Cybersecurity law / (Record no. 579)

MARC details
000 -LEADER
fixed length control field 01904cam a22003498i 4500
001 - CONTROL NUMBER
control field 22792058
003 - CONTROL NUMBER IDENTIFIER
control field Urbe University
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250508141447.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 220916s2022 nju b 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2022044953
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119822165
Qualifying information (hardback)
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Language of cataloging eng
Description conventions rda
Transcribing agency DLC
042 ## - AUTHENTICATION CODE
Authentication code pcc
043 ## - GEOGRAPHIC AREA CODE
Geographic area code n-us---
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number KF1263.C65
Item number K67 2023
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 343.7309/99
Edition number 23/eng/20220930
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Kosseff, Jeff,
Dates associated with a name 1978-
Relator term author.
245 10 - TITLE STATEMENT
Title Cybersecurity law /
Statement of responsibility, etc Jeff Kosseff.
250 ## - EDITION STATEMENT
Edition statement Third Edition.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Hoboken, NJ :
Name of publisher, distributor, etc John Wiley & Sons, Inc.,
Date of publication, distribution, etc 2023
263 ## - PROJECTED PUBLICATION DATE
Projected publication date 2212
300 ## - PHYSICAL DESCRIPTION
Extent xxxv, 836 pages ;
Dimensions 24 centímeters
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Data security laws and enforcement actions -- Cybersecurity litigation -- Cybersecurity requirements for specific industries -- Cybersecurity and corporate governance -- Antihacking laws -- U.S. government cyber structure and public-private cybersecurity partnerships -- Surveillance and cyber -- Cybersecurity and federal government contractors -- Privacy laws -- International cybersecurity law -- Cyber and the law of war -- Ransomware,
520 ## - SUMMARY, ETC.
Summary, etc "Cybersecurity is the process of applying security measures to ensure confidentiality, integrity, and availability of data. The goal of cybersecurity is to protect assets, which includes data, desktops, servers, buildings, and most importantly, humans"--
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data protection
General subdivision Law and legislation
Geographic subdivision United States.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security
General subdivision Law and legislation
Geographic subdivision United States.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Online version:
Main entry heading Kosseff, Jeff, 1978-
Title Cybersecurity law
Edition Jeff kosseff.
Place, publisher, and date of publication Hoboken : Wiley, 2022
International Standard Book Number 9781119822189
Record control number (DLC) 2022044954
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 7
b cbc
c orignew
d 1
e ecip
f 20
g y-gencatlg
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Library of Congress Classification
Koha item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Shelving location Date acquired Source of acquisition Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
    Library of Congress Classification     Non-fiction URBE Library URBE Library General Stacks 05/07/2025 Purchase   KF1263.C65 K67 2023 1003 05/08/2025 05/08/2025 Books

Actively maintained by Library Center and EdTech Departments at URBE University