MARC보기
LDR04246cam a2200685Ki 4500
001000000412157
00520190131142954
006m d
007cr cnu---unuuu
008180125s2018 mau ob 001 0 eng d
019 ▼a 1021095171 ▼a 1030718111 ▼a 1030796424 ▼a 1031331876 ▼a 1031877365 ▼a 1032573195 ▼a 1032649761
020 ▼a 9780262346641 ▼q (electronic bk.)
020 ▼a 0262346648 ▼q (electronic bk.)
020 ▼z 9780262535373
020 ▼z 0262535378
035 ▼a 1694039 ▼b (N$T)
035 ▼a (OCoLC)1020319459 ▼z (OCoLC)1021095171 ▼z (OCoLC)1030718111 ▼z (OCoLC)1030796424 ▼z (OCoLC)1031331876 ▼z (OCoLC)1031877365 ▼z (OCoLC)1032573195 ▼z (OCoLC)1032649761
040 ▼a N$T ▼b eng ▼e rda ▼e pn ▼c N$T ▼d YDX ▼d EBLCP ▼d COO ▼d CNCGM ▼d IDB ▼d MNW ▼d XUN ▼d CEF ▼d 247004
050 4 ▼a TK5105.59 ▼b .N3464 2018eb
072 7 ▼a BUS ▼x 082000 ▼2 bisacsh
072 7 ▼a BUS ▼x 041000 ▼2 bisacsh
072 7 ▼a BUS ▼x 042000 ▼2 bisacsh
072 7 ▼a BUS ▼x 085000 ▼2 bisacsh
08204 ▼a 658.4/78 ▼2 23
24500 ▼a New solutions for cybersecurity/ ▼c edited by Howard Shrobe, David L. Shrier, and Alex Pentland.
260 ▼a Cambridge, MA: ▼b MIT Press, ▼c [2018].
300 ▼a 1 online resource.
336 ▼a text ▼b txt ▼2 rdacontent
337 ▼a computer ▼b c ▼2 rdamedia
338 ▼a online resource ▼b cr ▼2 rdacarrier
347 ▼a text file ▼b PDF ▼2 rda
347 ▼a data file ▼2 rda
4900 ▼a MIT connections science & engineering
504 ▼a Includes bibliographical references and index.
5050 ▼a Intro; CONTENTS; INTRODUCTION: Cybersecurity and Society; SECTION I MANAGEMENT, ORGANIZATIONS & STRATEGY; CHAPTER 1 Institutions for Cybersecurity: International Responses and Data Sharing Initiatives; CHAPTER 2 Cybersafety: A Systems Theory Approach to Managing Cybersecurity Risksa?#x80;#x94;Applied to TJX Cyberattack; CHAPTER 3 Measuring Stakeholdersa?#x80;#x99; Perceptions of Cybersecurity for Renewable Energy Systems; CHAPTER 4 Fixing a Hole: The Labor Market for Bugs; SECTION II ARCHITECTURE; CHAPTER 5 Balancing Disruption and Deployability in the CHERI Instruction-Set Architecture (ISA)
5058 ▼a CHAPTER 6 Fundamental Trustworthiness Principles in CHERICHAPTER 7 ISPa?#x80;#x94;Hardware Enforcement of Security Policies; CHAPTER 8 Stealing Reality: When Criminals Become Data Scientists; CHAPTER 9 Moving Target Techniques: Cyber Resilience through Randomization, Diversity, and Dynamism; SECTION III SYSTEMS; CHAPTER 10 Who's Afraid of the Dark Web?; CHAPTER 11 Social Physics and Cybercrime; CHAPTER 12 Behavioral Biometrics; CHAPTER 14 Owner Centric Access Management for IoT Data; CHAPTER 15 Enigma: Decentralized Computation Platform with Guaranteed Privacy
5058 ▼a CHAPTER 16 The Trust::Data Framework as a Solution to the Cybersecurity ChallengeConclusion; Contributor Biographies
520 ▼a Experts from MIT explore recent advances in cybersecurity, bringing together management, technical, and sociological perspectives.
5880 ▼a Print version record.
590 ▼a Master record variable field(s) change: 050, 082, 650
650 0 ▼a Computer networks ▼x Security measures.
650 0 ▼a Internet ▼x Security measures.
650 7 ▼a Computer networks ▼x Security measures. ▼2 fast ▼0 (OCoLC)fst00872341
650 7 ▼a Internet ▼x Security measures. ▼2 fast ▼0 (OCoLC)fst01751426
650 7 ▼a BUSINESS & ECONOMICS / Industrial Management ▼2 bisacsh
650 7 ▼a BUSINESS & ECONOMICS / Management ▼2 bisacsh
650 7 ▼a BUSINESS & ECONOMICS / Management Science ▼2 bisacsh
650 7 ▼a BUSINESS & ECONOMICS / Organizational Behavior ▼2 bisacsh
655 4 ▼a Electronic books.
7001 ▼a Shrobe, Howard E., ▼e editor,
7001 ▼a Shrier, David L., ▼e editor,
7001 ▼a Pentland, Alex, ▼d 1952- ▼e editor,
77608 ▼i Print version: ▼t New solutions for cybersecurity. ▼d Cambridge, MA : MIT Press, [2018] ▼z 9780262535373 ▼w (DLC) 2017040417 ▼w (OCoLC)1003255394
85640 ▼3 EBSCOhost ▼u http://libproxy.dhu.ac.kr/_Lib_Proxy_Url/http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=1694039
938 ▼a EBL - Ebook Library ▼b EBLB ▼n EBL5240456
938 ▼a YBP Library Services ▼b YANK ▼n 15111609
938 ▼a EBSCOhost ▼b EBSC ▼n 1694039
990 ▼a ***1012033
994 ▼a 92 ▼b N$T