libri scuola books Fumetti ebook dvd top ten sconti 0 Carrello


Torna Indietro

cornish paul (curatore) - the oxford handbook of cyber security
Zoom

The Oxford Handbook of Cyber Security




Disponibilità: Normalmente disponibile in 20 giorni
A causa di problematiche nell'approvvigionamento legate alla Brexit sono possibili ritardi nelle consegne.


PREZZO
245,98 €
NICEPRICE
233,68 €
SCONTO
5%



Questo prodotto usufruisce delle SPEDIZIONI GRATIS
selezionando l'opzione Corriere Veloce in fase di ordine.


Pagabile anche con Carta della cultura giovani e del merito, 18App Bonus Cultura e Carta del Docente


Facebook Twitter Aggiungi commento


Spese Gratis

Dettagli

Genere:Libro
Lingua: Inglese
Pubblicazione: 11/2021





Note Editore

Cyber security is concerned with the identification, avoidance, management and mitigation of risk in, or from, cyber space. The risk concerns harm and damage that might occur as the result of everything from individual carelessness, to organised criminality, to industrial and national security espionage and, at the extreme end of the scale, to disabling attacks against a country's critical national infrastructure. However, there is much more to cyber space than vulnerability, risk, and threat. Cyber space security is an issue of strategy, both commercial and technological, and whose breadth spans the international, regional, national, and personal. It is a matter of hazard and vulnerability, as much as an opportunity for social, economic and cultural growth. Consistent with this outlook, The Oxford Handbook of Cyber Security takes a comprehensive and rounded approach to the still evolving topic of cyber security. The structure of the Handbook is intended to demonstrate how the scope of cyber security is beyond threat, vulnerability, and conflict and how it manifests on many levels of human interaction. An understanding of cyber security requires us to think not just in terms of policy and strategy, but also in terms of technology, economy, sociology, criminology, trade, and morality. Accordingly, contributors to the Handbook include experts in cyber security from around the world, offering a wide range of perspectives: former government officials, private sector executives, technologists, political scientists, strategists, lawyers, criminologists, ethicists, security consultants, and policy analysts.




Sommario

1 - The Origins of Cyberspace
2 - Opportunity, Threat and Dependency in the Social Infosphere
3 - A Political History of Cyberspace
4 - Cyber Power in International Relations
5 - Ethical Standards and 'Communication' Technologies
6 - Cybercrime: Thieves, Swindlers, Bandits and Privateers in Cyberspace
7 - Making Sense of Cybersecurity in Emerging Technology Areas
8 - Assessing Harm from Cyber Crime
9 - Toward a Vulnerability Mitigation Model.
10 - Managing Risk: Terrorism, Violent Extremism and Anti-Democratic Tendencies in the Digital Space
11 - Cyberweapons
12 - Intentions and Cyberterrorism
13 - Technology: Access and Denial
14 - Cyber Espionage
15 - Cyberwar Redux
16 - On Cyber-Enabled Information Warfare and Information Operations
17 - The Deterrence and Prevention of Cyber Conflict
18 - Stepping out of the Shadow: Computer Security Incident Response Teams in the Cybersecurity Ecosystem
19 - Cybersecurity Information Sharing: Voluntary Beginnings and a Mandatory Future
20 - Data Privacy and Security Law
21 - The Insider Threat and the Insider Advocate
22 - Personal Protection: Cyber Hygiene
23 - Online Child Safety
24 - Educating for Cyber Security
25 - Cyber Security, Human Rights and Empiricism: The Case of Digital Surveillance
26 - Securing the Critical National Infrastructure
27 - The Role of Defence in National Cyber Security
28 - Cyber Security Capacity Building
29 - Cyber Security, Multilateral Export Control, and Standard Setting Arrangements
30 - Cyber Security, Global Commerce, and International Organisations
31 - Global Trade and Cyber Security: Monitoring, Enforcement, and Sanctions
32 - Semi-Formal Diplomacy: Track 1.5 and Track 2
33 - States, Proxies, and (Remote) Offensive Cyber Operations
34 - Getting Beyond Norms: When Violating the Agreement Becomes Customary Practice
35 - International Law for Cyber Space: Competition and Conflict
36 - Community of Common Future in Cyberspace: The Proposal and Practice of China
37 - Look West or Look Easta India at the Crossroads of Cyberspace
38 - Cybersecurity in Israel: Organisation and Future Challenges
39 - The Evolving Concept of the Japanese Security Strategy
40 - Contextualizing Malaysia's Cybersecurity Agenda
41 - The Russian Federation s Approach to Cyber Security
42 - Rethinking the Governance of Technology in the Digital Age
43 - Maturing Autonomous Cyber Weapons Systems: Implications for International Cyber Security and Autonomous Weapons Systems Regimes
44 - The Future Human and Behavioural Challenges of Cyber Security
45 - The Future of Democratic Civil Societies in a Post-Western Cybered Era
46 - Future Normative Challenges
47 - Cybersecurity' and 'Development': Contested Futures
48 - Project Solarium 1953 and the Cyberspace Solarium Commission 2019




Autore

Paul Cornish was educated at St Andrews, LSE, and Cambridge Universities. He has served in the British Army and the Foreign and Commonwealth Office, and has worked at research institutes including Chatham House, the UK Defence Academy, the Centre for Defence Studies (King's College London), RAND Europe, and the Universities of Cambridge, Bath, and Exeter. His work covers international security, national strategy, arms control, the ethics of armed force, civil-military relations and cyber security. He was Co-Director of the Cyber Security Capacity Building Centre at Oxford University, 2013-18, and Professorial Fellow at the Australian National University, 2017. He is Visiting Professor at LSE IDEAS, London School of Economics.










Altre Informazioni

ISBN:

9780198800682

Condizione: Nuovo
Collana: Oxford Handbooks
Dimensioni: 252 x 59.0 x 176 mm Ø 1672 gr
Formato: Copertina rigida
Pagine Arabe: 890


Dicono di noi