Cryptography's role in securing the information society [[electronic resource] /] / Kenneth W. Dam and Herbert S. Lin, editors
| Cryptography's role in securing the information society [[electronic resource] /] / Kenneth W. Dam and Herbert S. Lin, editors |
| Pubbl/distr/stampa | Washington, DC, : National Academy Press, 1996 |
| Descrizione fisica | 1 online resource (720 p.) |
| Disciplina | 652.8 |
| Altri autori (Persone) |
DamKenneth W
LinHerbert |
| Soggetto topico |
Telecommunication systems - Security measures - Government policy - United States
Cryptography |
| Soggetto genere / forma | Electronic books. |
| ISBN |
1-280-19228-3
9786610192281 0-309-52254-4 0-585-02525-8 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
""Front Matter""; ""Preface""; ""Contents""; ""Executive Summary""; ""PART I Framing the Policy Issues""; ""1 Growing Vulnerability in the Information Age""; ""2 Cryptography: Roles, Market, and Infrastructure""; ""3 Needs for Access to Encrypted Information""; ""4 Export Controls""; ""5 Escrowed Encryption and Related Issues""; ""6 Other Dimensions of National Cryptography Policy""; ""PART III Policy Options, Findings, and Recommendations""; ""7 Policy Options for the Future""; ""8 Synthesis, Findings, and Recommendations""
""A Contributors to the NRC Project on National Cryptography Policy""""B Glossary""; ""C A Brief Primer on Cryptography""; ""D An Overview of Electronic Surveillance: History and Current Status""; ""E A Brief History of Cryptography Policy""; ""F A Brief Primer on Intelligence""; ""G The International Scope of Cryptography Policy""; ""H Summary of Important Requirements for a Public-Key Infrastructure""; ""I Industry-Specific Dimensions of Security""; ""J Examples of Risks Posed by Unprotected Information""; ""K Cryptographic Applications Programming Interfaces"" ""L Other Looming Issues Related to Cryptography Policy""""M Federal Information Processing Standards""; ""N Laws, Documents, and Regulations, Relevant to Cryptography""; ""Index"" |
| Record Nr. | UNINA-9910456066803321 |
| Washington, DC, : National Academy Press, 1996 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Cryptography's role in securing the information society [[electronic resource] /] / Kenneth W. Dam and Herbert S. Lin, editors
| Cryptography's role in securing the information society [[electronic resource] /] / Kenneth W. Dam and Herbert S. Lin, editors |
| Pubbl/distr/stampa | Washington, DC, : National Academy Press, 1996 |
| Descrizione fisica | 1 online resource (720 p.) |
| Disciplina | 652.8 |
| Altri autori (Persone) |
DamKenneth W
LinHerbert |
| Soggetto topico |
Telecommunication systems - Security measures - Government policy - United States
Cryptography |
| ISBN |
0-309-17580-1
1-280-19228-3 9786610192281 0-309-52254-4 0-585-02525-8 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
""Front Matter""; ""Preface""; ""Contents""; ""Executive Summary""; ""PART I Framing the Policy Issues""; ""1 Growing Vulnerability in the Information Age""; ""2 Cryptography: Roles, Market, and Infrastructure""; ""3 Needs for Access to Encrypted Information""; ""4 Export Controls""; ""5 Escrowed Encryption and Related Issues""; ""6 Other Dimensions of National Cryptography Policy""; ""PART III Policy Options, Findings, and Recommendations""; ""7 Policy Options for the Future""; ""8 Synthesis, Findings, and Recommendations""
""A Contributors to the NRC Project on National Cryptography Policy""""B Glossary""; ""C A Brief Primer on Cryptography""; ""D An Overview of Electronic Surveillance: History and Current Status""; ""E A Brief History of Cryptography Policy""; ""F A Brief Primer on Intelligence""; ""G The International Scope of Cryptography Policy""; ""H Summary of Important Requirements for a Public-Key Infrastructure""; ""I Industry-Specific Dimensions of Security""; ""J Examples of Risks Posed by Unprotected Information""; ""K Cryptographic Applications Programming Interfaces"" ""L Other Looming Issues Related to Cryptography Policy""""M Federal Information Processing Standards""; ""N Laws, Documents, and Regulations, Relevant to Cryptography""; ""Index"" |
| Record Nr. | UNINA-9910778656903321 |
| Washington, DC, : National Academy Press, 1996 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities [[electronic resource] /] / William A. Owens, Kenneth W. Dam, and Herbert S. Lin, editors ; Committee on Offensive Information Warfare, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, National Reseach Council of the National Academies
| Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities [[electronic resource] /] / William A. Owens, Kenneth W. Dam, and Herbert S. Lin, editors ; Committee on Offensive Information Warfare, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, National Reseach Council of the National Academies |
| Pubbl/distr/stampa | Washington, DC, : National Academies Press, c2009 |
| Descrizione fisica | 1 online resource (390 p.) |
| Disciplina | 355.3/43 |
| Altri autori (Persone) |
DamKenneth W
LinHerbert OwensWilliam A. <1940-> |
| Soggetto topico |
Computer networks - Security measures - Government policy - United States
Computer networks - Security measures - United States Cyberspace - Security measures - United States Cyberterrorism - United States - Prevention Information warfare - United States |
| Soggetto genere / forma | Electronic books. |
| ISBN |
1-282-43723-2
9786612437236 0-309-13851-5 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910459068403321 |
| Washington, DC, : National Academies Press, c2009 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities [[electronic resource] /] / William A. Owens, Kenneth W. Dam, and Herbert S. Lin, editors ; Committee on Offensive Information Warfare, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, National Research Council of the National Academies
| Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities [[electronic resource] /] / William A. Owens, Kenneth W. Dam, and Herbert S. Lin, editors ; Committee on Offensive Information Warfare, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, National Research Council of the National Academies |
| Pubbl/distr/stampa | Washington, DC, : National Academies Press, c2009 |
| Descrizione fisica | 1 online resource (390 p.) |
| Disciplina | 355.3/43 |
| Altri autori (Persone) |
DamKenneth W
LinHerbert OwensWilliam A. <1940-> |
| Soggetto topico |
Computer networks - Security measures - Government policy - United States
Computer networks - Security measures - United States Cyberspace - Security measures - United States Cyberterrorism - United States - Prevention Information warfare - United States |
| ISBN |
1-282-43723-2
9786612437236 0-309-13851-5 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910792341703321 |
| Washington, DC, : National Academies Press, c2009 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities / / William A. Owens, Kenneth W. Dam, and Herbert S. Lin, editors ; Committee on Offensive Information Warfare, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, National Research Council of the National Academies
| Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities / / William A. Owens, Kenneth W. Dam, and Herbert S. Lin, editors ; Committee on Offensive Information Warfare, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, National Research Council of the National Academies |
| Edizione | [1st ed.] |
| Pubbl/distr/stampa | Washington, DC, : National Academies Press, c2009 |
| Descrizione fisica | 1 online resource (390 p.) |
| Disciplina | 355.3/43 |
| Altri autori (Persone) |
DamKenneth W
LinHerbert OwensWilliam A. <1940-> |
| Soggetto topico |
Computer networks - Security measures - Government policy - United States
Computer networks - Security measures - United States Cyberspace - Security measures - United States Cyberterrorism - United States - Prevention Information warfare - United States |
| ISBN |
9786612437236
9781282437234 1282437232 9780309138512 0309138515 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | FrontMatter -- Preface -- Acknowledgment of Reviewers -- Contents -- Synopsis -- 1 Overview, Findings, and Recommendations -- Part I: Framing and Basic Technology -- 2 Technical and Operational Considerations in Cyberattack and Cyberexploitation -- Part II: Mission and Institutional Perspectives -- 3 A Military Perspective on Cyberattack -- 4 An Intelligence Community Perspective on Cyberattack and Cyberexploitation -- 5 Perspectives on Cyberattack Outside National Security -- 6 Decision Making and Oversight -- Part III: Intellectual Tools for Understanding and Thinking About Cyberattack -- 7 Legal and Ethical Perspectives on Cyberattack -- 8 Insights from Related Areas -- 9 Speculations on the Dynamics of Cyberconflict -- 10 Alternative Futures -- Appendixes -- Appendix A: Biographies of Committee Members and Staff -- Appendix B: Meeting Participants and Other Contributors -- Appendix C: Illustrative Criminal Cyberattacks -- Appendix D: Views on the Use of Force in Cyberspace -- Appendix E: Technical Vulnerabilities Targeted by Cyber Offensive Actions. |
| Record Nr. | UNINA-9910963701403321 |
| Washington, DC, : National Academies Press, c2009 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||