|
|
|
|
LEADER |
00000cam a2200000 c 4500 |
001 |
JSTOR_on1243906022 |
003 |
OCoLC |
005 |
20231005004200.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
210323t20212021nyu ob 001 0 eng |
010 |
|
|
|a 2021013835
|
040 |
|
|
|a DLC
|b eng
|e rda
|e pn
|c DLC
|d OCLCO
|d OCLCF
|d CUV
|d EBLCP
|d P@U
|d OCLCO
|d JSTOR
|d N$T
|d YDX
|d UKAHL
|d OCLCO
|d OCL
|d STBDS
|d OCLCO
|d OCLCQ
|d OCLCO
|
020 |
|
|
|a 9781501759055
|q electronic publication
|
020 |
|
|
|a 1501759051
|q electronic publication
|
020 |
|
|
|a 1501759043
|q electronic book
|
020 |
|
|
|a 9781501759048
|q electronic book
|
020 |
|
|
|z 9781501758942
|q hardcover
|
020 |
|
|
|z 1501758942
|q hardcover
|
029 |
1 |
|
|a AU@
|b 000068919424
|
029 |
1 |
|
|a AU@
|b 000070411268
|
035 |
|
|
|a (OCoLC)1243906022
|
037 |
|
|
|a 22573/ctv1bw9csc
|b JSTOR
|
042 |
|
|
|a pcc
|
050 |
0 |
4 |
|a QA76.9.A25
|b S755 2021
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 032000
|2 bisacsh
|
072 |
|
7 |
|a BUS
|x 070030
|2 bisacsh
|
082 |
0 |
0 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Stewart, Andrew,
|d 1975-
|e author.
|
245 |
1 |
2 |
|a A vulnerable system
|b the history of information security in the computer age
|c Andrew J. Stewart
|
264 |
|
1 |
|a Ithaca [New York]
|b Cornell University Press
|c 2021
|
264 |
|
4 |
|c ©2021
|
300 |
|
|
|a 1 online resource (viii, 299 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references and index
|
505 |
0 |
|
|a Introduction : Three Stigmata -- A "New Dimension" for the Security of Information -- The Promise, Success, and Failure of the Early Researchers -- The Creation of the Internet and the Web, and a Dark Portent -- The Dot-Com Boom and the Genesis of a Lucrative Feedback Loop -- Software Security and the "Hamster Wheel of Pain" -- Usable Security, Economics, and Psychology -- Vulnerability Disclosure, Bounties, and Markets -- Data Breaches, Nation-State Hacking, and Epistemic Closure -- The Wicked Nature of Information Security -- Epilogue : The Past, Present, and a Possible Future
|
520 |
|
|
|a "This book delivers a long view of the history of information security, beginning with the creation of the first digital computers"--
|c Provided by publisher
|
588 |
|
|
|a Description based on online resource; title from digital title page (viewed on August 23, 2021).
|
590 |
|
|
|a JSTOR
|b Books at JSTOR All Purchased
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Demand Driven Acquisitions (DDA)
|
650 |
|
0 |
|a Computer security
|x History.
|
650 |
|
0 |
|a Computer networks
|x Security measures
|x History.
|
650 |
|
6 |
|a Sécurité informatique
|x Histoire.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures
|x Histoire.
|
650 |
|
7 |
|a COMPUTERS / Security / General
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
655 |
|
7 |
|a Instructional and educational works
|2 fast
|
655 |
|
7 |
|a History
|2 fast
|
655 |
|
7 |
|a Instructional and educational works.
|2 lcgft
|
655 |
|
7 |
|a Matériel d'éducation et de formation.
|2 rvmgf
|
776 |
0 |
8 |
|i Print version:
|a Stewart, Andrew, 1975-
|t Vulnerable system
|d Ithaca [New York] : Cornell University Press, 2021
|z 9781501758942
|w (DLC) 2021013834
|w (OCoLC)1227917848
|
856 |
4 |
0 |
|u https://jstor.uam.elogim.com/stable/10.7591/j.ctv1bxh5t3
|z Texto completo
|
938 |
|
|
|a Oxford University Press USA
|b OUPR
|n EDZ0002656144
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH39109756
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 17608654
|
938 |
|
|
|a Project MUSE
|b MUSE
|n muse97134
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL6423755
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 2889278
|
994 |
|
|
|a 92
|b IZTAP
|