000 -LEADER |
fixed length control field |
02409nam a22004095i 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
OSt |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20140310151112.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
cr nn 008mamaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
130425s2013 xxk| s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781447150046 |
|
978-1-4471-5004-6 |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA75.5-76.95 |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
343.0999 |
Edition number |
23 |
264 #1 - |
-- |
London : |
-- |
Springer London : |
-- |
Imprint: Springer, |
-- |
2013. |
912 ## - |
-- |
ZDB-2-SCS |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Maurushat, Alana. |
Relator term |
author. |
245 10 - IMMEDIATE SOURCE OF ACQUISITION NOTE |
Title |
Disclosure of Security Vulnerabilities |
Medium |
[electronic resource] : |
Remainder of title |
Legal and Ethical Issues / |
Statement of responsibility, etc |
by Alana Maurushat. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
X, 121 p. 4 illus. |
Other physical details |
online resource. |
440 1# - SERIES STATEMENT/ADDED ENTRY--TITLE |
Title |
SpringerBriefs in Cybersecurity, |
International Standard Serial Number |
2193-973X |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Foreword -- Introduction -- Types of Disclosure -- Methods of Discovering Security Vulnerabilities -- Criminal Offences: Unauthorised Access, Modification or Interference Comprovisions -- Other Legal and Ethical Issues -- Conclusion -- Glossary of Terms -- Appendix: Comparative Tables. |
520 ## - SUMMARY, ETC. |
Summary, etc |
Much debate has been given as to whether computer security is improved through the full disclosure of security vulnerabilities versus keeping the problems private and unspoken. Although there is still tension between those who feel strongly about the subject, a middle ground of responsible disclosure seems to have emerged. Unfortunately, just as we’ve moved into an era with more responsible disclosure, it would seem that a market has emerged for security vulnerabilities and zero day exploits. Disclosure of Security Vulnerabilities: Legal and Ethical Issues considers both the ethical and legal issues involved with the disclosure of vulnerabilities and explores the ways in which law might respond to these challenges. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer science. |
|
Topical term or geographic name as entry element |
Computers |
General subdivision |
Law and legislation. |
|
Topical term or geographic name as entry element |
Computer Science. |
|
Topical term or geographic name as entry element |
Legal Aspects of Computing. |
|
Topical term or geographic name as entry element |
International IT and Media Law, Intellectual Property Law. |
710 2# - ADDED ENTRY--CORPORATE NAME |
Corporate name or jurisdiction name as entry element |
SpringerLink (Online service) |
773 0# - HOST ITEM ENTRY |
Title |
Springer eBooks |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
Display text |
Printed edition: |
International Standard Book Number |
9781447150039 |
856 40 - ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
http://dx.doi.org/10.1007/978-1-4471-5004-6 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Item type |
E-Book |