Saved in:
Main Authors: | , |
---|---|
Format: | Electronic eBook |
Language: | English |
Published: |
New York
Routledge, Taylor & Francis Group
2013
|
Edition: | First published |
Subjects: | |
Links: | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=547018 http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=547018 |
Physical Description: | 1 Online-Ressource (xxi, 147 Seiten) |
ISBN: | 0203096215 0415631963 1136217355 1299279201 9780203096215 9780415631969 9781136217357 9781299279209 |
Staff View
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV042734903 | ||
003 | DE-604 | ||
005 | 20160510 | ||
007 | cr|uuu---uuuuu | ||
008 | 150804s2013 xx o|||| 00||| eng d | ||
020 | |a 0203096215 |c electronic bk. |9 0-203-09621-5 | ||
020 | |a 0415631963 |c hardback |9 0-415-63196-3 | ||
020 | |a 1136217355 |c electronic bk. |9 1-136-21735-5 | ||
020 | |a 1299279201 |c MyiLibrary |9 1-299-27920-1 | ||
020 | |a 9780203096215 |c electronic bk. |9 978-0-203-09621-5 | ||
020 | |a 9780415631969 |c hardback |9 978-0-415-63196-9 | ||
020 | |a 9781136217357 |c electronic bk. |9 978-1-136-21735-7 | ||
020 | |a 9781299279209 |c MyiLibrary |9 978-1-299-27920-9 | ||
035 | |a (ZDB-4-NLEBK)547018 | ||
035 | |a (OCoLC)839778054 | ||
035 | |a (DE-599)BVBBV042734903 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-91 | ||
082 | 0 | |a 371.33 |2 23 | |
084 | |a DP 2580 |0 (DE-625)19827:761 |2 rvk | ||
084 | |a DP 2600 |0 (DE-625)19828:761 |2 rvk | ||
084 | |a DAT 460f |2 stub | ||
084 | |a EDU 400f |2 stub | ||
100 | 1 | |a Phillips, Richard |e Verfasser |4 aut | |
245 | 1 | 0 | |a Cyber security for educational leaders |b a guide to understanding and implementing technology policies |c Richard Phillips and Rayton R. Sianjina |
250 | |a First published | ||
264 | 1 | |a New York |b Routledge, Taylor & Francis Group |c 2013 | |
300 | |a 1 Online-Ressource (xxi, 147 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
505 | 8 | |a Includes bibliographical references (p. 132-142) and index | |
505 | 8 | |a Chapter 1. Introduction -- chapter 2. Total cost of ownership -- chapter 3. Acceptable use policy -- chapter 4. Authentication policy -- chapter 5. Internet-use policy -- chapter 6. Access policy -- chapter 7. Auditing policy -- chapter 8. Physical policy -- chapter 9. Analysis policy -- chapter 10. Privacy policy -- chapter 11. Cyber risk assessment checklist profile and questionnaire -- chapter 12. Electronic bullying -- chapter 13. Electronic sexual harassment -- chapter 14. Basics of copyright and fair use | |
505 | 8 | |a A text on developing, integrating, and understanding technology policies that govern schools and districts. Based on research and best practices, this book discusses the threats associated with technology use and policies and arms aspiring and practicing leaders with the necessary tools to protect their schools and to avoid litigation | |
650 | 7 | |a EDUCATION / Computers & Technology |2 bisacsh | |
650 | 4 | |a Educational technology |x Security measures | |
650 | 4 | |a Cyberspace |x Security measures | |
650 | 4 | |a Computer security | |
650 | 0 | 7 | |a Schulleitung |0 (DE-588)4053524-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheit |0 (DE-588)4054790-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Schulverwaltung |0 (DE-588)4053588-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informationstechnik |0 (DE-588)4026926-7 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Schulverwaltung |0 (DE-588)4053588-5 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Schulleitung |0 (DE-588)4053524-1 |D s |
689 | 1 | 1 | |a Informationstechnik |0 (DE-588)4026926-7 |D s |
689 | 1 | 2 | |a Sicherheit |0 (DE-588)4054790-5 |D s |
689 | 1 | |8 1\p |5 DE-604 | |
700 | 1 | |a Sianjina, Rayton R. |e Verfasser |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 0-415-63197-1 |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-0-415-63197-6 |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=547018 |x Aggregator |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-4-NLEBK | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-028165867 | |
966 | e | |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=547018 |l DE-91 |p ZDB-4-NLEBK |q TUM_PDA_EBSCO_EDU_gekauft |x Aggregator |3 Volltext |
Record in the Search Index
DE-BY-TUM_katkey | 2122783 |
---|---|
_version_ | 1821932207043772416 |
any_adam_object | |
author | Phillips, Richard Sianjina, Rayton R. |
author_facet | Phillips, Richard Sianjina, Rayton R. |
author_role | aut aut |
author_sort | Phillips, Richard |
author_variant | r p rp r r s rr rrs |
building | Verbundindex |
bvnumber | BV042734903 |
classification_rvk | DP 2580 DP 2600 |
classification_tum | DAT 460f EDU 400f |
collection | ZDB-4-NLEBK |
