Cybersecurity towards a strategy for securing critical infrastructure from cyberattacks
(eBook)
Author
Published
Boulder, Colo. : Silicon Flatirons Center, 2012.
Status
Description
Loading Description...
Also in this Series
Checking series information...
More Copies In Prospector
Loading Prospector Copies...
More Details
Format
eBook
Language
English
Notes
General Note
"May 2012."
Description
The financial and competitive implications of cyberattacks cause many to consider them the most important threat to the future of the United States. The Federal Bureau of Investigation called the threat the "No. 1 concern as foreign hackers . . . penetrate American firms' computers and steal huge amounts of valuable data and intellectual property." Although difficult to quantify or identify and easy to downplay, it is fair to say that the threat is real and growing
Citations
APA Citation, 7th Edition (style guide)
Kerfoot, T. (2012). Cybersecurity: towards a strategy for securing critical infrastructure from cyberattacks . Silicon Flatirons Center.
Chicago / Turabian - Author Date Citation, 17th Edition (style guide)Kerfoot, Therese. 2012. Cybersecurity: Towards a Strategy for Securing Critical Infrastructure From Cyberattacks. Silicon Flatirons Center.
Chicago / Turabian - Humanities (Notes and Bibliography) Citation, 17th Edition (style guide)Kerfoot, Therese. Cybersecurity: Towards a Strategy for Securing Critical Infrastructure From Cyberattacks Silicon Flatirons Center, 2012.
MLA Citation, 9th Edition (style guide)Kerfoot, Therese. Cybersecurity: Towards a Strategy for Securing Critical Infrastructure From Cyberattacks Silicon Flatirons Center, 2012.
Note! Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy. Citation formats are based on standards as of August 2021.
Staff View
Grouped Work ID
5fee5694-5db4-cf35-7d20-4905090d6d9a-eng
Grouping Information
Grouped Work ID | 5fee5694-5db4-cf35-7d20-4905090d6d9a-eng |
---|---|
Full title | cybersecurity towards a strategy for securing critical infrastructure from cyberattacks |
Author | kerfoot therese |
Grouping Category | book |
Last Update | 2022-06-13 10:33:16AM |
Last Indexed | 2024-05-04 02:25:37AM |
Book Cover Information
Image Source | default |
---|---|
First Loaded | Jul 1, 2022 |
Last Used | May 3, 2024 |
Marc Record
First Detected | Apr 04, 2014 12:00:00 AM |
---|---|
Last File Modification Time | Jul 31, 2021 04:35:01 AM |
MARC Record
LEADER | 02496nam a2200469Ia 4500 | ||
---|---|---|---|
001 | ocn875701508 | ||
003 | OCoLC | ||
005 | 20140404031341.0 | ||
006 | m o d s | ||
007 | cr ||||||||||| | ||
008 | 140404s2012 cou o s000 0 eng d | ||
035 | |a (OCoLC)875701508 | ||
040 | |a DDB|c DDB|d UtOrBLW | ||
043 | |a n-us--- | ||
049 | |a DDBA | ||
086 | |a UCB6/118.2/C99/2012/INTERNET | ||
086 | |a UCB6/118.2/C99/2012/INTERNET|2 codocs | ||
100 | 1 | |a Kerfoot, Therese. | |
245 | 1 | 0 | |a Cybersecurity|h [electronic resource] :|b towards a strategy for securing critical infrastructure from cyberattacks /|c Therese Kerfoot. |
246 | 3 | |a Cyber security towards a strategy for securing critical infrastructure from cyber attacks | |
264 | 1 | |a Boulder, Colo. :|b Silicon Flatirons Center,|c 2012. | |
300 | |a 1 online resource (5 unnumbered pages, 41 pages, 1 unnumbered page). | ||
336 | |a text|b txt|2 rdacontent | ||
337 | |a computer|b c|2 rdamedia | ||
338 | |a online resource|b cr|2 rdacarrier | ||
347 | |a text file|2 rdaft | ||
490 | 1 | |a Summit series / Silicon Flatirons Center for Law, Technology, and Entrepreneurship | |
500 | |a "May 2012." | ||
520 | |a The financial and competitive implications of cyberattacks cause many to consider them the most important threat to the future of the United States. The Federal Bureau of Investigation called the threat the "No. 1 concern as foreign hackers . . . penetrate American firms' computers and steal huge amounts of valuable data and intellectual property." Although difficult to quantify or identify and easy to downplay, it is fair to say that the threat is real and growing | ||
588 | 0 | |a Online resource; title from PDF cover (viewed April 2014) | |
650 | 0 | |a Computer security|x Government policy|z United States. | |
650 | 0 | |a Cyberterrorism|x Government policy|z United States. | |
710 | 2 | |a Silicon Flatirons Center for Law, Technology, and Entrepreneurship. | |
830 | 0 | |a Summit series (Silicon Flatirons Center for Law, Technology, and Entrepreneurship) | |
856 | 4 | 0 | |u http://hdl.handle.net/10176/co:13085_ucb61182c992012internet.pdf|z Access online |
907 | |a .b10577695|b 10-24-20|c 04-04-14 | ||
945 | |g 1|j 0|l csdig|o -|p $0.00|q -|r -|s j |t 0|u 0|v 0|w 0|x 0|y .i11522045|z 04-04-14 | ||
994 | |a C0|b DDB | ||
998 | |a cs|b 04-04-14|c m|d a |e -|f eng|g cou|h 0|i 0 | ||
998 | |a cs|b 04-04-14|c m|d a |e -|f eng|g cou|h 0|i 0 | ||
998 | |a cs|b 04-04-14|c m|d a|e -|f eng|g cou|h 0|i 0 | ||
998 | |a cs|b 04-04-14|c m|d a|e -|f eng|g cou|h 0|i 1 |