|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-1-4939-0962-9 |
003 |
DE-He213 |
005 |
20220120023213.0 |
007 |
cr nn 008mamaa |
008 |
140624s2014 xxu| s |||| 0|eng d |
020 |
|
|
|a 9781493909629
|9 978-1-4939-0962-9
|
024 |
7 |
|
|a 10.1007/978-1-4939-0962-9
|2 doi
|
050 |
|
4 |
|a TK5105.5-5105.9
|
072 |
|
7 |
|a UKN
|2 bicssc
|
072 |
|
7 |
|a COM069000
|2 bisacsh
|
072 |
|
7 |
|a UKN
|2 thema
|
082 |
0 |
4 |
|a 004.6
|2 23
|
245 |
1 |
0 |
|a Cyberterrorism
|h [electronic resource] :
|b Understanding, Assessment, and Response /
|c edited by Thomas M. Chen, Lee Jarvis, Stuart Macdonald.
|
250 |
|
|
|a 1st ed. 2014.
|
264 |
|
1 |
|a New York, NY :
|b Springer New York :
|b Imprint: Springer,
|c 2014.
|
300 |
|
|
|a XXIII, 215 p. 5 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
505 |
0 |
|
|a What is 'Cyberterrorism'? Computer and Internet Technology in Legal Definitions of Terrorism -- Understanding, Locating and Constructing 'Cyberterrorism' -- Rethinking the Threat of Cyberterrorism -- Putting the 'Cyber' into Cyberterrorism: Re-reading Technological Risk in a Hyperconnected World -- Dr. Strangeweb: Or How they Stopped Worrying and Learned to Love Cyber War -- Reality Check: Assessing the (Un)Likelihood of Cyberterrorism -- Cyber Threats to Critical Information Infrastructure -- The Citadel and its Sentinels: State Strategies for Contesting Cyberterrorism in the UK -- The Criminalisation of Terrorists' Online Preparatory Acts -- Adaptive Responses to Cyberterrorism.
|
520 |
|
|
|a This is the first book to present a multidisciplinary approach to cyberterrorism. It traces the threat posed by cyberterrorism today, with chapters discussing possible technological vulnerabilities, potential motivations to engage in cyberterrorism, and the challenges of distinguishing this from other cyber threats. The book also addresses the range of potential responses to this threat by exploring policy and legislative frameworks as well as a diversity of techniques for deterring or countering terrorism in cyber environments. The case studies throughout the book are global in scope and include the United States, United Kingdom, Australia, New Zealand and Canada. With contributions from distinguished experts with backgrounds including international relations, law, engineering, computer science, public policy and politics, Cyberterrorism: Understanding, Assessment and Response offers a cutting edge analysis of contemporary debate on, and issues surrounding, cyberterrorism. This global scope and diversity of perspectives ensure it is of great interest to academics, students, practitioners, policymakers and other stakeholders with an interest in cyber security.
|
650 |
|
0 |
|a Computer networks .
|
650 |
|
0 |
|a Criminal law.
|
650 |
|
0 |
|a Social sciences-Data processing.
|
650 |
|
0 |
|a Data protection.
|
650 |
1 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Criminal Law and Criminal Procedure Law.
|
650 |
2 |
4 |
|a Computer Application in Social and Behavioral Sciences.
|
650 |
2 |
4 |
|a Data and Information Security.
|
700 |
1 |
|
|a Chen, Thomas M.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Jarvis, Lee.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Macdonald, Stuart.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9781493909636
|
776 |
0 |
8 |
|i Printed edition:
|z 9781493909612
|
776 |
0 |
8 |
|i Printed edition:
|z 9781493944835
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-1-4939-0962-9
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|