Fr. 110.00

Cybersecurity in Context - Technology, Policy, and Law

English · Hardback

Shipping usually within 1 to 3 weeks (not available at short notice)

Description

Read more

Informationen zum Autor Chris Jay Hoofnagle is Professor of Law in Residence at the University of California, Berkeley, where he has taught since 2006. He has published extensively on cybersecurity law and related subjects, and is a practicing attorney with venture law firm Gunderson Dettmer, as well as an advisor to multiple defense and intelligence technology companies. Golden G. Richard III is Professor of Computer Science and Director of the Cyber Center at Louisiana State University. He is a Fellow of the American Academy of Forensic Sciences with over thirty years of experience in teaching cybersecurity and related topics in computer science. His primary areas of expertise are in memory forensics, digital forensics, malware analysis, reverse engineering, and systems programming. Klappentext "A masterful guide to the interplay between cybersecurity and its societal, economic, and political impacts, equipping students with the critical thinking needed to navigate and influence security for our digital world." --JOSIAH DYKSTRA, Trail of Bits "A comprehensive, multidisciplinary introduction to the technology and policy of cybersecurity. Start here if you are looking for an entry point to cyber." --BRUCE SCHNEIER, author of A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend Them Back The first-ever introduction to the full range of cybersecurity challenges Cybersecurity is crucial for preserving freedom in a connected world. Securing customer and business data, preventing election interference and the spread of disinformation, and understanding the vulnerabilities of key infrastructural systems are just a few of the areas in which cybersecurity professionals are indispensable. This textbook provides a comprehensive, student-oriented introduction to this capacious, interdisciplinary subject. Cybersecurity in Context covers both the policy and practical dimensions of the field. Beginning with an introduction to cybersecurity and its major challenges, it proceeds to discuss the key technologies which have brought cybersecurity to the fore, its theoretical and methodological frameworks and the legal and enforcement dimensions of the subject. The result is a cutting-edge guide to all key aspects of one of this century's most important fields. Cybersecurity in Context is ideal for students in introductory cybersecurity classes, and for IT professionals looking to ground themselves in this essential field. Inhaltsverzeichnis About the Authors xiii Preface xv Acknowledgments xix About the Companion Website xxi Introduction xxiii I What is Cybersecurity? 1 What Is Cybersecurity? 3 1.1 What Is the Cyber in Cybersecurity? 5 1.1.1 Cyberspace's Places and the Problem of Internet Sovereignty 8 1.2 What Is the Security in Cybersecurity? The "CIA" Triad 12 1.2.1 The Internet's Threat Model 15 1.2.2 Computer Security Versus "Cybersecurity" 19 1.2.3 Security, Innovation, "Hacking" 23 1.2.4 Security from a Private Sector Perspective 24 1.2.5 Building on the CIA Triad 26 1.2.6 Cybersecurity Definitions 27 1.3 Encryption Is Critical in Cybersecurity 28 1.3.1 Modern Cryptosystems 29 1.3.2 Hashing 33 1.4 Cyberpower: How Insecurity Empowers and Undermines Nations 37 1.5 Is Disinformation a Cybersecurity Concern? 40 1.5.1 From Information Scarcity to Glut 41 1.5.2 The Power of Influence Campaigns on the Internet 43 1.5.3 Libicki's Disinformation Framework 46 1.5.4 The US Approach: Free Speech First 48 1.5.5 Election Interference 50 1.5.6 Is There Really Reason to Be Concerned? 53 1.6 International Views 55 1.7 Conclusion: A Broad Approach 57 2 Technology Basics and Attribution 59 2...

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.