Cargando…

A vulnerable system the history of information security in the computer age

"This book delivers a long view of the history of information security, beginning with the creation of the first digital computers"--

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Stewart, Andrew, 1975- (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Ithaca [New York] Cornell University Press 2021
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 c 4500
001 JSTOR_on1243906022
003 OCoLC
005 20231005004200.0
006 m o d
007 cr cnu---unuuu
008 210323t20212021nyu ob 001 0 eng
010 |a  2021013835 
040 |a DLC  |b eng  |e rda  |e pn  |c DLC  |d OCLCO  |d OCLCF  |d CUV  |d EBLCP  |d P@U  |d OCLCO  |d JSTOR  |d N$T  |d YDX  |d UKAHL  |d OCLCO  |d OCL  |d STBDS  |d OCLCO  |d OCLCQ  |d OCLCO 
020 |a 9781501759055  |q electronic publication 
020 |a 1501759051  |q electronic publication 
020 |a 1501759043  |q electronic book 
020 |a 9781501759048  |q electronic book 
020 |z 9781501758942  |q hardcover 
020 |z 1501758942  |q hardcover 
029 1 |a AU@  |b 000068919424 
029 1 |a AU@  |b 000070411268 
035 |a (OCoLC)1243906022 
037 |a 22573/ctv1bw9csc  |b JSTOR 
042 |a pcc 
050 0 4 |a QA76.9.A25  |b S755 2021 
072 7 |a COM  |x 053000  |2 bisacsh 
072 7 |a COM  |x 032000  |2 bisacsh 
072 7 |a BUS  |x 070030  |2 bisacsh 
082 0 0 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Stewart, Andrew,  |d 1975-  |e author. 
245 1 2 |a A vulnerable system  |b the history of information security in the computer age  |c Andrew J. Stewart 
264 1 |a Ithaca [New York]  |b Cornell University Press  |c 2021 
264 4 |c ©2021 
300 |a 1 online resource (viii, 299 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references and index 
505 0 |a Introduction : Three Stigmata -- A "New Dimension" for the Security of Information -- The Promise, Success, and Failure of the Early Researchers -- The Creation of the Internet and the Web, and a Dark Portent -- The Dot-Com Boom and the Genesis of a Lucrative Feedback Loop -- Software Security and the "Hamster Wheel of Pain" -- Usable Security, Economics, and Psychology -- Vulnerability Disclosure, Bounties, and Markets -- Data Breaches, Nation-State Hacking, and Epistemic Closure -- The Wicked Nature of Information Security -- Epilogue : The Past, Present, and a Possible Future 
520 |a "This book delivers a long view of the history of information security, beginning with the creation of the first digital computers"--  |c Provided by publisher 
588 |a Description based on online resource; title from digital title page (viewed on August 23, 2021). 
590 |a JSTOR  |b Books at JSTOR All Purchased 
590 |a JSTOR  |b Books at JSTOR Demand Driven Acquisitions (DDA) 
650 0 |a Computer security  |x History. 
650 0 |a Computer networks  |x Security measures  |x History. 
650 6 |a Sécurité informatique  |x Histoire. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures  |x Histoire. 
650 7 |a COMPUTERS / Security / General  |2 bisacsh 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
655 7 |a Instructional and educational works  |2 fast 
655 7 |a History  |2 fast 
655 7 |a Instructional and educational works.  |2 lcgft 
655 7 |a Matériel d'éducation et de formation.  |2 rvmgf 
776 0 8 |i Print version:  |a Stewart, Andrew, 1975-  |t Vulnerable system  |d Ithaca [New York] : Cornell University Press, 2021  |z 9781501758942  |w (DLC) 2021013834  |w (OCoLC)1227917848 
856 4 0 |u https://jstor.uam.elogim.com/stable/10.7591/j.ctv1bxh5t3  |z Texto completo 
938 |a Oxford University Press USA  |b OUPR  |n EDZ0002656144 
938 |a Askews and Holts Library Services  |b ASKH  |n AH39109756 
938 |a YBP Library Services  |b YANK  |n 17608654 
938 |a Project MUSE  |b MUSE  |n muse97134 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL6423755 
938 |a EBSCOhost  |b EBSC  |n 2889278 
994 |a 92  |b IZTAP