LEADER 01899oam 2200529K 450 001 9910796593803321 005 20231110213618.0 010 $a0-262-34664-8 035 $a(CKB)3840000000330708 035 $a(MiAaPQ)EBC5240456 035 $a(CaBNVSL)mat08327691 035 $a(IDAMS)0b00006487b95bf8 035 $a(IEEE)8327691 035 $a(OCoLC)1020319459$z(OCoLC)1021095171$z(OCoLC)1030718111$z(OCoLC)1030796424$z(OCoLC)1031331876$z(OCoLC)1031877365$z(OCoLC)1032573195$z(OCoLC)1032649761 035 $a(OCoLC-P)1020319459 035 $a(MaCbMITP)11636 035 $a(PPN)25481008X 035 $a(EXLCZ)993840000000330708 100 $a20180125d2018 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $2rdacontent 182 $2rdamedia 183 $2rdacarrier 200 00$aNew solutions for cybersecurity /$fedited by Howard Shrobe, David L. Shrier, and Alex Pentland 210 1$aCambridge, MA :$cMIT Press,$d[2018] 215 $a1 online resource (491 pages) 225 1 $aMIT Connection Science and Engineering 311 $a0-262-53537-8 320 $aIncludes bibliographical references. 330 $aExperts from MIT explore recent advances in cybersecurity, bringing together management, technical, and sociological perspectives. 410 0$aMIT connections science & engineering 606 $aComputer networks$xSecurity measures 606 $aInternet$xSecurity measures 610 $aINFORMATION SCIENCE/Information Systems 615 0$aComputer networks$xSecurity measures. 615 0$aInternet$xSecurity measures. 676 $a658.4/78 702 $aShrobe$b Howard E. 702 $aShrier$b David L. 702 $aPentland$b Alex$f1952- 801 0$bOCoLC-P 801 1$bOCoLC-P 906 $aBOOK 912 $a9910796593803321 996 $aNew solutions for cybersecurity$93782090 997 $aUNINA