LEADER 02380nam 2200553 450 001 9910794891003321 005 20170919195653.0 010 $a1-4422-5522-6 035 $a(CKB)4330000000011003 035 $a(SSID)ssj0001653025 035 $a(PQKBManifestationID)16426711 035 $a(PQKBTitleCode)TC0001653025 035 $a(PQKBWorkID)14961786 035 $a(PQKB)10692714 035 $a(PQKBManifestationID)16402504 035 $a(PQKBWorkID)14961787 035 $a(PQKB)23320194 035 $a(MiAaPQ)EBC4503874 035 $a(DLC) 2016016849 035 $a(EXLCZ)994330000000011003 100 $a20160505h20162016 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt 182 $cc 183 $acr 200 10$aHacked $ethe inside story of America's struggle to secure cyberspace /$fCharlie Mitchell 210 1$aLanham, Maryland :$cRowman & Littlefield,$d2016. 210 4$dİ2016 215 $a1 online resource (253 pages) 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a1-4422-5521-8 320 $aIncludes bibliographical references and index. 327 $a"Carry out our demand if you want to escape us" -- The first cyber president -- Sirens on Capitol Hill -- To build a framework -- The department of insecurity -- The telecom challenge -- The FTC, "protecting America's consumers" -- Fear and failure, again, on Capitol Hill -- The information-sharing matrix -- A new congress brings a new energy to cyber debate -- The promise and peril of "strong encryption" -- Cyber tensions define the U.S.-China relationship -- Help wanted, desperately, for cybersecurity -- Senate debate takes shape, then "surprise!" stalls -- At long last, the political system arrives at an answer -- The unfinished journey. 606 $aInternet$xGovernment policy$zUnited States 606 $aComputer security$xGovernment policy$zUnited States 606 $aCyber intelligence (Computer security) 615 0$aInternet$xGovernment policy 615 0$aComputer security$xGovernment policy 615 0$aCyber intelligence (Computer security) 676 $a384.30973 700 $aMitchell$b Charlie$f1962-$01558482 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910794891003321 996 $aHacked$93822884 997 $aUNINA