The Oxford Handbook of Cyber Security
Herausgeber: Cornish, Paul
The Oxford Handbook of Cyber Security
Herausgeber: Cornish, Paul
- Gebundenes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
The Oxford Handbook of Cyber Security presents forty-eight chapters examining the technological, economic, commercial, and strategic aspects of cyber security, including studies at the international, regional, amd national level.
Andere Kunden interessierten sich auch für
- The Oxford Handbook of U.S. Women's Social Movement Activism209,99 €
- Myriam Dunn CaveltyThe Politics of Cyber-Security194,99 €
- Noran Shafik FouadTheorising Cyber (In)Security204,99 €
- Saadia M PekkanenThe Oxford Handbook of Space Security244,99 €
- The Oxford Handbook of Danish Politics226,99 €
- Daniel J BennyU.S. National Security and the Intelligence Services180,99 €
- The Security Dimensions of the Syrian Civil War157,99 €
-
-
-
The Oxford Handbook of Cyber Security presents forty-eight chapters examining the technological, economic, commercial, and strategic aspects of cyber security, including studies at the international, regional, amd national level.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Hurst & Co.
- Seitenzahl: 890
- Erscheinungstermin: 4. Februar 2022
- Englisch
- Abmessung: 252mm x 178mm x 52mm
- Gewicht: 1702g
- ISBN-13: 9780198800682
- ISBN-10: 0198800681
- Artikelnr.: 62162007
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
- Verlag: Hurst & Co.
- Seitenzahl: 890
- Erscheinungstermin: 4. Februar 2022
- Englisch
- Abmessung: 252mm x 178mm x 52mm
- Gewicht: 1702g
- ISBN-13: 9780198800682
- ISBN-10: 0198800681
- Artikelnr.: 62162007
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
Paul Cornish was educated at St Andrews, LSE, and Cambridge Universities. He has served in the British Army and the Foreign and Commonwealth Office, and has worked at research institutes including Chatham House, the UK Defence Academy, the Centre for Defence Studies (King's College London), RAND Europe, and the Universities of Cambridge, Bath, and Exeter. His work covers international security, national strategy, arms control, the ethics of armed force, civil-military relations and cyber security. He was Co-Director of the Cyber Security Capacity Building Centre at Oxford University, 2013-18, and Professorial Fellow at the Australian National University, 2017. He is Visiting Professor at LSE IDEAS, London School of Economics.
* Foreword
* Introduction
* PART I. Cyber Space: What it is and Why it Matters
* 1: David Pym: The Origins of Cyberspace
* 2: Greg Austin: Opportunity, Threat and Dependency in the Social
Infosphere
* 3: Madeline Carr: A Political History of Cyberspace
* 4: Camino Kavanagh and Tim Stevens: Cyber Power in International
Relations
* 5: Onora O Neill: Ethical Standards and 'Communication' Technologies
* PART II. Security in Cyber Space: Cyber Crime
* 6: Roderic Broadhurst: Cybercrime: Thieves, Swindlers, Bandits and
Privateers in Cyberspace
* 7: Claire Vishik, Marcello Balduccini, Michael Huth, and Lawrence
John: Making Sense of Cybersecurity in Emerging Technology Areas
* 8: Eva Ignatuschtschenko: Assessing Harm from Cyber Crime
* 9: José Eduardo Malta de Sá Brandão: Toward a Vulnerability
Mitigation Model.
