The Secure Information Society Ethical, Legal and Political Challenges /
In our modern information societies, we not only use and welcome computers; we are highly dependent upon them. There is a downside of this kind of progress, however. Computers are not 100% reliable. They are insecure. They are vulnerable to attackers. They can either be attacked directly, to disrupt...
Published in: | Springer eBooks |
---|---|
Corporate Author: | |
Other Authors: | , , |
Format: | eBook |
Language: | English |
Published: |
London :
Springer London : Imprint: Springer,
2013.
|
Subjects: | |
Online Access: | http://dx.doi.org/10.1007/978-1-4471-4763-3 Перейти в каталог НБ ТГУ |
Table of Contents:
- Preface
- Section 1 - New Strategic Cybersecurity
- Between War & Peace: Considering the Statecraft of Cyberspace
- Laying an Intellectual Foundation for Cyberdeterrence: Some Initial Steps
- Section 2 - New Regulatory Cybersecurity
- Duties of Care on the Internet
- The Governance of Network and Information Security in the European Union: The European Public-Private Partnership for Resilience (EP3R)
- Data Insecurity: Scams, Blags & Scalawags
- Section 3 - New Technological Cybersecurity
- Content Analysis in the Digital Age: Tools, Functions, and Implications for Security
- Secure Products Using Inherent Features
- Assistant-based Reconstruction of Believed Destroyed Shredded Documents
- In-Memory Technology Enables History-Based Access Control for RFID-Aided Supply Chains.