Local cover image
Local cover image
Normal view

Semi-state actors in cybersecurity / Florian J. Egloff.

By: Material type: Computer fileComputer filePublisher: New York, New York : Oxford University Press, 2022Copyright date: ©2022Description: 1 online resource (286 pages) : illustrationsContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9780197579305
Subject(s): Genre/Form: LOC classification:
  • HV6773 .E356 2022
Contents:
INTRODUCTION AND RESEARCH STRATEGY-- 1. Introduction-- 2. Using a Historical Analogy as a Research Strategy.
HISTORIES OF THE SEA AND CYBERSPACE, COMPARISON, AND LOCATING THE ANALOGY IN TIME-- 3. A History of the Loosely Governed Seas between the 16th and 19th Centuries: From the Age of Privateering to Its Abolition-- 4. A Brief History of Cyberspace: Origins and Development of (In-) Security in Cyberspace-- 5. The Sea and Cyberspace: Comparison and Analytical Lines of Enquiry.
APPLYING THE ANALOGY TO CYBERSECURITY-- 6. Cyber Pirates and Privateers: State Proxies, Criminals, and Independent Patriotic Hackers-- 7. Cyber Mercantile Companies: Conflict and Cooperation.
CONCLUSION-- Conclusion.
List(s) this item appears in: Electronic Books | الكتب الإلكترونية
Holdings
Item type Current library Call number URL Status Date due Barcode
Online Resource Online Resource UAE Federation Library | مكتبة اتحاد الإمارات Online Copy | نسخة إلكترونية Link to resource Not for loan

Includes bibliographical references and index.

INTRODUCTION AND RESEARCH STRATEGY-- 1. Introduction-- 2. Using a Historical Analogy as a Research Strategy.

HISTORIES OF THE SEA AND CYBERSPACE, COMPARISON, AND LOCATING THE ANALOGY IN TIME-- 3. A History of the Loosely Governed Seas between the 16th and 19th Centuries: From the Age of Privateering to Its Abolition-- 4. A Brief History of Cyberspace: Origins and Development of (In-) Security in Cyberspace-- 5. The Sea and Cyberspace: Comparison and Analytical Lines of Enquiry.

APPLYING THE ANALOGY TO CYBERSECURITY-- 6. Cyber Pirates and Privateers: State Proxies, Criminals, and Independent Patriotic Hackers-- 7. Cyber Mercantile Companies: Conflict and Cooperation.

CONCLUSION-- Conclusion.

Description based on print version record.

Electronic reproduction. Ann Arbor, MI : ProQuest, 2018. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.

Click on an image to view it in the image viewer

Local cover image
Share

Abu Dhabi, United Arab Emirates

reference@ecssr.ae

+97124044780

Copyright © 2024 Emirates Center for Strategic Studies and Research All Rights Reserved