|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
on1289423607 |
003 |
OCoLC |
005 |
20241006213017.0 |
006 |
m o d |
007 |
cr ||||||||||| |
008 |
210907t20212021enkab fob 001 0 eng d |
010 |
|
|
|a 2021940009
|
040 |
|
|
|a S2H
|b eng
|e rda
|e pn
|c S2H
|d YDX
|d OCLCF
|d STBDS
|d OCLCO
|d ORZ
|d OCLCQ
|d UBY
|d OCLCO
|d IBI
|d OCLCQ
|d OCL
|d OCLCO
|d OCLCL
|d UKAHL
|
019 |
|
|
|a 1288410590
|a 1288465631
|a 1288562152
|a 1288632380
|a 1288660539
|
020 |
|
|
|a 9780191840166
|q (electronic book)
|
020 |
|
|
|a 0191840165
|q (electronic book)
|
020 |
|
|
|z 9780198800682
|q (hardcover)
|
020 |
|
|
|z 0198800681
|q (hardcover)
|
035 |
|
|
|a (OCoLC)1289423607
|z (OCoLC)1288410590
|z (OCoLC)1288465631
|z (OCoLC)1288562152
|z (OCoLC)1288632380
|z (OCoLC)1288660539
|
050 |
|
4 |
|a QA76.9.A25
|b O94 2021eb
|
049 |
|
|
|a HCDD
|
245 |
0 |
4 |
|a The Oxford handbook of cyber security /
|c edited by Paul Cornish.
|
246 |
3 |
0 |
|a Handbook of cyber security
|
246 |
3 |
0 |
|a Cyber security
|
264 |
|
1 |
|a Oxford, United Kingdom ;
|a New York, NY :
|b Oxford University Press,
|c 2021.
|
264 |
|
4 |
|c ©2021
|
300 |
|
|
|a 1 online resource (xxvi, 862 pages) :
|b illustrations, maps.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
0 |
|t The Origins of Cyberspace /
|r David J. Pym --
|t Intentions and Cyberterrorism /
|r Florian J. Egloff --
|t Technology: Access and Denial /
|r Caitr iona Heinl --
|t Cyber Espionage /
|r Jon R. Lindsay --
|t Cyberwar Redux /
|r Ben Buchanan --
|t On Cyber-Enabled Information Warfare and Information Operations /
|r Herbert Lin, Jaclyn Kerr --
|t The Deterrence and Prevention of Cyber Conflict /
|r Paul Cornish --
|t Stepping out of the Shadow: Computer Security Incident Response Teams in the Cybersecurity Ecosystem /
|r Nicole van der Meulen --
|t Opportunity, Threat and Dependency in the Social Infosphere /
|r Greg Austin --
|t Data Privacy and Security Law /
|r Fred Cate, Rachel Dockery --
|t The 'Insider Threat' and the 'Insider Advocate' /
|r Mike Steinmetz --
|t Personal Protection: 'Cyber Hygiene' /
|r Dave Clemente --
|t Online Child Safety /
|r John Carr --
|t Educating for Cyber (Security) /
|r Roger Bradbury --
|t Securing the Critical National Infrastructure /
|r David Mussington --
|t The Role of Defence in National Cybersecurity /
|r Mika Kerttunen --
|t Cybersecurity Capacity Building /
|r Lara Pace, Paul Cornish --
|t A Political History of Cyberspace /
|r Madeline Carr --
|t Cybersecurity, Multilateral Export Control, and Standard Setting Arrangements /
|r Elaine Korzak --
|t Cybersecurity, Global Commerce and International Organisations /
|r David Fidler --
|t Global Trade and Cybersecurity: Monitoring, enforcement and sanctions /
|r Franz-Stefan Gady, Greg Austin --
|t Semi-Formal Diplomacy: Track 1.5 and Track 2 /
|r Nigel Inkster --
|t States, Proxies, and (Remote) Offensive Cyber Operations /
|r Tim Maurer --
|t Getting Beyond Norms: When Violating the Agreement Becomes Customary Practice /
|r Melissa Hathaway --
|t International Law for Cyberspace: Competition and Conflict /
|r Thomas Wingfield, Harry Wingo --
|t Toward a Vulnerability Mitigation Model /
