Welcome to P K Kelkar Library, Online Public Access Catalogue (OPAC)

Cybersecurity [2nd ed.] (Record no. 567646)

MARC details
000 -LEADER
fixed length control field 02025 a2200205 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250922103629.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250917b |||||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781509558711
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Item number P991c2
100 ## - MAIN ENTRY--AUTHOR NAME
Personal name Puyvelde, Damien Van
245 ## - TITLE STATEMENT
Title Cybersecurity [2nd ed.]
Remainder of title politics, governance and conflict in cyberspace
Statement of responsibility, etc Damien Van Puyvelde and Aaron F. Brantly
250 ## - EDITION STATEMENT
Edition statement 2nd ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Name of publisher Polity Press
Year of publication 2025
Place of publication Cambridge
300 ## - PHYSICAL DESCRIPTION
Number of Pages xiii, 271p
520 ## - SUMMARY, ETC.
Summary, etc In the last decade, the proliferation of billions of new Internet-enabled devices and users has significantly expanded concerns about cybersecurity. How much should we worry about cyber threats and their impact on our lives, society and international affairs? Are these security concerns real, exaggerated or just poorly understood?<br/>In this fully revised and updated second edition of their popular text, Damien Van Puyvelde and Aaron F. Brantly provide a cutting-edge introduction to the key concepts, controversies and policy debates in cybersecurity today. Exploring the interactions of individuals, groups and states in cyberspace, and the integrated security risks to which these give rise, they examine cyberspace as a complex socio-technical-economic domain that fosters both great potential and peril. <br/>Across its ten chapters, the book explores the complexities and challenges of cybersecurity using new case studies – such as NotPetya and Colonial Pipeline – to highlight the evolution of attacks that can exploit and damage individual systems and critical infrastructures. This edition also includes “reader’s guides” and active-learning exercises, in addition to questions for group discussion. Cybersecurity is essential reading for anyone interested in understanding the challenges and opportunities presented by the continued expansion of cyberspace.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Computer crimes prevention
-- Computer security government policy
-- Computers and IT
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Brantly, Aaron F.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Books
Holdings
Withdrawn status Lost status Damaged status Not for loan Collection code Home library Current library Date acquired Source of acquisition Cost, normal purchase price Full call number Accession Number Cost, replacement price Koha item type
      Under Process General Stacks PK Kelkar Library, IIT Kanpur PK Kelkar Library, IIT Kanpur 15/09/2025 2 1781.53 005.8 P991c2 A187038 2375.37 Books

Powered by Koha