Cybersecurity : geopolitics, law, and policy / Amos N. Guiora.
نوع المادة : نصالناشر:Abingdon, Oxon ; New York, NY : Routledge, 2017وصف:170 pages ; 22 cmنوع المحتوى:- text
- unmediated
- volume
- 9781498729116
- 1498729118
- 9781138033290
- 1138033294
- TK5105.59 .G85 2017
نوع المادة | المكتبة الحالية | رقم الطلب | رقم النسخة | حالة | تاريخ الإستحقاق | الباركود | |
---|---|---|---|---|---|---|---|
كتاب | UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة | TK5105.59 .G85 2017 (إستعراض الرف(يفتح أدناه)) | C.1 | Library Use Only | داخل المكتبة فقط | 30020000028258 | ||
كتاب | UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة | TK5105.59 .G85 2017 (إستعراض الرف(يفتح أدناه)) | C.2 | Library Use Only | داخل المكتبة فقط | 30020000028255 |
Browsing UAE Federation Library | مكتبة اتحاد الإمارات shelves, Shelving location: General Collection | المجموعات العامة إغلاق مستعرض الرف(يخفي مستعرض الرف)
TK5105.59 G387 2004 The information security dictionary : defining the terms that define security for E-business, Internet, information, and wireless technology / | TK5105.59 G387 2004 The information security dictionary : defining the terms that define security for E-business, Internet, information, and wireless technology / | TK5105.59 .G85 2017 Cybersecurity : geopolitics, law, and policy / | TK5105.59 .G85 2017 Cybersecurity : geopolitics, law, and policy / | TK5105.59 .H3533 2012 Handbook on securing cyber-physical critical infrastructure : foundation and challenges / | TK5105.59 .H3533 2012 Handbook on securing cyber-physical critical infrastructure : foundation and challenges / | TK5105.59 H673 2013 Official (ISC)² guide to the CAP CBK / |
Includes bibliographical references and index.
An introduction to cyber-security -- What is cyber-security? -- Geo-politics and cyber-security -- International law and cyber-security -- Development and implementation of cyber-security policy -- How do corporations respond to cyber-crime? -- How can individuals mitigate cyber-security? -- How does law enforcement mitigate cyber-security? -- Cyber-security in the future -- Final word.