* PART III. Security in Cyber Space: Extremism and Terrorism
* 10: Alexander Corbeil and Rafal Rohozinski: Managing Risk: Terrorism,
Violent Extremism and Anti-Democratic Tendencies in the Digital Space
* 11: Sandro Gaycken: Cyberweapons
* 12: Florian Egloff: Intentions and Cyberterrorism
* 13: Caitríona Heinl: Technology: Access and Denial
* PART IV. Security in Cyber Space: State-Sponsored Cyber Attacks
* 14: Jon Lindsay: Cyber Espionage
* 15: Ben Buchanan: Cyberwar Redux
* 16: Herbert Lin and Jaclyn Kerr: On Cyber-Enabled Information Warfare
and Information Operations
* 17: Paul Cornish: The Deterrence and Prevention of Cyber Conflict
* PART V. Technical and Corporate Cyber Security
* 18: Nicole van der Meulen: Stepping out of the Shadow: Computer
Security Incident Response Teams in the Cybersecurity Ecosystem
* 19: Stuart Murdoch: Cybersecurity Information Sharing: Voluntary
Beginnings and a Mandatory Future
* 20: Fred Cate and Rachel Dockery: Data Privacy and Security Law
* 21: Mike Steinmetz: The Insider Threat and the Insider Advocate
* PART VI. Personal Cyber Security
* 22: Dave Clemente: Personal Protection: Cyber Hygiene
* 23: John Carr: Online Child Safety
* 24: Roger Bradbury: Educating for Cyber Security
* 25: Jonathon Penney: Cyber Security, Human Rights and Empiricism: The
Case of Digital Surveillance
* PART VII. National Cyber Security
* 26: David Mussington: Securing the Critical National Infrastructure
* 27: Mika Kerttunen: The Role of Defence in National Cyber Security
* 28: Lara Pace and Paul Cornish: Cyber Security Capacity Building
* PART VIII. Global Trade and Cyber Security
* 29: Elaine Korzak: Cyber Security, Multilateral Export Control, and
Standard Setting Arrangements
* 30: David Fidler: Cyber Security, Global Commerce, and International
Organisations
* 31: Franz-Stefan Gady and Greg Austin: Global Trade and Cyber
Security: Monitoring, Enforcement, and Sanctions
* PART IX. International Cyber Security
* 32: Nigel Inkster: Semi-Formal Diplomacy: Track 1.5 and Track 2
* 33: Tim Maurer: States, Proxies, and (Remote) Offensive Cyber
Operations
* 34: Melissa Hathaway: Getting Beyond Norms: When Violating the
Agreement Becomes Customary Practice
* 35: Thomas Wingfield and Harry Wingo: International Law for Cyber
Space: Competition and Conflict
* PART X. Perspectives on Cyber Security
* 36: Tang Lan: Community of Common Future in Cyberspace: The Proposal
and Practice of China
* 37: Arun Mohan Sukumar: Look West or Look Easta India at the
Crossroads of Cyberspace
* 38: Lior Tabansky: Cybersecurity in Israel: Organisation and Future
Challenges
* 39: Yoko Nitta: The Evolving Concept of the Japanese Security
Strategy
* 40: Elina Noor: Contextualizing Malaysia's Cybersecurity Agenda
* 41: Anton Shingarev and Anastasya Kazakova: The Russian Federation s
Approach to Cyber Security
* PART XI. Future Challenges
* 42: Joëlle Webb: Rethinking the Governance of Technology in the
Digital Age
* 43: Caitríona Heinl: Maturing Autonomous Cyber Weapons Systems:
Implications for International Cyber Security and Autonomous Weapons
Systems Regimes
* 44: Debi Ashenden: The Future Human and Behavioural Challenges of
Cyber Security
* 45: Chris Demchak: The Future of Democratic Civil Societies in a
Post-Western Cybered Era
* 46: Eneken Tikk: Future Normative Challenges
* 47: Tim Unwin: Cybersecurity' and 'Development': Contested Futures
* 48: Mike Steinmetz: Project Solarium 1953 and the Cyberspace Solarium
Commission 2019
* Conclusion
* Introduction
* PART I. Cyber Space: What it is and Why it Matters
* 1: David Pym: The Origins of Cyberspace
* 2: Greg Austin: Opportunity, Threat and Dependency in the Social
Infosphere
* 3: Madeline Carr: A Political History of Cyberspace
* 4: Camino Kavanagh and Tim Stevens: Cyber Power in International
Relations
* 5: Onora O Neill: Ethical Standards and 'Communication' Technologies
* PART II. Security in Cyber Space: Cyber Crime
* 6: Roderic Broadhurst: Cybercrime: Thieves, Swindlers, Bandits and
Privateers in Cyberspace
* 7: Claire Vishik, Marcello Balduccini, Michael Huth, and Lawrence
John: Making Sense of Cybersecurity in Emerging Technology Areas
* 8: Eva Ignatuschtschenko: Assessing Harm from Cyber Crime
* 9: José Eduardo Malta de Sá Brandão: Toward a Vulnerability
Mitigation Model.
