Establishing cyber security programs through the community cyber security maturity model (CCSMM)

"This book explores how to establish a cyber security program through the use of the community cyber security maturity model" - Provided by publisher

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: White, Gregory (VerfasserIn), Sjelin, Natalie 1967- (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Hershey PA, USA IGI Global, Publisher of Timely Knowledge [2021]
Schriftenreihe:A volume in the Advances in information security, privacy, and ethics (AISPE) book series
Premier reference source
Schlagworte:
Online-Zugang:DE-1050
DE-573
DE-898
DE-1049
DE-706
DE-83
URL des Erstveröffentlichers
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nmm a2200000 c 4500
001 BV047028081
003 DE-604
005 20211126
007 cr|uuu---uuuuu
008 201125s2021 |||| o||u| ||||||eng d
020 |a 9781799844723  |9 978-1-7998-4472-3 
024 7 |a 10.4018/978-1-7998-4471-6  |2 doi 
035 |a (ZDB-1-IGE)00244468 
035 |a (ZDB-98-IGB)978-1-7998-4472-3 
035 |a (OCoLC)1224488325 
035 |a (DE-599)BVBBV047028081 
040 |a DE-604  |b ger  |e rda 
041 0 |a eng 
049 |a DE-1049  |a DE-573  |a DE-1050  |a DE-91  |a DE-706  |a DE-898  |a DE-83 
082 0 |a 352.3/79  |2 23 
100 1 |a White, Gregory  |e Verfasser  |0 (DE-588)1105681300  |4 aut 
245 1 0 |a Establishing cyber security programs through the community cyber security maturity model (CCSMM)  |c Gregory B. White (CIAS, The University of Texas at San Antonio, USA), Natalie Sjelin (CIAS, The University of Texas at San Antonio, USA) 
264 1 |a Hershey PA, USA  |b IGI Global, Publisher of Timely Knowledge  |c [2021] 
264 4 |c © 2021 
300 |a 1 Online-Ressource (xxxiii, 221 Seiten)  |b Illustrationen 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
490 0 |a A volume in the Advances in information security, privacy, and ethics (AISPE) book series  |x 1948-9749 
490 0 |a Premier reference source 
520 |a "This book explores how to establish a cyber security program through the use of the community cyber security maturity model" - Provided by publisher 
650 7 |a Computer networks / Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
650 4 |a Computer networks / Security measures 
650 4 |a Community information services / Security measures 
650 4 |a Computer security 
700 1 |a Sjelin, Natalie  |d 1967-  |e Verfasser  |4 aut 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 9781799844716 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 1-7998-4471-4 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe, Softcover  |z 978-1-7998-5158-5 
856 4 0 |u https://doi.org/10.4018/978-1-7998-4471-6  |x Verlag  |z URL des Erstveröffentlichers  |3 Volltext 
912 |a ZDB-98-IGB  |a ZDB-1-IGE 
966 e |u https://doi.org/10.4018/978-1-7998-4471-6  |l DE-1050  |p ZDB-98-IGB  |q FHD01_IGB_Kauf  |x Verlag  |3 Volltext 
966 e |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-4471-6  |l DE-573  |p ZDB-1-IGE  |x Verlag  |3 Volltext 
966 e |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-4471-6  |l DE-898  |p ZDB-1-IGE  |x Verlag  |3 Volltext 
966 e |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-4471-6  |l DE-1049  |p ZDB-1-IGE  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.4018/978-1-7998-4471-6  |l DE-706  |p ZDB-98-IGB  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.4018/978-1-7998-4471-6  |l DE-83  |p ZDB-98-IGB  |q TUB_EBS_IGB  |x Verlag  |3 Volltext 

