The Oxford handbook of cyber security / edited by Paul Cornish.

Presents forty-eight chapters examining the technological, economic, commercial, and strategic aspects of cyber security, including studies at the international, regional, and national level.

Saved in:
Bibliographic Details
Other Authors: Cornish, Paul (Editor)
Format: eBook
Language:English
Published: Oxford, United Kingdom ; New York, NY : Oxford University Press, 2021.
Subjects:
Online Access:Click for online access

MARC

LEADER 00000cam a2200000 i 4500
001 on1289423607
003 OCoLC
005 20241006213017.0
006 m o d
007 cr |||||||||||
008 210907t20212021enkab fob 001 0 eng d
010 |a  2021940009 
040 |a S2H  |b eng  |e rda  |e pn  |c S2H  |d YDX  |d OCLCF  |d STBDS  |d OCLCO  |d ORZ  |d OCLCQ  |d UBY  |d OCLCO  |d IBI  |d OCLCQ  |d OCL  |d OCLCO  |d OCLCL  |d UKAHL 
019 |a 1288410590  |a 1288465631  |a 1288562152  |a 1288632380  |a 1288660539 
020 |a 9780191840166  |q (electronic book) 
020 |a 0191840165  |q (electronic book) 
020 |z 9780198800682  |q (hardcover) 
020 |z 0198800681  |q (hardcover) 
035 |a (OCoLC)1289423607  |z (OCoLC)1288410590  |z (OCoLC)1288465631  |z (OCoLC)1288562152  |z (OCoLC)1288632380  |z (OCoLC)1288660539 
050 4 |a QA76.9.A25  |b O94 2021eb 
049 |a HCDD 
245 0 4 |a The Oxford handbook of cyber security /  |c edited by Paul Cornish. 
246 3 0 |a Handbook of cyber security 
246 3 0 |a Cyber security 
264 1 |a Oxford, United Kingdom ;  |a New York, NY :  |b Oxford University Press,  |c 2021. 
264 4 |c ©2021 
300 |a 1 online resource (xxvi, 862 pages) :  |b illustrations, maps. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references and index. 
505 0 0 |t The Origins of Cyberspace /  |r David J. Pym --  |t Intentions and Cyberterrorism /  |r Florian J. Egloff --  |t Technology: Access and Denial /  |r Caitr iona Heinl --  |t Cyber Espionage /  |r Jon R. Lindsay --  |t Cyberwar Redux /  |r Ben Buchanan --  |t On Cyber-Enabled Information Warfare and Information Operations /  |r Herbert Lin, Jaclyn Kerr --  |t The Deterrence and Prevention of Cyber Conflict /  |r Paul Cornish --  |t Stepping out of the Shadow: Computer Security Incident Response Teams in the Cybersecurity Ecosystem /  |r Nicole van der Meulen --  |t Opportunity, Threat and Dependency in the Social Infosphere /  |r Greg Austin --  |t Data Privacy and Security Law /  |r Fred Cate, Rachel Dockery --  |t The 'Insider Threat' and the 'Insider Advocate' /  |r Mike Steinmetz --  |t Personal Protection: 'Cyber Hygiene' /  |r Dave Clemente --  |t Online Child Safety /  |r John Carr --  |t Educating for Cyber (Security) /  |r Roger Bradbury --  |t Securing the Critical National Infrastructure /  |r David Mussington --  |t The Role of Defence in National Cybersecurity /  |r Mika Kerttunen --  |t Cybersecurity Capacity Building /  |r Lara Pace, Paul Cornish --  |t A Political History of Cyberspace /  |r Madeline Carr --  |t Cybersecurity, Multilateral Export Control, and Standard Setting Arrangements /  |r Elaine Korzak --  |t Cybersecurity, Global Commerce and International Organisations /  |r David Fidler --  |t Global Trade and Cybersecurity: Monitoring, enforcement and sanctions /  |r Franz-Stefan Gady, Greg Austin --  |t Semi-Formal Diplomacy: Track 1.5 and Track 2 /  |r Nigel Inkster --  |t States, Proxies, and (Remote) Offensive Cyber Operations /  |r Tim Maurer --  |t Getting Beyond Norms: When