LEADER 01150nam0 22003133i 450 001 SUN0106182 005 20160805012644.576 010 $a22-470-1852-1$d0.00 100 $a20160725d1996 |0frec50 ba 101 $afre 102 $aFR 105 $a|||| ||||| 200 1 $a*Droit administratif$fJean Rivero, Jean Waline 205 $a15. ed 210 $aParis$cDalloz$d1994 215 $a482 p.$d22 cm. 410 1$1001SUN0039862$12001 $a*Précis Dalloz. Droit$1210 $aParis$cDalloz. 606 $aDiritto amministrativo$xFrancia$2EC$3SUNC032570 620 $dParis$3SUNL000046 676 $a342.44$v21 700 1$aRivero$b, Jean$3SUNV078129$0229033 701 1$aWaline$b, Jean$3SUNV082425$0603682 712 $aDalloz$3SUNV001165$4650 801 $aIT$bSOL$c20181109$gRICA 912 $aSUN0106182 950 $aUFFICIO DI BIBLIOTECA DEL DIPARTIMENTO DI ECONOMIA$d03 PREST IVEh7 $e03 32627 995 $aUFFICIO DI BIBLIOTECA DEL DIPARTIMENTO DI ECONOMIA$bIT-CE0106$h32627$kPREST IVEh7$op$qa 996 $aDroit administratif$91249684 997 $aUNICAMPANIA LEADER 02779oam 2200733I 450 001 9910783823203321 005 20230207225155.0 010 $a1-134-50011-4 010 $a1-299-14671-6 010 $a1-134-50012-2 010 $a0-415-26685-8 010 $a1-280-07324-1 010 $a0-203-63432-2 024 7 $a10.4324/9780203634325 035 $a(CKB)1000000000254649 035 $a(EBL)182275 035 $a(OCoLC)475895323 035 $a(SSID)ssj0000295635 035 $a(PQKBManifestationID)11251229 035 $a(PQKBTitleCode)TC0000295635 035 $a(PQKBWorkID)10322278 035 $a(PQKB)10317924 035 $a(MiAaPQ)EBC182275 035 $a(MiAaPQ)EBC5292600 035 $a(Au-PeEL)EBL182275 035 $a(CaPaEBR)ebr10097331 035 $a(CaONFJC)MIL445921 035 $a(OCoLC)56335836 035 $a(Au-PeEL)EBL5292600 035 $a(CaONFJC)MIL7324 035 $a(OCoLC)1027153292 035 $a(EXLCZ)991000000000254649 100 $a20180706d2003 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 14$aThe ethics of tourism development /$fMick Smith and Rosaleen Duffy 210 1$aLondon ;$aNew York :$cRoutledge,$d2003. 215 $a1 online resource (208 p.) 225 1 $aContemporary geographies of leisure, tourism, and mobility 300 $aDescription based upon print version of record. 311 $a0-203-63897-2 311 $a0-415-26686-6 320 $aIncludes bibliographical references (p. [169]-189) and index. 327 $aBook Cover; Title; Contents; List of illustrations; Acknowledgements; Introduction; Ethical values; The virtues of travel and the virtuous traveller; The greatest happiness is to travel?; Rights and codes of practice; From social justice to an ethics of care; Authenticity and the ethics of tourism; Ethics and sustainable tourism; Conclusion; Notes; Bibliography; Index; 330 $aDraws upon a variety of important philosophical traditions to develop an original perspective on the relations between ethical, economic and aesthetic values in a tourism context. 410 0$aRoutledge studies in contemporary geographies of leisure, tourism, and mobility. 606 $aTourism$xSocial aspects 606 $aTourism$xMoral and ethical aspects 615 0$aTourism$xSocial aspects. 615 0$aTourism$xMoral and ethical aspects. 676 $a174/.991 686 $a76.60$2bcl 700 $aSmith$b Mick$f1961-,$0282883 701 $aDuffy$b Rosaleen$0282884 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910783823203321 996 $aThe ethics of tourism development$93742217 997 $aUNINA LEADER 05967nam 2200817 a 450 001 9910825352603321 005 20230912155313.0 010 $a9781299189324 010 $a1299189326 010 $a9781118241325 010 $a1118241320 010 $a9781118241530 010 $a1118241533 010 $a9781118241486 010 $a1118241487 035 $a(CKB)2670000000166885 035 $a(EBL)818205 035 $a(SSID)ssj0000633925 035 $a(PQKBManifestationID)11386595 035 $a(PQKBTitleCode)TC0000633925 035 $a(PQKBWorkID)10623475 035 $a(PQKB)11069962 035 $a(Au-PeEL)EBL818205 035 $a(CaPaEBR)ebr10630610 035 $a(CaONFJC)MIL450182 035 $a(CaSebORM)9781118241325 035 $a(MiAaPQ)EBC818205 035 $a(OCoLC)793103968 035 $a(MiAaPQ)EBC4471045 035 $a(OCoLC)876046653 035 $a(OCoLC)ocn876046653 035 $a(Perlego)1003787 035 $a(EXLCZ)992670000000166885 100 $a20110824d2012 uy 0 101 0 $aeng 135 $aurcn||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aCyber security policy guidebook /$fJennifer L. Bayuk ... [et al.] 205 $aFirst edition 210 $aHoboken, N.J. $cWiley$dc2012 215 $a1 online resource (xvi, 270 pages) $cillustrations 300 $aDescription based upon print version of record. 311 08$a9781118027806 311 08$a1118027809 320 $aIncludes bibliographical references (p. 255-265) and index. 327 $aCyber Security Policy Guidebook; Contents; Foreword; Preface; Acknowledgments; 1: Introduction; 1.1 What Is Cyber Security?; 1.2 What Is Cyber Security Policy?; 1.3 Domains of Cyber Security Policy; 1.3.1 Laws and Regulations; 1.3.2 Enterprise Policy; 1.3.3 Technology Operations; 1.3.4 Technology Configuration; 1.4 Strategy versus Policy; 2: Cyber Security Evolution; 2.1 Productivity; 2.2 Internet; 2.3 e-Commerce; 2.4 Countermeasures; 2.5 Challenges; 3: Cyber Security Objectives; 3.1 Cyber Security Metrics; 3.2 Security Management Goals; 3.3 Counting Vulnerabilities; 3.4 Security Frameworks 327 $a3.4.1 e-Commerce Systems3.4.2 Industrial Control Systems; 3.4.3 Personal Mobile Devices; 3.5 Security Policy Objectives; 4: Guidance for Decision Makers; 4.1 Tone at the Top; 4.2 Policy as a Project; 4.3 Cyber Security Management; 4.3.1 Arriving at Goals; 4.3.2 Cyber Security Documentation; 4.4 Using the Catalog; 5: The Catalog Approach; 5.1 Catalog Format; 5.2 Cyber Security Policy Taxonomy; 6: Cyber Security Policy Catalog; 6.1 Cyber Governance Issues; 6.1.1 Net Neutrality; 6.1.2 Internet Names and Numbers; 6.1.3 Copyrights and Trademarks; 6.1.4 Email and Messaging; 6.2 Cyber User Issues 327 $a6.2.1 Malvertising6.2.2 Impersonation; 6.2.3 Appropriate Use; 6.2.4 Cyber Crime; 6.2.5 Geolocation; 6.2.6 Privacy; 6.3 Cyber Conflict Issues; 6.3.1 Intellectual Property Theft; 6.3.2 Cyber Espionage; 6.3.3 Cyber Sabotage; 6.3.4 Cyber Warfare; 6.4 Cyber Management Issues; 6.4.1 Fiduciary Responsibility; 6.4.2 Risk Management; 6.4.3 Professional Certification; 6.4.4 Supply Chain; 6.4.5 Security Principles; 6.4.6 Research and Development; 6.5 Cyber Infrastructure Issues; 6.5.1 Banking and Finance; 6.5.2 Health Care; 6.5.3 Industrial Control Systems 327 $a7: One Government's Approach to Cyber Security Policy7.1 U.S. Federal Cyber Security Strategy; 7.2 A Brief History of Cyber Security Public Policy Development in the U.S. Federal Government; 7.2.1 The Bombing of New York's World Trade Center on February 26, 1993; 7.2.2 Cyber Attacks against the United States Air Force, March-May 1994: Targeting the Pentagon; 7.2.3 The Citibank Caper, June-October, 1994: How to Catch a Hacker; 7.2.4 Murrah Federal Building, Oklahoma City-April 19, 1995: Major Terrorism Events and Their U.S. Outcomes 327 $a7.2.5 President's Commission on Critical Infrastructure Protection-19967.2.6 Presidential Decision Directive 63-1998; 7.2.7 National Infrastructure Protection Center (NIPC) and ISACs-1998; 7.2.8 Eligible Receiver-1997; 7.2.9 Solar Sunrise-1998; 7.2.10 Joint Task Force-Computer Network Defense (JTF-CND)-1998; 7.2.11 Terrorist Attacks against the United States-September 11, 2001 Effects of Catastrophic Events on Transportation System Management and Operations; 7.2.12 U.S. Government Response to the September 11, 2001 Terrorist Attacks; 7.2.13 Homeland Security Presidential Directives 327 $a7.2.14 National Strategies 330 $a"Drawing upon a wealth of experience from academia, industry, and government service, this book details and dissects current organizational cybersecurity policy issues on a global scale. Using simple language, it includes a thorough description of each issue, lists pros and cons, documents policy alternatives for the sake of clarity with respect to policy alone, and dives into organizational implementation issues. It also equips the reader with descriptions of the impact of specific policy choices, both positive and negative. This book gives students, scholars, and technical decision-makers the necessary knowledge of cybersecurity policy in order to make more informed decisions"--Provided by publisher. 410 0$aWiley UBCM ebooks. 606 $aInformation technology$xGovernment policy 606 $aComputer security$xGovernment policy 606 $aData protection$xGovernment policy 615 0$aInformation technology$xGovernment policy. 615 0$aComputer security$xGovernment policy. 615 0$aData protection$xGovernment policy. 676 $a005.8 686 $aCOM053000$2bisacsh 701 $aBayuk$b Jennifer L$01625658 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910825352603321 996 $aCyber security policy guidebook$93961270 997 $aUNINA