|r Jos e Eduardo Malta de S a Brand ao --
|t Cyber Power in International Relations /
|r Camino Kavanagh, Tim Stevens --
|t Community of Common Future in Cyberspace: the Proposal and Practice of China /
|r Tang Lan --
|t Look West or Look East? India at the Crossroads of Cyberspace /
|r Arun Mohan Sukumar --
|t The Evolving Concept of the Japanese Security Strategy /
|r Yoko Nitta --
|t Malaysia /
|r Elina Noor --
|t The Russian Federation's Approach to Cybersecurity /
|r Anton Shingarev, Anastasiya Kazakova --
|t Maturing Autonomous Cyber Weapons Systems: Implications for International Cyber Security and Autonomous Weapons Systems Regimes /
|r Caitr iona Heinl --
|t Future Human and Behavioural Challenges of Cyber Security /
|r Debi Ashenden --
|t The Future of Democratic Civil Societies in a Post-Western Cybered Era /
|r Chris Demchak --
|t Cybercrime: Thieves, Swindlers, Bandits, and Privateers in Cyberspace /
|r Roderic Broadhurst --
|t Future Normative Challenges /
|r Eneken Tikk --
|t Conclusion /
|r Paul Cornish --
|t Introduction /
|r Paul Cornish --
|t Ethical Standards and 'Communication' Technologies /
|r Onora O'Neill --
|t Cybersecurity Information Sharing: Voluntary Beginnings and a Mandatory Future /
|r Stuart Murdoch --
|t Cybersecurity, Human Rights and Empiricism: The Case of Digital Surveillance /
|r Jonathon Penney --
|t Cybersecurity in Israel: Organisation and Future Challenges /
|r Lior Tabansky --
|t Rethinking the Governance of Technology in the Digital Age /
|r Jo elle Webb -- /
|r Tim Unwin --
|t Making Sense of Cybersecurity in Emerging Technology Areas /
|r Claire Vishik, Marcello Balduccini, Michael Huth, Lawrence John --
|t Project Solarium 1953 and the Cyberspace Solarium Commission 2019 /
|r Mike Steinmetz --
|t Assessing Harm from Cyber Crime /
|r Eva Ignatuschtschenko --
|t Managing Risk: Terrorism, Violent Extremism and Anti-Democratic Tendencies in the Digital Space /
|r Alexander Corbeil, Rafal Rohozinski --
|t Cyberweapons /
|r Sandro Gaycken.
|
520 |
|
|
|a Presents forty-eight chapters examining the technological, economic, commercial, and strategic aspects of cyber security, including studies at the international, regional, and national level.
|
588 |
0 |
|
|a Online resource; title from digital title page (viewed on December 20, 2021).
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Cyber intelligence (Computer security)
|
650 |
|
7 |
|a Cyber intelligence (Computer security)
|2 fast
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
700 |
1 |
|
|a Cornish, Paul,
|e editor.
|
758 |
|
|
|i has work:
|a The Oxford handbook of cyber security (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCGpD4CygFmkJY84qwb7gVd
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Online version:
|t Oxford handbook of cyber security.
|d Oxford, United Kingdom ; New York, NY : Oxford University Press, 2021
|z 9780198800682
|w (DLC) 2021940009
|w (OCoLC)1253472780
|
856 |
4 |
0 |
|u https://holycross.idm.oclc.org/login?auth=cas&url=https://academic.oup.com/edited-volume/41360
|y Click for online access
|
903 |
|
|
|a OUP-HBPOLISCI2021
|
994 |
|
|
|a 92
|b HCD
|