The code of honor embracing ethics in cybersecurity

A comprehensive and practical framework for ethical practices in contemporary cybersecurity While some professions - including medicine, law, and engineering - have wholeheartedly embraced wide-ranging codes of ethics and conduct, the field of cybersecurity continues to lack an overarching ethical s...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Maurer, Paul J. (VerfasserIn)
Format: Buch
Sprache:English
Veröffentlicht: Hoboken, New Jersey John Wiley & Sons, Inc. [2024]
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000 c 4500
001 BV050095135
003 DE-604
007 t|
008 241212s2024 xx a||| b||| 00||| eng d
020 |a 9781394275861  |c hardback  |9 978-1-394-27586-1 
020 |a 1394275862  |9 1-394-27586-2 
035 |a (DE-599)BVBBV050095135 
040 |a DE-604  |b ger  |e rda 
041 0 |a eng 
049 |a DE-573 
084 |a ST 277  |0 (DE-625)143643:  |2 rvk 
100 1 |a Maurer, Paul J.  |e Verfasser  |4 aut 
245 1 0 |a The code of honor  |b embracing ethics in cybersecurity  |c Paul J. Maurer, Ed Skoudis 
264 1 |a Hoboken, New Jersey  |b John Wiley & Sons, Inc.  |c [2024] 
300 |a xiv, 204 Seiten  |b Illustrationen 
336 |b txt  |2 rdacontent 
337 |b n  |2 rdamedia 
338 |b nc  |2 rdacarrier 
520 3 |a A comprehensive and practical framework for ethical practices in contemporary cybersecurity While some professions - including medicine, law, and engineering - have wholeheartedly embraced wide-ranging codes of ethics and conduct, the field of cybersecurity continues to lack an overarching ethical standard. This vacuum constitutes a significant threat to the safety of consumers and businesses around the world, slows commerce, and delays innovation. The Code of Honor: Embracing Ethics in Cybersecurity delivers a first of its kind comprehensive discussion of the ethical challenges that face contemporary information security workers, managers, and executives 
650 0 7 |a Informationstechnik  |0 (DE-588)4026926-7  |2 gnd  |9 rswk-swf 
650 0 7 |a Ethik  |0 (DE-588)4015602-3  |2 gnd  |9 rswk-swf 
650 0 7 |a Computersicherheit  |0 (DE-588)4274324-2  |2 gnd  |9 rswk-swf 
653 0 |a Computer security / Moral and ethical aspects 
653 0 |a Penetration testing (Computer security) 
653 0 |a Sécurité informatique / Aspect moral 
653 0 |a Tests d'intrusion 
689 0 0 |a Informationstechnik  |0 (DE-588)4026926-7  |D s 
689 0 1 |a Computersicherheit  |0 (DE-588)4274324-2  |D s 
689 0 2 |a Ethik  |0 (DE-588)4015602-3  |D s 
689 0 |5 DE-604 
700 1 |a Skoudis, Ed  |e Sonstige  |0 (DE-588)1350929948  |4 oth 
776 0 8 |i Erscheint auch als  |n Online-Ausgabe, PDF  |z 978-1-394-27587-8 
776 0 8 |i Erscheint auch als  |n Online-Ausgabe, EPUB  |z 978-1-394-27588-5 
943 1 |a oai:aleph.bib-bvb.de:BVB01-035432360 

