|
|
|
|
LEADER |
00000cam a2200000Ii 4500 |
001 |
EBSCO_ocn864907720 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
131210t20142014nyua ob 001 0 eng d |
040 |
|
|
|a N$T
|b eng
|e rda
|e pn
|c N$T
|d E7B
|d YDXCP
|d CCO
|d N$T
|d OCLCO
|d OCLCQ
|d IDEBK
|d EBLCP
|d MHW
|d MEAUC
|d AUD
|d DEBSZ
|d MOR
|d Z5A
|d MERUC
|d OCLCQ
|d SAV
|d OCLCA
|d ZEM
|d OCLCA
|d BAL
|d UUM
|d YDX
|d CEF
|d OCLCQ
|d INT
|d STF
|d OCLCQ
|d WYU
|d TKN
|d AGLDB
|d OCL
|d G3B
|d IGB
|d AUW
|d BTN
|d INTCL
|d SNK
|d DKC
|d OCLCQ
|d NJT
|d OCLCQ
|d TFW
|d OCLCO
|d IAC
|d INARC
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCL
|d OCLCQ
|
015 |
|
|
|a GBB301524
|2 bnb
|
016 |
7 |
|
|a 016246323
|2 Uk
|
019 |
|
|
|a 862372354
|a 863595909
|a 962805954
|a 965341952
|a 1014223855
|a 1030218295
|a 1031565497
|a 1031868422
|a 1035504986
|a 1104696857
|a 1105951029
|a 1124330462
|a 1259487985
|
020 |
|
|
|a 9780199918102
|q (electronic bk.)
|
020 |
|
|
|a 0199918104
|q (electronic bk.)
|
020 |
|
|
|a 1306081998
|
020 |
|
|
|a 9781306081993
|
020 |
|
|
|z 9780199918096
|
020 |
|
|
|z 0199918090
|
020 |
|
|
|z 9780199918119
|
020 |
|
|
|z 0199918112
|
029 |
1 |
|
|a AU@
|b 000052757088
|
029 |
1 |
|
|a AU@
|b 000062305834
|
029 |
1 |
|
|a CHNEW
|b 000637843
|
029 |
1 |
|
|a CHNEW
|b 000886602
|
029 |
1 |
|
|a CHNEW
|b 001020538
|
029 |
1 |
|
|a CHVBK
|b 529499282
|
029 |
1 |
|
|a DEBBG
|b BV041633714
|
029 |
1 |
|
|a DEBSZ
|b 405519087
|
029 |
1 |
|
|a GBVCP
|b 772605513
|
029 |
1 |
|
|a NZ1
|b 15499482
|
029 |
1 |
|
|a NZ1
|b 15697412
|
035 |
|
|
|a (OCoLC)864907720
|z (OCoLC)862372354
|z (OCoLC)863595909
|z (OCoLC)962805954
|z (OCoLC)965341952
|z (OCoLC)1014223855
|z (OCoLC)1030218295
|z (OCoLC)1031565497
|z (OCoLC)1031868422
|z (OCoLC)1035504986
|z (OCoLC)1104696857
|z (OCoLC)1105951029
|z (OCoLC)1124330462
|z (OCoLC)1259487985
|
037 |
|
|
|a 539450
|b MIL
|
043 |
|
|
|a n-us---
|
050 |
|
4 |
|a QA76.9.A25
|b S562 2014eb
|
055 |
|
3 |
|a QA76.9 A25
|b S546
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
084 |
|
|
|a POL012000
|2 bisacsh
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Singer, P. W.
|q (Peter Warren),
|e author.
|
245 |
1 |
0 |
|a Cybersecurity and cyberwar :
|b what everyone needs to know /
|c P.W. Singer and Allan Friedman.
|
264 |
|
1 |
|a Oxford :
|b Oxford University Press,
|c [2014]
|
264 |
|
4 |
|c ©2014
|
300 |
|
|
|a 1 online resource (iii, 306 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a What everyone needs to know
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a INTRODUCTION. Why write a book about cybersecurity and cyberwar? -- Why is there a cybersecurity knowledge gap, and why does it matter? -- How did you write the book and what do you hope to accomplish? -- PART I. HOW IT ALL WORKS. The world wide what? Defining cyberspace -- Where did this "cyber stuff" come from anyway? A short history of the internet -- How does the internet actually work? -- Who runs it? Understanding internet governance -- On the internet, how do they know whether you are a dog? Identity and authentication -- What do we mean by "security" anyway? -- What are the threats? -- One phish, two phish, red phish, cyber phish: what are vulnerabilities? -- How do we trust in cyberspace? -- Focus: What happened in WikiLeaks? -- What is an advanced persistent threat (APT)? -- How do we keep the bad guys out? The basics of computer defense -- Who is the weakest link? Human factors -- PART II. WHY IT MATTERS. What is the meaning of cyberattack? The importance of terms and frameworks -- Whodunit? The problem of attribution -- What Is hactivism? -- Focus: Who is Anonymous? -- The crimes of tomorrow, today: what is cybercrime? -- Shady RATs and cyberspies: what is cyber espionage? -- How afraid should we be of cyberterrorism? -- So how do terrorists actually use the web? -- What about cyber counterterrorism? -- Security risk or human right? Foreign policy and the internet -- Focus: What is Tor and why does peeling back the onion matter? -- Who are patriotic hackers? -- Focus: What was Stuxnet? -- What is the hidden lesson of Stuxnet? The ethics of cyberweapons -- "Cyberwar, ugh, what are zeros and ones good for?": defining cyberwar -- A war by any other name? The legal side of cyber conflict -- What might a "cyberwar" actually look like? Computer network operations -- Focus: What is the US military approach to cyberwar? -- Focus: What is the Chinese approach to cyberwar? -- What about deterrence in an era of cyberwar? -- Why is threat assessment so hard in cyberspace? -- Does the cybersecurity world favor the weak or the strong? -- Who has the advantage, the offense or the defense? -- A new kind of arms race: what are the dangers of cyber proliferation? -- Are there lessons from past arms races? -- Behind the scenes: is there a cyber-industrial complex? -- PART