781118241530&rft.externalDocID=180831
thumbnail_m http://cvtisr.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fwww.safaribooksonline.com%2Flibrary%2Fcover%2F9781118241325
http://cvtisr.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fvle.dmmserver.com%2Fmedia%2F640%2F97811182%2F9781118241325.jpg
http://cvtisr.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fvle.dmmserver.com%2Fmedia%2F640%2F97811182%2F9781118241486.jpg
thumbnail_s http://cvtisr.summon.serialssolutions.com/2.0.0/image/custom?url=http%3A%2F%2Fportal.igpublish.com%2Figlibrary%2Famazonbuffer%2FWILEYB0016321_null_0_320.png