|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
EBOOKCENTRAL_on1020319142 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr cnu|||unuuu |
008 |
180125s2018 dcu o 000 0 eng d |
040 |
|
|
|a N$T
|b eng
|e rda
|e pn
|c N$T
|d N$T
|d EBLCP
|d NLE
|d OCLCF
|d OCLCA
|d YDX
|d AJB
|d NRC
|d TEFOD
|d UKAHL
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d K6U
|d OCLCQ
|d OCLCO
|d OCLCL
|d TMA
|d OCLCQ
|
019 |
|
|
|a 1021099401
|
020 |
|
|
|a 9781442280526
|q (electronic bk.)
|
020 |
|
|
|a 1442280522
|q (electronic bk.)
|
020 |
|
|
|z 9781442280519
|
029 |
1 |
|
|a AU@
|b 000062637044
|
029 |
1 |
|
|a AU@
|b 000071300754
|
035 |
|
|
|a (OCoLC)1020319142
|z (OCoLC)1021099401
|
037 |
|
|
|a 84D10462-CADF-4371-907C-9BAE1270A83B
|b OverDrive, Inc.
|n http://www.overdrive.com
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Lewis, James Andrew,
|d 1953-
|e author.
|1 https://id.oclc.org/worldcat/entity/E39PCjBYxM8Hpmh4dK8BP7fKBP
|
245 |
1 |
0 |
|a Rethinking cybersecurity :
|b strategy, mass effect, and states /
|c author: James Andrew Lewis.
|
264 |
|
1 |
|a Washington, DC :
|b Center for Strategic & International Studies ;
|a Lanham, MD :
|b Rowman & Littlefield,
|c [2018]
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
500 |
|
|
|a "January 2018."
|
500 |
|
|
|a A report of the CSIS Technology Program.
|
520 |
|
|
|a Despite all the attention, cyberspace is far from secure. Why this is so reflects conceptual weaknesses more than imperfect technologies. Two questions highlight shortcomings in the discussion of cybersecurity. The first is why, after more than two decades, we have not seen anything like a cyber Pearl Harbor, cyber 9/11, or cyber catastrophe. The second is why, despite the increasing quantity of recommendations, there has been so little progress. This report explores these questions and assesses the accuracy of our perceptions of cybersecurity.
|
588 |
0 |
|
|a Vendor-supplied metadata.
|
505 |
0 |
|
|a Introduction: Structuring security for the digital revolution. -- Chapter 1: Outdated ideas guide cybersecurity. -- Chapter 2: States are the most dangerous actors. -- Chapter 3: Misperception and mirror imaging. -- Chapter 4: Cyber operations and interstate conflict. -- Chapter 5: Political and strategic constraints on cyber attack. -- Chapter 6: Rethinking principles for cybersecurity. -- Chapter 7: Moving to a new paradigm. -- About the author.
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Computer security.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer security
|2 fast
|
710 |
2 |
|
|a Center for Strategic and International Studies (Washington, D.C.)
|
758 |
|
|
|i has work:
|a Rethinking cybersecurity (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCG6rP4yYt48jmVHHYVbV3P
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=5233949
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH33836470
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL5233949
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1694016
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 15114967
|
994 |
|
|
|a 92
|b IZTAP
|