Cryptography's role in securing the information society [[electronic resource] /] / Kenneth W. Dam and Herbert S. Lin, editors |
Pubbl/distr/stampa | Washington, DC, : National Academy Press, 1996 |
Descrizione fisica | 1 online resource (720 p.) |
Disciplina | 652.8 |
Altri autori (Persone) |
DamKenneth W
LinHerbert |
Soggetto topico |
Telecommunication systems - Security measures - Government policy - United States
Cryptography |
Soggetto genere / forma | Electronic books. |
ISBN |
1-280-19228-3
9786610192281 0-309-52254-4 0-585-02525-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
""Front Matter""; ""Preface""; ""Contents""; ""Executive Summary""; ""PART I Framing the Policy Issues""; ""1 Growing Vulnerability in the Information Age""; ""2 Cryptography: Roles, Market, and Infrastructure""; ""3 Needs for Access to Encrypted Information""; ""4 Export Controls""; ""5 Escrowed Encryption and Related Issues""; ""6 Other Dimensions of National Cryptography Policy""; ""PART III Policy Options, Findings, and Recommendations""; ""7 Policy Options for the Future""; ""8 Synthesis, Findings, and Recommendations""
""A Contributors to the NRC Project on National Cryptography Policy""""B Glossary""; ""C A Brief Primer on Cryptography""; ""D An Overview of Electronic Surveillance: History and Current Status""; ""E A Brief History of Cryptography Policy""; ""F A Brief Primer on Intelligence""; ""G The International Scope of Cryptography Policy""; ""H Summary of Important Requirements for a Public-Key Infrastructure""; ""I Industry-Specific Dimensions of Security""; ""J Examples of Risks Posed by Unprotected Information""; ""K Cryptographic Applications Programming Interfaces"" ""L Other Looming Issues Related to Cryptography Policy""""M Federal Information Processing Standards""; ""N Laws, Documents, and Regulations, Relevant to Cryptography""; ""Index"" |
Record Nr. | UNINA-9910456066803321 |
Washington, DC, : National Academy Press, 1996 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cryptography's role in securing the information society [[electronic resource] /] / Kenneth W. Dam and Herbert S. Lin, editors |
Pubbl/distr/stampa | Washington, DC, : National Academy Press, 1996 |
Descrizione fisica | 1 online resource (720 p.) |
Disciplina | 652.8 |
Altri autori (Persone) |
DamKenneth W
LinHerbert |
Soggetto topico |
Telecommunication systems - Security measures - Government policy - United States
Cryptography |
ISBN |
0-309-17580-1
1-280-19228-3 9786610192281 0-309-52254-4 0-585-02525-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
""Front Matter""; ""Preface""; ""Contents""; ""Executive Summary""; ""PART I Framing the Policy Issues""; ""1 Growing Vulnerability in the Information Age""; ""2 Cryptography: Roles, Market, and Infrastructure""; ""3 Needs for Access to Encrypted Information""; ""4 Export Controls""; ""5 Escrowed Encryption and Related Issues""; ""6 Other Dimensions of National Cryptography Policy""; ""PART III Policy Options, Findings, and Recommendations""; ""7 Policy Options for the Future""; ""8 Synthesis, Findings, and Recommendations""
""A Contributors to the NRC Project on National Cryptography Policy""""B Glossary""; ""C A Brief Primer on Cryptography""; ""D An Overview of Electronic Surveillance: History and Current Status""; ""E A Brief History of Cryptography Policy""; ""F A Brief Primer on Intelligence""; ""G The International Scope of Cryptography Policy""; ""H Summary of Important Requirements for a Public-Key Infrastructure""; ""I Industry-Specific Dimensions of Security""; ""J Examples of Risks Posed by Unprotected Information""; ""K Cryptographic Applications Programming Interfaces"" ""L Other Looming Issues Related to Cryptography Policy""""M Federal Information Processing Standards""; ""N Laws, Documents, and Regulations, Relevant to Cryptography""; ""Index"" |
Record Nr. | UNINA-9910778656903321 |
Washington, DC, : National Academy Press, 1996 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cryptography's role in securing the information society / / Kenneth W. Dam and Herbert S. Lin, editors |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Washington, DC, : National Academy Press, 1996 |
Descrizione fisica | 1 online resource (720 p.) |
Disciplina | 652.8 |
Altri autori (Persone) |
DamKenneth W
LinHerbert |
Soggetto topico |
Telecommunication systems - Security measures - Government policy - United States
Cryptography |
ISBN |
0-309-17580-1
1-280-19228-3 9786610192281 0-309-52254-4 0-585-02525-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
""Front Matter""; ""Preface""; ""Contents""; ""Executive Summary""; ""PART I Framing the Policy Issues""; ""1 Growing Vulnerability in the Information Age""; ""2 Cryptography: Roles, Market, and Infrastructure""; ""3 Needs for Access to Encrypted Information""; ""4 Export Controls""; ""5 Escrowed Encryption and Related Issues""; ""6 Other Dimensions of National Cryptography Policy""; ""PART III Policy Options, Findings, and Recommendations""; ""7 Policy Options for the Future""; ""8 Synthesis, Findings, and Recommendations""
