Security in the cyber age: an introduction to policy and technology
"Cyberspace is the global medium used to socialize, manage businesses, governments, and militaries, and secure personal, corporate, and government secrets. This book provides an accessible and engaging introduction to the policy and technology dimensions of cyberspace for the lay audience as we...
Authors: | ; |
---|---|
Format: | Print Book |
Language: | English |
Published: |
Cambridge New York, NY Port Melbourne
Cambridge University Press
2024
|
In: | Year: 2024 |
Online Access: |
Cover (lizenzpflichtig) Table of Contents |
Check availability: | HBZ Gateway |
Book acquisition: | Place book order |
Subito Delivery Service: | Order now. |
Keywords: |
MARC
LEADER | 00000cam a2200000 4500 | ||
---|---|---|---|
001 | 1858355508 | ||
003 | DE-627 | ||
005 | 20240516225004.0 | ||
007 | tu | ||
008 | 230830s2024 xxk||||| 00| ||eng c | ||
010 | |a 2023020506 | ||
020 | |a 9781009308595 |c hardback |9 978-1-009-30859-5 | ||
020 | |a 9781009308588 |c paperback |9 978-1-009-30858-8 | ||
035 | |a (DE-627)1858355508 | ||
035 | |a (DE-599)KXP1858355508 | ||
035 | |a (OCoLC)1409803301 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
044 | |c XA-GB |c XD-US |c XE-AU | ||
050 | 0 | |a HV6773.15.C97 | |
082 | 0 | |a 363.325 |q DLC |2 23/eng/20230824 | |
100 | 1 | |a Reveron, Derek S. |e VerfasserIn |0 (DE-588)1147334528 |0 (DE-627)1006078959 |0 (DE-576)495807389 |4 aut | |
109 | |a Reveron, Derek S. | ||
245 | 1 | 0 | |a Security in the cyber age |b an introduction to policy and technology |c Derek S. Reveron (U.S. Naval War College), John E. Savage (Brown University) |
263 | |a 2311 | ||
264 | 1 | |a Cambridge |a New York, NY |a Port Melbourne |b Cambridge University Press |c 2024 | |
300 | |a xviii, 393 Seiten |b Illustrationen, Diagramme | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a ohne Hilfsmittel zu benutzen |b n |2 rdamedia | ||
338 | |a Band |b nc |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
505 | 8 | 0 | |a Introduction -- The Emergence of Cyberspace and Its Implications -- From the Abacus to the Computer -- Communicating Through Cyberspace -- The Human Dimensions of Cyberspace -- Strategy and Cyberspace -- Domestic Regulation of Cyberspace -- Internet Governance and International Institutions -- International Law and Norms in Cyberspace -- Artificial Intelligence and Ethics -- Conclusions and Future Directions of Cybersecurity Policy -- Leading in the Cyber Age. |
520 | |a "Cyberspace is the global medium used to socialize, manage businesses, governments, and militaries, and secure personal, corporate, and government secrets. This book provides an accessible and engaging introduction to the policy and technology dimensions of cyberspace for the lay audience as well as computer science and political science students"-- | ||
520 | |a Cyberspace is essential for socializing, learning, shopping, and just about everything in modern life. Yet, there is also a dark side to cyberspace: sub-national, transnational, and international actors are challenging the ability of sovereign governments to provide a secure environment for their citizens. Criminal groups hold businesses and local governments hostage through ransomware, foreign intelligence services steal intellectual property and conduct influence operations, governments attempt to rewrite Internet protocols to facilitate censorship, and militaries prepare to use cyberspace operations in wars. Security in the Cyber Age breaks-down how cyberspace works, analyzes how state and non-state actors exploit vulnerabilities in cyberspace, and provides ways to improve cybersecurity. Written by a computer scientist and national security scholar-practitioner, the book offers technological, policy, and ethical ways to protect cyberspace. Its interdisciplinary approach and engaging style make the book accessible to the lay audience as well as computer science and political science students | ||
650 | 0 | |a Cyberterrorism |2 DLC | |
650 | 0 | |a Cyberinfrastructure |x Security measures |2 DLC | |
650 | 0 | |a Cyberterrorism |x Risk assessment |2 DLC | |
650 | 0 | |a Internet |x Security measures |2 DLC | |
650 | 4 | |a COMPUTERS / Social Aspects / General | |
650 | 4 | |a Computer- und Internetkriminalität | |
650 | 4 | |a Computersicherheit | |
650 | 4 | |a Digital- und Informationstechnologien: Rechtliche Aspekte | |
650 | 4 | |a Digital- und Informationstechnologien: soziale und ethische Aspekte | |
650 | 4 | |a Ethical & social aspects of IT | |
650 | 4 | |a Kontrolle, Privatsphäre und Sicherheit in der Gesellschaft | |
650 | 4 | |a Online Sicherheit & Verhalten | |
650 | 4 | |a Recht und Gesellschaft, Rechtssoziologie | |
650 | 4 | |a Wissenschaft, Technologie und Gesellschaft | |
700 | 1 | |a Savage, John E. |d 1939- |e VerfasserIn |0 (DE-588)172354277 |0 (DE-627)697298655 |0 (DE-576)133219763 |4 aut | |
776 | 1 | |z 9781009308564 |c ebook | |
776 | 1 | |z 9789004684980 | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |a Reveron, Derek S |t Security in the cyber age |d Cambridge, United Kingdom : Cambridge University Press, 2024 |z 9789004684980 |
856 | 4 | 2 | |u https://www.dietmardreier.de/annot/426F6F6B446174617C7C393738313030393330383538387C7C434F50.jpg?sq=3 |x Verlag |z lizenzpflichtig |3 Cover |
856 | 4 | 2 | |u https://swbplus.bsz-bw.de/bsz1858355508inh.htm |m V:DE-576 |m B:DE-Frei85 |v 20240516160647 |3 Inhaltsverzeichnis |
935 | |a mkri | ||
951 | |a BO | ||
ELC | |b 1 | ||
LOK | |0 000 xxxxxcx a22 zn 4500 | ||
LOK | |0 001 4510470002 | ||
LOK | |0 003 DE-627 | ||
LOK | |0 004 1858355508 | ||
LOK | |0 005 20240514131935 | ||
LOK | |0 008 240411||||||||||||||||ger||||||| | ||
LOK | |0 040 |a DE-Frei85 |c DE-627 |d DE-Frei85 | ||
LOK | |0 852 |a DE-Frei85 | ||
LOK | |0 852 1 |m p |9 00 | ||
LOK | |0 938 |k p | ||
ORI | |a WA-MARC-krimdoka001.raw | ||
PDA | |a yes |