| 000 | 02622nam a2200253 i 4500 | ||
|---|---|---|---|
| 003 | MIUC | ||
| 005 | 20191007111807.0 | ||
| 008 | 150128s2014 nyu||||| |||| 001 | eng d | ||
| 020 | _a9781623568030 | ||
| 040 |
_aMIUC _beng _cMIUC |
||
| 082 | 0 | _a363 | |
| 245 | 0 | 0 |
_aSecurity in cyberspace : _btargeting nations, infrastructures, individuals / _cedited by Giampiero Giacomello. |
| 260 |
_aNew York : _bBloomsbury, _c2014. |
||
| 300 |
_a237 p. ; _c24 cm. |
||
| 504 | _aIncludes bibliographical references and index. | ||
| 505 |
_gCh. 1. _tThe "state(s)" of cybersecurity / _rRossella Mattioli -- _gCh. 2. _tReducing uncertainties in cyberspace through confidence and capacity-building measures / _rPatryk Pawlak -- _gCh. 3. _tWikiLeaks and state control of information in the Cyber Age / _rJudith Reppy -- _gCh. 4. _tLeaks secure communication and achieving nuclear zero / _rBruce D. Larkin -- _gCh. 5. _tEstablishing norms of behaviour in cyberspace: the Chinese viewpoint / _rChunnei Kang -- _gCh. 6. _tEinstein on the breach: surveillance technology, cybersecurity and organizational change / _rAndreas Kuehn, Milton Mueller -- _gCh. 7. _tArtificial or "legitimate" barriers to internet governance? / _rFrancesco Giacomini, Laura Cordani -- _gCh. 8. _tPublic-private partnerships: a soft approach to cybersecurity? views from the European Union / _rMaria Grazia Porcedda -- _gCh. 9. _tBeing publicly private: extreme nationalist user practices on social networks / _rAndra Siibak. |
||
| 520 | _aToday, the Internet has become a source of information that no country or company can forgo. It is not only used to communicate or entertain, but most importantly to operate utilities and public services such as banking or air traffic. As the reliance on computer networks across societies and economies keeps growing, so do security risks in cyberspace - referred to as "cybersecurity." Cybersecurity means protecting information and control systems from those who seek to compromise them. It also involves actors, both malicious or protective, policies and their societal consequences. This collection of essays provides a better understanding of the risks, perceptions, and myths that surround cybersecurity by looking at it from three different levels of analysis: the sovereign state, the infrastructure and stakeholders of the Internet, and the individual. | ||
| 650 | 0 |
_aComputer networks _xSecurity measures _9712 |
|
| 650 | 0 |
_9535 _aInternet _xSecurity measures _xPolitical aspects |
|
| 650 | 0 |
_91545 _aTelecommunication policy |
|
| 650 | 0 |
_9487 _aNational security |
|
| 700 | 1 |
_4edt _91544 _aGiacomello, Giampiero, _d1959- |
|
| 942 |
_2ddc _cBK |
||