contents | Includes bibliographical references (p. 132-142) and index Chapter 1. Introduction -- chapter 2. Total cost of ownership -- chapter 3. Acceptable use policy -- chapter 4. Authentication policy -- chapter 5. Internet-use policy -- chapter 6. Access policy -- chapter 7. Auditing policy -- chapter 8. Physical policy -- chapter 9. Analysis policy -- chapter 10. Privacy policy -- chapter 11. Cyber risk assessment checklist profile and questionnaire -- chapter 12. Electronic bullying -- chapter 13. Electronic sexual harassment -- chapter 14. Basics of copyright and fair use A text on developing, integrating, and understanding technology policies that govern schools and districts. Based on research and best practices, this book discusses the threats associated with technology use and policies and arms aspiring and practicing leaders with the necessary tools to protect their schools and to avoid litigation |
ctrlnum | (ZDB-4-NLEBK)547018 (OCoLC)839778054 (DE-599)BVBBV042734903 |
dewey-full | 371.33 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 371 - Schools and their activities; special education |
dewey-raw | 371.33 |
dewey-search | 371.33 |
dewey-sort | 3371.33 |
dewey-tens | 370 - Education |
discipline | Pädagogik Informatik |
edition | First published |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03962nam a2200733zc 4500</leader><controlfield tag="001">BV042734903</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20160510 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150804s2013 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0203096215</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-203-09621-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0415631963</subfield><subfield code="c">hardback</subfield><subfield code="9">0-415-63196-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1136217355</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-136-21735-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1299279201</subfield><subfield code="c">MyiLibrary</subfield><subfield code="9">1-299-27920-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780203096215</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-203-09621-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780415631969</subfield><subfield code="c">hardback</subfield><subfield code="9">978-0-415-63196-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781136217357</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-136-21735-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781299279209</subfield><subfield code="c">MyiLibrary</subfield><subfield code="9">978-1-299-27920-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-NLEBK)547018</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)839778054</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042734903</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">371.33</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DP 2580</subfield><subfield code="0">(DE-625)19827:761</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DP 2600</subfield><subfield code="0">(DE-625)19828:761</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">EDU 400f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Phillips, Richard</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber security for educational leaders</subfield><subfield code="b">a guide to understanding and implementing technology policies</subfield><subfield code="c">Richard Phillips and Rayton R. Sianjina</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">First published</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York</subfield><subfield code="b">Routledge, Taylor & Francis Group</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxi, 147 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Includes bibliographical references (p. 132-142) and index</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Chapter 1. Introduction -- chapter 2. Total cost of ownership -- chapter 3. Acceptable use policy -- chapter 4. Authentication policy -- chapter 5. Internet-use policy -- chapter 6. Access policy -- chapter 7. Auditing policy -- chapter 8. Physical policy -- chapter 9. Analysis policy -- chapter 10. Privacy policy -- chapter 11. Cyber risk assessment checklist profile and questionnaire -- chapter 12. Electronic bullying -- chapter 13. Electronic sexual harassment -- chapter 14. Basics of copyright and fair use</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">A text on developing, integrating, and understanding technology policies that govern schools and districts. Based on research and best practices, this book discusses the threats associated with technology use and policies and arms aspiring and practicing leaders with the necessary tools to protect their schools and to avoid litigation</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">EDUCATION / Computers & Technology</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Educational technology</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberspace</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Schulleitung</subfield><subfield code="0">(DE-588)4053524-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Schulverwaltung</subfield><subfield code="0">(DE-588)4053588-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informationstechnik</subfield><subfield code="0">(DE-588)4026926-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Schulverwaltung</subfield><subfield code="0">(DE-588)4053588-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Schulleitung</subfield><subfield code="0">(DE-588)4053524-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Informationstechnik</subfield><subfield code="0">(DE-588)4026926-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sianjina, Rayton R.