|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
JSTOR_on1375368537 |
003 |
OCoLC |
005 |
20231005004200.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
230410s2023 enka ob 001 0 eng d |
040 |
|
|
|a JSTOR
|b eng
|e rda
|e pn
|c JSTOR
|d UKAHL
|d DEGRU
|
020 |
|
|
|a 9781529226973
|q (electronic bk.)
|
020 |
|
|
|a 152922697X
|q (electronic bk.)
|
020 |
|
|
|z 1529226953
|
020 |
|
|
|z 9781529226959
|
029 |
1 |
|
|a AU@
|b 000073863482
|
035 |
|
|
|a (OCoLC)1375368537
|
037 |
|
|
|a 22573/cats1513947
|b JSTOR
|
050 |
|
4 |
|a TK5105.59
|b .S74 2023eb
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.82
|2 23/eng/20230410
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Stevens, Tim,
|d 1973-
|e author.
|
245 |
1 |
0 |
|a What is cybersecurity for? /
|c Tim Stevens.
|
264 |
|
1 |
|a Bristol :
|b Bristol University Press,
|c 2023.
|
300 |
|
|
|a 1 online resource (xi, 145 pages) :
|b illustrations.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a What is it for?
|
504 |
|
|
|a Includes bibliographical references and index.
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
0 |
|t Front Matter --
|t Contents --
|t List of Figures and Tables --
|t Introduction: A 'Wicked Problem' --
|t How Did We Get Here? --
|t Cybersecurity, Cyber Risk --
|t States and Markets --
|t International Cybersecurity --
|t Cybersecurity and Human Security --
|t Conclusion: A Global Conversation --
|t Notes --
|t Further Reading --
|t Index
|
520 |
|
|
|a How will protecting our digital infrastructure shape our future? Cybersecurity is one of the key practical and political challenges of our time. It is at the heart of how modern societies survive and thrive, yet public understanding is still rudimentary: media portrayals of hoodie-wearing hackers accessing the Pentagon don't convey its complexity or significance to contemporary life. This book addresses this gap, showing that the political dimension is as important as the technological one. It accessibly explains the complexities of global information systems, the challenges of providing security to users, societies, states and the international system, and the multitude of competing players and ambitions in this arena. Making the case for understanding it not only as a technical project, but as a crucial political one that links competing visions of what cybersecurity is for, it tackles the ultimate question: how can we do it better?
|
590 |
|
|
|a JSTOR
|b Books at JSTOR All Purchased
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Demand Driven Acquisitions (DDA)
|
650 |
|
0 |
|a Cyberspace
|x Security measures.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Computer crimes
|x Prevention.
|
650 |
|
7 |
|a COMPUTERS / Security / General
|2 bisacsh
|
650 |
|
7 |
|a Computer crimes
|x Prevention.
|2 fast
|0 (OCoLC)fst00872068
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
7 |
|a Cyberspace
|x Security measures.
|2 fast
|0 (OCoLC)fst02031378
|
776 |
0 |
8 |
|i Print version:
|a Stevens, Tim, 1973-
|t What is cybersecurity for?
|d Bristol : Bristol University Press, 2023
|z 1529226953
|w (OCoLC)1337403360
|
830 |
|
0 |
|a What is it for?
|
856 |
4 |
0 |
|u https://jstor.uam.elogim.com/stable/10.2307/jj.1544765
|z Texto completo
|
938 |
|
|
|a De Gruyter
|b DEGR
|n 9781529226973
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH40394313
|
994 |
|
|
|a 92
|b IZTAP
|