|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
JSTOR_ocn940922726 |
003 |
OCoLC |
005 |
20231005004200.0 |
006 |
m o d |
007 |
cr |n||||||||| |
008 |
160223s2012 dcua ob 100 0 eng d |
040 |
|
|
|a YDXCP
|b eng
|e pn
|c YDXCP
|d OCLCO
|d JSTOR
|d OCLCO
|d OCLCQ
|d CUS
|d OCLCA
|d IOG
|d WAU
|d OCLCF
|d OCLCA
|d LUN
|d INARC
|d OCLCO
|d OCL
|d OCLCQ
|
019 |
|
|
|a 1176522393
|
020 |
|
|
|a 9780898436389
|q (electronic bk.)
|
020 |
|
|
|a 0898436389
|q (electronic bk.)
|
020 |
|
|
|z 9780898435627
|
020 |
|
|
|z 0898435625
|
029 |
1 |
|
|a AU@
|b 000062513665
|
035 |
|
|
|a (OCoLC)940922726
|z (OCoLC)1176522393
|
037 |
|
|
|a 22573/ctt19wxnp2
|b JSTOR
|
043 |
|
|
|a n-us---
|
050 |
|
4 |
|a HV6773.2
|b .S32 2012eb
|
082 |
0 |
4 |
|a 352.3/790973
|2 23
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Securing cyberspace :
|b a new domain for national security /
|c foreword by Joseph S. Nye & Brent Scowcroft ; edited by Nicholas Burns & Jonathon Price.
|
260 |
|
|
|a Washington, D.C. :
|b Aspen Institute,
|c ©2012.
|
300 |
|
|
|a 1 online resource (202 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
500 |
|
|
|a Papers presented at a Aspen Group meeting held in August 2011 in Aspen, Colorado.
|
504 |
|
|
|a Includes bibliographical references.
|
505 |
0 |
0 |
|g pt. 1.
|t Cyberwars & cyberterror : understanding cyberspace as a new battleground --
|g The Third Annual Ernest May Memorial Lecture :
|t nuclear lessons for cybersecurity? /
|r Joseph S. Nye, Jr. --
|t U.S. cybersecurity : the current threat and future challenges /
|r Eric Rosenbach and Robert Belk --
|t Resilience, disruption, and a "cyber Westphalia" : options for national security in a cybered conflict world /
|r Chris Demchak --
|g pt. 2.
|t Cyber policy : regulating cyberspace --
|t Eight questions and answers on U.S. cyber statecraft /
|r Jason Healey --
|t Harnessing leviathan : internet governance and cybersecurity /
|r James A. Lewis --
|g pt. 3.
|t Cybercrime : implications for business and the economy --
|t The cybersecurity threat to U.S. growth and prosperity /
|r John Dowdy --
|t Falling prey to cybercrime : implications for business and the economy /
|r Melissa E. Hathaway --
|g pt. 4.
|t Cybersecurity and its tensions with Internet freedom --
|t Internet freedom and its tensions with cybersecurity /
|r Richard A. Falkenrath --
|t Internet freedom and political change /
|r Richard Fontaine --
|g pt. 5.
|t Cyberspace : new policies and a new strategy --
|t A path forward for cyber defense and security /
|r Michael Chertoff and John Michael McConnell.
|
520 |
|
|
|a This book is a collection of papers commissioned for the 2011 Aspen Strategy Group workshop, a bipartisan meeting of top national security experts. The papers examine the complexities of the emerging cyber threat, as well as the possibilities -- and inherent challenges -- of crafting effective domestic and international cyber policy. Authors explore topics such as the economic impact of cyber crime, cyber as a new dimension of warfare, the revolutionary potential of internet freedom, and the future realities the United States will face in the new age of heightened internet connectivity.
|
588 |
0 |
|
|a Online resource; title from PDF title page (JSTOR, viewed January 31, 2017).
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Demand Driven Acquisitions (DDA)
|
590 |
|
|
|a JSTOR
|b Books at JSTOR All Purchased
|
650 |
|
0 |
|a Cyberspace
|x Security measures
|v Congresses.
|
650 |
|
0 |
|a Cyberterrorism
|z United States
|x Prevention
|v Congresses.
|
650 |
|
0 |
|a National security
|z United States
|v Congresses.
|
650 |
|
0 |
|a Information warfare
|v Congresses.
|
650 |
|
0 |
|a Internet governance
|v Congresses.
|
650 |
|
0 |
|a Computer crimes
|v Congresses.
|
650 |
|
0 |
|a Data protection
|v Congresses.
|
650 |
|
6 |
|a Guerre de l'information
|v Congrès.
|
650 |
|
6 |
|a Gouvernance d'Internet
|v Congrès.
|
650 |
|
6 |
|a Criminalité informatique
|v Congrès.
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|v Congrès.
|
650 |
|
7 |
|a Cyberspace
|x Security measures.
|2 fast
|0 (OCoLC)fst02031378
|
650 |
|
7 |
|a Computer crimes.
|2 fast
|0 (OCoLC)fst00872063
|
650 |
|
7 |
|a Cyberterrorism
|x Prevention.
|2 fast
|0 (OCoLC)fst01905567
|
650 |
|
7 |
|a Data protection.
|2 fast
|0 (OCoLC)fst00887958
|
650 |
|
7 |
|a Information warfare.
|2 fast
|0 (OCoLC)fst00973186
|
650 |
|
7 |
|a Internet governance.
|2 fast
|0 (OCoLC)fst01746940
|
650 |
|
7 |
|a National security.
|2 fast
|0 (OCoLC)fst01033711
|
651 |
|
7 |
|a United States.
|2 fast
|0 (OCoLC)fst01204155
|
655 |
|
7 |
|a Conference papers and proceedings.
|2 fast
|0 (OCoLC)fst01423772
|
700 |
1 |
|
|a Burns, R. Nicholas,
|d 1956-
|e editor.
|
700 |
1 |
|
|a Price, Jonathon,
|e editor.
|
700 |
1 |
|
|a Nye, Joseph S.,
|e writer of foreword.
|
700 |
1 |
|
|a Scowcroft, Brent,
|e writer of foreword.
|
710 |
2 |
|
|a Aspen Institute.
|
710 |
2 |
|
|a Aspen Strategy Group (U.S.)
|
776 |
0 |
8 |
|i Print version:
|t Securing cyberspace.
|d Washington, D.C. : Aspen Institute, ©2012
|z 9780898435627
|w (OCoLC)786160445
|
856 |
4 |
0 |
|u https://jstor.uam.elogim.com/stable/10.2307/j.ctt19x3h93
|z Texto completo
|
938 |
|
|
|a Internet Archive
|b INAR
|n securin_xxx_2012_00_9419
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 12856811
|
994 |
|
|
|a 92
|b IZTAP
|