| 000 | 01554cam a2200325 i 4500 | ||
|---|---|---|---|
| 999 |
_c12053 _d12053 |
||
| 001 | 19404314 | ||
| 005 | 20210418122213.0 | ||
| 008 | 161212s2017 enk b 001 0 eng | ||
| 020 | _a9781138033290 | ||
| 040 |
_aEG-NcFUE _beng _cEG-NcFUE _erda |
||
| 082 | 0 | 0 |
_a005.8 _223 _bG.A.C |
| 100 | 1 |
_aGuiora, Amos N., _d1957- _eauthor. |
|
| 245 | 1 | 0 |
_aCybersecurity : _bgeopolitics, law and policy / _cAmos N. Guiora. |
| 264 | 1 |
_aLondon ; _aNew York : _bRoutledge, Taylor & Francis Group, _c2017 |
|
| 300 |
_a170 pages ; _c23 cm |
||
| 336 |
_2rdacontent _atext _btxt |
||
| 337 |
_2rdamedia _aunmediated _bn |
||
| 338 |
_2rdacarrier _avolume _bnc |
||
| 500 | 0 | _aIncludes appendix | |
| 504 | _aIncludes bibliographical references (pages 164-165) and index. | ||
| 505 | 0 | _a1. An Introduction to Cyber-Security 2. What is Cyber-Security? 3. Geo-Politics & Cyber-Security 4. International Law & Cyber-Security 5. Development & Implementation of Cyber-Security Policy 6. How Do Corporations Respond to Cyber-Crime? 7. How Can Individuals Mitigate Cyber-Security? 8. How Does Law Enforcement Mitigate Cyber-Security? 9. Cyber-Security in the Future 10. Final Word | |
| 650 | 0 |
_aComputer networks _xSecurity measures _xGovernment policy. |
|
| 650 | 0 |
_aComputer security _xGovernment policy. |
|
| 650 | 0 |
_aComputer crimes _xPrevention. |
|
| 650 | 0 | _aTechnology and international relations. | |
| 650 | 0 | _aCyber intelligence (Computer security) | |
| 650 | 0 |
_aComputer security _xLaw and legislation |
|
| 942 |
_2ddc _cBK |
||