top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Cyber insecurity : navigating the perils of the next information age / / edited by Richard M. Harrison and Trey Herr
Cyber insecurity : navigating the perils of the next information age / / edited by Richard M. Harrison and Trey Herr
Pubbl/distr/stampa Lanham ; London : , : Rowman & Littlefield, , 2016
Descrizione fisica 1 online resource (xx, 392 pages)
Disciplina 364.4
Soggetto topico computer crime
information security
fight against crime
Internet
electronic commerce
Computer crimes - Prevention
Computer security
Cyberterrorism - Prevention
Telecommunication - Security measures
Internet governance
ISBN 1-4422-7285-6
Classificazione 32.24.56
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Foreword / Honorable Richard J. Danzig -- Introduction / Trey Herr and Richard M. Harrison -- Section I: Securing Data, Devices, and Networks. Understanding information assurance / Eric Ormes and Trey Herr -- A path to collective security: information sharing at the state and local level / David Weinstein -- Protecting industrial control systems in critical infrastructure / Robert M. Lee -- Safety at any speed: the roads ahead for automotive cyber safety policy / Joshua Corman and Beau Woods -- Bad code: exploring liability in software development / Jane Chong -- Section II: Combating Cyber Crime. Understanding cyber crime / Sasha Romanosky and Trey Herr -- Disrupting malware markets / Trey Herr and Ryan Ellis -- The Computer Fraud and Abuse Act: structure, controversies, and proposals for reform / Paul Ohm -- Breach notification laws: the policy and practice / Sasha Romanosky -- Cyber insurance: a market-based approach to information assurance / Robert Morgus -- Section III: Governing the Security of the Internet. Understanding internet security governance / Trey Herr and Heather West -- A holistic approach to the encryption debate / Aaron Brantly -- Certificate authorities: modernizing the internet's chain of trust / Adrienne Allen -- Multistakeholder approaches to cybersecurity challenges / Allan Friedman and Jonah F. Hill -- Countering the proliferation of malware / Trey Herr and Paul Rosenzweig -- Section IV: Military Cyber Operations. Understanding military cyber operations / Trey Herr and Drew Herrick -- Government acquisition and use of zero-day software vulnerabilities / Mailyn Fidler -- The Joint Cyber Force: challenges and opportunities / Jason Rivera, Lauren Boas Hayes, Anastasia Mark, Matthew Russell, and Nathaniel Tisa -- The practical impact of classification regarding offensive cyber operations / Herbert S. Lin and Taylor Grossman -- Creating influence through information / Kat Dransfield, Abraham Wagner, and Rand Waltzman -- Concluding remarks / Trey Herr an Richard M. Harrison.
Record Nr. UNINA-9910798871003321
Lanham ; London : , : Rowman & Littlefield, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber insecurity : navigating the perils of the next information age / / edited by Richard M. Harrison and Trey Herr
Cyber insecurity : navigating the perils of the next information age / / edited by Richard M. Harrison and Trey Herr
Pubbl/distr/stampa Lanham ; London : , : Rowman & Littlefield, , 2016
Descrizione fisica 1 online resource (xx, 392 pages)
Disciplina 364.4
Soggetto topico computer crime
information security
fight against crime
Internet
electronic commerce
Computer crimes - Prevention
Computer security
Cyberterrorism - Prevention
Telecommunication - Security measures
Internet governance
ISBN 1-4422-7285-6
Classificazione 32.24.56
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Foreword / Honorable Richard J. Danzig -- Introduction / Trey Herr and Richard M. Harrison -- Section I: Securing Data, Devices, and Networks. Understanding information assurance / Eric Ormes and Trey Herr -- A path to collective security: information sharing at the state and local level / David Weinstein -- Protecting industrial control systems in critical infrastructure / Robert M. Lee -- Safety at any speed: the roads ahead for automotive cyber safety policy / Joshua Corman and Beau Woods -- Bad code: exploring liability in software development / Jane Chong -- Section II: Combating Cyber Crime. Understanding cyber crime / Sasha Romanosky and Trey Herr -- Disrupting malware markets / Trey Herr and Ryan Ellis -- The Computer Fraud and Abuse Act: structure, controversies, and proposals for reform / Paul Ohm -- Breach notification laws: the policy and practice / Sasha Romanosky -- Cyber insurance: a market-based approach to information assurance / Robert Morgus -- Section III: Governing the Security of the Internet. Understanding internet security governance / Trey Herr and Heather West -- A holistic approach to the encryption debate / Aaron Brantly -- Certificate authorities: modernizing the internet's chain of trust / Adrienne Allen -- Multistakeholder approaches to cybersecurity challenges / Allan Friedman and Jonah F. Hill -- Countering the proliferation of malware / Trey Herr and Paul Rosenzweig -- Section IV: Military Cyber Operations. Understanding military cyber operations / Trey Herr and Drew Herrick -- Government acquisition and use of zero-day software vulnerabilities / Mailyn Fidler -- The Joint Cyber Force: challenges and opportunities / Jason Rivera, Lauren Boas Hayes, Anastasia Mark, Matthew Russell, and Nathaniel Tisa -- The practical impact of classification regarding offensive cyber operations / Herbert S. Lin and Taylor Grossman -- Creating influence through information / Kat Dransfield, Abraham Wagner, and Rand Waltzman -- Concluding remarks / Trey Herr an Richard M. Harrison.
Record Nr. UNINA-9910828077303321
Lanham ; London : , : Rowman & Littlefield, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui