Security in cyberspace: targeting nations, infrastructures, individuals
"Today, the Internet has become a source of information that no country or company can forgo. It is not only used to communicate or entertain, but most importantly to operate utilities and public services such as banking or air traffic. As the reliance on computer networks across societies and...
Contributors: | |
---|---|
Format: | Print Book |
Language: | English |
Published: |
New York [u.a.]
Bloomsbury
2014
|
In: | Year: 2014 |
Online Access: |
Cover (Verlag) Inhaltsverzeichnis (Verlag) |
Availability in Tübingen: | Present in Tübingen. UB: KB 20 A 8012 |
Check availability: | HBZ Gateway |
Subito Delivery Service: | Order now. |
Keywords: |
MARC
LEADER | 00000cam a2200000 4500 | ||
---|---|---|---|
001 | 1611166128 | ||
003 | DE-627 | ||
005 | 20240509193052.0 | ||
007 | tu | ||
008 | 140930s2014 xxu||||| 00| ||eng c | ||
020 | |a 9781623568030 |9 978-1-62356-803-0 | ||
035 | |a (DE-627)1611166128 | ||
035 | |a (DE-576)414951514 | ||
035 | |a (DE-599)BSZ414951514 | ||
035 | |a (OCoLC)1012103671 | ||
035 | |a (OCoLC)890025457 | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
044 | |c XD-US | ||
050 | 0 | |a TK5105.59 | |
082 | 0 | |a 363.3 | |
082 | 0 | 4 | |a POL011000 |a POL012000 |a POL037000 |q bisacsh |
084 | |a 2,1 |2 ssgn | ||
130 | 0 | |a Security in cyberspace | |
245 | 1 | 0 | |a Security in cyberspace |b targeting nations, infrastructures, individuals |c ed. by Giampiero Giacomello |
264 | 1 | |a New York [u.a.] |b Bloomsbury |c 2014 | |
300 | |a XXIII, 237 S. |b graph. Darst. | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a ohne Hilfsmittel zu benutzen |b n |2 rdamedia | ||
338 | |a Band |b nc |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
505 | 8 | 0 | |a Machine generated contents note:List of Abbreviations List of Figures and Tables Acknowledgments Foreword Carlo Schaerf List of Contributors Introduction - Security in Cybersapce Giampiero Giacomello Part One: The Nation Chapter 1: The 'State(s)' of Cybersecurity Rossella Mattioli Chapter 2: Reducing Uncertainties in Cyberspace through Confidence and Capacity Building Measures Patryk Pawlak Chapter 3: Wikileaks and Cyberspace Judith Reppy Chapter 4: Leaks: Securing Communications and Achieving Nuclear Zero Bruce Larkin Chapter 5: Establishing Norms of Behavior in Cyberspace: The Chinese Viewpoint Chunmei Kang Part Two: The Infrastructure and The Individual Chapter 6: Einstein on the Breach: Surveillance Technology, Cybersecurity and Organizational Change Milton Mueller and Andreas Kuehn Chapter 7: Artificial or 'Legitimate' Barriers to Internet Governance?" Francesco Giacomini and Laura Cordani Chapter 8: Public-Private Partnerships: A 'Soft' Approach to Cybersecurity? Views from the European Union Maria Grazia Porcedda Chapter 9: Targeting One's Ideal Audience: Self-Presentation Practices among Extreme Nationalists on Social Networks Andra SiibakBibliography Index. |
