Local cover image
Local cover image
Image from Google Jackets

Security in cyberspace : targeting nations, infrastructures, individuals / edited by Giampiero Giacomello.

Contributor(s): Material type: TextPublication details: New York : Bloomsbury, 2014.Description: 237 p. ; 24 cmISBN:
  • 9781623568030
Subject(s): DDC classification:
  • 363
Contents:
Ch. 1. The "state(s)" of cybersecurity / Rossella Mattioli -- Ch. 2. Reducing uncertainties in cyberspace through confidence and capacity-building measures / Patryk Pawlak -- Ch. 3. WikiLeaks and state control of information in the Cyber Age / Judith Reppy -- Ch. 4. Leaks secure communication and achieving nuclear zero / Bruce D. Larkin -- Ch. 5. Establishing norms of behaviour in cyberspace: the Chinese viewpoint / Chunnei Kang -- Ch. 6. Einstein on the breach: surveillance technology, cybersecurity and organizational change / Andreas Kuehn, Milton Mueller -- Ch. 7. Artificial or "legitimate" barriers to internet governance? / Francesco Giacomini, Laura Cordani -- Ch. 8. Public-private partnerships: a soft approach to cybersecurity? views from the European Union / Maria Grazia Porcedda -- Ch. 9. Being publicly private: extreme nationalist user practices on social networks / Andra Siibak.
Summary: Today, the Internet has become a source of information that no country or company can forgo. It is not only used to communicate or entertain, but most importantly to operate utilities and public services such as banking or air traffic. As the reliance on computer networks across societies and economies keeps growing, so do security risks in cyberspace - referred to as "cybersecurity." Cybersecurity means protecting information and control systems from those who seek to compromise them. It also involves actors, both malicious or protective, policies and their societal consequences. This collection of essays provides a better understanding of the risks, perceptions, and myths that surround cybersecurity by looking at it from three different levels of analysis: the sovereign state, the infrastructure and stakeholders of the Internet, and the individual.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Barcode
Books Marbella International University Centre Library 363 SEC sec (Browse shelf(Opens below)) Available 10559

Includes bibliographical references and index.

Ch. 1. The "state(s)" of cybersecurity / Rossella Mattioli -- Ch. 2. Reducing uncertainties in cyberspace through confidence and capacity-building measures / Patryk Pawlak -- Ch. 3. WikiLeaks and state control of information in the Cyber Age / Judith Reppy -- Ch. 4. Leaks secure communication and achieving nuclear zero / Bruce D. Larkin -- Ch. 5. Establishing norms of behaviour in cyberspace: the Chinese viewpoint / Chunnei Kang -- Ch. 6. Einstein on the breach: surveillance technology, cybersecurity and organizational change / Andreas Kuehn, Milton Mueller -- Ch. 7. Artificial or "legitimate" barriers to internet governance? / Francesco Giacomini, Laura Cordani -- Ch. 8. Public-private partnerships: a soft approach to cybersecurity? views from the European Union / Maria Grazia Porcedda -- Ch. 9. Being publicly private: extreme nationalist user practices on social networks / Andra Siibak.

Today, the Internet has become a source of information that no country or company can forgo. It is not only used to communicate or entertain, but most importantly to operate utilities and public services such as banking or air traffic. As the reliance on computer networks across societies and economies keeps growing, so do security risks in cyberspace - referred to as "cybersecurity."

Cybersecurity means protecting information and control systems from those who seek to compromise them. It also involves actors, both malicious or protective, policies and their societal consequences. This collection of essays provides a better understanding of the risks, perceptions, and myths that surround cybersecurity by looking at it from three different levels of analysis: the sovereign state, the infrastructure and stakeholders of the Internet, and the individual.

There are no comments on this title.

to post a comment.

Click on an image to view it in the image viewer

Local cover image


© Marbella International University Centre, 2024. All rights reserved.

(Koha-ILS, Implemented and customized by MIUC Library in 2015)