* PART III. Security in Cyber Space: Extremism and Terrorism
* 10: Alexander Corbeil and Rafal Rohozinski: Managing Risk: Terrorism,
Violent Extremism and Anti-Democratic Tendencies in the Digital Space
* 11: Sandro Gaycken: Cyberweapons
* 12: Florian Egloff: Intentions and Cyberterrorism
* 13: Caitríona Heinl: Technology: Access and Denial
* PART IV. Security in Cyber Space: State-Sponsored Cyber Attacks
* 14: Jon Lindsay: Cyber Espionage
* 15: Ben Buchanan: Cyberwar Redux
* 16: Herbert Lin and Jaclyn Kerr: On Cyber-Enabled Information Warfare
and Information Operations
* 17: Paul Cornish: The Deterrence and Prevention of Cyber Conflict
* PART V. Technical and Corporate Cyber Security
* 18: Nicole van der Meulen: Stepping out of the Shadow: Computer
Security Incident Response Teams in the Cybersecurity Ecosystem
* 19: Stuart Murdoch: Cybersecurity Information Sharing: Voluntary
Beginnings and a Mandatory Future
* 20: Fred Cate and Rachel Dockery: Data Privacy and Security Law
* 21: Mike Steinmetz: The Insider Threat and the Insider Advocate
* PART VI. Personal Cyber Security
* 22: Dave Clemente: Personal Protection: Cyber Hygiene
* 23: John Carr: Online Child Safety
* 24: Roger Bradbury: Educating for Cyber Security
* 25: Jonathon Penney: Cyber Security, Human Rights and Empiricism: The
Case of Digital Surveillance
* PART VII. National Cyber Security
* 26: David Mussington: Securing the Critical National Infrastructure
* 27: Mika Kerttunen: The Role of Defence in National Cyber Security
* 28: Lara Pace and Paul Cornish: Cyber Security Capacity Building
* PART VIII. Global Trade and Cyber Security
* 29: Elaine Korzak: Cyber Security, Multilateral Export Control, and
Standard Setting Arrangements
* 30: David Fidler: Cyber Security, Global Commerce, and International
Organisations
* 31: Franz-Stefan Gady and Greg Austin: Global Trade and Cyber
Security: Monitoring, Enforcement, and Sanctions
* PART IX. International Cyber Security
* 32: Nigel Inkster: Semi-Formal Diplomacy: Track 1.5 and Track 2
* 33: Tim Maurer: States, Proxies, and (Remote) Offensive Cyber
Operations
* 34: Melissa Hathaway: Getting Beyond Norms: When Violating the
Agreement Becomes Customary Practice
* 35: Thomas Wingfield and Harry Wingo: International Law for Cyber
Space: Competition and Conflict
* PART X. Perspectives on Cyber Security
* 36: Tang Lan: Community of Common Future in Cyberspace: The Proposal
and Practice of China
* 37: Arun Mohan Sukumar: Look West or Look Easta India at the
Crossroads of Cyberspace
* 38: Lior Tabansky: Cybersecurity in Israel: Organisation and Future
Challenges
* 39: Yoko Nitta: The Evolving Concept of the Japanese Security
Strategy
* 40: Elina Noor: Contextualizing Malaysia's Cybersecurity Agenda
* 41: Anton Shingarev and Anastasya Kazakova: The Russian Federation s
Approach to Cyber Security
* PART XI. Future Challenges
* 42: Joëlle Webb: Rethinking the Governance of Technology in the
Digital Age
* 43: Caitríona Heinl: Maturing Autonomous Cyber Weapons Systems:
Implications for International Cyber Security and Autonomous Weapons
Systems Regimes
* 44: Debi Ashenden: The Future Human and Behavioural Challenges of
Cyber Security
* 45: Chris Demchak: The Future of Democratic Civil Societies in a
Post-Western Cybered Era
* 46: Eneken Tikk: Future Normative Challenges
* 47: Tim Unwin: Cybersecurity' and 'Development': Contested Futures
* 48: Mike Steinmetz: Project Solarium 1953 and the Cyberspace Solarium
Commission 2019
* Conclusion
* Foreword
* Introduction
* PART I. Cyber Space: What it is and Why it Matters
* 1: David Pym: The Origins of Cyberspace
* 2: Greg Austin: Opportunity, Threat and Dependency in the Social
Infosphere
* 3: Madeline Carr: A Political History of Cyberspace
* 4: Camino Kavanagh and Tim Stevens: Cyber Power in International
Relations
* 5: Onora O Neill: Ethical Standards and 'Communication' Technologies
* PART II. Security in Cyber Space: Cyber Crime
* 6: Roderic Broadhurst: Cybercrime: Thieves, Swindlers, Bandits and
Privateers in Cyberspace
* 7: Claire Vishik, Marcello Balduccini, Michael Huth, and Lawrence
John: Making Sense of Cybersecurity in Emerging Technology Areas
* 8: Eva Ignatuschtschenko: Assessing Harm from Cyber Crime
* 9: José Eduardo Malta de Sá Brandão: Toward a Vulnerability
Mitigation Model.
