A vulnerable system the history of information security in the computer age Andrew J. Stewart
Material type: TextDescription: 1 online resource (viii, 299 pages)Content type:- text
- computer
- online resource
- 9781501759055
- 9781501759048
- QA76 .V856 2021
- COPYRIGHT NOT covered - Click this link to request copyright permission: https://lib.ciu.edu/copyright-request-form
Item type | Current library | Collection | Call number | URL | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|
Online Book (LOGIN USING YOUR MY CIU LOGIN AND PASSWORD) | G. Allen Fleece Library ONLINE | Non-fiction | QA76.9.25 (Browse shelf(Opens below)) | Link to resource | Available | on1243906022 |
Browsing G. Allen Fleece Library shelves, Shelving location: ONLINE, Collection: Non-fiction Close shelf browser (Hides shelf browser)
Introduction : Three Stigmata -- A "New Dimension" for the Security of Information -- The Promise, Success, and Failure of the Early Researchers -- The Creation of the Internet and the Web, and a Dark Portent -- The Dot-Com Boom and the Genesis of a Lucrative Feedback Loop -- Software Security and the "Hamster Wheel of Pain" -- Usable Security, Economics, and Psychology -- Vulnerability Disclosure, Bounties, and Markets -- Data Breaches, Nation-State Hacking, and Epistemic Closure -- The Wicked Nature of Information Security -- Epilogue : The Past, Present, and a Possible Future
"This book delivers a long view of the history of information security, beginning with the creation of the first digital computers"--
COPYRIGHT NOT covered - Click this link to request copyright permission:
There are no comments on this title.