""A Contributors to the NRC Project on National Cryptography Policy""""B Glossary""; ""C A Brief Primer on Cryptography""; ""D An Overview of Electronic Surveillance: History and Current Status""; ""E A Brief History of Cryptography Policy""; ""F A Brief Primer on Intelligence""; ""G The International Scope of Cryptography Policy""; ""H Summary of Important Requirements for a Public-Key Infrastructure""; ""I Industry-Specific Dimensions of Security""; ""J Examples of Risks Posed by Unprotected Information""; ""K Cryptographic Applications Programming Interfaces"" ""L Other Looming Issues Related to Cryptography Policy""""M Federal Information Processing Standards""; ""N Laws, Documents, and Regulations, Relevant to Cryptography""; ""Index"" |
Record Nr. | UNINA-9910827543503321 |
Washington, DC, : National Academy Press, 1996 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities [[electronic resource] /] / William A. Owens, Kenneth W. Dam, and Herbert S. Lin, editors ; Committee on Offensive Information Warfare, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, National Reseach Council of the National Academies |
Pubbl/distr/stampa | Washington, DC, : National Academies Press, c2009 |
Descrizione fisica | 1 online resource (390 p.) |
Disciplina | 355.3/43 |
Altri autori (Persone) |
DamKenneth W
LinHerbert OwensWilliam A. <1940-> |
Soggetto topico |
Computer networks - Security measures - Government policy - United States
Computer networks - Security measures - United States Cyberspace - Security measures - United States Cyberterrorism - United States - Prevention Information warfare - United States |
Soggetto genere / forma | Electronic books. |
ISBN |
1-282-43723-2
9786612437236 0-309-13851-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910459068403321 |
Washington, DC, : National Academies Press, c2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities [[electronic resource] /] / William A. Owens, Kenneth W. Dam, and Herbert S. Lin, editors ; Committee on Offensive Information Warfare, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, National Research Council of the National Academies |
Pubbl/distr/stampa | Washington, DC, : National Academies Press, c2009 |
Descrizione fisica | 1 online resource (390 p.) |
Disciplina | 355.3/43 |
Altri autori (Persone) |
DamKenneth W
LinHerbert OwensWilliam A. <1940-> |
Soggetto topico |
Computer networks - Security measures - Government policy - United States
Computer networks - Security measures - United States Cyberspace - Security measures - United States Cyberterrorism - United States - Prevention Information warfare - United States |
ISBN |
1-282-43723-2
9786612437236 0-309-13851-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910792341703321 |
Washington, DC, : National Academies Press, c2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities / / William A. Owens, Kenneth W. Dam, and Herbert S. Lin, editors ; Committee on Offensive Information Warfare, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, National Research Council of the National Academies |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Washington, DC, : National Academies Press, c2009 |
Descrizione fisica | 1 online resource (390 p.) |
Disciplina | 355.3/43 |
Altri autori (Persone) |
DamKenneth W
LinHerbert OwensWilliam A. <1940-> |
Soggetto topico |
Computer networks - Security measures - Government policy - United States
Computer networks - Security measures - United States Cyberspace - Security measures - United States Cyberterrorism - United States - Prevention Information warfare - United States |
ISBN |
1-282-43723-2
9786612437236 0-309-13851-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | FrontMatter -- Preface -- Acknowledgment of Reviewers -- Contents -- Synopsis -- 1 Overview, Findings, and Recommendations -- Part I: Framing and Basic Technology -- 2 Technical and Operational Considerations in Cyberattack and Cyberexploitation -- Part II: Mission and Institutional Perspectives -- 3 A Military Perspective on Cyberattack -- 4 An Intelligence Community Perspective on Cyberattack and Cyberexploitation -- 5 Perspectives on Cyberattack Outside National Security -- 6 Decision Making and Oversight -- Part III: Intellectual Tools for Understanding and Thinking About Cyberattack -- 7 Legal and Ethical Perspectives on Cyberattack -- 8 Insights from Related Areas -- 9 Speculations on the Dynamics of Cyberconflict -- 10 Alternative Futures -- Appendixes -- Appendix A: Biographies of Committee Members and Staff -- Appendix B: Meeting Participants and Other Contributors -- Appendix C: Illustrative Criminal Cyberattacks -- Appendix D: Views on the Use of Force in Cyberspace -- Appendix E: Technical Vulnerabilities Targeted by Cyber Offensive Actions. |
Record Nr. | UNINA-9910810215403321 |
Washington, DC, : National Academies Press, c2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|