Cybersecurity in context (Record no. 567536)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01427 a2200229 4500 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | OSt |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20250626103249.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 250626b |||||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9781394262441 |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 343.995 |
Item number | H761c |
100 ## - MAIN ENTRY--AUTHOR NAME | |
Personal name | Hoofnagle, Chris Jay |
245 ## - TITLE STATEMENT | |
Title | Cybersecurity in context |
Remainder of title | technology, policy, and law |
Statement of responsibility, etc | Chris Jay Hoofnagle and Golden Richard |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Name of publisher | John Wiley |
Year of publication | 2025 |
Place of publication | Hoboken |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | xxvii, 506p |
520 ## - SUMMARY, ETC. | |
Summary, etc | Cybersecurity integrates aspects of both computer science and social sciences, ranging from economics to psychology to law. To understand cybersecurity, one must have fundamental familiarity with a variety of concepts. These include the "halting problem" which makes it impossible to use a computer to tell whether another system is secure, issues with how new security problems emerge from computer networks, the difference between data and information and which should be the focus of cybersecurity, the science of analyzing computers and networks for malicious software, and the need for security balanced with psychological, economic, and practical impediments that prevent us from realizing secure systems |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical Term | Computer security -- Government policy |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical Term | Computer security -- Law and legislation |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical Term | Computer security -- Social aspects |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical Term | Computer security -- Forecasting |
700 ## - ADDED ENTRY--PERSONAL NAME | |
Personal name | Richard, Golden G. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | Books |
Withdrawn status | Lost status | Damaged status | Not for loan | Collection code | Home library | Current library | Date acquired | Source of acquisition | Cost, normal purchase price | Full call number | Accession Number | Cost, replacement price | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
In Acquisition | PK Kelkar Library, IIT Kanpur | PK Kelkar Library, IIT Kanpur | 24/06/2025 | 2 | 5227.22 | 343.995 H761c | A186891 | 6969.62 | Books |