43,95 €
43,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
22 °P sammeln
43,95 €
43,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
22 °P sammeln
Als Download kaufen
43,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
22 °P sammeln
Jetzt verschenken
43,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
22 °P sammeln
  • Format: PDF

This companion provides the most comprehensive and up-to-date comparative overview of the cyber-security strategies and doctrines of the major states and actors in Europe, North America, South America, Africa and Asia.

  • Geräte: PC
  • ohne Kopierschutz
  • eBook Hilfe
  • Größe: 15.44MB
Produktbeschreibung
This companion provides the most comprehensive and up-to-date comparative overview of the cyber-security strategies and doctrines of the major states and actors in Europe, North America, South America, Africa and Asia.


Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.

Autorenporträt
Scott N. Romaniuk is a Postdoctoral Research Fellow in Security Studies at the China Institute, University of Alberta, Canada, and a Visiting Fellow at the International Centre for Policing and Security, University of South Wales, UK. Mary Manjikian is Associate Dean of the Robertson School of Government at Regent University, USA.
Rezensionen
'To create this omnibus collection, Romaniuk (Univ. of Alberta) and Manjikian (Regent Univ.) gathered the most comprehensive possible set of essays on national cybersecurity policies. Each of the 51 chapters provides an up-to-date summary and analysis of a single country's cybersecurity situation and strategies. Hostile-state actors, online terrorists, organized criminal groups, black hat hackers, and other bad actors all must be countered through sophisticated advance planning. Defenders are generally at a significant disadvantage against their nimbler attackers. Policies vary according to how each nation defines and prioritizes the potential threats. An authoritarian government, for example, will be far more concerned with controlling politically sensitive information that might undermine the power of the ruling regime than a more democratic nation. A maritime country is likely to prioritize different defenses than one that is landlocked. Countries that were once parts of the former Soviet Union fear hybrid warfare attacks that might be launched from Russia. Although the individual essays provide fine summaries of the unique laws, political forces, and social dynamics obtaining in each nation discussed, the book as a whole would have been greatly enhanced by expanding the editors' nine-page introduction to further integrate the themes drawn from these diverse contributions.

Summing Up: Recommended. Upper-division undergraduates. Graduate students, faculty, and professionals.'



--T. H. Koenig, Northeastern University, Choice, December 2022

…mehr