Cargando…

Routledge companion to global cyber-security strategy /

This companion provides the most comprehensive and up-to-date comparative overview of the cyber-security strategies and doctrines of the major states and actors in Europe, North America, South America, Africa, and Asia. The volume offers an introduction to each nation's cyber-security strategy...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Romaniuk, Scott N. (Editor ), Manjikian, Mary (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York, NY : Routledge, 2021
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 i 4500
001 OR_on1225547195
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 201205s2021 nyua ob 001 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d N$T  |d OCLCO  |d N$T  |d OCLCF  |d MYG  |d OCLCO  |d OCL  |d ORMDA  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCL  |d TAMCT  |d OCLCQ 
020 |a 0429680368 
020 |a 9780429680366  |q (electronic bk.) 
035 |a (OCoLC)1225547195 
037 |a 9780429680366  |b O'Reilly Media 
050 4 |a UA163 
082 0 4 |a 363.325  |2 23 
049 |a UAMI 
245 0 0 |a Routledge companion to global cyber-security strategy /  |c edited by Scott M. Romaniuk and Mary Manjikian. 
264 1 |a New York, NY :  |b Routledge,  |c 2021 
264 4 |c ©2021 
300 |a 1 online resource (xxiii, 632 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references and index. 
520 |a This companion provides the most comprehensive and up-to-date comparative overview of the cyber-security strategies and doctrines of the major states and actors in Europe, North America, South America, Africa, and Asia. The volume offers an introduction to each nation's cyber-security strategy and policy, along with a list of resources in English that may be consulted for those wishing to go into greater depth. Each chapter is written by a leading academic or policy specialist, and contains the following sections: overview of national cyber-security strategy; concepts and definitions; exploration of cyber-security issues as they relate to international law and governance; critical examinations of cyber partners at home and abroad; legislative developments and processes; dimensions of cybercrime and cyberterrorism; implications of cyber-security policies and strategies. This book will be of much interest to students and practitioners in the fields of cyber-security, national security, strategic studies, foreign policy, and international relations. 
505 0 |a Part I: Europe -- Securing the kingdom's cyberspace: cybersecurity and cyber intelligence in Spain -- Albania's cybersecurity pivot: between Western architectures and great power competition -- Armenian national policy in cyber space: toward a global cyber security architecture -- Czech Republic: a new cyber security leader in Central Europe -- Cyber security in the French Republic -- Germany's cybersecurity strategy: confronting future challeges -- Cybersecurity of Poland: legal and organizational framework -- Hungary's evolving cyber security strategyy -- Romanian cybersecurity efforts: a work in progress -- Italy's cyber security architecture and critical infrastructure -- Dutch cyber security strategy -- Norwegian cyber security: a small-state approach to building international cyber cooperation -- Seeking a new order for global cybersecurity: the Russian approach to cyber-sovereignty -- Slovakia: the Tatra Tiger without teeth -- Slovenia: a fragmented cyber security -- In the line of Russian Ukraine. hybrid warfare, and cybersecurity defense aggression: Ukraine, hybrid warfare, and cybersecurity defense -- United Kingdom: pragmatism and adaptability in the cyber realm -- European Union: policy, cohesion, and supranational experiences with cybersecurity -- Estonia: from the "Bronze Night" to cybersecurity pioneers -- NATO's evolving cyber security policy and strategy -- Part II: Asia and Australia -- Japan's challenges, capabilities, and preparedness in cyberspace -- An effective shield? Analyzing South Korea's cybersecurity strategy -- In the line of fire: Taiwan's legal, political, and technological cybersecurity posture -- Serving the people: China's cybersecurity policy and its implications -- Cybersecurity in a one-party state: policies and implications for Vietnam's economy and online freedom -- The Philippines' cybersecurity strategy: strengthening partnerships to enhance cybersecurity capability -- Malaysia: balancing national development, national security, and cybersecurity policy -- Cyber governance and data protection in India: a critical legal analysis -- Cybersecurity: a national priority in Bangledesh -- Managing a digital revolution: cyber security capacity building in Myanmar -- Australia's cyber security: a unique opportunity -- Singapore: a leading actor in ASEAN cybersecurity -- Part III: The Middle East -- Between multi-stakeholderism and cyber sovereignty: understanding Turkey's cybersecurity strategy -- Israel: cyber securitization as national trademark -- Palestinian territory occupied: cybersecurity at reduced sovereignty -- The "Silicon Valley of the Middle East": cybersecurity, Saudi Arabia, and the path to Vision 2030 -- The Islamic Republic of Iran's cyber security strategy: challenges in an era of cyber uncertainty -- Part IV: The Americas -- Canada's cyber security in a globalized environment: challenges and opportunities -- The United States: a declining hegemon in cyberspace? -- Jamaica's cybercrime and cyber-security: policies, laws, and strategies -- Mexico and cybersecurity: policies, challenges, and concerns -- Colombia's cybersecurity predicament: state making, strategic challenges, and cyberspace -- Cyber security governance in Brazil: keeping silos or building bridges? -- Part V: Africa -- Securitizing cyberspace in Egypt: the dilemma of cybersecurity and democracy -- Security through the Arab Winter: cyber strategies in postrevolutionary Tunisia -- Cyber security policy in Nigeria: a tool for national security and economic prosperity -- Cybersecurity in Ghana: past, present, and future -- Building a cyber fortress in Africa: Uganda's cyber security capacities and challenges -- Cybersecurity in South Africa: status, governance, and prospects -- Algorithms of oppression? AU's cybersecurity policy and its enforcement in Africa. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Cyberspace  |x Security measures  |x Government policy. 
650 0 |a Cyberterrorism  |x Prevention  |x Government policy. 
650 0 |a Computer crimes  |x Prevention  |x Government policy. 
650 0 |a Computer security  |x Government policy. 
650 0 |a Internet  |x Security measures  |x Government policy. 
650 0 |a Computer networks  |x Security measures  |x Government policy. 
650 6 |a Sécurité informatique  |x Politique gouvernementale. 
650 6 |a Internet  |x Sécurité  |x Mesures  |x Politique gouvernementale. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures  |x Politique gouvernementale. 
650 7 |a Computer networks  |x Security measures  |x Government policy.  |2 fast  |0 (OCoLC)fst00872344 
650 7 |a Computer security  |x Government policy.  |2 fast  |0 (OCoLC)fst00872490 
700 1 |a Romaniuk, Scott N.,  |e editor. 
700 1 |a Manjikian, Mary,  |e editor. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780429680366/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL6415984 
938 |a EBSCOhost  |b EBSC  |n 2622525 
994 |a 92  |b IZTAP