LEADER 01403oam 2200469zu 450 001 9910139415203321 005 20220310195529.0 010 $a0-470-77830-X 010 $a0-470-77125-9 010 $a0-470-77139-9 035 $a(CKB)2500000000001596 035 $a(SSID)ssj0000354607 035 $a(PQKBManifestationID)11275374 035 $a(PQKBTitleCode)TC0000354607 035 $a(PQKBWorkID)10313389 035 $a(PQKB)10212744 035 $a(EXLCZ)992500000000001596 100 $a20160829d1971 uy 101 0 $aeng 181 $ctxt 182 $cc 183 $acr 200 14$aThe chemistry of the hydroxyl group 210 31$a[Place of publication not identified]$cInterscience$d1971 225 0 $aThe Chemistry of functional groups The chemistry of the hydroxyl group 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a0-471-66939-3 606 $aHydroxyl group 606 $aOrganic Chemistry$2HILCC 606 $aChemistry$2HILCC 606 $aPhysical Sciences & Mathematics$2HILCC 615 0$aHydroxyl group 615 7$aOrganic Chemistry 615 7$aChemistry 615 7$aPhysical Sciences & Mathematics 676 $a547/.03 700 $aPatai$b Saul$0335987 801 0$bPQKB 906 $aBOOK 912 $a9910139415203321 996 $aThe chemistry of the hydroxyl group$92131571 997 $aUNINA LEADER 06663nam 22006015 450 001 9910299352703321 005 20200703111134.0 010 $a3-319-90014-5 024 7 $a10.1007/978-3-319-90014-8 035 $a(CKB)4100000005249365 035 $a(DE-He213)978-3-319-90014-8 035 $a(MiAaPQ)EBC5471150 035 $a(PPN)22950387X 035 $a(EXLCZ)994100000005249365 100 $a20180720d2018 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCybersecurity in Germany /$fby Martin Schallbruch, Isabel Skierka 205 $a1st ed. 2018. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2018. 215 $a1 online resource (VIII, 66 p.) 225 1 $aSpringerBriefs in Cybersecurity,$x2193-973X 320 $aIncludes bibliographical references. 327 $aIntro; foreword; contents; 1 Introduction; 1.1 On Terminology; 1.2 Approach; 1.3 Peculiarities of the German political system; 1.4 Structure; references; 2 The German view on cybersecurity; 2.1 The public perception of cyber issues; 2.2 Political and regulatory concepts; 2.3 Snowden and the emerging discussion about technological sovereignty; 2.4 Combining a German data protection and engineering approach with holistic cyber debates; 2.5 Advantages and disadvantages of the German approach-A preliminary balance; references; 3 The evolution of German cybersecurity strategy; 3.1 Introduction 3.2 Phase 1, 1991-2011: IT security and critical infrastructure protection 3.3 Phase 2: 2011-2016: building a civilian cybersecurity strategy; 3.3.1 The first national cybersecurity strategy for Germany; 3.3.2 The IT security law; 3.3.3 The Snowden revelations; 3.4 Phase 3, 2016-2018: consolidating a comprehensive civilian-military approach to cybersecurity; 3.4.1 The 2016 white paper on German security policy and the future of the Bundeswehr; 3.4.2 The 2016 second national cybersecurity strategy; 3.4.3 Taking stock of past developments for future cybersecurity strategies; references 4 The organisation of cybersecurity in Germany 4.1 Particularities of German law enforcement, intelligence, and public security organisations; 4.2 The German military's role in the cyber realm; 4.3 Cooperation and conflict between agencies; 4.4 Public-private cybersecurity cooperation; references; 5 Current priorities and gaps in German national cybersecurity, future trends; 5.1 Introduction; 5.2 Legal, technical and practical development of active cyber defence; 5.3 Cybersecurity architecture-roles and responsibilities of agencies; 5.4 Towards a governmental vulnerability handling strategy 5.5 Implementing a comprehensive IT security industry policy 5.6 Finding a coherent legal concept for safety and security; 5.7 International cooperation; references; 6 Conclusion 330 $aIn 2016, Germany's government presented its third cybersecurity strategy, which aims to strengthen the national cyber defence architecture, cooperation between the state and industry, and individual users? agency. For many years, Germany has followed/adopted a preventive and engineering approach to cybersecurity, which emphasizes technological control of security threats in cyberspace over political, diplomatic and military approaches. Accordingly, the technically oriented Federal Office for Information Security (BSI) has played a leading role in Germany?s national cybersecurity architecture. Only in 2016 did the military expand and reorganize its cyber defence capabilities. Moreover, cybersecurity is inextricably linked to data protection, which is particularly emphasised in Germany and has gained high public attention since Edward Snowden?s revelations. On the basis of official documents and their insights from many years of experience in cybersecurity policy, the two authors describe cyber security in Germany in the light of these German peculiarities. They explain the public perception of cybersecurity, its strong link with data protection in Germany, the evolution of Germany's cybersecurity strategies, and the current organisation of cybersecurity across the government and industry. The Brief takes stock of past developments and works out the present and future gaps and priorities in Germany?s cybersecurity policy and strategy, which will be decisive for Germany?s political role in Europe and beyond. This includes the cybersecurity priorities formulated by the current German government which took office in the spring of 2018. 410 0$aSpringerBriefs in Cybersecurity,$x2193-973X 606 $aComputer security 606 $aComputers and civilization 606 $aPublic policy 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aPublic Policy$3https://scigraph.springernature.com/ontologies/product-market-codes/911060 615 0$aComputer security. 615 0$aComputers and civilization. 615 0$aPublic policy. 615 14$aSystems and Data Security. 615 24$aComputers and Society. 615 24$aPublic Policy. 676 $a005.8 686 $a32.24.56$2EP-CLASS 686 $a08.12.16$2EP-CLASS 700 $aSchallbruch$b Martin$4aut$4http://id.loc.gov/vocabulary/relators/aut$0925446 702 $aSkierka$b Isabel$4aut$4http://id.loc.gov/vocabulary/relators/aut 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910299352703321 996 $aCybersecurity in Germany$92077954 997 $aUNINA