* PART III. Security in Cyber Space: Extremism and Terrorism
* 10: Alexander Corbeil and Rafal Rohozinski: Managing Risk: Terrorism,
Violent Extremism and Anti-Democratic Tendencies in the Digital Space
* 11: Sandro Gaycken: Cyberweapons
* 12: Florian Egloff: Intentions and Cyberterrorism
* 13: Caitríona Heinl: Technology: Access and Denial
* PART IV. Security in Cyber Space: State-Sponsored Cyber Attacks
* 14: Jon Lindsay: Cyber Espionage
* 15: Ben Buchanan: Cyberwar Redux
* 16: Herbert Lin and Jaclyn Kerr: On Cyber-Enabled Information Warfare
and Information Operations
* 17: Paul Cornish: The Deterrence and Prevention of Cyber Conflict
* PART V. Technical and Corporate Cyber Security
* 18: Nicole van der Meulen: Stepping out of the Shadow: Computer
Security Incident Response Teams in the Cybersecurity Ecosystem
* 19: Stuart Murdoch: Cybersecurity Information Sharing: Voluntary
Beginnings and a Mandatory Future
* 20: Fred Cate and Rachel Dockery: Data Privacy and Security Law
* 21: Mike Steinmetz: The Insider Threat and the Insider Advocate
* PART VI. Personal Cyber Security
* 22: Dave Clemente: Personal Protection: Cyber Hygiene
* 23: John Carr: Online Child Safety
* 24: Roger Bradbury: Educating for Cyber Security
* 25: Jonathon Penney: Cyber Security, Human Rights and Empiricism: The
Case of Digital Surveillance
* PART VII. National Cyber Security
* 26: David Mussington: Securing the Critical National Infrastructure
* 27: Mika Kerttunen: The Role of Defence in National Cyber Security
* 28: Lara Pace and Paul Cornish: Cyber Security Capacity Building
* PART VIII. Global Trade and Cyber Security
* 29: Elaine Korzak: Cyber Security, Multilateral Export Control, and
Standard Setting Arrangements
* 30: David Fidler: Cyber Security, Global Commerce, and International
Organisations
* 31: Franz-Stefan Gady and Greg Austin: Global Trade and Cyber
Security: Monitoring, Enforcement, and Sanctions
* PART IX. International Cyber Security
* 32: Nigel Inkster: Semi-Formal Diplomacy: Track 1.5 and Track 2
* 33: Tim Maurer: States, Proxies, and (Remote) Offensive Cyber
Operations
* 34: Melissa Hathaway: Getting Beyond Norms: When Violating the
Agreement Becomes Customary Practice
* 35: Thomas Wingfield and Harry Wingo: International Law for Cyber
Space: Competition and Conflict
* PART X. Perspectives on Cyber Security
* 36: Tang Lan: Community of Common Future in Cyberspace: The Proposal
and Practice of China
* 37: Arun Mohan Sukumar: Look West or Look Easta India at the
Crossroads of Cyberspace
* 38: Lior Tabansky: Cybersecurity in Israel: Organisation and Future
Challenges
* 39: Yoko Nitta: The Evolving Concept of the Japanese Security
Strategy
* 40: Elina Noor: Contextualizing Malaysia's Cybersecurity Agenda
* 41: Anton Shingarev and Anastasya Kazakova: The Russian Federation s
Approach to Cyber Security
* PART XI. Future Challenges
* 42: Joëlle Webb: Rethinking the Governance of Technology in the
Digital Age
* 43: Caitríona Heinl: Maturing Autonomous Cyber Weapons Systems:
Implications for International Cyber Security and Autonomous Weapons
Systems Regimes
* 44: Debi Ashenden: The Future Human and Behavioural Challenges of
Cyber Security
* 45: Chris Demchak: The Future of Democratic Civil Societies in a
Post-Western Cybered Era
* 46: Eneken Tikk: Future Normative Challenges
* 47: Tim Unwin: Cybersecurity' and 'Development': Contested Futures
* 48: Mike Steinmetz: Project Solarium 1953 and the Cyberspace Solarium
Commission 2019
* Conclusion
* Introduction
* PART I. Cyber Space: What it is and Why it Matters
* 1: David Pym: The Origins of Cyberspace
* 2: Greg Austin: Opportunity, Threat and Dependency in the Social
Infosphere
* 3: Madeline Carr: A Political History of Cyberspace
* 4: Camino Kavanagh and Tim Stevens: Cyber Power in International
Relations
* 5: Onora O Neill: Ethical Standards and 'Communication' Technologies
* PART II. Security in Cyber Space: Cyber Crime
* 6: Roderic Broadhurst: Cybercrime: Thieves, Swindlers, Bandits and
Privateers in Cyberspace
* 7: Claire Vishik, Marcello Balduccini, Michael Huth, and Lawrence
John: Making Sense of Cybersecurity in Emerging Technology Areas
* 8: Eva Ignatuschtschenko: Assessing Harm from Cyber Crime
* 9: José Eduardo Malta de Sá Brandão: Toward a Vulnerability
Mitigation Model.