Datensatz im Suchindex

_version_ 1820211605787377664
adam_text
any_adam_object
author Maurer, Paul J.
author_GND (DE-588)1350929948
author_facet Maurer, Paul J.
author_role aut
author_sort Maurer, Paul J.
author_variant p j m pj pjm
building Verbundindex
bvnumber BV050095135
classification_rvk ST 277
ctrlnum (DE-599)BVBBV050095135
discipline Informatik
format Book
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 c 4500</leader><controlfield tag="001">BV050095135</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">241212s2024 xx a||| b||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781394275861</subfield><subfield code="c">hardback</subfield><subfield code="9">978-1-394-27586-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1394275862</subfield><subfield code="9">1-394-27586-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV050095135</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-573</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Maurer, Paul J.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">The code of honor</subfield><subfield code="b">embracing ethics in cybersecurity</subfield><subfield code="c">Paul J. Maurer, Ed Skoudis</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, New Jersey</subfield><subfield code="b">John Wiley &amp; Sons, Inc.</subfield><subfield code="c">[2024]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xiv, 204 Seiten</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">A comprehensive and practical framework for ethical practices in contemporary cybersecurity While some professions - including medicine, law, and engineering - have wholeheartedly embraced wide-ranging codes of ethics and conduct, the field of cybersecurity continues to lack an overarching ethical standard. This vacuum constitutes a significant threat to the safety of consumers and businesses around the world, slows commerce, and delays innovation. The Code of Honor: Embracing Ethics in Cybersecurity delivers a first of its kind comprehensive discussion of the ethical challenges that face contemporary information security workers, managers, and executives</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informationstechnik</subfield><subfield code="0">(DE-588)4026926-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Ethik</subfield><subfield code="0">(DE-588)4015602-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer security / Moral and ethical aspects</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Penetration testing (Computer security)</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Sécurité informatique / Aspect moral</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Tests d'intrusion</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Informationstechnik</subfield><subfield code="0">(DE-588)4026926-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Ethik</subfield><subfield code="0">(DE-588)4015602-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Skoudis, Ed</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1350929948</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe, PDF</subfield><subfield code="z">978-1-394-27587-8</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe, EPUB</subfield><subfield code="z">978-1-394-27588-5</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-035432360</subfield></datafield></record></collection>
id DE-604.BV050095135
illustrated Illustrated
indexdate 2025-01-03T07:24:12Z
institution BVB
isbn 9781394275861
1394275862
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-035432360
open_access_boolean
owner DE-573
owner_facet DE-573
physical xiv, 204 Seiten Illustrationen
publishDate 2024
publishDateSearch 2024
publishDateSort 2024
publisher John Wiley & Sons, Inc.
record_format marc
spelling Maurer, Paul J. Verfasser aut
The code of honor embracing ethics in cybersecurity Paul J. Maurer, Ed Skoudis
Hoboken, New Jersey John Wiley & Sons, Inc. [2024]
xiv, 204 Seiten Illustrationen
txt rdacontent
n rdamedia
nc rdacarrier
A comprehensive and practical framework for ethical practices in contemporary cybersecurity While some professions - including medicine, law, and engineering - have wholeheartedly embraced wide-ranging codes of ethics and conduct, the field of cybersecurity continues to lack an overarching ethical standard. This vacuum constitutes a significant threat to the safety of consumers and businesses around the world, slows commerce, and delays innovation. The Code of Honor: Embracing Ethics in Cybersecurity delivers a first of its kind comprehensive discussion of the ethical challenges that face contemporary information security workers, managers, and executives
Informationstechnik (DE-588)4026926-7 gnd rswk-swf
Ethik (DE-588)4015602-3 gnd rswk-swf
Computersicherheit (DE-588)4274324-2 gnd rswk-swf
Computer security / Moral and ethical aspects
Penetration testing (Computer security)
Sécurité informatique / Aspect moral
Tests d'intrusion
Informationstechnik (DE-588)4026926-7 s
Computersicherheit (DE-588)4274324-2 s
Ethik (DE-588)4015602-3 s
DE-604
Skoudis, Ed Sonstige (DE-588)1350929948 oth
Erscheint auch als Online-Ausgabe, PDF 978-1-394-27587-8
Erscheint auch als Online-Ausgabe, EPUB 978-1-394-27588-5
spellingShingle Maurer, Paul J.
The code of honor embracing ethics in cybersecurity
Informationstechnik (DE-588)4026926-7 gnd
Ethik (DE-588)4015602-3 gnd
Computersicherheit (DE-588)4274324-2 gnd
subject_GND (DE-588)4026926-7
(DE-588)4015602-3
(DE-588)4274324-2
title The code of honor embracing ethics in cybersecurity
title_auth The code of honor embracing ethics in cybersecurity
title_exact_search The code of honor embracing ethics in cybersecurity
title_full The code of honor embracing ethics in cybersecurity Paul J. Maurer, Ed Skoudis
title_fullStr The code of honor embracing ethics in cybersecurity Paul J. Maurer, Ed Skoudis
title_full_unstemmed The code of honor embracing ethics in cybersecurity Paul J. Maurer, Ed Skoudis
title_short The code of honor
title_sort the code of honor embracing ethics in cybersecurity
title_sub embracing ethics in cybersecurity
topic Informationstechnik (DE-588)4026926-7 gnd
Ethik (DE-588)4015602-3 gnd
Computersicherheit (DE-588)4274324-2 gnd
topic_facet Informationstechnik
Ethik
Computersicherheit
work_keys_str_mv AT maurerpaulj thecodeofhonorembracingethicsincybersecurity
AT skoudised thecodeofhonorembracingethicsincybersecurity