Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Type of Medium
Language
Region
Library
Years
  • 1
    UID:
    gbv_1679263889
    Format: Online-Ressource
    ISBN: 9781501302237
    Content: "Today, the Internet has become a source of information that no country or company can forgo. It is not only used to communicate or entertain, but most importantly to operate utilities and public services such as banking or air traffic. As the reliance on computer networks across societies and economies keeps growing, so do security risks in cyberspace - referred to as "cybersecurity." Cybersecurity means protecting information and control systems from those who seek to compromise them. It also involves actors, both malicious or protective, policies and their societal consequences. This collection of essays provides a better understanding of the risks, perceptions, and myths that surround cybersecurity by looking at it from three different levels of analysis: the sovereign state, the infrastructure and stakeholders of the Internet, and the individual. The essays explore such issues as information ownership, censorship, cyberwars, cyberterrorism, privacy, and rebellion, bringing together expert knowledge from computer science and the social sciences with case studies. It reviews existing policies and practices and discusses the threats and benefits of living in an increasingly networked world. This authoritative analysis of one of the most controversial and compelling security debates of the twenty-first century will appeal to scholars and practitioners interested in security, international relations and policymaking."--
    Content: Machine generated contents note: -- List of Abbreviations List of Figures and Tables Acknowledgments Foreword Carlo Schaerf List of Contributors Introduction - Security in Cybersapce Giampiero Giacomello Part One: The Nation Chapter 1: The 'State(s)' of Cybersecurity Rossella Mattioli Chapter 2: Reducing Uncertainties in Cyberspace through Confidence and Capacity Building Measures Patryk Pawlak Chapter 3: Wikileaks and Cyberspace Judith Reppy Chapter 4: Leaks: Securing Communications and Achieving Nuclear Zero Bruce Larkin Chapter 5: Establishing Norms of Behavior in Cyberspace: The Chinese Viewpoint Chunmei Kang Part Two: The Infrastructure and The Individual Chapter 6: Einstein on the Breach: Surveillance Technology, Cybersecurity and Organizational Change Milton Mueller and Andreas Kuehn Chapter 7: Artificial or 'Legitimate' Barriers to Internet Governance?" Francesco Giacomini and Laura Cordani Chapter 8: Public-Private Partnerships: A 'Soft' Approach to Cybersecurity? Views from the European Union Maria Grazia Porcedda Chapter 9: Targeting One's Ideal Audience: Self-Presentation Practices among Extreme Nationalists on Social Networks Andra SiibakBibliography Index.
    Note: Includes bibliographical references and index , Barrierefreier Inhalt: Compliant with Level AA of the Web Content Accessibility Guidelines. Content is displayed as HTML full text which can easily be resized or read with assistive technology, with mark-up that allows screen readers and keyboard-only users to navigate easily
    Additional Edition: ISBN 9781623568030
    Additional Edition: Available in another form
    Language: English
    Keywords: Internetkriminalität ; Electronic books
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    almafu_9960010609102883
    Format: 1 online resource (262 p.)
    ISBN: 1-5013-1729-6 , 1-5013-0223-X , 1-62356-570-7
    Uniform Title: Security in cyberspace (Bloomsbury Academic)
    Content: "Today, the Internet has become a source of information that no country or company can forgo. It is not only used to communicate or entertain, but most importantly to operate utilities and public services such as banking or air traffic. As the reliance on computer networks across societies and economies keeps growing, so do security risks in cyberspace - referred to as "cybersecurity." Cybersecurity means protecting information and control systems from those who seek to compromise them. It also involves actors, both malicious or protective, policies and their societal consequences. This collection of essays provides a better understanding of the risks, perceptions, and myths that surround cybersecurity by looking at it from three different levels of analysis: the sovereign state, the infrastructure and stakeholders of the Internet, and the individual. The essays explore such issues as information ownership, censorship, cyberwars, cyberterrorism, privacy, and rebellion, bringing together expert knowledge from computer science and the social sciences with case studies. It reviews existing policies and practices and discusses the threats and benefits of living in an increasingly networked world. This authoritative analysis of one of the most controversial and compelling security debates of the twenty-first century will appeal to scholars and practitioners interested in security, international relations and policymaking."--Bloomsbury Publishing.
    Note: Description based upon print version of record. , List of Abbreviations -- List of Figures and Tables -- Acknowledgments -- Foreword / Carlo Schaerf -- List of Contributors -- Introduction - Security in Cybersapce / Giampiero Giacomello -- Part One: The Nation. Chapter 1: The 'State(s)' of Cybersecurity / Rossella Mattioli ; Chapter 2: Reducing Uncertainties in Cyberspace through Confidence and Capacity Building Measures / Patryk Pawlak ; Chapter 3: Wikileaks and Cyberspace / Judith Reppy ; Chapter 4: Leaks: Securing Communications and Achieving Nuclear Zero / Bruce Larkin ; Chapter 5: Establishing Norms of Behavior in Cyberspace: The Chinese Viewpoint / Chunmei Kang -- Part Two: The Infrastructure and The Individual. Chapter 6: Einstein on the Breach: Surveillance Technology, Cybersecurity and Organizational Change / Milton Mueller and Andreas Kuehn ; Chapter 7: Artificial or 'Legitimate' Barriers to Internet Governance?" / Francesco Giacomini and Laura Cordani ; Chapter 8: Public-Private Partnerships: A 'Soft' Approach to Cybersecurity? Views from the European Union / Maria Grazia Porcedda ; Chapter 9: Targeting One's Ideal Audience: Self-Presentation Practices among Extreme Nationalists on Social Networks / Andra Siibak -- Bibliography -- Index. , Also issued in print. , English
    Additional Edition: ISBN 1-322-14664-0
    Additional Edition: ISBN 1-62356-803-X
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Did you mean 9781350130227?
Did you mean 9781501300233?
Did you mean 9781501302039?
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages