|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
EBSCO_ocn183601162 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
071213s2008 enk ob 001 0 eng d |
040 |
|
|
|a N$T
|b eng
|e pn
|c N$T
|d YDXCP
|d BUF
|d OCLCQ
|d OSU
|d CDX
|d IDEBK
|d E7B
|d OCLCQ
|d REDDC
|d OCLCQ
|d TYFRS
|d DEBSZ
|d OCLCQ
|d OTZ
|d OCLCQ
|d OCLCA
|d OCLCF
|d OCLCQ
|d U3W
|d UKAHL
|d OCLCQ
|d UWK
|d K6U
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCQ
|d ALSTP
|d SFB
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 213384458
|a 243828301
|a 648328857
|a 1086490011
|
020 |
|
|
|a 0203937414
|q (electronic bk.)
|
020 |
|
|
|a 9780203937419
|q (electronic bk.)
|
020 |
|
|
|z 0415429811
|
020 |
|
|
|z 9780415429818
|
029 |
1 |
|
|a AU@
|b 000055618926
|
029 |
1 |
|
|a CDX
|b 7436011
|
029 |
1 |
|
|a DEBSZ
|b 430457995
|
035 |
|
|
|a (OCoLC)183601162
|z (OCoLC)213384458
|z (OCoLC)243828301
|z (OCoLC)648328857
|z (OCoLC)1086490011
|
043 |
|
|
|a n-us---
|
050 |
|
4 |
|a QA76.9.A25
|b D87 2008eb
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Dunn Cavelty, Myriam.
|
245 |
1 |
0 |
|a Cyber-security and threat politics :
|b US efforts to secure the information age /
|c Myriam Dunn Cavelty.
|
260 |
|
|
|a Milton Park, Abingdon, Oxon ;
|a New York :
|b Routledge,
|c 2008.
|
300 |
|
|
|a 1 online resource (ix, 182 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a CSS studies in security and international relations
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a Introduction -- The information age and cyber-threats : shifting meanings and interpretations -- Politics and threat construction : theoretical underpinnings -- The hostile intelligence threat, data security, and encryption set the stage -- Asymmetric vulnerabilities and the double-edged sword of information warfare : developments in the military domain -- Critical infrastructures and homeland security -- Securing the information age : failed securitisation or a new logic of security? -- Cyber-threats and security in the information age : issues and implications.
|
588 |
0 |
|
|a Print version record.
|
520 |
|
|
|a This book explores the political process behind the construction of cyber-threats as one of the quintessential security threats of modern times in the US. Myriam Dunn Cavelty posits that cyber-threats are definable by their unsubstantiated nature. Despite this, they have been propelled to the forefront of the political agenda. Using an innovative theoretical approach, this book examines how, under what conditions, by whom, for what reasons, and with what impact cyber-threats have been moved on to the political agenda. In particular, it analyses how governments have used threat frames,
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Computer security
|z United States.
|
650 |
|
0 |
|a Computer security
|x Government policy
|z United States.
|
650 |
|
0 |
|a Threats
|x Government policy
|z United States.
|
650 |
|
0 |
|a Computer networks
|x Security measures
|z United States.
|
650 |
|
0 |
|a National security
|z United States.
|
650 |
|
6 |
|a Sécurité informatique
|z États-Unis.
|
650 |
|
6 |
|a Sécurité informatique
|x Politique gouvernementale
|z États-Unis.
|
650 |
|
6 |
|a Menaces
|x Politique gouvernementale
|z États-Unis.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures
|z États-Unis.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Computer security
|x Government policy
|2 fast
|
650 |
|
7 |
|a National security
|2 fast
|
651 |
|
7 |
|a United States
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a Dunn Cavelty, Myriam.
|t Cyber-security and threat politics.
|d Milton Park, Abingdon, Oxon ; New York : Routledge, 2007
|z 9780415429818
|w (DLC) 2007022679
|w (OCoLC)137331503
|
830 |
|
0 |
|a CSS studies in security and international relations.
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=213328
|z Texto completo
|
938 |
|
|
|a Alexander Street
|b ALSP
|n ASP3914570/secu
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH24518990
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH24518991
|
938 |
|
|
|a Coutts Information Services
|b COUT
|n 7436011
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10205512
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 213328
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n 106390
|
938 |
|
|
|a Taylor & Francis
|b TAFR
|n 9780203937419
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 2745009
|
994 |
|
|
|a 92
|b IZTAP
|