Datensatz im Suchindex

DE-BY-TUM_katkey 2535361
DE-BY-TUM_local_url http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-4471-6
https://doi.org/10.4018/978-1-7998-4471-6
Verlag
_version_ 1816714651021344768
adam_text
adam_txt
any_adam_object
any_adam_object_boolean
author White, Gregory
Sjelin, Natalie 1967-
author_GND (DE-588)1105681300
author_facet White, Gregory
Sjelin, Natalie 1967-
author_role aut
aut
author_sort White, Gregory
author_variant g w gw
n s ns
building Verbundindex
bvnumber BV047028081
collection ZDB-98-IGB
ZDB-1-IGE
ctrlnum (ZDB-1-IGE)00244468
(ZDB-98-IGB)978-1-7998-4472-3
(OCoLC)1224488325
(DE-599)BVBBV047028081
dewey-full 352.3/79
dewey-hundreds 300 - Social sciences
dewey-ones 352 - General considerations of public administration
dewey-raw 352.3/79
dewey-search 352.3/79
dewey-sort 3352.3 279
dewey-tens 350 - Public administration and military science
doi_str_mv 10.4018/978-1-7998-4471-6
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000 c 4500</leader><controlfield tag="001">BV047028081</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20211126</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">201125s2021 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781799844723</subfield><subfield code="9">978-1-7998-4472-3</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-7998-4471-6</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-1-IGE)00244468</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-98-IGB)978-1-7998-4472-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1224488325</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047028081</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1049</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">352.3/79</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">White, Gregory</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1105681300</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Establishing cyber security programs through the community cyber security maturity model (CCSMM)</subfield><subfield code="c">Gregory B. White (CIAS, The University of Texas at San Antonio, USA), Natalie Sjelin (CIAS, The University of Texas at San Antonio, USA)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey PA, USA</subfield><subfield code="b">IGI Global, Publisher of Timely Knowledge</subfield><subfield code="c">[2021]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2021</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxxiii, 221 Seiten)</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">A volume in the Advances in information security, privacy, and ethics (AISPE) book series</subfield><subfield code="x">1948-9749</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Premier reference source</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This book explores how to establish a cyber security program through the use of the community cyber security maturity model" - Provided by publisher</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Community information services / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sjelin, Natalie</subfield><subfield code="d">1967-</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781799844716</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1-7998-4471-4</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Softcover</subfield><subfield code="z">978-1-7998-5158-5</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.4018/978-1-7998-4471-6</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield><subfield code="a">ZDB-1-IGE</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-7998-4471-6</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FHD01_IGB_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-4471-6</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-4471-6</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-4471-6</subfield><subfield code="l">DE-1049</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-7998-4471-6</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-7998-4471-6</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
id DE-604.BV047028081
illustrated Not Illustrated
index_date 2024-07-03T16:01:30Z
indexdate 2024-11-25T17:57:35Z
institution BVB
isbn 9781799844723
issn 1948-9749
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-032435426
oclc_num 1224488325
open_access_boolean
owner DE-1049
DE-573
DE-1050
DE-91
DE-BY-TUM
DE-706
DE-898
DE-BY-UBR
DE-83
owner_facet DE-1049
DE-573
DE-1050
DE-91
DE-BY-TUM
DE-706
DE-898
DE-BY-UBR
DE-83
physical 1 Online-Ressource (xxxiii, 221 Seiten) Illustrationen
psigel ZDB-98-IGB
ZDB-1-IGE
ZDB-98-IGB FHD01_IGB_Kauf
ZDB-98-IGB TUB_EBS_IGB
publishDate 2021
publishDateSearch 2021
publishDateSort 2021
publisher IGI Global, Publisher of Timely Knowledge
record_format marc
series2 A volume in the Advances in information security, privacy, and ethics (AISPE) book series
Premier reference source
spellingShingle White, Gregory
Sjelin, Natalie 1967-
Establishing cyber security programs through the community cyber security maturity model (CCSMM)
Computer networks / Security measures fast
Computer security fast
Computer networks / Security measures
Community information services / Security measures
Computer security
title Establishing cyber security programs through the community cyber security maturity model (CCSMM)
title_auth Establishing cyber security programs through the community cyber security maturity model (CCSMM)
title_exact_search Establishing cyber security programs through the community cyber security maturity model (CCSMM)
title_exact_search_txtP Establishing cyber security programs through the community cyber security maturity model (CCSMM)
title_full Establishing cyber security programs through the community cyber security maturity model (CCSMM) Gregory B. White (CIAS, The University of Texas at San Antonio, USA), Natalie Sjelin (CIAS, The University of Texas at San Antonio, USA)
title_fullStr Establishing cyber security programs through the community cyber security maturity model (CCSMM) Gregory B. White (CIAS, The University of Texas at San Antonio, USA), Natalie Sjelin (CIAS, The University of Texas at San Antonio, USA)
title_full_unstemmed Establishing cyber security programs through the community cyber security maturity model (CCSMM) Gregory B. White (CIAS, The University of Texas at San Antonio, USA), Natalie Sjelin (CIAS, The University of Texas at San Antonio, USA)
title_short Establishing cyber security programs through the community cyber security maturity model (CCSMM)
title_sort establishing cyber security programs through the community cyber security maturity model ccsmm
topic Computer networks / Security measures fast
Computer security fast
Computer networks / Security measures
Community information services / Security measures
Computer security
topic_facet Computer networks / Security measures
Computer security
Community information services / Security measures
url https://doi.org/10.4018/978-1-7998-4471-6
work_keys_str_mv AT whitegregory establishingcybersecurityprogramsthroughthecommunitycybersecuritymaturitymodelccsmm
AT sjelinnatalie establishingcybersecurityprogramsthroughthecommunitycybersecuritymaturitymodelccsmm