Amazon cover image
Image from Amazon.com

A vulnerable system the history of information security in the computer age Andrew J. Stewart

By: Material type: TextTextDescription: 1 online resource (viii, 299 pages)Content type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9781501759055
  • 9781501759048
Subject(s): Genre/Form: LOC classification:
  • QA76 .V856 2021
Online resources: Available additional physical forms:
Contents:
A "New Dimension" for the Security of Information -- The Promise, Success, and Failure of the Early Researchers -- The Creation of the Internet and the Web, and a Dark Portent -- The Dot-Com Boom and the Genesis of a Lucrative Feedback Loop -- Software Security and the "Hamster Wheel of Pain" -- Usable Security, Economics, and Psychology -- Vulnerability Disclosure, Bounties, and Markets -- Data Breaches, Nation-State Hacking, and Epistemic Closure -- The Wicked Nature of Information Security -- Epilogue : The Past, Present, and a Possible Future
Subject: "This book delivers a long view of the history of information security, beginning with the creation of the first digital computers"--
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number URL Status Date due Barcode
Online Book (LOGIN USING YOUR MY CIU LOGIN AND PASSWORD) Online Book (LOGIN USING YOUR MY CIU LOGIN AND PASSWORD) G. Allen Fleece Library ONLINE Non-fiction QA76.9.25 (Browse shelf(Opens below)) Link to resource Available on1243906022

Introduction : Three Stigmata -- A "New Dimension" for the Security of Information -- The Promise, Success, and Failure of the Early Researchers -- The Creation of the Internet and the Web, and a Dark Portent -- The Dot-Com Boom and the Genesis of a Lucrative Feedback Loop -- Software Security and the "Hamster Wheel of Pain" -- Usable Security, Economics, and Psychology -- Vulnerability Disclosure, Bounties, and Markets -- Data Breaches, Nation-State Hacking, and Epistemic Closure -- The Wicked Nature of Information Security -- Epilogue : The Past, Present, and a Possible Future

"This book delivers a long view of the history of information security, beginning with the creation of the first digital computers"--

COPYRIGHT NOT covered - Click this link to request copyright permission:

https://lib.ciu.edu/copyright-request-form

There are no comments on this title.

to post a comment.