LEADER 01764oam 2200493 450 001 9910704053003321 005 20151022105900.0 035 $a(CKB)5470000002437124 035 $a(OCoLC)886546746 035 $a(EXLCZ)995470000002437124 100 $a20140812d1984 ua 0 101 0 $aeng 135 $aurbn||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aBall clay and bentonite deposits of the central and western Gulf of Mexico coastal plain, United States /$fby John W. Hosterman 210 1$a[Reston, Va.] :$cDepartment of the Interior, U.S. Geological Survey,$d1984. 210 2$aWashington :$cUnited States Government Printing Office. 215 $a1 online resource (iii, 22 pages, 1 page of plates) $cillustrations, 1 map 225 1 $aContributions to the geology of mineral deposits 225 1 $aGeological Survey bulletin ;$v1558-C 300 $aTitle from title screen (viewed Aug. 4, 2014). 320 $aIncludes bibliographical references (pages 20-22). 606 $aBall clay$zGulf Coast (U.S.) 606 $aBentonite$zGulf Coast (U.S.) 606 $aBall clay$2fast 606 $aBentonite$2fast 607 $aUnited States$zGulf Coast$2fast 615 0$aBall clay 615 0$aBentonite 615 7$aBall clay. 615 7$aBentonite. 700 $aHosterman$b John W$g(John Wallace),$f1923-$01391885 712 02$aGeological Survey (U.S.), 801 0$bCOP 801 1$bCOP 801 2$bOCLCO 801 2$bOCLCF 801 2$bGPO 906 $aBOOK 912 $a9910704053003321 996 $aBall clay and bentonite deposits of the central and western Gulf of Mexico coastal plain, United States$93519493 997 $aUNINA LEADER 04544nam 22007335 450 001 9910298983003321 005 20200704000618.0 010 $a3-319-10620-1 024 7 $a10.1007/978-3-319-10620-5 035 $a(CKB)3710000000261961 035 $a(EBL)1967229 035 $a(SSID)ssj0001372351 035 $a(PQKBManifestationID)11785440 035 $a(PQKBTitleCode)TC0001372351 035 $a(PQKBWorkID)11303605 035 $a(PQKB)10915622 035 $a(MiAaPQ)EBC1967229 035 $a(DE-He213)978-3-319-10620-5 035 $a(PPN)182096289 035 $a(EXLCZ)993710000000261961 100 $a20141011d2014 u| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aCybersecurity in Switzerland /$fby Myriam Dunn Cavelty 205 $a1st ed. 2014. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2014. 215 $a1 online resource (81 p.) 225 1 $aSpringerBriefs in Cybersecurity,$x2193-973X 300 $aDescription based upon print version of record. 311 $a3-319-10619-8 320 $aIncludes bibliographical references at the end of each chapters. 327 $aForeword -- List of Abbreviations -- Introduction -- Global Cyber-security Policy Evolution -- Phase 1: The Four Pillar Model for Information Assurance (1997-2004) -- Phase 2: Reporting and Analysis Center for Information Assurance (MELANI) (2004-2010) -- Phase 3: Consolidation and Cyber-Risk Strategy (2011-2014) -- Conclusion. 330 $aGives the reader a detailed account of how cyber-security in Switzerland has evolved over the years, using official documents and a considerable amount of inside knowledge. It focuses on key ideas, institutional arrangements, on the publication of strategy papers, and importantly, on processes leading up to these strategy documents. The peculiarities of the Swiss political system, which influence the way cyber-security can be designed and practiced in Switzerland are considered, as well as the bigger, global influences and driving factors that shaped the Swiss approach to cyber-security. It shows that throughout the years, the most important influence on the Swiss policy-approach was the international level, or rather the developments of a cyber-security policy in other states. Even though many of the basic ideas about information-sharing and public-private partnerships were influenced by (amongst others) the US approach to critical infrastructure protection, the peculiarities of the Swiss political system has led to a particular ?Swiss solution?, which is based on the federalist structures and subsidiary principles, characterized by stability and resilience to external shocks in the form of cyber-incidents. Cybersecurity in Switzerland will be a stimulating read for anybody interested in cyber-security policy, including students, researchers, analysts and policy makers. It contains not only specific material on an interesting case,  but also a wealth of background information on different variations of cyber-security, as well as on information-sharing and public-private partnerships. 410 0$aSpringerBriefs in Cybersecurity,$x2193-973X 606 $aComputers 606 $aLaw and legislation 606 $aInternational law 606 $aCriminology 606 $aComputer security 606 $aLegal Aspects of Computing$3https://scigraph.springernature.com/ontologies/product-market-codes/I24059 606 $aPublic International Law $3https://scigraph.springernature.com/ontologies/product-market-codes/R19000 606 $aCriminology and Criminal Justice, general$3https://scigraph.springernature.com/ontologies/product-market-codes/1B0000 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 615 0$aComputers. 615 0$aLaw and legislation. 615 0$aInternational law. 615 0$aCriminology. 615 0$aComputer security. 615 14$aLegal Aspects of Computing. 615 24$aPublic International Law . 615 24$aCriminology and Criminal Justice, general. 615 24$aSystems and Data Security. 676 $a005.82 700 $aDunn Cavelty$b Myriam$4aut$4http://id.loc.gov/vocabulary/relators/aut$0892361 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910298983003321 996 $aCybersecurity in Switzerland$92149591 997 $aUNINA