Cybersecurity towards a strategy for securing critical infrastructure from cyberattacks
(eBook)

Book Cover
Average Rating
Published
Boulder, Colo. : Silicon Flatirons Center, 2012.
Status

Description

Loading Description...

Also in this Series

Checking series information...

More Like This

Loading more titles like this title...

More Copies In Prospector

Loading Prospector Copies...

More Details

Format
eBook
Language
English

Notes

General Note
"May 2012."
Description
The financial and competitive implications of cyberattacks cause many to consider them the most important threat to the future of the United States. The Federal Bureau of Investigation called the threat the "No. 1 concern as foreign hackers . . . penetrate American firms' computers and steal huge amounts of valuable data and intellectual property." Although difficult to quantify or identify and easy to downplay, it is fair to say that the threat is real and growing

Citations

APA Citation, 7th Edition (style guide)

Kerfoot, T. (2012). Cybersecurity: towards a strategy for securing critical infrastructure from cyberattacks . Silicon Flatirons Center.

Chicago / Turabian - Author Date Citation, 17th Edition (style guide)

Kerfoot, Therese. 2012. Cybersecurity: Towards a Strategy for Securing Critical Infrastructure From Cyberattacks. Silicon Flatirons Center.

Chicago / Turabian - Humanities (Notes and Bibliography) Citation, 17th Edition (style guide)

Kerfoot, Therese. Cybersecurity: Towards a Strategy for Securing Critical Infrastructure From Cyberattacks Silicon Flatirons Center, 2012.

MLA Citation, 9th Edition (style guide)

Kerfoot, Therese. Cybersecurity: Towards a Strategy for Securing Critical Infrastructure From Cyberattacks Silicon Flatirons Center, 2012.

Note! Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy. Citation formats are based on standards as of August 2021.

Staff View

Grouped Work ID
5fee5694-5db4-cf35-7d20-4905090d6d9a-eng
Go To Grouped Work

Grouping Information

Grouped Work ID5fee5694-5db4-cf35-7d20-4905090d6d9a-eng
Full titlecybersecurity towards a strategy for securing critical infrastructure from cyberattacks
Authorkerfoot therese
Grouping Categorybook
Last Update2022-06-13 10:33:16AM
Last Indexed2024-05-04 02:25:37AM

Book Cover Information

Image Sourcedefault
First LoadedJul 1, 2022
Last UsedMay 3, 2024

Marc Record

First DetectedApr 04, 2014 12:00:00 AM
Last File Modification TimeJul 31, 2021 04:35:01 AM

MARC Record

LEADER02496nam a2200469Ia 4500
001ocn875701508
003OCoLC
00520140404031341.0
006m     o  d s      
007cr |||||||||||
008140404s2012    cou     o    s000 0 eng d
035 |a (OCoLC)875701508
040 |a DDB|c DDB|d UtOrBLW
043 |a n-us---
049 |a DDBA
086 |a UCB6/118.2/C99/2012/INTERNET
086 |a UCB6/118.2/C99/2012/INTERNET|2 codocs
1001 |a Kerfoot, Therese.
24510|a Cybersecurity|h [electronic resource] :|b towards a strategy for securing critical infrastructure from cyberattacks /|c Therese Kerfoot.
2463 |a Cyber security towards a strategy for securing critical infrastructure from cyber attacks
264 1|a Boulder, Colo. :|b Silicon Flatirons Center,|c 2012.
300 |a 1 online resource (5 unnumbered pages, 41 pages, 1 unnumbered page).
336 |a text|b txt|2 rdacontent
337 |a computer|b c|2 rdamedia
338 |a online resource|b cr|2 rdacarrier
347 |a text file|2 rdaft
4901 |a Summit series / Silicon Flatirons Center for Law, Technology, and Entrepreneurship
500 |a "May 2012."
520 |a The financial and competitive implications of cyberattacks cause many to consider them the most important threat to the future of the United States. The Federal Bureau of Investigation called the threat the "No. 1 concern as foreign hackers . . . penetrate American firms' computers and steal huge amounts of valuable data and intellectual property." Although difficult to quantify or identify and easy to downplay, it is fair to say that the threat is real and growing
5880 |a Online resource; title from PDF cover (viewed April 2014)
650 0|a Computer security|x Government policy|z United States.
650 0|a Cyberterrorism|x Government policy|z United States.
7102 |a Silicon Flatirons Center for Law, Technology, and Entrepreneurship.
830 0|a Summit series (Silicon Flatirons Center for Law, Technology, and Entrepreneurship)
85640|u http://hdl.handle.net/10176/co:13085_ucb61182c992012internet.pdf|z Access online
907 |a .b10577695|b 10-24-20|c 04-04-14
945 |g 1|j 0|l csdig|o -|p $0.00|q -|r -|s j |t 0|u 0|v 0|w 0|x 0|y .i11522045|z 04-04-14
994 |a C0|b DDB
998 |a cs|b 04-04-14|c m|d a |e -|f eng|g cou|h 0|i 0
998 |a cs|b 04-04-14|c m|d a |e -|f eng|g cou|h 0|i 0
998 |a cs|b 04-04-14|c m|d a|e -|f eng|g cou|h 0|i 0
998 |a cs|b 04-04-14|c m|d a|e -|f eng|g cou|h 0|i 1