LEADER 01015nam--2200361---450- 001 990003193140203316 005 20090205095127.0 010 $a978-88-15-12694-8 035 $a000319314 035 $aUSA01000319314 035 $a(ALEPH)000319314USA01 035 $a000319314 100 $a20090205d2008----km-y0itay50------ba 101 $aita 102 $aIT 105 $a||||||||001yy 200 1 $a<> decisione di bilancio in Italia$fPaolo De Ioanna, Chiara Goretti 210 $aBologna$cIl Mulino$d2008 215 $a286 p.$d24 cm 225 2 $aRicerca 410 0$12001$aRicerca 606 0 $aBilancio statale$2BNCF 676 $a352.48945 700 1$aDE IOANNA,$bPaolo$0119393 701 1$aGORETTI,$bChiara$0507469 801 0$aIT$bsalbc$gISBD 912 $a990003193140203316 951 $aXXIV.3.R 2$b61817 G.$cXXIV.3.R$dO0211021 959 $aBK 969 $aGIU 979 $aCHIARA$b90$c20090205$lUSA01$h0951 996 $aDecisione di bilancio in Italia$9780711 997 $aUNISA LEADER 03141nam 2200685Ia 450 001 9910455517103321 005 20200520144314.0 010 $a1-282-26359-5 010 $a9786612263590 010 $a1-905356-48-X 035 $a(CKB)1000000000765343 035 $a(EBL)480406 035 $a(OCoLC)609854817 035 $a(SSID)ssj0000358621 035 $a(PQKBManifestationID)11246754 035 $a(PQKBTitleCode)TC0000358621 035 $a(PQKBWorkID)10380085 035 $a(PQKB)10161266 035 $a(MiAaPQ)EBC480406 035 $a(CaSebORM)9781905356478 035 $a(Au-PeEL)EBL480406 035 $a(CaPaEBR)ebr10438090 035 $a(CaONFJC)MIL226359 035 $a(EXLCZ)991000000000765343 100 $a20080723d2008 ky 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aCyberwar, cyberterror, cybercrime$b[electronic resource] $ea guide to the role of standards in an environment of change and danger /$fJulie E. Mehan 205 $a1st edition 210 $aEly $cIT Governance Pub.$d2008 215 $a1 online resource (281 p.) 300 $aDescription based upon print version of record. 311 $a1-905356-47-1 320 $aIncludes bibliographical references and index. 327 $aINTRODUCTION; CHAPTER 1: WHAT TECHNOLOGY GIVETH IT TAKETH AWAY; CHAPTER 2: CYBERATTACK: IT'S A DANGEROUS WORLD FOR INFORMATION SYSTEMS; CHAPTER 3: THE HUMAN FACTOR: THE UNDERRATED THREAT; CHAPTER 4: TRANSITION FROM AN ENVIRONMENT OF 'FUD' TO A STANDARDS-BASED ENVIRONMENT; CHAPTER 5: ESTABLISHING A CULTURE OF CYBERSECURITY; CHAPTER 6: INCREASING INTERNATIONALISM: GOVERNANCE, LAWS, AND ETHICS; CHAPTER 7: STANDARDS: WHAT ARE THEY AND WHY SHOULD WE CARE?; CHAPTER 8: FROM CYBERWAR TO CYBERDEFENCE: APPLYING STANDARDS IN AN ENVIRONMENT OF CHANGE AND DANGER 327 $aCHAPTER 9: CONCLUSION: WHERE DO WE GO FROM HERE?APPENDIX 1: GAP ANALYSIS AREAS OF INTEREST; APPENDIX 2: STANDARDS CROSSWALK; DEFINITIONS; ACRONYMS; INDEX 330 $aCyberWar, CyberTerror, CyberCrime provides a stark and timely analysis of the increasingly hostile online landscape that today's corporate systems inhabit, and gives a practical introduction to the defensive strategies that can be employed in response. 606 $aComputer crimes$xPrevention 606 $aCyberterrorism$xPrevention 606 $aComputer networks$xSecurity measures$xStandards 606 $aComputer networks$xSecurity measures$xQuality control 606 $aInternet$xSecurity measures 608 $aElectronic books. 615 0$aComputer crimes$xPrevention. 615 0$aCyberterrorism$xPrevention. 615 0$aComputer networks$xSecurity measures$xStandards. 615 0$aComputer networks$xSecurity measures$xQuality control. 615 0$aInternet$xSecurity measures. 676 $a005.802/18 700 $aMehan$b Julie E$0891538 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910455517103321 996 $aCyberwar, cyberterror, cybercrime$92148257 997 $aUNINA