skip to content
Covid-19 virus
COVID-19 Resources

Reliable information about the coronavirus (COVID-19) is available from the World Health Organization (current situation, international travel). Numerous and frequently-updated resource results are available from this WorldCat.org search. OCLC’s WebJunction has pulled together information and resources to assist library staff as they consider how to handle coronavirus issues in their communities.

Image provided by: CDC/ Alissa Eckert, MS; Dan Higgins, MAM
Cyber security in the European Union : resilience and adaptability in governance policy Preview this item
ClosePreview this item
Checking...

Cyber security in the European Union : resilience and adaptability in governance policy

Author: George Christou
Publisher: Houndmills, Basingstoke Hampshire ; New York, NY : Palgrave Macmillan, 2016.
Series: New security challenges series.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Summary:
Cybercrime affects over 1 million people worldwide a day, and cyber attacks on public institutions and businesses are increasing. This book interrogates the European Union's evolving cybersecurity policies and strategy and argues that while progress is being made, much remains to be done to ensure a secure and resilient cyberspace in the future.
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Print version:
Christou, George, 1973-
Cyber security in the European Union.
(DLC) 2015019826
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: George Christou
ISBN: 9781137400529 1137400528 1349557900 9781349557905
OCLC Number: 930990293
Description: 1 online resource
Contents: Cover; Contents; List of Tables, Boxes and Figures; Foreword; Preface; Acknowledgements; 1 Introduction; The salience of cybersecurity in the European Union; Central questions and objectives of the book; The structure and organisation of the book; 2 Conceptualising Security as Resilience in Cyberspace; Introduction; Approaches to analysing cybersecurity; Understanding the European Union in cybersecurity; Ecosystems and resilience; Security and governance; Conclusion: Security as resilience; 3 Cybersecurity in the Global Ecosystem; Introduction: The international context. Internet governance and cybersecurityICANN; Internet Governance Forum; Multilateral organisations and cybersecurity; The G8 group of states; The United Nations (UN); International Telecommunications Union (ITU); North Atlantic Treaty Organisation (NATO); Organisation for Economic Cooperation and Development (OECD); Council of Europe; Organisation for Security and Cooperation in Europe (OSCE); Conclusion: Security as resilience in the international cyber ecosystem; 4 National Cybersecurity Approaches in the European Union: The Case of the UK; Introduction. The UK's evolving narrative on cybersecurityThe UK cybersecurity strategy: Building effective security as resilience?; Cybercrime and making cyberspace safe for UK business: Institutional innovation and improved partnership?; Securing cyberspace for business: Partnerships, information sharing and standards; Cyber-attacks and resilience; Shaping the international; Knowledge, skills and capability; Conclusion: UK security as resilience; 5 The European Union and Cybercrime; Introduction; Governing cybercrime in the European Union. Exploitation of the online world for the purposes of abusing childrenThe cybersecurity strategy of the European Union: Cybercrime; Legal; Cooperation, collaboration and operational aspects; Conclusion: Security as resilience and European Union cybercrime; 6 Network and Information Security and Cyber Defencein the European Union; Introduction; Governing NIS in the European Union; Network and information security in the cybersecurity strategy of the European Union: Achieving cyber resilience?; European Union cyber defence: Under construction?; Conclusions. 7 Transatlantic Cooperation in Cybersecurity: Convergingon Security as Resilience?Introduction; Governing cyberspace; Security, data privacy and data protection; EU and US logics and approaches; Network and information security: Critical infrastructure protection; Data privacy and protection; EU-US platforms for cooperation and coordination on cybersecurity and cybercrime; Conclusion: Converging on security as resilience?; 8 Conclusions: Towards Effective Security as Resilience in the European Union?; Introduction; The emerging ecosystem in the EuropeanUnion: Security as resilience?
Series Title: New security challenges series.
Responsibility: George Christou.

Abstract:

Cybercrime affects over 1 million people worldwide a day, and cyber attacks on public institutions and businesses are increasing. This book interrogates the European Union's evolving cybersecurity  Read more...