III. WHAT CAN WE DO? Don't get fooled: why can't we just build a new, more secure internet? -- Rethink security: what is resilience, and why is it important? -- Reframe the problem (and the solution): what can we learn from public health? -- Learn from history: what can (real) pirates teach us about cybersecurity? -- Protect world wide governance for the world wide web: what Is the role of international institutions? -- "Graft" the rule of law: do we need a cyberspace treaty? -- Understand the limits of the state in cyberspace: why can't the government handle it? -- Rethink government's role: how can we better organize for cybersecurity? -- Approach it as a public-private problem: how do we better coordinate defense? -- Exercise is good for you: how can we better prepare for cyber incidents? -- Build cybersecurity incentives: why should I do what you want? -- Learn to share: how can we better collaborate on information? -- Demand disclosure: what is the role of transparency? -- Get "vigorous" about responsibility: how can we create accountability for security? -- Find the IT crowd: how do we solve the cyber people problem? -- Do your part: how can I protect myself (and the internet)? -- CONCLUSIONS. Where is cybersecurity headed next? -- What do I really need to know in the end? -- Acknowledgments -- Notes -- Glossary -- Index.
|
520 |
|
|
|a A generation ago, ""cyberspace"" was just a term from science fiction, used to describe the nascent network of computers linking a few university labs. Today, our entire modern way of life, from communication to commerce to conflict, fundamentally depends on the Internet. And the cybersecurity issues that result challenge literally everyone: politicians wrestling with everything from cybercrime to online freedom; generals protecting the nation from new forms of attack, while planning new cyberwars; business executives defending firms from once unimaginable threats, and looking to make money of.
|
588 |
0 |
|
|a Print version record; online resource viewed February 9, 2021.
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Computer security
|z United States.
|
650 |
|
0 |
|a Computer networks
|x Security measures
|z United States.
|
650 |
|
0 |
|a Cyberspace
|x Security measures
|z United States.
|
650 |
|
0 |
|a Cyberterrorism
|z United States
|x Prevention.
|
650 |
|
0 |
|a Information warfare
|z United States
|x Prevention.
|
650 |
|
0 |
|a Cyberspace operations (Military science)
|
650 |
|
6 |
|a Sécurité informatique
|z États-Unis.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures
|z États-Unis.
|
650 |
|
6 |
|a Cyberguerre (Science militaire)
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a POLITICAL SCIENCE
|x Political Freedom & Security
|x International Security.
|2 bisacsh
|
650 |
|
7 |
|a Cyberspace
|x Security measures.
|2 fast
|0 (OCoLC)fst02031378
|
650 |
|
7 |
|a Information warfare
|x Prevention.
|2 fast
|0 (OCoLC)fst00973188
|
650 |
|
7 |
|a Cyberterrorism
|x Prevention.
|2 fast
|0 (OCoLC)fst01905567
|
650 |
|
7 |
|a Cyberspace operations (Military science)
|2 fast
|0 (OCoLC)fst01909446
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
651 |
|
7 |
|a United States.
|2 fast
|0 (OCoLC)fst01204155
|
650 |
1 |
7 |
|a Beveiliging.
|2 gtt
|0 (NL-LeOCL)078451183
|
650 |
1 |
7 |
|a Internet.
|2 gtt
|0 (NL-LeOCL)101068689
|
650 |
|
7 |
|a United States of America.
|2 pplt
|
650 |
|
7 |
|a Cyberspace.
|2 pplt
|
650 |
|
7 |
|a National security.
|2 pplt
|
650 |
|
7 |
|a Computer-related crime.
|2 pplt
|
650 |
|
7 |
|a Cyberwarfare.
|2 pplt
|
650 |
|
7 |
|a Information and communication technology.
|2 pplt
|
650 |
|
7 |
|a IT-säkerhet.
|2 sao
|
650 |
|
7 |
|a Datanät
|x säkerhetsaspekter.
|2 sao
|
650 |
|
7 |
|a Cyberspace
|x säkerhetsaspekter.
|2 sao
|
650 |
|
7 |
|a Cyberterrorism
|x prevention.
|2 sao
|
650 |
|
7 |
|a Informationskrigföring.
|2 sao
|
650 |
|
7 |
|a IW
|x computers
|x information technology
|x communications
|x security
|x terrorism
|z USA.
|2 sipri
|
700 |
1 |
|
|a Friedman, Allan.
|
776 |
0 |
8 |
|i Print version:
|a Singer, P.W. (Peter Warren).
|t Cybersecurity and cyberwar.
|d Oxford : Oxford University Press, [2014]
|z 9780199918096
|w (DLC) 2013028127
|w (OCoLC)802324804
|
830 |
|
0 |
|a What everyone needs to know.
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=657629
|z Texto completo
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL1538365
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10792438
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 657629
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n cis26541403
|
938 |
|
|
|a Internet Archive
|b INAR
|n cybersecuritycyb0000sing
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 11319484
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 17012839
|
994 |
|
|
|a 92
|b IZTAP
|