* PART III. Security in Cyber Space: Extremism and Terrorism
* 10: Alexander Corbeil and Rafal Rohozinski: Managing Risk: Terrorism,
Violent Extremism and Anti-Democratic Tendencies in the Digital Space
* 11: Sandro Gaycken: Cyberweapons
* 12: Florian Egloff: Intentions and Cyberterrorism
* 13: Caitríona Heinl: Technology: Access and Denial
* PART IV. Security in Cyber Space: State-Sponsored Cyber Attacks
* 14: Jon Lindsay: Cyber Espionage
* 15: Ben Buchanan: Cyberwar Redux
* 16: Herbert Lin and Jaclyn Kerr: On Cyber-Enabled Information Warfare
and Information Operations
* 17: Paul Cornish: The Deterrence and Prevention of Cyber Conflict
* PART V. Technical and Corporate Cyber Security
* 18: Nicole van der Meulen: Stepping out of the Shadow: Computer
Security Incident Response Teams in the Cybersecurity Ecosystem
* 19: Stuart Murdoch: Cybersecurity Information Sharing: Voluntary
Beginnings and a Mandatory Future
* 20: Fred Cate and Rachel Dockery: Data Privacy and Security Law
* 21: Mike Steinmetz: The Insider Threat and the Insider Advocate
* PART VI. Personal Cyber Security
* 22: Dave Clemente: Personal Protection: Cyber Hygiene
* 23: John Carr: Online Child Safety
* 24: Roger Bradbury: Educating for Cyber Security
* 25: Jonathon Penney: Cyber Security, Human Rights and Empiricism: The
Case of Digital Surveillance
* PART VII. National Cyber Security
* 26: David Mussington: Securing the Critical National Infrastructure
* 27: Mika Kerttunen: The Role of Defence in National Cyber Security
* 28: Lara Pace and Paul Cornish: Cyber Security Capacity Building
* PART VIII. Global Trade and Cyber Security
* 29: Elaine Korzak: Cyber Security, Multilateral Export Control, and
Standard Setting Arrangements
* 30: David Fidler: Cyber Security, Global Commerce, and International
Organisations
* 31: Franz-Stefan Gady and Greg Austin: Global Trade and Cyber
Security: Monitoring, Enforcement, and Sanctions
* PART IX. International Cyber Security
* 32: Nigel Inkster: Semi-Formal Diplomacy: Track 1.5 and Track 2
* 33: Tim Maurer: States, Proxies, and (Remote) Offensive Cyber
Operations
* 34: Melissa Hathaway: Getting Beyond Norms: When Violating the
Agreement Becomes Customary Practice
* 35: Thomas Wingfield and Harry Wingo: International Law for Cyber
Space: Competition and Conflict
* PART X. Perspectives on Cyber Security
* 36: Tang Lan: Community of Common Future in Cyberspace: The Proposal
and Practice of China
* 37: Arun Mohan Sukumar: Look West or Look Easta India at the
Crossroads of Cyberspace
* 38: Lior Tabansky: Cybersecurity in Israel: Organisation and Future
Challenges
* 39: Yoko Nitta: The Evolving Concept of the Japanese Security
Strategy
* 40: Elina Noor: Contextualizing Malaysia's Cybersecurity Agenda
* 41: Anton Shingarev and Anastasya Kazakova: The Russian Federation s
Approach to Cyber Security
* PART XI. Future Challenges
* 42: Joëlle Webb: Rethinking the Governance of Technology in the
Digital Age
* 43: Caitríona Heinl: Maturing Autonomous Cyber Weapons Systems:
Implications for International Cyber Security and Autonomous Weapons
Systems Regimes
* 44: Debi Ashenden: The Future Human and Behavioural Challenges of
Cyber Security
* 45: Chris Demchak: The Future of Democratic Civil Societies in a
Post-Western Cybered Era
* 46: Eneken Tikk: Future Normative Challenges
* 47: Tim Unwin: Cybersecurity' and 'Development': Contested Futures
* 48: Mike Steinmetz: Project Solarium 1953 and the Cyberspace Solarium
Commission 2019
* Conclusion