Reviews

Editorial reviews

Publisher Synopsis

"The book is well written and clear in its content and purposes. It is well suited for both academics and practitioners, including political and military personnel, presenting a clear overview of the Read more...

 
User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


\n\n

Primary Entity<\/h3>\n
<http:\/\/www.worldcat.org\/oclc\/930990293<\/a>> # Cyber security in the European Union : resilience and adaptability in governance policy<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:MediaObject<\/a>, schema:CreativeWork<\/a>, schema:Book<\/a> ;\u00A0\u00A0\u00A0\nlibrary:oclcnum<\/a> \"930990293<\/span>\" ;\u00A0\u00A0\u00A0\nlibrary:placeOfPublication<\/a> <http:\/\/id.loc.gov\/vocabulary\/countries\/enk<\/a>> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2532094598#Topic\/national_security<\/a>> ; # National security<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2532094598#Topic\/cyberterrorism_prevention<\/a>> ; # Cyberterrorism--Prevention<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2532094598#Topic\/national_security_european_union_countries<\/a>> ; # National security--European Union countries<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/dewey.info\/class\/364.4\/e23\/<\/a>> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2532094598#Topic\/warfare_&_defence<\/a>> ; # Warfare & defence<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2532094598#Topic\/computer_crimes_european_union_countries_prevention<\/a>> ; # Computer crimes--European Union countries--Prevention<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2532094598#Topic\/cyberterrorism_european_union_countries_prevention<\/a>> ; # Cyberterrorism--European Union countries--Prevention<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2532094598#Topic\/politics_&_government<\/a>> ; # Politics & government<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2532094598#Place\/european_union<\/a>> ; # European Union.<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2532094598#Place\/union_europeenne<\/a>> ; # Union europ\u00E9enne.<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2532094598#Topic\/computer_crimes_prevention<\/a>> ; # Computer crimes--Prevention<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2532094598#Topic\/delits_informatiques<\/a>> ; # D\u00E9lits informatiques<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2532094598#Place\/european_union_countries<\/a>> ; # European Union countries.<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2532094598#Topic\/social_science_criminology<\/a>> ; # SOCIAL SCIENCE--Criminology<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2532094598#Topic\/cyberspace_operations_military_science<\/a>> ; # Cyberspace operations (Military science)<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2532094598#Topic\/cyberspace_operations_military_science_european_union_countries<\/a>> ; # Cyberspace operations (Military science)--European Union countries<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2532094598#Topic\/cyberspace_security_measures<\/a>> ; # Cyberspace--Security measures<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2532094598#Topic\/political_science_&_theory<\/a>> ; # Political science & theory<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2532094598#Topic\/international_relations<\/a>> ; # International relations<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2532094598#Topic\/computer_security<\/a>> ; # Computer security<\/span>\n\u00A0\u00A0\u00A0\nschema:author<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2532094598#Person\/christou_george_1973<\/a>> ; # George Christou<\/span>\n\u00A0\u00A0\u00A0\nschema:bookFormat<\/a> schema:EBook<\/a> ;\u00A0\u00A0\u00A0\nschema:datePublished<\/a> \"2016<\/span>\" ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"Cover; Contents; List of Tables, Boxes and Figures; Foreword; Preface; Acknowledgements; 1 Introduction; The salience of cybersecurity in the European Union; Central questions and objectives of the book; The structure and organisation of the book; 2 Conceptualising Security as Resilience in Cyberspace; Introduction; Approaches to analysing cybersecurity; Understanding the European Union in cybersecurity; Ecosystems and resilience; Security and governance; Conclusion: Security as resilience; 3 Cybersecurity in the Global Ecosystem; Introduction: The international context.