Skip to:Content
|
Bottom
Cover image for Cybersecurity public sector threats and responses
Title:
Cybersecurity public sector threats and responses
Author:
Andreasson, Kim J.
ISBN:
9781439846643
Publication Information:
Boca Raton, Fla. : CRC Press, 2012.
Physical Description:
xxxv, 354 p. : ill.
Series:
Public administration and public policy ; 165
Series Title:
Public administration and public policy ; 165
Contents:
ch. 1. The global rise of e-government and its security implications / Jeremy Millard -- ch. 2. Understanding cyber threats / Deborah L. Wheeler -- ch. 3. Cybersecurity in east Asia : Japan and the 2009 attacks on South Korea and the United States / Motohiro Tsuchiya -- ch. 4. Toward a global approach to cybersecurity / Marco Obiso and Gary Fowlie -- ch. 5. The cybersecurity policy challenge : the tyranny of geography / Elaine C. Kamarck -- ch. 6. U.S. federal cybersecurity policy / Daniel Castro -- ch. 7. European cybersecurity policy / Neil Robinson -- ch. 8. A local cybersecurity approach : the case of Catalonia / Ignacio Alamillo Domingo and Agust ̕Cerrillo-I-Martn̕ez -- ch. 9. Securing government transparency : cybersecurity policy issues in a Gov 2.0 environment and beyond / Gregory G. Curtin and Charity C. Tran -- ch. 10. The civilian cyber incident response policies of the U.S. federal government / Chris Bronk -- ch. 11. Cybersecurity health check : a framework to enhance organizational security / Shih Ming Pan ... [et al.] -- ch. 12. Beyond public-private partnerships : leadership strategies for securing cyberspace / Dave Sulek and Megan Doscher -- ch. 13. Is there a conclusion to cybersecurity? / Kim Andreasson.
Abstract:
"Written as a reference, but easily adaptable for classroom use, this book explains the importance of cyber security, why readers should care, and what threats to watch for. It also offers information on how to improve an operating environment and better safeguard the constituents organizations serve. Based on research that claims that cyber security policy is often set at less senior levels of corporations, and left to IT security professionals, this book explains why security should be addressed by senior level management. "-- Provided by publisher.
Added Author:
Holds:
Copies:

Available:*

Library
Material Type
Item Barcode
Shelf Number
Status
Item Holds
Searching...
E-Book 286202-1001 ONLINE
Searching...

On Order

Go to:Top of Page