Στοιχεία MARC
000 -LEADER |
fixed length control field |
01634cam a22002898i 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
CY-NiCPA |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20230606101957.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
ta |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
220916s2022 nju ob 001 0 eng |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
Canceled/invalid ISBN |
9781119822165 |
Qualifying information |
(hbk.) |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
DLC |
Language of cataloging |
eng |
Transcribing agency |
CY-NiCPA |
Modifying agency |
CY-NiCPA |
Description conventions |
AACR2 |
041 0# - LANGUAGE CODE |
Language code of text/sound track or separate title |
eng |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
343.730999 |
Edition number |
23 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Kosseff, Jeff, |
Dates associated with a name |
1978- |
Relator code |
Author |
9 (RLIN) |
171034 |
245 10 - TITLE STATEMENT |
Title |
Cybersecurity law / |
Statement of responsibility, etc. |
Jeff Kosseff. |
250 ## - EDITION STATEMENT |
Edition statement |
3rd Ed. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Hoboken : |
Name of publisher, distributor, etc. |
Wiley, |
Date of publication, distribution, etc. |
2023. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxv, 836 p. ; |
Dimensions |
24 cm. |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes bibliographical references and index. |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Data security laws and enforcement actions -- Cybersecurity litigation -- Cybersecurity requirements for specific industries -- Cybersecurity and corporate governance -- Antihacking laws -- U.S. government cyber structure and public-private cybersecurity partnerships -- Surveillance and cyber -- Cybersecurity and federal government contractors -- Privacy laws -- International cybersecurity law -- Cyber and the law of war -- Ransomware, |
520 ## - SUMMARY, ETC. |
Summary, etc. |
"Cybersecurity is the process of applying security measures to ensure confidentiality, integrity, and availability of data. The goal of cybersecurity is to protect assets, which includes data, desktops, servers, buildings, and most importantly, humans"-- |
Assigning source |
Provided by publisher. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Data protection |
General subdivision |
Law and legislation |
Geographic subdivision |
United States. |
9 (RLIN) |
171035 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer security |
General subdivision |
Law and legislation |
Geographic subdivision |
United States. |
9 (RLIN) |
171036 |
710 2# - ADDED ENTRY--CORPORATE NAME |
Corporate name or jurisdiction name as entry element |
John Wiley & Sons |
Relator code |
Publisher |
9 (RLIN) |
161571 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
Books |
Classification part |
343.730999 KOS |
970 ## - Cataloguer name |
Cataloguer name |
M. Papamarkou |