| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA990007713680403321 |
|
|
Autore |
Schacht, Joseph <1902-1969> |
|
|
Titolo |
An Introduction to Islamic Law / Joseph Schacht |
|
|
|
|
|
Pubbl/distr/stampa |
|
|
|
|
|
|
Descrizione fisica |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Locazione |
|
|
|
|
|
|
Collocazione |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
2. |
Record Nr. |
UNINA9910694388903321 |
|
|
Titolo |
Vertically integrated sports programming : are cable companies excluding competition? : hearing before the Committee on the Judiciary, United States Senate, One Hundred Ninth Congress, second session, December 7, 2006 |
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (iii, 84 p.) |
|
|
|
|
|
|
Soggetti |
|
Television broadcasting of sports - United States |
Cable television - United States |
Competition - United States |
Consumer protection - United States |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
|
|
|
|
|
|
|
3. |
Record Nr. |
UNINA9910411653103321 |
|
|
Titolo |
Cybersecurity : public sector threats and responses / / [edited by] Kim Andreasson |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Boca Raton, Fla. : , : CRC Press, , 2012 |
|
|
|
|
|
|
|
ISBN |
|
0-429-25115-7 |
1-4665-4186-5 |
1-280-12213-7 |
9786613525994 |
1-4398-4664-2 |
|
|
|
|
|
|
|
|
Edizione |
[1st ed.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (598 p.) |
|
|
|
|
|
|
Collana |
|
Public administration and public policy ; ; 165 |
|
|
|
|
|
|
Classificazione |
|
COM053000POL002000POL028000 |
|
|
|
|
|
|
Altri autori (Persone) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computer networks - Security measures - Government policy |
Government information - Security measures |
Computer crimes - Prevention |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Cover; Title Page; Copyright; Dedication; Contents; Preface; Introduction; The Editor; Contributor Biographies (In Order of Appearance); Chapter 1. The Global Rise of E-Government and Its Security Implications; Chapter 2. Understanding Cyber Threats; Chapter 3. Cybersecurity in East Asia: Japan and the 2009 Attacks on South Korea and the United States; Chapter 4. Toward a Global Approach To Cybersecurity; Chapter 5. The Cybersecurity Policy Challenge: The Tyranny of Geography; Chapter 6. U.S. Federal Cybersecurity Policy; Chapter 7. European Cybersecurity Policy |
Chapter 8. A Local Cybersecurity Approach: The Case of CataloniaChapter 9. Securing Government Transparency: Cybersecurity Policy Issues in a Gov 2.0 Environment and Beyond; Chapter 10. The Civilian Cyber Incident Response Policies of the U.S. Federal Government; Chapter 11. Cybersecurity Health Check: A Framework to Enhance Organizational Security; Chapter 12. Beyond Public-Private Partnerships: Leadership Strategies for Securing Cyberspace; Chapter 13. Is There a Conclusion to Cybersecurity?; Index |
|
|
|
|
|
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
Written as a reference, but easily adaptable for classroom use, this book explains the importance of cyber security, why readers should care, and what threats to watch for. It also offers information on how to improve an operating environment and better safeguard the constituents organizations serve. Based on research that claims that cyber security policy is often set at less senior levels of corporations, and left to IT security professionals, this book explains why security should be addressed by senior level management. -- |
|
|
|
|
|
|
|
| |