NLU Meghalaya Library

Online Public Access Catalogue (OPAC)

Why don't we defend better? : (Record no. 6378)

MARC details
000 -LEADER
fixed length control field 03293cam a2200589Ki 4500
001 - CONTROL NUMBER
control field 9781351127301
003 - CONTROL NUMBER IDENTIFIER
control field FlBoTFG
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240213122834.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cnu---unuuu
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 190709s2019 flu o 000 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency OCoLC-P
Language of cataloging eng
Description conventions rda
-- pn
Transcribing agency OCoLC-P
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781351127288
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1351127284
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781351127301
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1351127306
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781351127295
Qualifying information (electronic bk. : PDF)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1351127292
Qualifying information (electronic bk. : PDF)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781351127271
Qualifying information (electronic bk. : Mobipocket)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1351127276
Qualifying information (electronic bk. : Mobipocket)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9780815356622
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 0815356625
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)1107700233
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC-P)1107700233
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5105.59
Item number .S585 2019eb
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 000000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 012040
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 021030
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code URD
Source bicssc
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Sloan, Robert H.,
Relator term author.
245 10 - TITLE STATEMENT
Title Why don't we defend better? :
Remainder of title data breaches, risk management, and public policy /
Statement of responsibility, etc. Robert H. Sloan, Richard Warner.
250 ## - EDITION STATEMENT
Edition statement First edition.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Boca Raton, FL :
Name of producer, publisher, distributor, manufacturer CRC Press/Taylor & Francis Group,
Date of production, publication, distribution, manufacture, or copyright notice [2019]
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource.
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Introduction -- Software vulnerabilities -- (Mis)management : Failing to defend against technical attacks -- A mandatory reporting proposal -- Outsourcing security -- The internet of things -- Human vulnerabilities -- Seeing the forest : An overview of policy proposals.
520 ## - SUMMARY, ETC.
Summary, etc. "The wave of data breaches raises two pressing questions : Why don't we defend our networks better? And, what practical incentives can we create to improve our defenses? Why Don't We Defend Better? : Data Breaches, Risk Management, and Public Policy answers those questions. It distinguishes three technical sources of data breaches corresponding to three types of vulnerabilities: software, human, and network. It discusses two risk management goals: business and consumer. The authors propose mandatory anonymous reporting of information as an essential step toward better defense, as well as a general reporting requirement. They also provide a systematic overview of data breach defense, combining technological and public policy considerations"--
Assigning source Provided by publisher.
588 ## - SOURCE OF DESCRIPTION NOTE
Source of description note OCLC-licensed vendor bibliographic record.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures
-- Government policy.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security
General subdivision Government policy.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Business
General subdivision Data processing
-- Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer crimes
General subdivision Risk assessment.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTERS / General
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTERS / Computer Graphics / Game Programming & Design
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTERS / Database Management / Data Mining
Source of heading or term bisacsh
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Warner, Richard,
Dates associated with a name 1946-
Relator term author.
856 40 - ELECTRONIC LOCATION AND ACCESS
Materials specified Taylor & Francis
Uniform Resource Identifier <a href="https://www.taylorfrancis.com/books/9781351127301">https://www.taylorfrancis.com/books/9781351127301</a>
856 42 - ELECTRONIC LOCATION AND ACCESS
Materials specified OCLC metadata license agreement
Uniform Resource Identifier <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a>

No items available.