Establishing cyber security programs through the community cyber security maturity model (CCSMM)
"This book explores how to establish a cyber security program through the use of the community cyber security maturity model" - Provided by publisher
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey PA, USA
IGI Global, Publisher of Timely Knowledge
[2021]
|
Schriftenreihe: | A volume in the Advances in information security, privacy, and ethics (AISPE) book series
Premier reference source |
Schlagworte: | |
Online-Zugang: | DE-1050 DE-573 DE-898 DE-1049 DE-706 DE-83 URL des Erstveröffentlichers |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV047028081 | ||
003 | DE-604 | ||
005 | 20211126 | ||
007 | cr|uuu---uuuuu | ||
008 | 201125s2021 |||| o||u| ||||||eng d | ||
020 | |a 9781799844723 |9 978-1-7998-4472-3 | ||
024 | 7 | |a 10.4018/978-1-7998-4471-6 |2 doi | |
035 | |a (ZDB-1-IGE)00244468 | ||
035 | |a (ZDB-98-IGB)978-1-7998-4472-3 | ||
035 | |a (OCoLC)1224488325 | ||
035 | |a (DE-599)BVBBV047028081 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-1049 |a DE-573 |a DE-1050 |a DE-91 |a DE-706 |a DE-898 |a DE-83 | ||
082 | 0 | |a 352.3/79 |2 23 | |
100 | 1 | |a White, Gregory |e Verfasser |0 (DE-588)1105681300 |4 aut | |
245 | 1 | 0 | |a Establishing cyber security programs through the community cyber security maturity model (CCSMM) |c Gregory B. White (CIAS, The University of Texas at San Antonio, USA), Natalie Sjelin (CIAS, The University of Texas at San Antonio, USA) |
264 | 1 | |a Hershey PA, USA |b IGI Global, Publisher of Timely Knowledge |c [2021] | |
264 | 4 | |c © 2021 | |
300 | |a 1 Online-Ressource (xxxiii, 221 Seiten) |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a A volume in the Advances in information security, privacy, and ethics (AISPE) book series |x 1948-9749 | |
490 | 0 | |a Premier reference source | |
520 | |a "This book explores how to establish a cyber security program through the use of the community cyber security maturity model" - Provided by publisher | ||
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 4 | |a Computer networks / Security measures | |
650 | 4 | |a Community information services / Security measures | |
650 | 4 | |a Computer security | |
700 | 1 | |a Sjelin, Natalie |d 1967- |e Verfasser |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781799844716 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1-7998-4471-4 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Softcover |z 978-1-7998-5158-5 |
856 | 4 | 0 | |u https://doi.org/10.4018/978-1-7998-4471-6 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-98-IGB |a ZDB-1-IGE | ||
966 | e | |u https://doi.org/10.4018/978-1-7998-4471-6 |l DE-1050 |p ZDB-98-IGB |q FHD01_IGB_Kauf |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-4471-6 |l DE-573 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-4471-6 |l DE-898 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-4471-6 |l DE-1049 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-7998-4471-6 |l DE-706 |p ZDB-98-IGB |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-7998-4471-6 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-TUM_katkey | 2535361 |
---|---|
DE-BY-TUM_local_url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-4471-6 https://doi.org/10.4018/978-1-7998-4471-6 Verlag |
_version_ | 1816714651021344768 |
adam_text | |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | White, Gregory Sjelin, Natalie 1967- |
author_GND | (DE-588)1105681300 |
author_facet | White, Gregory Sjelin, Natalie 1967- |
author_role | aut aut |
author_sort | White, Gregory |
author_variant | g w gw n s ns |
building | Verbundindex |
bvnumber | BV047028081 |
collection | ZDB-98-IGB ZDB-1-IGE |
ctrlnum | (ZDB-1-IGE)00244468 (ZDB-98-IGB)978-1-7998-4472-3 (OCoLC)1224488325 (DE-599)BVBBV047028081 |
dewey-full | 352.3/79 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 352 - General considerations of public administration |
dewey-raw | 352.3/79 |
dewey-search | 352.3/79 |
dewey-sort | 3352.3 279 |
dewey-tens | 350 - Public administration and military science |
doi_str_mv | 10.4018/978-1-7998-4471-6 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000 c 4500</leader><controlfield tag="001">BV047028081</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20211126</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">201125s2021 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781799844723</subfield><subfield code="9">978-1-7998-4472-3</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-7998-4471-6</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-1-IGE)00244468</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-98-IGB)978-1-7998-4472-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1224488325</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047028081</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1049</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">352.3/79</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">White, Gregory</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1105681300</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Establishing cyber security programs through the community cyber security maturity model (CCSMM)</subfield><subfield code="c">Gregory B. White (CIAS, The University of Texas at San Antonio, USA), Natalie Sjelin (CIAS, The University of Texas at San Antonio, USA)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey PA, USA</subfield><subfield code="b">IGI Global, Publisher of Timely Knowledge</subfield><subfield code="c">[2021]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2021</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxxiii, 221 Seiten)</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">A volume in the Advances in information security, privacy, and ethics (AISPE) book series</subfield><subfield code="x">1948-9749</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Premier reference source</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This book explores how to establish a cyber security program through the use of the community cyber security maturity model" - Provided by publisher</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Community information services / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sjelin, Natalie</subfield><subfield code="d">1967-</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781799844716</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1-7998-4471-4</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Softcover</subfield><subfield code="z">978-1-7998-5158-5</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.4018/978-1-7998-4471-6</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield><subfield code="a">ZDB-1-IGE</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-7998-4471-6</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FHD01_IGB_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-4471-6</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-4471-6</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-4471-6</subfield><subfield code="l">DE-1049</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-7998-4471-6</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-7998-4471-6</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV047028081 |
illustrated | Not Illustrated |
index_date | 2024-07-03T16:01:30Z |
indexdate | 2024-11-25T17:57:35Z |
institution | BVB |
isbn | 9781799844723 |
issn | 1948-9749 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032435426 |
oclc_num | 1224488325 |
open_access_boolean | |
owner | DE-1049 DE-573 DE-1050 DE-91 DE-BY-TUM DE-706 DE-898 DE-BY-UBR DE-83 |
owner_facet | DE-1049 DE-573 DE-1050 DE-91 DE-BY-TUM DE-706 DE-898 DE-BY-UBR DE-83 |
physical | 1 Online-Ressource (xxxiii, 221 Seiten) Illustrationen |
psigel | ZDB-98-IGB ZDB-1-IGE ZDB-98-IGB FHD01_IGB_Kauf ZDB-98-IGB TUB_EBS_IGB |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | IGI Global, Publisher of Timely Knowledge |
record_format | marc |
series2 | A volume in the Advances in information security, privacy, and ethics (AISPE) book series Premier reference source |
spellingShingle | White, Gregory Sjelin, Natalie 1967- Establishing cyber security programs through the community cyber security maturity model (CCSMM) Computer networks / Security measures fast Computer security fast Computer networks / Security measures Community information services / Security measures Computer security |
title | Establishing cyber security programs through the community cyber security maturity model (CCSMM) |
title_auth | Establishing cyber security programs through the community cyber security maturity model (CCSMM) |
title_exact_search | Establishing cyber security programs through the community cyber security maturity model (CCSMM) |
title_exact_search_txtP | Establishing cyber security programs through the community cyber security maturity model (CCSMM) |
title_full | Establishing cyber security programs through the community cyber security maturity model (CCSMM) Gregory B. White (CIAS, The University of Texas at San Antonio, USA), Natalie Sjelin (CIAS, The University of Texas at San Antonio, USA) |
title_fullStr | Establishing cyber security programs through the community cyber security maturity model (CCSMM) Gregory B. White (CIAS, The University of Texas at San Antonio, USA), Natalie Sjelin (CIAS, The University of Texas at San Antonio, USA) |
title_full_unstemmed | Establishing cyber security programs through the community cyber security maturity model (CCSMM) Gregory B. White (CIAS, The University of Texas at San Antonio, USA), Natalie Sjelin (CIAS, The University of Texas at San Antonio, USA) |
title_short | Establishing cyber security programs through the community cyber security maturity model (CCSMM) |
title_sort | establishing cyber security programs through the community cyber security maturity model ccsmm |
topic | Computer networks / Security measures fast Computer security fast Computer networks / Security measures Community information services / Security measures Computer security |
topic_facet | Computer networks / Security measures Computer security Community information services / Security measures |
url | https://doi.org/10.4018/978-1-7998-4471-6 |
work_keys_str_mv | AT whitegregory establishingcybersecurityprogramsthroughthecommunitycybersecuritymaturitymodelccsmm AT sjelinnatalie establishingcybersecurityprogramsthroughthecommunitycybersecuritymaturitymodelccsmm |