Cybersecurity : public sector threats and responses / editor, Kim Andreasson.
Material type: TextSeries: Public administration and public policyPublication details: Boca Raton, FL : CRC Press, c2012Description: xxxv, 354 p. : ill. ; 24 cmISBN: 9781439846636 (pbk.)Subject(s): Computer networks -- Security measures -- Government policy | Government information -- Security measures | Computer crimes -- Prevention | COMPUTERS / Security / General | POLITICAL SCIENCE / Public Policy / City Planning & Urban Development | POLITICAL SCIENCE / Public Policy / GeneralDDC classification: 352.379 LOC classification: TK5105.59 | .C93 2012Summary: "Written as a reference, but easily adaptable for classroom use, this book explains the importance of cyber security, why readers should care, and what threats to watch for. It also offers information on how to improve an operating environment and better safeguard the constituents organizations serve. Based on research that claims that cyber security policy is often set at less senior levels of corporations, and left to IT security professionals, this book explains why security should be addressed by senior level management. "--Item type | Current library | Collection | Call number | Copy number | Status | Date due | Barcode |
---|---|---|---|---|---|---|---|
Staff Circulation | APU Library Open Shelf | Book | TK5105.59 .C93 2012 c.1 (Browse shelf (Opens below)) | 1 | Available (No use restrictions) | 00026402 | |
General Circulation | APU Library Open Shelf | Book | TK5105.59 .C93 2012 c.2 (Browse shelf (Opens below)) | 2 | Available (No use restrictions) | 00026403 |
Includes bibliographical references and index.
"Written as a reference, but easily adaptable for classroom use, this book explains the importance of cyber security, why readers should care, and what threats to watch for. It also offers information on how to improve an operating environment and better safeguard the constituents organizations serve. Based on research that claims that cyber security policy is often set at less senior levels of corporations, and left to IT security professionals, this book explains why security should be addressed by senior level management. "--
There are no comments on this title.