<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"Cybercrime affects over 1 million people worldwide a day, and cyber attacks on public institutions and businesses are increasing. This book interrogates the European Union\'s evolving cybersecurity policies and strategy and argues that while progress is being made, much remains to be done to ensure a secure and resilient cyberspace in the future.<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:exampleOfWork<\/a> <http:\/\/worldcat.org\/entity\/work\/id\/2532094598<\/a>> ;\u00A0\u00A0\u00A0\nschema:genre<\/a> \"Electronic books<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:inLanguage<\/a> \"en<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isPartOf<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2532094598#Series\/new_security_challenges_series<\/a>> ; # New security challenges series.<\/span>\n\u00A0\u00A0\u00A0\nschema:isPartOf<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2532094598#Series\/new_security_challenges<\/a>> ; # New security challenges<\/span>\n\u00A0\u00A0\u00A0\nschema:isSimilarTo<\/a> <http:\/\/worldcat.org\/entity\/work\/data\/2532094598#CreativeWork\/cyber_security_in_the_european_union<\/a>> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Cyber security in the European Union : resilience and adaptability in governance policy<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:productID<\/a> \"930990293<\/span>\" ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/link.springer.com\/openurl?genre=book&isbn=978-1-349-55790-5<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/public.eblib.com\/choice\/publicfullrecord.aspx?p=4096827<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <https:\/\/0-link-springer-com.pugwash.lib.warwick.ac.uk\/10.1057\/9781137400529<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <https:\/\/search.ebscohost.com\/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=1163912<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/ezsecureaccess.balamand.edu.lb\/login?url=https:\/\/doi.org\/10.1057\/9781137400529<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <https:\/\/0-link-springer-com.pugwash.lib.warwick.ac.uk\/book\/10.1057\/9781137400529<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <https:\/\/link.springer.com\/openurl?genre=book&isbn=978-1-349-55790-5<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/dx.doi.org\/10.1057\/9781137400529<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/site.ebrary.com\/id\/11121158<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/public.ebookcentral.proquest.com\/choice\/publicfullrecord.aspx?p=4096827<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <https:\/\/doi.org\/10.1057\/9781137400529<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/link.springer.com\/10.1057\/9781137400529<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/www.dawsonera.com\/depp\/reader\/protected\/external\/AbstractView\/S9781137400529<\/a>> ;\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/worldcat.org\/isbn\/9781349557905<\/a>> ;\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/dx.doi.org\/10.1057\/9781137400529<\/a>> ;\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/worldcat.org\/isbn\/9781137400529<\/a>> ;\u00A0\u00A0\u00A0\numbel:isLike<\/a> <http:\/\/bnb.data.bl.uk\/id\/resource\/GBB8L6268<\/a>> ;\u00A0\u00A0\u00A0\nwdrs:describedby<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/930990293<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n\n

