Power and Security in the Information Age
Power and Security in the Information Age
Investigating the Role of the State in Cyberspace
Mauer, Victor; Cavelty, Myriam Dunn
Taylor & Francis Ltd
12/2007
182
Dura
Inglês
9780754670889
15 a 20 dias
500
Descrição não disponível.
Chapter 1 Introduction: Information, Power, and Security - An Outline of Debates and Implications, Myriam Dunn Cavelty, Elgin M. Brunner; Chapter 2 Is Anything Ever New? - Exploring the Specificities of Security and Governance in the Information Age, Myriam Dunn Cavelty; Chapter 3 Meta-power, Networks, Security and Commerce, J.P. Singh; Chapter 4 Cyberspace and Sovereignty: Thoughts on Physical Space and Digital Space, Geoffrey L. Herrera; Chapter 5 Terrorist Use of the Internet and the Challenges of Governing Cyberspace, Maura Conway; Chapter 6 Improving Information Security in Companies: How to Meet the Need for Threat Information, Manuel Suter; Chapter 7 The Role of the State in Securing the Information Age - Challenges and Prospects, Myriam Dunn Cavelty, Victor Mauer;
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
critical;infrastructure;protection;john;perry;barlow;soft;breaches;foster;sharing;Information Infrastructure;USA Patriot Act;Critical Information Infrastructure Protection;WSIS;Public Private Partnership;CIP;Information Revolution;Internet Governance;Terrorist Websites;Information Security;Information Security Breaches;Internet Haganah;Stakeholders Circle;Designated Foreign Terrorist Organizations;Foster Information Sharing;Anarchist Cookbook;Status Quo Interests;Current Information Revolution;Vice Versa;International Humanitarian Law;Common Language;Topical Complex;Complexity Researcher;Gps Receiver;ICT Today
Chapter 1 Introduction: Information, Power, and Security - An Outline of Debates and Implications, Myriam Dunn Cavelty, Elgin M. Brunner; Chapter 2 Is Anything Ever New? - Exploring the Specificities of Security and Governance in the Information Age, Myriam Dunn Cavelty; Chapter 3 Meta-power, Networks, Security and Commerce, J.P. Singh; Chapter 4 Cyberspace and Sovereignty: Thoughts on Physical Space and Digital Space, Geoffrey L. Herrera; Chapter 5 Terrorist Use of the Internet and the Challenges of Governing Cyberspace, Maura Conway; Chapter 6 Improving Information Security in Companies: How to Meet the Need for Threat Information, Manuel Suter; Chapter 7 The Role of the State in Securing the Information Age - Challenges and Prospects, Myriam Dunn Cavelty, Victor Mauer;
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
critical;infrastructure;protection;john;perry;barlow;soft;breaches;foster;sharing;Information Infrastructure;USA Patriot Act;Critical Information Infrastructure Protection;WSIS;Public Private Partnership;CIP;Information Revolution;Internet Governance;Terrorist Websites;Information Security;Information Security Breaches;Internet Haganah;Stakeholders Circle;Designated Foreign Terrorist Organizations;Foster Information Sharing;Anarchist Cookbook;Status Quo Interests;Current Information Revolution;Vice Versa;International Humanitarian Law;Common Language;Topical Complex;Complexity Researcher;Gps Receiver;ICT Today