000 | 06313cam a2200457Ii 4500 | ||
---|---|---|---|
001 | ocn864907720 | ||
003 | OCoLC | ||
005 | 20240726105434.0 | ||
008 | 131210t20142014nyua ob 001 0 eng d | ||
040 |
_aNT _beng _erda _epn _cNT _dE7B _dYDXCP _dCCO _dNT _dOCLCO _dOCLCQ _dIDEBK _dEBLCP _dMHW _dMEAUC _dAUD _dDEBSZ _dMOR _dZ5A _dMERUC _dOCLCQ _dSAV _dOCLCA _dZEM _dOCLCA _dBAL _dUUM _dYDX _dCEF _dOCLCQ _dINT _dSTF _dOCLCQ _dWYU _dTKN _dAGLDB _dOCL _dG3B _dIGB _dAUW _dBTN _dINTCL _dSNK _dDKC _dOCLCQ _dNJT _dOCLCQ _dTFW |
||
020 |
_a9780199918102 _q((electronic)l(electronic)ctronic) |
||
020 | _a9781306081993 | ||
043 | _an-us--- | ||
050 | 0 | 4 |
_aQA76 _b.C934 2014 |
049 | _aMAIN | ||
100 | 1 |
_aSinger, P. W. _q(Peter Warren), _e1 |
|
245 | 1 | 0 |
_aCybersecurity and cyberwar : _bwhat everyone needs to know / _cP.W. Singer and Allan Friedman. |
260 |
_aOxford : _bOxford University Press, _c(c)2014. |
||
300 |
_a1 online resource (iii, 306 pages) : _billustrations |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_adata file _2rda |
||
490 | 1 | _aWhat everyone needs to know | |
504 | _a2 | ||
505 | 0 | 0 |
_aINTRODUCTION -- _tWhy Write a Book about Cybersecurity and Cyberwar? -- _tWhy Is There a Cybersecurity Knowledge Gap, and Why Does It Matter? -- _tHow Did You Write the Book and What Do You Hope to Accomplish? -- _tPART I HOW IT ALL WORKS -- _tThe World Wide What? Defining Cyberspace -- _tWhere Did This "Cyber Stuff" Come from Anyway? A Short History of the Internet -- _tHow Does the Internet Actually Work? -- _tWho Runs It? Understanding Internet Governance -- _tOn the Internet, How Do They Know Whether You Are a Dog? Identity and Authentication -- _tWhat Do We Mean by "Security" Anyway? -- _tWhat Are the Threats? -- _tOne Phish, Two Phish, Red Phish, Cyber Phish: What Are Vulnerabilities? -- _tHow Do We Trust in Cyberspace? -- _tFocus: What Happened in WikiLeaks? -- _tWhat Is an Advanced Persistent Threat (APT)? -- _tHow Do We Keep the Bad Guys Out? The Basics of Computer Defense -- _tWho Is the Weakest Link? Human Factors -- _tPART II WHY IT MATTERS -- _tWhat Is the Meaning of Cyberattack? The Importance of Terms and Frameworks -- _tWhodunit? The Problem of Attribution -- _tWhat Is Hactivism? -- _tFocus: Who Is Anonymous? -- _tThe Crimes of Tomorrow, Today: What Is Cybercrime? -- _tShady RATs and Cyberspies: What Is Cyber Espionage? -- _tHow Afraid Should We Be of Cyberterrorism? -- _tSo How Do Terrorists Actually Use the Web? -- _tWhat about Cyber Counterterrorism? -- _tSecurity Risk or Human Right? Foreign Policy and the Internet -- _tFocus: What Is Tor and Why Does Peeling Back the Onion Matter? -- _tWho Are Patriotic Hackers? -- _tFocus: What Was Stuxnet? -- _tWhat Is the Hidden Lesson of Stuxnet? The Ethics of Cyberweapons -- _t"Cyberwar, Ugh, What Are Zeros and Ones Good For?": Defining Cyberwar -- _tA War by Any Other Name? The Legal Side of Cyber Conflict -- _tWhat Might a "Cyberwar" Actually Look Like? Computer Network Operations -- _tFocus: What Is the US Military Approach to Cyberwar? -- _tFocus: What Is the Chinese Approach to Cyberwar? -- _tWhat about Deterrence in an Era of Cyberwar? -- _tWhy Is Threat Assessment So Hard in Cyberspace? -- _tDoes the Cybersecurity World Favor the Weak or the Strong? -- _tWho Has the Advantage, the Offense or the Defense? -- _tA New Kind of Arms Race: What Are the Dangers of Cyber Proliferation? -- _tAre There Lessons from Past Arms Races? -- _tBehind the Scenes: Is There a Cyber-Industrial Complex? -- _tPART III WHAT CAN WE DO? -- _tDon't Get Fooled: Why Can't We Just Build a New, More Secure Internet? -- _tRethink Security: What Is Resilience, and Why Is It Important? -- _tReframe the Problem (and the Solution): What Can We Learn from Public Health? -- _tLearn from History: What Can (Real) Pirates Teach Us about Cybersecurity? -- _tProtect World Wide Governance for the World Wide Web: What Is the Role of International Institutions? -- _t"Graft" the Rule of Law: Do We Need a Cyberspace Treaty? -- _tUnderstand the Limits of the State in Cyberspace: Why Can't the Government Handle It? -- _tRethink Government's Role: How Can We Better Organize for Cybersecurity? -- _tApproach It as a Public-Private Problem: How Do We Better Coordinate Defense? -- _tExercise Is Good for You: How Can We Better Prepare for Cyber Incidents? -- _tBuild Cybersecurity Incentives: Why Should I Do What You Want? -- _tLearn to Share: How Can We Better Collaborate on Information? -- _tDemand Disclosure: What Is the Role of Transparency? -- _tGet "Vigorous" about Responsibility: How Can We Create Accountability for Security? -- _tFind the IT Crowd: How Do We Solve the Cyber People Problem? Do Your Part: How Can I Protect Myself (and the Internet)? -- _tCONCLUSIONS -- _tWhere Is Cybersecurity Headed Next? -- _tWhat Do I Really Need to Know in the End? -- _tACKNOWLEDGMENTS -- _tNOTES -- _tGLOSSARY -- _tINDEX. |
520 | 0 | _aA generation ago, ""cyberspace"" was just a term from science fiction, used to describe the nascent network of computers linking a few university labs. Today, our entire modern way of life, from communication to commerce to conflict, fundamentally depends on the Internet. And the cybersecurity issues that result challenge literally everyone: politicians wrestling with everything from cybercrime to online freedom; generals protecting the nation from new forms of attack, while planning new cyberwars; business executives defending firms from once unimaginable threats, and looking to make money of. | |
530 |
_a2 _ub |
||
650 | 0 |
_aComputer security _zUnited States. |
|
650 | 0 |
_aComputer networks _xSecurity measures _zUnited States. |
|
650 | 0 |
_aCyberspace _xSecurity measures _zUnited States. |
|
650 | 0 |
_aCyberterrorism _zUnited States _xPrevention. |
|
650 | 0 |
_aInformation warfare _zUnited States _xPrevention. |
|
650 | 0 | _aCyberspace operations (Military science) | |
655 | 1 | _aElectronic Books. | |
700 | 1 | _aFriedman, Allan. | |
856 | 4 | 0 |
_uhttps://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=657629&site=eds-live&custid=s3260518 _zClick to access digital title | log in using your CIU ID number and my.ciu.edu password |
942 |
_cOB _D _eEB _hQA.. _m2014 _QOL _R _x _8NFIC _2LOC |
||
994 |
_a92 _bNT |
||
999 |
_c100404 _d100404 |
||
902 |
_a1 _bCynthia Snell _c1 _dCynthia Snell |