Border control and new technologies : addressing integrated impact assessment / / edited by J. Peter Burgess and Dariusz Kloza |
Pubbl/distr/stampa | [Brussels] : , : ASP editions - Academic and Scientific Publishers, , 2021 |
Altri autori (Persone) |
BurgessJ. Peter
KlozaDariusz |
Soggetto topico |
enforcement of ruling
fight against crime border control new technology protection of privacy data protection decision-making assessment |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910493729503321 |
[Brussels] : , : ASP editions - Academic and Scientific Publishers, , 2021 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber insecurity : navigating the perils of the next information age / / edited by Richard M. Harrison and Trey Herr |
Pubbl/distr/stampa | Lanham ; London : , : Rowman & Littlefield, , 2016 |
Descrizione fisica | 1 online resource (xx, 392 pages) |
Disciplina | 364.4 |
Soggetto topico |
computer crime
information security fight against crime Internet electronic commerce Computer crimes - Prevention Computer security Cyberterrorism - Prevention Telecommunication - Security measures Internet governance |
ISBN | 1-4422-7285-6 |
Classificazione | 32.24.56 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Foreword / Honorable Richard J. Danzig -- Introduction / Trey Herr and Richard M. Harrison -- Section I: Securing Data, Devices, and Networks. Understanding information assurance / Eric Ormes and Trey Herr -- A path to collective security: information sharing at the state and local level / David Weinstein -- Protecting industrial control systems in critical infrastructure / Robert M. Lee -- Safety at any speed: the roads ahead for automotive cyber safety policy / Joshua Corman and Beau Woods -- Bad code: exploring liability in software development / Jane Chong -- Section II: Combating Cyber Crime. Understanding cyber crime / Sasha Romanosky and Trey Herr -- Disrupting malware markets / Trey Herr and Ryan Ellis -- The Computer Fraud and Abuse Act: structure, controversies, and proposals for reform / Paul Ohm -- Breach notification laws: the policy and practice / Sasha Romanosky -- Cyber insurance: a market-based approach to information assurance / Robert Morgus -- Section III: Governing the Security of the Internet. Understanding internet security governance / Trey Herr and Heather West -- A holistic approach to the encryption debate / Aaron Brantly -- Certificate authorities: modernizing the internet's chain of trust / Adrienne Allen -- Multistakeholder approaches to cybersecurity challenges / Allan Friedman and Jonah F. Hill -- Countering the proliferation of malware / Trey Herr and Paul Rosenzweig -- Section IV: Military Cyber Operations. Understanding military cyber operations / Trey Herr and Drew Herrick -- Government acquisition and use of zero-day software vulnerabilities / Mailyn Fidler -- The Joint Cyber Force: challenges and opportunities / Jason Rivera, Lauren Boas Hayes, Anastasia Mark, Matthew Russell, and Nathaniel Tisa -- The practical impact of classification regarding offensive cyber operations / Herbert S. Lin and Taylor Grossman -- Creating influence through information / Kat Dransfield, Abraham Wagner, and Rand Waltzman -- Concluding remarks / Trey Herr an Richard M. Harrison. |
Record Nr. | UNINA-9910798871003321 |
Lanham ; London : , : Rowman & Littlefield, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber insecurity : navigating the perils of the next information age / / edited by Richard M. Harrison and Trey Herr |
Pubbl/distr/stampa | Lanham ; London : , : Rowman & Littlefield, , 2016 |
Descrizione fisica | 1 online resource (xx, 392 pages) |
Disciplina | 364.4 |
Soggetto topico |
computer crime
information security fight against crime Internet electronic commerce Computer crimes - Prevention Computer security Cyberterrorism - Prevention Telecommunication - Security measures Internet governance |
ISBN | 1-4422-7285-6 |
Classificazione | 32.24.56 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Foreword / Honorable Richard J. Danzig -- Introduction / Trey Herr and Richard M. Harrison -- Section I: Securing Data, Devices, and Networks. Understanding information assurance / Eric Ormes and Trey Herr -- A path to collective security: information sharing at the state and local level / David Weinstein -- Protecting industrial control systems in critical infrastructure / Robert M. Lee -- Safety at any speed: the roads ahead for automotive cyber safety policy / Joshua Corman and Beau Woods -- Bad code: exploring liability in software development / Jane Chong -- Section II: Combating Cyber Crime. Understanding cyber crime / Sasha Romanosky and Trey Herr -- Disrupting malware markets / Trey Herr and Ryan Ellis -- The Computer Fraud and Abuse Act: structure, controversies, and proposals for reform / Paul Ohm -- Breach notification laws: the policy and practice / Sasha Romanosky -- Cyber insurance: a market-based approach to information assurance / Robert Morgus -- Section III: Governing the Security of the Internet. Understanding internet security governance / Trey Herr and Heather West -- A holistic approach to the encryption debate / Aaron Brantly -- Certificate authorities: modernizing the internet's chain of trust / Adrienne Allen -- Multistakeholder approaches to cybersecurity challenges / Allan Friedman and Jonah F. Hill -- Countering the proliferation of malware / Trey Herr and Paul Rosenzweig -- Section IV: Military Cyber Operations. Understanding military cyber operations / Trey Herr and Drew Herrick -- Government acquisition and use of zero-day software vulnerabilities / Mailyn Fidler -- The Joint Cyber Force: challenges and opportunities / Jason Rivera, Lauren Boas Hayes, Anastasia Mark, Matthew Russell, and Nathaniel Tisa -- The practical impact of classification regarding offensive cyber operations / Herbert S. Lin and Taylor Grossman -- Creating influence through information / Kat Dransfield, Abraham Wagner, and Rand Waltzman -- Concluding remarks / Trey Herr an Richard M. Harrison. |
Record Nr. | UNINA-9910828077303321 |
Lanham ; London : , : Rowman & Littlefield, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
The cybersecurity dilemma : hacking, trust, and fear between nations / / Ben Buchanan |
Autore | Buchanan Ben |
Pubbl/distr/stampa | Oxford : , : Oxford University Press, , 2016 |
Descrizione fisica | 1 online resource (viii, 290 p.) |
Disciplina | 005.8 |
Soggetto topico |
Cyber intelligence (Computer security)
Cyberterrorism - Prevention National security - Technological innovations Internet - Security measures Internet computer crime innovation artificial intelligence computer piracy fight against crime |
ISBN |
0-19-068654-5
0-19-069469-6 |
Classificazione | 32.24.56 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910164930703321 |
Buchanan Ben | ||
Oxford : , : Oxford University Press, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|