000 -LEADER |
fixed length control field |
a |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
250306b xxu||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781009308588 |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
363.325 |
Item number |
REV |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
Reveron, Derek S. |
245 ## - TITLE STATEMENT |
Title |
Security in the cyber age : an introduction to policy and technology |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Name of publisher, distributor, etc |
Cambridge University Press, |
Date of publication, distribution, etc |
2024 |
Place of publication, distribution, etc |
Cambridge : |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xviii, 393 p. ; |
Other physical details |
ill., |
Dimensions |
23 cm |
365 ## - TRADE PRICE |
Price amount |
26.99 |
Price type code |
£ |
Unit of pricing |
111.30 |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Includes bibliographical references and index. |
520 ## - SUMMARY, ETC. |
Summary, etc |
Cyberspace is essential for socializing, learning, shopping, and just about everything in modern life. Yet, there is also a dark side to cyberspace: sub-national, transnational, and international actors are challenging the ability of sovereign governments to provide a secure environment for their citizens. Criminal groups hold businesses and local governments hostage through ransomware, foreign intelligence services steal intellectual property and conduct influence operations, governments attempt to rewrite Internet protocols to facilitate censorship, and militaries prepare to use cyberspace operations in wars. Security in the Cyber Age breaks-down how cyberspace works, analyzes how state and non-state actors exploit vulnerabilities in cyberspace, and provides ways to improve cybersecurity. Written by a computer scientist and national security scholar-practitioner, the book offers technological, policy, and ethical ways to protect cyberspace. Its interdisciplinary approach and engaging style make the book accessible to the lay audience as well as computer science and political science students. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Cyberinfrastructure |
|
Topical term or geographic name as entry element |
Security measures |
|
Topical term or geographic name as entry element |
Cyberterrorism |
|
Topical term or geographic name as entry element |
Cyberterrorism Risk assessment |
|
Topical term or geographic name as entry element |
Informational works |
|
Topical term or geographic name as entry element |
Internet Security measures |
|
Topical term or geographic name as entry element |
ARPANET |
|
Topical term or geographic name as entry element |
Denial-of-service attacks |
|
Topical term or geographic name as entry element |
Internet governance |
700 ## - ADDED ENTRY--PERSONAL NAME |
Personal name |
Savage, John E. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Item type |
Books |