Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
By combining theoretical discussions with real-world examples, The Politics of Cyber-Security offers readers valuable insights into the role of cyber-security in the realm of international politics.
By combining theoretical discussions with real-world examples, The Politics of Cyber-Security offers readers valuable insights into the role of cyber-security in the realm of international politics.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Die Herstellerinformationen sind derzeit nicht verfügbar.
Autorenporträt
Myriam Dunn Cavelty is Senior Scientist and Deputy Head of Research and Teaching at the Center for Security Studies (CSS), ETH Zurich. She is the author of Cyber-Security and Threat Politics: US Efforts to Secure the Information Age (Routledge 2008) and many other articles and books on the politics of cyber-security.
Inhaltsangabe
1. An Introduction to the Politics of Cyber Security 2. What Is Cyber Security Politics? 3. Cyber Security Becomes Political: Threat Frames and Countermeasures 4. A Problem Matures When States Become Active 5. The Cyber Threat Landscape 6. International Cyber Security Norms, Practices, and Strategy 7. Cyber Incidents: A Conceptualization 8. Cyber Operations: Use and Utility 9. The Politics of Cyber Security Now and in the Future Concluding Remarks
1. An Introduction to the Politics of Cyber-Security
2. What Is Cyber-Security Politics?
3. Cyber-Security Becomes Political: Threat Frames and Countermeasures
4. A Problem Matures When States Become Active
5. The Cyber-Threat Landscape
6. International Cyber-Security Norms, Practices, and Strategy
7. Cyber-Incidents: A Conceptualization
8. Cyber-Operations: Use and Utility
9. The Politics of Cyber-Security Now and in the Future-Concluding Remarks
1. An Introduction to the Politics of Cyber Security 2. What Is Cyber Security Politics? 3. Cyber Security Becomes Political: Threat Frames and Countermeasures 4. A Problem Matures When States Become Active 5. The Cyber Threat Landscape 6. International Cyber Security Norms, Practices, and Strategy 7. Cyber Incidents: A Conceptualization 8. Cyber Operations: Use and Utility 9. The Politics of Cyber Security Now and in the Future Concluding Remarks
1. An Introduction to the Politics of Cyber-Security
2. What Is Cyber-Security Politics?
3. Cyber-Security Becomes Political: Threat Frames and Countermeasures
4. A Problem Matures When States Become Active
5. The Cyber-Threat Landscape
6. International Cyber-Security Norms, Practices, and Strategy
7. Cyber-Incidents: A Conceptualization
8. Cyber-Operations: Use and Utility
9. The Politics of Cyber-Security Now and in the Future-Concluding Remarks
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826