<?xml version="1.0" encoding="UTF-8"?>
<record
    xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
    xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd"
    xmlns="http://www.loc.gov/MARC21/slim">

  <leader>02322nam a2200445 i 4500</leader>
  <controlfield tag="001">ebr10889073</controlfield>
  <controlfield tag="003">CaPaEBR</controlfield>
  <controlfield tag="006">m     o  d        </controlfield>
  <controlfield tag="007">cr cn|||||||||</controlfield>
  <controlfield tag="008">140718t20142014dcua    ob    000 0 eng d</controlfield>
  <datafield tag="020" ind1=" " ind2=" ">
    <subfield code="z">9780309303156</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
    <subfield code="z">9780309303187</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
    <subfield code="a">9780309303194 (e-book)</subfield>
  </datafield>
  <datafield tag="040" ind1=" " ind2=" ">
    <subfield code="a">CaPaEBR</subfield>
    <subfield code="b">eng</subfield>
    <subfield code="e">rda</subfield>
    <subfield code="e">pn</subfield>
    <subfield code="c">CaPaEBR</subfield>
  </datafield>
  <datafield tag="035" ind1=" " ind2=" ">
    <subfield code="a">(OCoLC)884590411</subfield>
  </datafield>
  <datafield tag="043" ind1=" " ind2=" ">
    <subfield code="a">n-us---</subfield>
  </datafield>
  <datafield tag="050" ind1="1" ind2="4">
    <subfield code="a">QA76.9.A25</subfield>
    <subfield code="b">.A884 2014eb</subfield>
  </datafield>
  <datafield tag="082" ind1="0" ind2="4">
    <subfield code="a">005.80973</subfield>
    <subfield code="2">23</subfield>
  </datafield>
  <datafield tag="245" ind1="0" ind2="0">
    <subfield code="a">At the nexus of cybersecurity and public policy :</subfield>
    <subfield code="b">some basic concepts and issues /</subfield>
    <subfield code="c">David Clark, Thomas Berson, and Herbert S. Lin, editors ; Committee on Developing a Cybersecurity Primer: Leveraging Two Decades of National Academies Work, Computer Science and Telecommunications Board, National Research Council of the Academies.</subfield>
  </datafield>
  <datafield tag="264" ind1=" " ind2="1">
    <subfield code="a">Washington, District of Columbia :</subfield>
    <subfield code="b">The National Academies Press,</subfield>
    <subfield code="c">2014.</subfield>
  </datafield>
  <datafield tag="264" ind1=" " ind2="4">
    <subfield code="c">&#xFFFD;2014</subfield>
  </datafield>
  <datafield tag="300" ind1=" " ind2=" ">
    <subfield code="a">1 online resource (149 pages) :</subfield>
    <subfield code="b">illustrations</subfield>
  </datafield>
  <datafield tag="336" ind1=" " ind2=" ">
    <subfield code="a">text</subfield>
    <subfield code="2">rdacontent</subfield>
  </datafield>
  <datafield tag="337" ind1=" " ind2=" ">
    <subfield code="a">computer</subfield>
    <subfield code="2">rdamedia</subfield>
  </datafield>
  <datafield tag="338" ind1=" " ind2=" ">
    <subfield code="a">online resource</subfield>
    <subfield code="2">rdacarrier</subfield>
  </datafield>
  <datafield tag="504" ind1=" " ind2=" ">
    <subfield code="a">Includes bibliographical references.</subfield>
  </datafield>
  <datafield tag="588" ind1=" " ind2=" ">
    <subfield code="a">Description based on online resource; title from PDF title page (ebrary, viewed July 17, 2014).</subfield>
  </datafield>
  <datafield tag="590" ind1=" " ind2=" ">
    <subfield code="a">Electronic reproduction. Palo Alto, Calif. : ebrary, 2014. Available via World Wide Web. Access may be limited to ebrary affiliated libraries.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
    <subfield code="a">Computer security</subfield>
    <subfield code="z">United States.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
    <subfield code="a">Computer networks</subfield>
    <subfield code="x">Security measures</subfield>
    <subfield code="x">Government policy.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
    <subfield code="a">Computer crimes</subfield>
    <subfield code="x">Prevention.</subfield>
  </datafield>
  <datafield tag="655" ind1=" " ind2="0">
    <subfield code="a">Electronic books.</subfield>
  </datafield>
  <datafield tag="700" ind1="1" ind2=" ">
    <subfield code="a">Clark, David,</subfield>
    <subfield code="e">editor.</subfield>
  </datafield>
  <datafield tag="700" ind1="1" ind2=" ">
    <subfield code="a">Berson, Thomas,</subfield>
    <subfield code="e">editor.</subfield>
  </datafield>
  <datafield tag="700" ind1="1" ind2=" ">
    <subfield code="a">Lin, Herbert S.,</subfield>
    <subfield code="e">editor.</subfield>
  </datafield>
  <datafield tag="710" ind1="2" ind2=" ">
    <subfield code="a">National Research Council (U.S.).</subfield>
    <subfield code="b">Computer Science and Telecommunications Board.</subfield>
    <subfield code="b">Committee on Developing a Cybersecurity Primer,</subfield>
    <subfield code="e">originator.</subfield>
  </datafield>
  <datafield tag="776" ind1="0" ind2="8">
    <subfield code="i">Print version:</subfield>
    <subfield code="t">At the nexus of cybersecurity and public policy : some basic concepts and issues.</subfield>
    <subfield code="d">Washington, District of Columbia : The National Academies Press, c2014 </subfield>
    <subfield code="h">xv, 133 pages </subfield>
    <subfield code="z">9780309303156 </subfield>
    <subfield code="w">2014940211</subfield>
  </datafield>
  <datafield tag="797" ind1="2" ind2=" ">
    <subfield code="a">ebrary.</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2="0">
    <subfield code="u">http://site.ebrary.com/lib/rucke/Doc?id=10889073</subfield>
    <subfield code="z">An electronic book accessible through the World Wide Web; click to view</subfield>
  </datafield>
  <datafield tag="999" ind1=" " ind2=" ">
    <subfield code="c">30074</subfield>
    <subfield code="d">30074</subfield>
  </datafield>
</record>