Related Entities<\/h3>\n
<http:\/\/dewey.info\/class\/364.4\/e23\/<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/dx.doi.org\/10.1057\/9781137400529<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:IndividualProduct<\/a> ;\u00A0\u00A0\u00A0\nrdfs:comment<\/a> \"An electronic book accessible through the World Wide Web; click to view<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/2532094598#Person\/christou_george_1973<\/a>> # George Christou<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:birthDate<\/a> \"1973<\/span>\" ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Christou<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"George<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"George Christou<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/2532094598#Place\/european_union<\/a>> # European Union.<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"European Union.<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/2532094598#Place\/european_union_countries<\/a>> # European Union countries.<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"European Union countries.<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/2532094598#Place\/union_europeenne<\/a>> # Union europ\u00E9enne.<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Union europ\u00E9enne.<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/2532094598#Series\/new_security_challenges<\/a>> # New security challenges<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nbgn:PublicationSeries<\/a> ;\u00A0\u00A0\u00A0\nschema:hasPart<\/a> <http:\/\/www.worldcat.org\/oclc\/930990293<\/a>> ; # Cyber security in the European Union : resilience and adaptability in governance policy<\/span>\n\u00A0\u00A0\u00A0\nschema:name<\/a> \"New security challenges<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/2532094598#Series\/new_security_challenges_series<\/a>> # New security challenges series.<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nbgn:PublicationSeries<\/a> ;\u00A0\u00A0\u00A0\nschema:hasPart<\/a> <http:\/\/www.worldcat.org\/oclc\/930990293<\/a>> ; # Cyber security in the European Union : resilience and adaptability in governance policy<\/span>\n\u00A0\u00A0\u00A0\nschema:name<\/a> \"New security challenges series.<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/2532094598#Topic\/computer_crimes_european_union_countries_prevention<\/a>> # Computer crimes--European Union countries--Prevention<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Computer crimes--European Union countries--Prevention<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/2532094598#Topic\/computer_crimes_prevention<\/a>> # Computer crimes--Prevention<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Computer crimes--Prevention<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/2532094598#Topic\/computer_security<\/a>> # Computer security<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Computer security<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/2532094598#Topic\/cyberspace_operations_military_science<\/a>> # Cyberspace operations (Military science)<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Cyberspace operations (Military science)<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/2532094598#Topic\/cyberspace_operations_military_science_european_union_countries<\/a>> # Cyberspace operations (Military science)--European Union countries<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Cyberspace operations (Military science)--European Union countries<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/2532094598#Topic\/cyberspace_security_measures<\/a>> # Cyberspace--Security measures<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Cyberspace--Security measures<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/2532094598#Topic\/cyberterrorism_european_union_countries_prevention<\/a>> # Cyberterrorism--European Union countries--Prevention<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Cyberterrorism--European Union countries--Prevention<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/2532094598#Topic\/cyberterrorism_prevention<\/a>> # Cyberterrorism--Prevention<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Cyberterrorism--Prevention<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/2532094598#Topic\/delits_informatiques<\/a>> # D\u00E9lits informatiques<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"D\u00E9lits informatiques<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/2532094598#Topic\/international_relations<\/a>> # International relations<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"International relations<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/2532094598#Topic\/national_security<\/a>> # National security<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"National security<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/2532094598#Topic\/national_security_european_union_countries<\/a>> # National security--European Union countries<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"National security--European Union countries<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/2532094598#Topic\/political_science_&_theory<\/a>> # Political science & theory<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Political science & theory<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/2532094598#Topic\/politics_&_government<\/a>> # Politics & government<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Politics & government<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/2532094598#Topic\/social_science_criminology<\/a>> # SOCIAL SCIENCE--Criminology<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"SOCIAL SCIENCE--Criminology<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/2532094598#Topic\/warfare_&_defence<\/a>> # Warfare & defence<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Warfare & defence<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.loc.gov\/vocabulary\/countries\/enk<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\ndcterms:identifier<\/a> \"enk<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/entity\/work\/data\/2532094598#CreativeWork\/cyber_security_in_the_european_union<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:CreativeWork<\/a> ;\u00A0\u00A0\u00A0\nrdfs:label<\/a> \"Cyber security in the European Union.<\/span>\" ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"Print version:<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isSimilarTo<\/a> <http:\/\/www.worldcat.org\/oclc\/930990293<\/a>> ; # Cyber security in the European Union : resilience and adaptability in governance policy<\/span>\n\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/isbn\/9781137400529<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:ProductModel<\/a> ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"1137400528<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"9781137400529<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/isbn\/9781349557905<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:ProductModel<\/a> ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"1349557900<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"9781349557905<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/www.worldcat.org\/title\/-\/oclc\/930990293<\/a>>\u00A0\u00A0\u00A0\u00A0a \ngenont:InformationResource<\/a>, genont:ContentTypeGenericResource<\/a> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/www.worldcat.org\/oclc\/930990293<\/a>> ; # Cyber security in the European Union : resilience and adaptability in governance policy<\/span>\n\u00A0\u00A0\u00A0\nschema:dateModified<\/a> \"2020-06-30<\/span>\" ;\u00A0\u00A0\u00A0\nvoid:inDataset<\/a> <http:\/\/purl.oclc.org\/dataset\/WorldCat<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<https:\/\/0-link-springer-com.pugwash.lib.warwick.ac.uk\/10.1057\/9781137400529<\/a>>\u00A0\u00A0\u00A0\nrdfs:comment<\/a> \"Connect to Springer e-book<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<https:\/\/0-link-springer-com.pugwash.lib.warwick.ac.uk\/book\/10.1057\/9781137400529<\/a>>\u00A0\u00A0\u00A0\nrdfs:comment<\/a> \"Connect to Springer e-book<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n