LEADER 01148nam0 22003131i 450 001 RML0242069 005 20231121125707.0 100 $a20121121d2000 ||||0itac50 ba 101 | $aita 102 $ait 181 1$6z01$ai $bxxxe 182 1$6z01$an 200 1 $aUsare Linux$fJack Tackett, Jr. e Steven Burnett 205 $aSpecial edition 210 $aMilano $cMondadori Informatica $d2000 215 $axxxiv, 861 p.$cfig., tab.$d24 cm.$e3 cd 300 $aInclude un Indice analitico. -Seguono Appendici 606 $aSistemi operativi$2FIR$3RMLC400063$9I 676 $a005.4469$9$v20 700 1$aTackett$b, Jack Jr.$3RMLV155615$0460070 701 1$aBurnett$b, Steven$3RMLV155614$01443557 801 3$aIT$bIT-01$c20121121 850 $aIT-FR0098 899 $aBiblioteca Area Giuridico Economica$bFR0098 912 $aRML0242069 950 0$aBiblioteca Area Giuridico Economica$d 53TER 005.446/4$e 53VM 0000114165 VM barcode:ECO010686. - Inventario:5405. - Fondo:Sala referenceVM$fB $h20020206$i20121204 977 $a 53 996 $aUsare Linux$93620937 997 $aUNICAS LEADER 02763nam 2200673Ia 450 001 9910960896803321 005 20240416232144.0 010 $a9786610179985 010 $a9780309168083 010 $a0309168082 010 $a9781280179983 010 $a1280179988 010 $a9780309513845 010 $a0309513847 035 $a(CKB)111069351131880 035 $a(SSID)ssj0000132642 035 $a(PQKBManifestationID)12045284 035 $a(PQKBTitleCode)TC0000132642 035 $a(PQKBWorkID)10039124 035 $a(PQKB)10865590 035 $a(MiAaPQ)EBC3375827 035 $a(Au-PeEL)EBL3375827 035 $a(CaPaEBR)ebr10046876 035 $a(OCoLC)923259201 035 $a(Perlego)4736499 035 $a(EXLCZ)99111069351131880 100 $a20030505d2003 uy 0 101 0 $aeng 135 $aurcn||||||||| 181 $ctxt 182 $cc 183 $acr 200 00$aCritical information infrastructure protection and the law $ean overview of key issues /$fCommittee on Critical Information Infrastructure and the Law, Computer Science and Telecommunications Board, National Academy of Engineering, National Research Council of the National Academies ; Stewart D. Personick and Cynthia A. Patterson, editors 205 $a1st ed. 210 $aWashington, D.C. $cNational Academies Press$dc2003 215 $axvi, 102 p 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a9780309088787 311 08$a030908878X 320 $aIncludes bibliographical references. 327 $a1. Introduction and context (Rise of CIP as a policy issue) -- 2. Increasing the flow of information (Information sharing framework, (Perceived) Barriers to information sharing, Concluding observations) -- 3. Liability for unsecured systems and networks (Criminal law, Civil liability, Regulation) -- 4. Moving forward (Motivating the private sector, Security and privacy tensions, A Trust network) 606 $aConfidential communications$zUnited States 606 $aComputer security$zUnited States 606 $aComputers$xAccess control$zUnited States 606 $aPrivacy, Right of$zUnited States 615 0$aConfidential communications 615 0$aComputer security 615 0$aComputers$xAccess control 615 0$aPrivacy, Right of 701 $aPersonick$b Stewart D$0771895 701 $aPatterson$b Cynthia A$0261386 712 02$aNational Research Council (U.S.) Committee on Critical Information Infrastructure Protection and the Law. 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910960896803321 996 $aCritical information infrastructure protection and the law$94357624 997 $aUNINA