{"@context":{"owl":"http://www.w3.org/2002/07/owl#","bibo":"http://purl.org/ontology/bibo/","foaf":"http://xmlns.com/foaf/0.1/","rdfs":"http://www.w3.org/2000/01/rdf-schema#","prism":"http://prismstandard.org/namespaces/basic/2.0/","cinii":"http://ci.nii.ac.jp/ns/1.0/","dc":"http://purl.org/dc/elements/1.1/","dcterms":"http://purl.org/dc/terms/"},"@id":"https://ci.nii.ac.jp/ncid/BD02380983.json","@graph":[{"@id":"https://ci.nii.ac.jp/ncid/BD02380983#entity","@type":"bibo:Book","foaf:isPrimaryTopicOf":{"@id":"https://ci.nii.ac.jp/ncid/BD02380983.json"},"dc:title":[{"@value":"Cyber security education : principles and policies"}],"dc:creator":"edited by Greg Austin","dc:publisher":[{"@value":"Routledge"}],"dcterms:extent":"xx, 226 p.","cinii:size":"24 cm","dc:language":"eng","dc:date":"2021","cinii:ncid":"BD02380983","cinii:ownerCount":"2","foaf:maker":[{"@type":"foaf:Person","foaf:name":[{"@value":"Austin, Greg"}]}],"bibo:owner":[{"@id":"https://ci.nii.ac.jp/library/FA018371","@type":"foaf:Organization","foaf:name":"政策研究大学院大学 図書館","rdfs:seeAlso":{"@id":"http://glib.grips.ac.jp/mylimedio/search/search.do?target=local&mode=comp&ncid=BD02380983"}},{"@id":"https://ci.nii.ac.jp/library/FA023633","@type":"foaf:Organization","foaf:name":"東京都立産業技術大学院大学 附属図書館"}],"prism:publicationDate":["2021"],"cinii:note":["Includes bibliographical references and index"],"dc:subject":["DC23:005.8071"],"foaf:topic":[{"@id":"https://ci.nii.ac.jp/books/search?q=Computer+security+--+Study+and+teaching","dc:title":"Computer security -- Study and teaching"},{"@id":"https://ci.nii.ac.jp/books/search?q=Computer+networks+--+Security+measures+--+Study+and+teaching","dc:title":"Computer networks -- Security measures -- Study and teaching"}],"dcterms:isPartOf":[{"@id":"https://ci.nii.ac.jp/ncid/BB16257685#entity","dc:title":"Routledge studies in conflict, security and technology","@type":"bibo:Book"}],"dcterms:hasPart":[{"@id":"urn:isbn:9780367421915","dc:title":": pbk"}]}]}