Cyber warfare : how conflicts in cyberspace are challenging America and changing the world / Paul Rosenzweig.

By: Material type: TextTextSeries: Changing face of warPublication details: Santa Barbara, Calif. : Praeger, Description: xi, 290 pages ; 25 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9780313398957
  • 031339895X
  • 9780313398964
  • 0313398968
Other title:
  • How conflicts in cyberspace are challenging America and changing the world
Subject(s): DDC classification:
  • 355.4 23
LOC classification:
  • U163 .R68 2013
Contents:
The transformation of cyberspace and cyber conflict -- The nature of cyberspace -- Of viruses and vulnerabilities -- Nations in conflict -- Cyber war and the law -- Cyber-insurgency -- Protecting the web -- The fundamental problem of identity -- Cybercrime -- Cyber conflict and the constitution -- Dataveillance and cyber conflict -- Privacy for the cyber age -- No more secrets -- Encryption and wiretapping -- The devil in the system: hardware failures -- Enduring questions -- The economics of cybersecurity -- The role of government regulating the private sector -- Protecting America's critical infrastructure -- The organization of the US Government -- Challenging questions of policy and organization -- The "borderless" international Internet -- The future and beyond -- What the future holds -- Concluding thoughts.
Summary: This is a comprehensive and highly topical one-stop source for cyber conflict issues that provides scholarly treatment of the subject in a readable format. The book provides a level-headed, concrete analytical foundation for thinking about cybersecurity law and policy questions, covering the entire range of cyber issues in the 21st century, including topics such as malicious software, encryption, hardware intrusions, privacy and civil liberties concerns, and other interesting aspects of the problem. This book describes the nature of cyber threats, including the threat of cyber warfare. It also describes the policies and practices currently in place and proposes optimal responses to the challenges we face. The work should be considered essential reading for national and homeland security professionals as well as students and lay readers wanting to understand of the scope of our shared cybersecurity problem.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Copy number Status Date due Barcode
Books Books Odessa College Stacks 355.4 R816C (Browse shelf(Opens below)) 1 Available 51994001698085

Includes bibliographical references (pages 271-277) and index.

The transformation of cyberspace and cyber conflict -- The nature of cyberspace -- Of viruses and vulnerabilities -- Nations in conflict -- Cyber war and the law -- Cyber-insurgency -- Protecting the web -- The fundamental problem of identity -- Cybercrime -- Cyber conflict and the constitution -- Dataveillance and cyber conflict -- Privacy for the cyber age -- No more secrets -- Encryption and wiretapping -- The devil in the system: hardware failures -- Enduring questions -- The economics of cybersecurity -- The role of government regulating the private sector -- Protecting America's critical infrastructure -- The organization of the US Government -- Challenging questions of policy and organization -- The "borderless" international Internet -- The future and beyond -- What the future holds -- Concluding thoughts.

This is a comprehensive and highly topical one-stop source for cyber conflict issues that provides scholarly treatment of the subject in a readable format. The book provides a level-headed, concrete analytical foundation for thinking about cybersecurity law and policy questions, covering the entire range of cyber issues in the 21st century, including topics such as malicious software, encryption, hardware intrusions, privacy and civil liberties concerns, and other interesting aspects of the problem. This book describes the nature of cyber threats, including the threat of cyber warfare. It also describes the policies and practices currently in place and proposes optimal responses to the challenges we face. The work should be considered essential reading for national and homeland security professionals as well as students and lay readers wanting to understand of the scope of our shared cybersecurity problem.

There are no comments on this title.

to post a comment.