Cyberterrorism Understanding, Assessment, and Response /

This is the first book to present a multidisciplinary approach to cyberterrorism. It traces the threat posed by cyberterrorism today, with chapters discussing possible technological vulnerabilities, potential motivations to engage in cyberterrorism, and the challenges of distinguishing this from oth...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Chen, Thomas M. (Επιμελητής έκδοσης), Jarvis, Lee (Επιμελητής έκδοσης), Macdonald, Stuart (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: New York, NY : Springer New York : Imprint: Springer, 2014.
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 03728nam a22005415i 4500
001 978-1-4939-0962-9
003 DE-He213
005 20151204174605.0
007 cr nn 008mamaa
008 140624s2014 xxu| s |||| 0|eng d
020 |a 9781493909629  |9 978-1-4939-0962-9 
024 7 |a 10.1007/978-1-4939-0962-9  |2 doi 
040 |d GrThAP 
050 4 |a QA75.5-76.95 
072 7 |a UT  |2 bicssc 
072 7 |a COM069000  |2 bisacsh 
072 7 |a COM032000  |2 bisacsh 
082 0 4 |a 005.7  |2 23 
245 1 0 |a Cyberterrorism  |h [electronic resource] :  |b Understanding, Assessment, and Response /  |c edited by Thomas M. Chen, Lee Jarvis, Stuart Macdonald. 
264 1 |a New York, NY :  |b Springer New York :  |b Imprint: Springer,  |c 2014. 
300 |a XXIII, 215 p. 5 illus. in color.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 |a What is 'Cyberterrorism'? Computer and Internet Technology in Legal Definitions of Terrorism -- Understanding, Locating and Constructing 'Cyberterrorism' -- Rethinking the Threat of Cyberterrorism -- Putting the 'Cyber' into Cyberterrorism: Re-reading Technological Risk in a Hyperconnected World -- Dr. Strangeweb: Or How they Stopped Worrying and Learned to Love Cyber War -- Reality Check: Assessing the (Un)Likelihood of Cyberterrorism -- Cyber Threats to Critical Information Infrastructure -- The Citadel and its Sentinels: State Strategies for Contesting Cyberterrorism in the UK -- The Criminalisation of Terrorists' Online Preparatory Acts -- Adaptive Responses to Cyberterrorism. 
520 |a This is the first book to present a multidisciplinary approach to cyberterrorism. It traces the threat posed by cyberterrorism today, with chapters discussing possible technological vulnerabilities, potential motivations to engage in cyberterrorism, and the challenges of distinguishing this from other cyber threats. The book also addresses the range of potential responses to this threat by exploring policy and legislative frameworks as well as a diversity of techniques for deterring or countering terrorism in cyber environments. The case studies throughout the book are global in scope and include the United States, United Kingdom, Australia, New Zealand and Canada. With contributions from distinguished experts with backgrounds including international relations, law, engineering, computer science, public policy and politics, Cyberterrorism: Understanding, Assessment and Response offers a cutting edge analysis of contemporary debate on, and issues surrounding, cyberterrorism. This global scope and diversity of perspectives ensure it is of great interest to academics, students, practitioners, policymakers and other stakeholders with an interest in cyber security. 
650 0 |a Computer science. 
650 0 |a Computer communication systems. 
650 0 |a Computer security. 
650 0 |a Computers. 
650 0 |a Application software. 
650 0 |a Criminal law. 
650 1 4 |a Computer Science. 
650 2 4 |a Information Systems and Communication Service. 
650 2 4 |a Computer Communication Networks. 
650 2 4 |a Criminal Law. 
650 2 4 |a Computer Appl. in Social and Behavioral Sciences. 
650 2 4 |a Systems and Data Security. 
700 1 |a Chen, Thomas M.  |e editor. 
700 1 |a Jarvis, Lee.  |e editor. 
700 1 |a Macdonald, Stuart.  |e editor. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9781493909612 
856 4 0 |u http://dx.doi.org/10.1007/978-1-4939-0962-9  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
950 |a Computer Science (Springer-11645)