Cybersecurity and cyber-information sharing : legal and economic analyses /

Over the course of the last year, a host of cyberattacks has been perpetrated on a number of high profile American companies. The high profile cyberattacks of 2014 and early 2015 appear to be indicative of a broader trend: the frequency and ferocity of cyberattacks are increasing, posing grave threa...

Full description

Saved in:
Bibliographic Details
Other Authors: Morgan, Julia M. (Editor)
Format: Electronic eBook
Language:English
Published: New York : Nova Publishers, Inc., [2015]
Series:Internet theory, technology and applications.
Subjects:
Online Access:CONNECT

MARC

LEADER 00000cam a2200000 i 4500
001 mig00005468601
006 m o d
007 cr cnu|||unuuu
008 150713s2015 nyu o 001 0 eng d
005 20240618145937.3
019 |a 918623929 
020 |a 9781634831383  |q (electronic bk.) 
020 |a 1634831381  |q (electronic bk.) 
020 |z 9781634831376 
035 |a 1WRLDSHRocn913742589 
035 |a (OCoLC)913742589  |z (OCoLC)918623929 
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d N$T  |d YDXCP  |d EBLCP  |d AGLDB  |d OCLCQ  |d OCLCF  |d STF  |d OCLCQ  |d OCLCO  |d OCL  |d OCLCQ  |d OCLCO 
049 |a TXMM 
050 4 |a TK5105.59 
082 0 4 |a 005.8  |2 23 
245 0 0 |a Cybersecurity and cyber-information sharing :  |b legal and economic analyses /  |c Julia M. Morgan, editor. 
264 1 |a New York :  |b Nova Publishers, Inc.,  |c [2015] 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a data file  |2 rda 
490 1 |a Internet theory, technology and applications 
500 |a Includes index. 
588 0 |a Vendor-supplied metadata. 
505 0 |a CYBERSECURITY AND CYBER-INFORMATION SHARING: LEGAL AND ECONOMIC ANALYSES; CYBERSECURITY AND CYBER-INFORMATION SHARING: LEGAL AND ECONOMIC ANALYSES; Library of Congress Cataloging-in-Publication Data; CONTENTS; PREFACE; Chapter 1: CYBERSECURITY AND INFORMATION SHARING: LEGAL CHALLENGES AND SOLUTIONS; Chapter 2: LEGISLATION TO FACILITATE CYBERSECURITY INFORMATION SHARING: ECONOMIC ANALYSIS; Chapter 3: CYBERSECURITY AND INFORMATION SHARING: COMPARISON OF H.R. 1560 AND H.R. 1731; Chapter 4: EXECUTIVE ORDER 13691: PROMOTING PRIVATE SECTOR CYBERSECURITY INFORMATION SHARING; INDEX. 
520 |a Over the course of the last year, a host of cyberattacks has been perpetrated on a number of high profile American companies. The high profile cyberattacks of 2014 and early 2015 appear to be indicative of a broader trend: the frequency and ferocity of cyberattacks are increasing, posing grave threats to the national interests of the United States. While considerable debate exists with regard to the best strategies for protecting America's various cyber-systems and promoting cybersecurity, one point of general agreement amongst cyber-analysts is the perceived need for enhanced and timely excha. 
500 |a EBSCO eBook Academic Comprehensive Collection North America  |5 TMurS 
500 |a EBSCO eBook Business Collection  |5 TMurS 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Cyberspace  |x Security measures. 
650 0 |a Data protection. 
700 1 |a Morgan, Julia M.,  |e editor. 
730 0 |a WORLDSHARE SUB RECORDS 
776 0 8 |i Print version:  |a Morgan, Julia M.  |t Cybersecurity and Cyber-Information Sharing : Legal and Economic Analyses.  |d Hauppauge : Nova Science Publishers, Inc., ©2015  |z 9781634831376 
830 0 |a Internet theory, technology and applications. 
856 4 0 |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1023440&authtype=ip,sso&custid=s4672406  |z CONNECT  |3 eBooks on EBSCOhost  |t 0 
907 |a 4746448  |b 05-26-21  |c 07-06-20 
949 |a ho0 
994 |a 92  |b TXM 
998 |a wi  |d z 
999 f f |s 7e640356-54df-47c8-8d12-92d02803da1c  |i 84a57422-0bc1-4656-b100-62792d5b1716  |t 0 
952 f f |a Middle Tennessee State University  |b Main  |c James E. Walker Library  |d Electronic Resources  |t 0  |e TK5105.59   |h Library of Congress classification