Violating the Agreement Becomes Customary Practice /  |r Melissa Hathaway --  |t International Law for Cyberspace: Competition and Conflict /  |r Thomas Wingfield, Harry Wingo --  |t Toward a Vulnerability Mitigation Model /  |r Jos e Eduardo Malta de S a Brand ao --  |t Cyber Power in International Relations /  |r Camino Kavanagh, Tim Stevens --  |t Community of Common Future in Cyberspace: the Proposal and Practice of China /  |r Tang Lan --  |t Look West or Look East? India at the Crossroads of Cyberspace /  |r Arun Mohan Sukumar --  |t The Evolving Concept of the Japanese Security Strategy /  |r Yoko Nitta --  |t Malaysia /  |r Elina Noor --  |t The Russian Federation's Approach to Cybersecurity /  |r Anton Shingarev, Anastasiya Kazakova --  |t Maturing Autonomous Cyber Weapons Systems: Implications for International Cyber Security and Autonomous Weapons Systems Regimes /  |r Caitr iona Heinl --  |t Future Human and Behavioural Challenges of Cyber Security /  |r Debi Ashenden --  |t The Future of Democratic Civil Societies in a Post-Western Cybered Era /  |r Chris Demchak --  |t Cybercrime: Thieves, Swindlers, Bandits, and Privateers in Cyberspace /  |r Roderic Broadhurst --  |t Future Normative Challenges /  |r Eneken Tikk --  |t Conclusion /  |r Paul Cornish --  |t Introduction /  |r Paul Cornish --  |t Ethical Standards and 'Communication' Technologies /  |r Onora O'Neill --  |t Cybersecurity Information Sharing: Voluntary Beginnings and a Mandatory Future /  |r Stuart Murdoch --  |t Cybersecurity, Human Rights and Empiricism: The Case of Digital Surveillance /  |r Jonathon Penney --  |t Cybersecurity in Israel: Organisation and Future Challenges /  |r Lior Tabansky --  |t Rethinking the Governance of Technology in the Digital Age /  |r Jo elle Webb -- /  |r Tim Unwin --  |t Making Sense of Cybersecurity in Emerging Technology Areas /  |r Claire Vishik, Marcello Balduccini, Michael Huth, Lawrence John --  |t Project Solarium 1953 and the Cyberspace Solarium Commission 2019 /  |r Mike Steinmetz --  |t Assessing Harm from Cyber Crime /  |r Eva Ignatuschtschenko --  |t Managing Risk: Terrorism, Violent Extremism and Anti-Democratic Tendencies in the Digital Space /  |r Alexander Corbeil, Rafal Rohozinski --  |t Cyberweapons /  |r Sandro Gaycken. 
520 |a Presents forty-eight chapters examining the technological, economic, commercial, and strategic aspects of cyber security, including studies at the international, regional, and national level. 
588 0 |a Online resource; title from digital title page (viewed on December 20, 2021). 
650 0 |a Computer security. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Cyber intelligence (Computer security) 
650 7 |a Cyber intelligence (Computer security)  |2 fast 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
700 1 |a Cornish, Paul,  |e editor. 
758 |i has work:  |a The Oxford handbook of cyber security (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCGpD4CygFmkJY84qwb7gVd  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Online version:  |t Oxford handbook of cyber security.  |d Oxford, United Kingdom ; New York, NY : Oxford University Press, 2021  |z 9780198800682  |w (DLC) 2021940009  |w (OCoLC)1253472780 
856 4 0 |u https://holycross.idm.oclc.org/login?auth=cas&url=https://academic.oup.com/edited-volume/41360  |y Click for online access 
903 |a OUP-HBPOLISCI2021 
994 |a 92  |b HCD