520 | |a "Today, the Internet has become a source of information that no country or company can forgo. It is not only used to communicate or entertain, but most importantly to operate utilities and public services such as banking or air traffic. As the reliance on computer networks across societies and economies keeps growing, so do security risks in cyberspace - referred to as "cybersecurity." Cybersecurity means protecting information and control systems from those who seek to compromise them. It also involves actors, both malicious or protective, policies and their societal consequences. This collection of essays provides a better understanding of the risks, perceptions, and myths that surround cybersecurity by looking at it from three different levels of analysis: the sovereign state, the infrastructure and stakeholders of the Internet, and the individual. The essays explore such issues as information ownership, censorship, cyberwars, cyberterrorism, privacy, and rebellion, bringing together expert knowledge from computer science and the social sciences with case studies. It reviews existing policies and practices and discusses the threats and benefits of living in an increasingly networked world. This authoritative analysis of one of the most controversial and compelling security debates of the twenty-first century will appeal to scholars and practitioners interested in security, international relations and policymaking"-- | ||
583 | 1 | |a Archivierung/Langzeitarchivierung gewährleistet |f SSG |x XA-DE-BW |2 pdager |5 DE-21 | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Internet |x Security measures |x Political aspects | |
650 | 0 | |a Telecommunication policy | |
650 | 0 | |a National Security | |
689 | 0 | 0 | |d s |0 (DE-588)7864395-8 |0 (DE-627)700634487 |0 (DE-576)363213635 |a Internetkriminalität |2 gnd |
689 | 0 | 1 | |d s |0 (DE-588)4181167-7 |0 (DE-627)104353333 |0 (DE-576)210002980 |a Sicherheitsmaßnahme |2 gnd |
689 | 0 | |5 DE-101 | |
689 | 1 | 0 | |d s |0 (DE-588)7864395-8 |0 (DE-627)700634487 |0 (DE-576)363213635 |a Internetkriminalität |2 gnd |
689 | 1 | 1 | |d s |0 (DE-588)4181167-7 |0 (DE-627)104353333 |0 (DE-576)210002980 |a Sicherheitsmaßnahme |2 gnd |
689 | 1 | |5 (DE-627) | |
700 | 1 | |a Giacomello, Giampiero |e Hrsg. |0 (DE-588)1095251015 |0 (DE-627)855928042 |0 (DE-576)182792404 |4 edt | |
776 | 1 | |z 9781623566999 | |
776 | 1 | |z 9781623565701 | |
856 | 4 | 2 | |u https://swbplus.bsz-bw.de/bsz414951514inh.htm |m B:DE-576;DE-Frei85 |q application/pdf |v 20141215100125 |x Verlag |3 Inhaltsverzeichnis |
856 | 4 | 2 | |u http://www.netread.com/jcusers2/bk1388/030/9781623568030/image/lgcover.9781623568030.jpg |v 2015-03-04 |x Verlag |3 Cover |
889 | |w (DE-627)788158198 | ||
935 | |i mdedup | ||
951 | |a BO | ||
ELC | |b 1 | ||
LOK | |0 000 xxxxxcx a22 zn 4500 | ||
LOK | |0 001 3157680730 | ||
LOK | |0 003 DE-627 | ||
LOK | |0 004 1611166128 | ||
LOK | |0 005 20160629124554 | ||
LOK | |0 008 160427||||||||||||||||ger||||||| | ||
LOK | |0 040 |a DE-21 |c DE-627 |d DE-21 | ||
LOK | |0 852 |a DE-21 | ||
LOK | |0 852 1 |c KB 20 A 8012 |9 00 | ||
LOK | |0 935 |a krim | ||
LOK | |0 938 |a 1606 |f 34 | ||
LOK | |0 000 xxxxxcx a22 zn 4500 | ||
LOK | |0 001 315768082X | ||
LOK | |0 003 DE-627 | ||
LOK | |0 004 1611166128 | ||
LOK | |0 005 20141209113530 | ||
LOK | |0 008 140930||||||||||||||||ger||||||| | ||
LOK | |0 040 |a DE-Frei85 |c DE-627 |d DE-Frei85 | ||
LOK | |0 852 |a DE-Frei85 | ||
LOK | |0 852 1 |m p |9 00 | ||
LOK | |0 938 |k p | ||
ORI | |a SA-MARC-krimdoka001.raw | ||
SIG | |a UB: KB 20 A 8012 |