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">0-415-63197-1</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-0-415-63197-6</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=547018</subfield><subfield code="x">Aggregator</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-NLEBK</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028165867</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=547018</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-4-NLEBK</subfield><subfield code="q">TUM_PDA_EBSCO_EDU_gekauft</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV042734903 |
illustrated | Not Illustrated |
indexdate | 2024-12-20T17:18:32Z |
institution | BVB |
isbn | 0203096215 0415631963 1136217355 1299279201 9780203096215 9780415631969 9781136217357 9781299279209 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028165867 |
oclc_num | 839778054 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (xxi, 147 Seiten) |
psigel | ZDB-4-NLEBK ZDB-4-NLEBK TUM_PDA_EBSCO_EDU_gekauft |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Routledge, Taylor & Francis Group |
record_format | marc |
spellingShingle | Phillips, Richard Sianjina, Rayton R. Cyber security for educational leaders a guide to understanding and implementing technology policies Includes bibliographical references (p. 132-142) and index Chapter 1. Introduction -- chapter 2. Total cost of ownership -- chapter 3. Acceptable use policy -- chapter 4. Authentication policy -- chapter 5. Internet-use policy -- chapter 6. Access policy -- chapter 7. Auditing policy -- chapter 8. Physical policy -- chapter 9. Analysis policy -- chapter 10. Privacy policy -- chapter 11. Cyber risk assessment checklist profile and questionnaire -- chapter 12. Electronic bullying -- chapter 13. Electronic sexual harassment -- chapter 14. Basics of copyright and fair use A text on developing, integrating, and understanding technology policies that govern schools and districts. Based on research and best practices, this book discusses the threats associated with technology use and policies and arms aspiring and practicing leaders with the necessary tools to protect their schools and to avoid litigation EDUCATION / Computers & Technology bisacsh Educational technology Security measures Cyberspace Security measures Computer security Schulleitung (DE-588)4053524-1 gnd Sicherheit (DE-588)4054790-5 gnd Computersicherheit (DE-588)4274324-2 gnd Schulverwaltung (DE-588)4053588-5 gnd Informationstechnik (DE-588)4026926-7 gnd |
subject_GND | (DE-588)4053524-1 (DE-588)4054790-5 (DE-588)4274324-2 (DE-588)4053588-5 (DE-588)4026926-7 |
title | Cyber security for educational leaders a guide to understanding and implementing technology policies |
title_auth | Cyber security for educational leaders a guide to understanding and implementing technology policies |
title_exact_search | Cyber security for educational leaders a guide to understanding and implementing technology policies |
title_full | Cyber security for educational leaders a guide to understanding and implementing technology policies Richard Phillips and Rayton R. Sianjina |
title_fullStr | Cyber security for educational leaders a guide to understanding and implementing technology policies Richard Phillips and Rayton R. Sianjina |
title_full_unstemmed | Cyber security for educational leaders a guide to understanding and implementing technology policies Richard Phillips and Rayton R. Sianjina |
title_short | Cyber security for educational leaders |
title_sort | cyber security for educational leaders a guide to understanding and implementing technology policies |
title_sub | a guide to understanding and implementing technology policies |
topic | EDUCATION / Computers & Technology bisacsh Educational technology Security measures Cyberspace Security measures Computer security Schulleitung (DE-588)4053524-1 gnd Sicherheit (DE-588)4054790-5 gnd Computersicherheit (DE-588)4274324-2 gnd Schulverwaltung (DE-588)4053588-5 gnd Informationstechnik (DE-588)4026926-7 gnd |
topic_facet | EDUCATION / Computers & Technology Educational technology Security measures Cyberspace Security measures Computer security Schulleitung Sicherheit Computersicherheit Schulverwaltung Informationstechnik |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=547018 |
work_keys_str_mv | AT phillipsrichard cybersecurityforeducationalleadersaguidetounderstandingandimplementingtechnologypolicies AT sianjinaraytonr cybersecurityforeducationalleadersaguidetounderstandingandimplementingtechnologypolicies |