Security in the cyber age : an introduction to policy and technology (Record no. 33626)

000 -LEADER
fixed length control field a
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250306b xxu||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781009308588
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 363.325
Item number REV
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Reveron, Derek S.
245 ## - TITLE STATEMENT
Title Security in the cyber age : an introduction to policy and technology
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Name of publisher, distributor, etc Cambridge University Press,
Date of publication, distribution, etc 2024
Place of publication, distribution, etc Cambridge :
300 ## - PHYSICAL DESCRIPTION
Extent xviii, 393 p. ;
Other physical details ill.,
Dimensions 23 cm
365 ## - TRADE PRICE
Price amount 26.99
Price type code £
Unit of pricing 111.30
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
520 ## - SUMMARY, ETC.
Summary, etc Cyberspace is essential for socializing, learning, shopping, and just about everything in modern life. Yet, there is also a dark side to cyberspace: sub-national, transnational, and international actors are challenging the ability of sovereign governments to provide a secure environment for their citizens. Criminal groups hold businesses and local governments hostage through ransomware, foreign intelligence services steal intellectual property and conduct influence operations, governments attempt to rewrite Internet protocols to facilitate censorship, and militaries prepare to use cyberspace operations in wars. Security in the Cyber Age breaks-down how cyberspace works, analyzes how state and non-state actors exploit vulnerabilities in cyberspace, and provides ways to improve cybersecurity. Written by a computer scientist and national security scholar-practitioner, the book offers technological, policy, and ethical ways to protect cyberspace. Its interdisciplinary approach and engaging style make the book accessible to the lay audience as well as computer science and political science students.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cyberinfrastructure
Topical term or geographic name as entry element Security measures
Topical term or geographic name as entry element Cyberterrorism
Topical term or geographic name as entry element Cyberterrorism Risk assessment
Topical term or geographic name as entry element Informational works
Topical term or geographic name as entry element Internet Security measures
Topical term or geographic name as entry element ARPANET
Topical term or geographic name as entry element Denial-of-service attacks
Topical term or geographic name as entry element Internet governance
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Savage, John E.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent location Current location Date acquired Source of acquisition Cost, normal purchase price Full call number Barcode Date last seen Koha item type
          DAU DAU 2025-02-21 KBD 3003.99 363.325 REV 035233 2025-03-06 Books

Powered by Koha