چو ایران نباشد تن من مباد
Security in Cyberspace: Targeting Nations, Infrastructures, Individuals

دانلود کتاب Security in Cyberspace: Targeting Nations, Infrastructures, Individuals

60000 تومان موجود

کتاب امنیت در فضای مجازی: هدف قرار دادن کشورها، زیرساخت ها، افراد نسخه زبان اصلی

دانلود کتاب امنیت در فضای مجازی: هدف قرار دادن کشورها، زیرساخت ها، افراد بعد از پرداخت مقدور خواهد بود
توضیحات کتاب در بخش جزئیات آمده است و می توانید موارد را مشاهده فرمایید


این کتاب نسخه اصلی می باشد و به زبان فارسی نیست.


امتیاز شما به این کتاب (حداقل 1 و حداکثر 5):

امتیاز کاربران به این کتاب:        تعداد رای دهنده ها: 8


توضیحاتی در مورد کتاب Security in Cyberspace: Targeting Nations, Infrastructures, Individuals

نام کتاب : Security in Cyberspace: Targeting Nations, Infrastructures, Individuals
عنوان ترجمه شده به فارسی : امنیت در فضای مجازی: هدف قرار دادن کشورها، زیرساخت ها، افراد
سری :
نویسندگان :
ناشر : Bloomsbury Academic
سال نشر : 2014
تعداد صفحات : 264
ISBN (شابک) : 9781623568030 , 9781623565701
زبان کتاب : English
فرمت کتاب : pdf
حجم کتاب : 3 مگابایت



بعد از تکمیل فرایند پرداخت لینک دانلود کتاب ارائه خواهد شد. درصورت ثبت نام و ورود به حساب کاربری خود قادر خواهید بود لیست کتاب های خریداری شده را مشاهده فرمایید.


فهرست مطالب :


Cover\nHalf-title\nTitle\nCopyright\nDedication\nContents\nList of Abbreviations\nList of Figures and Tables\nAcknowledgements\nForeword\nList of Contributors\nIntroduction: Security in Cyberspace\n Of cyber space and security\n Structure of the book\n Notes\n References\nPart 1: The Nation\n 1 The ‘State(s)’ of Cybersecurity\n The nature of cyberspace\n Defining cybersecurity\n The state(s) of cybersecurity\n Cybersecurity at the global level\n Cybersecurity at the national level\n Cybersecurity at the organizational level\n Cybersecurity at the individual level\n The way ahead\n Notes\n References\n 2 Reducing Uncertainties in Cyberspace through Confidence and Capacity-Building Measures\n Uncertainty in cyberspace\n Cyber fortress Europe: Are domestic efforts enough?\n Confidence-building measures: Diffusing conflicts and enhancing trust\n Capacity building: Addressing blurred lines between internal and external security\n Conclusions\n Notes\n References\n 3 WikiLeaks and State Control of Information in the Cyber Age\n Introduction\n WikiLeaks in action\n Secrecy and the US state\n Impacts on security\n Conclusions\n Notes\n References\n 4 Leaks: Secure Communications and Achieving Nuclear Zero\n Precis\n Secure communication\n What political damage can follow a breakdown of security?\n Nuclear-weapon ‘management’\n Classification in practice\n Secrecy in nuclear weapons: Dispelling fears and verification\n Secrecy as a ‘wasting asset’\n What secrets are ‘necessary’, or ‘useful’, in seeking and then sustaining nuclear zero?\n What about ‘secure communication’ among anti-zero plotters?\n If nuclear zero requires ‘secure communications’, can they be had?\n Taking account of the NSA and GCHQ files and other examples\n Further implications\n Notes\n References\n 5 Establishing Norms of Behaviour in Cyberspace: The Chinese Viewpoint\n Change in cyberspace\n Challenge in cyberspace governance\n Technical difficulties in Internet governance\n Conclusions\n Notes\n References\nPart 2: The Infrastructure and The Individual\n 6 Einstein on the Breach: Surveillance Technology, Cybersecurity and Organizational Change\n Introduction\n Theory and method\n Public vs. private security\n Deep packet inspection and the firm\n Cybersecurity policy and technology\n Discussion\n Conclusion\n Notes\n References\n Appendix A: Sample flow record\n Appendix B: Sample signature\n Appendix C: Timeline\n 7 Artificial or ‘Legitimate’ Barriers to Internet Governance?\n The economic perspective\n The law-enforcement perspective\n The cyberspace perspective\n Stuxnet\n Cyber-attacks\n The way forward\n Notes\n References\n 8 Public-Private Partnerships: A ‘Soft’ Approach to Cybersecurity? Views from the European Union\n Introduction\n What are PPPs? A complex landscape\n Regional (EU-based) PPPs\n Transnational institutional and non-institutional PPPs\n Contrasting objectives\n What is the impact of PPPs on society?\n Is the lack of a legal framework fostering flexibility, or is it conducive to collusion, liability and ‘societal collateral damage’?\n Conclusions: A ‘soft’ success for cybersecurity?\n Notes\n References\n 9 Being Publicly Private: Extreme Nationalist User Practices on Social Networks\n Introduction\n Social media: A safe haven for extremist groups?\n Creating secret messages for an ideal audience\n Self-presentation practices of the extreme-nationalist users of SNS Rate\n Targeting one’s ideal audience: Secret Codes from 2011\n Conclusion\n Acknowledgement\n Notes\n References\nIndex




پست ها تصادفی