|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_on1225547195 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
201205s2021 nyua ob 001 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d N$T
|d OCLCO
|d N$T
|d OCLCF
|d MYG
|d OCLCO
|d OCL
|d ORMDA
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCL
|d TAMCT
|d OCLCQ
|
020 |
|
|
|a 0429680368
|
020 |
|
|
|a 9780429680366
|q (electronic bk.)
|
035 |
|
|
|a (OCoLC)1225547195
|
037 |
|
|
|a 9780429680366
|b O'Reilly Media
|
050 |
|
4 |
|a UA163
|
082 |
0 |
4 |
|a 363.325
|2 23
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Routledge companion to global cyber-security strategy /
|c edited by Scott M. Romaniuk and Mary Manjikian.
|
264 |
|
1 |
|a New York, NY :
|b Routledge,
|c 2021
|
264 |
|
4 |
|c ©2021
|
300 |
|
|
|a 1 online resource (xxiii, 632 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references and index.
|
520 |
|
|
|a This companion provides the most comprehensive and up-to-date comparative overview of the cyber-security strategies and doctrines of the major states and actors in Europe, North America, South America, Africa, and Asia. The volume offers an introduction to each nation's cyber-security strategy and policy, along with a list of resources in English that may be consulted for those wishing to go into greater depth. Each chapter is written by a leading academic or policy specialist, and contains the following sections: overview of national cyber-security strategy; concepts and definitions; exploration of cyber-security issues as they relate to international law and governance; critical examinations of cyber partners at home and abroad; legislative developments and processes; dimensions of cybercrime and cyberterrorism; implications of cyber-security policies and strategies. This book will be of much interest to students and practitioners in the fields of cyber-security, national security, strategic studies, foreign policy, and international relations.
|
505 |
0 |
|
|a Part I: Europe -- Securing the kingdom's cyberspace: cybersecurity and cyber intelligence in Spain -- Albania's cybersecurity pivot: between Western architectures and great power competition -- Armenian national policy in cyber space: toward a global cyber security architecture -- Czech Republic: a new cyber security leader in Central Europe -- Cyber security in the French Republic -- Germany's cybersecurity strategy: confronting future challeges -- Cybersecurity of Poland: legal and organizational framework -- Hungary's evolving cyber security strategyy -- Romanian cybersecurity efforts: a work in progress -- Italy's cyber security architecture and critical infrastructure -- Dutch cyber security strategy -- Norwegian cyber security: a small-state approach to building international cyber cooperation -- Seeking a new order for global cybersecurity: the Russian approach to cyber-sovereignty -- Slovakia: the Tatra Tiger without teeth -- Slovenia: a fragmented cyber security -- In the line of Russian Ukraine. hybrid warfare, and cybersecurity defense aggression: Ukraine, hybrid warfare, and cybersecurity defense -- United Kingdom: pragmatism and adaptability in the cyber realm -- European Union: policy, cohesion, and supranational experiences with cybersecurity -- Estonia: from the "Bronze Night" to cybersecurity pioneers -- NATO's evolving cyber security policy and strategy -- Part II: Asia and Australia -- Japan's challenges, capabilities, and preparedness in cyberspace -- An effective shield? Analyzing South Korea's cybersecurity strategy -- In the line of fire: Taiwan's legal, political, and technological cybersecurity posture -- Serving the people: China's cybersecurity policy and its implications -- Cybersecurity in a one-party state: policies and implications for Vietnam's economy and online freedom -- The Philippines' cybersecurity strategy: strengthening partnerships to enhance cybersecurity capability -- Malaysia: balancing national development, national security, and cybersecurity policy -- Cyber governance and data protection in India: a critical legal analysis -- Cybersecurity: a national priority in Bangledesh -- Managing a digital revolution: cyber security capacity building in Myanmar -- Australia's cyber security: a unique opportunity -- Singapore: a leading actor in ASEAN cybersecurity -- Part III: The Middle East -- Between multi-stakeholderism and cyber sovereignty: understanding Turkey's cybersecurity strategy -- Israel: cyber securitization as national trademark -- Palestinian territory occupied: cybersecurity at reduced sovereignty -- The "Silicon Valley of the Middle East": cybersecurity, Saudi Arabia, and the path to Vision 2030 -- The Islamic Republic of Iran's cyber security strategy: challenges in an era of cyber uncertainty -- Part IV: The Americas -- Canada's cyber security in a globalized environment: challenges and opportunities -- The United States: a declining hegemon in cyberspace? -- Jamaica's cybercrime and cyber-security: policies, laws, and strategies -- Mexico and cybersecurity: policies, challenges, and concerns -- Colombia's cybersecurity predicament: state making, strategic challenges, and cyberspace -- Cyber security governance in Brazil: keeping silos or building bridges? -- Part V: Africa -- Securitizing cyberspace in Egypt: the dilemma of cybersecurity and democracy -- Security through the Arab Winter: cyber strategies in postrevolutionary Tunisia -- Cyber security policy in Nigeria: a tool for national security and economic prosperity -- Cybersecurity in Ghana: past, present, and future -- Building a cyber fortress in Africa: Uganda's cyber security capacities and challenges -- Cybersecurity in South Africa: status, governance, and prospects -- Algorithms of oppression? AU's cybersecurity policy and its enforcement in Africa.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Cyberspace
|x Security measures
|x Government policy.
|
650 |
|
0 |
|a Cyberterrorism
|x Prevention
|x Government policy.
|
650 |
|
0 |
|a Computer crimes
|x Prevention
|x Government policy.
|
650 |
|
0 |
|a Computer security
|x Government policy.
|
650 |
|
0 |
|a Internet
|x Security measures
|x Government policy.
|
650 |
|
0 |
|a Computer networks
|x Security measures
|x Government policy.
|
650 |
|
6 |
|a Sécurité informatique
|x Politique gouvernementale.
|
650 |
|
6 |
|a Internet
|x Sécurité
|x Mesures
|x Politique gouvernementale.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures
|x Politique gouvernementale.
|
650 |
|
7 |
|a Computer networks
|x Security measures
|x Government policy.
|2 fast
|0 (OCoLC)fst00872344
|
650 |
|
7 |
|a Computer security
|x Government policy.
|2 fast
|0 (OCoLC)fst00872490
|
700 |
1 |
|
|a Romaniuk, Scott N.,
|e editor.
|
700 |
1 |
|
|a Manjikian, Mary,
|e editor.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780429680366/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL6415984
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 2622525
|
994 |
|
|
|a 92
|b IZTAP
|