By combining theoretical discussions with real-world examples, The Politics of Cyber-Security offers readers valuable insights into the role of cyber-security in the realm of international politics.
By combining theoretical discussions with real-world examples, The Politics of Cyber-Security offers readers valuable insights into the role of cyber-security in the realm of international politics.Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Myriam Dunn Cavelty is Senior Scientist and Deputy Head of Research and Teaching at the Center for Security Studies (CSS), ETH Zurich. She is the author of Cyber-Security and Threat Politics: US Efforts to Secure the Information Age (Routledge 2008) and many other articles and books on the politics of cyber-security.
Inhaltsangabe
1. An Introduction to the Politics of Cyber Security 2. What Is Cyber Security Politics? 3. Cyber Security Becomes Political: Threat Frames and Countermeasures 4. A Problem Matures When States Become Active 5. The Cyber Threat Landscape 6. International Cyber Security Norms, Practices, and Strategy 7. Cyber Incidents: A Conceptualization 8. Cyber Operations: Use and Utility 9. The Politics of Cyber Security Now and in the Future Concluding Remarks
1. An Introduction to the Politics of Cyber-Security
2. What Is Cyber-Security Politics?
3. Cyber-Security Becomes Political: Threat Frames and Countermeasures
4. A Problem Matures When States Become Active
5. The Cyber-Threat Landscape
6. International Cyber-Security Norms, Practices, and Strategy
7. Cyber-Incidents: A Conceptualization
8. Cyber-Operations: Use and Utility
9. The Politics of Cyber-Security Now and in the Future-Concluding Remarks
1. An Introduction to the Politics of Cyber Security 2. What Is Cyber Security Politics? 3. Cyber Security Becomes Political: Threat Frames and Countermeasures 4. A Problem Matures When States Become Active 5. The Cyber Threat Landscape 6. International Cyber Security Norms, Practices, and Strategy 7. Cyber Incidents: A Conceptualization 8. Cyber Operations: Use and Utility 9. The Politics of Cyber Security Now and in the Future Concluding Remarks
1. An Introduction to the Politics of Cyber-Security
2. What Is Cyber-Security Politics?
3. Cyber-Security Becomes Political: Threat Frames and Countermeasures
4. A Problem Matures When States Become Active
5. The Cyber-Threat Landscape
6. International Cyber-Security Norms, Practices, and Strategy
7. Cyber-Incidents: A Conceptualization
8. Cyber-Operations: Use and Utility
9. The Politics of Cyber-Security Now and in the Future-Concluding Remarks
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497