Cybersecurity [2nd ed.] (Record no. 567646)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 02025 a2200205 4500 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | OSt |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20250922103629.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 250917b |||||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9781509558711 |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 |
Item number | P991c2 |
100 ## - MAIN ENTRY--AUTHOR NAME | |
Personal name | Puyvelde, Damien Van |
245 ## - TITLE STATEMENT | |
Title | Cybersecurity [2nd ed.] |
Remainder of title | politics, governance and conflict in cyberspace |
Statement of responsibility, etc | Damien Van Puyvelde and Aaron F. Brantly |
250 ## - EDITION STATEMENT | |
Edition statement | 2nd ed. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Name of publisher | Polity Press |
Year of publication | 2025 |
Place of publication | Cambridge |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | xiii, 271p |
520 ## - SUMMARY, ETC. | |
Summary, etc | In the last decade, the proliferation of billions of new Internet-enabled devices and users has significantly expanded concerns about cybersecurity. How much should we worry about cyber threats and their impact on our lives, society and international affairs? Are these security concerns real, exaggerated or just poorly understood?<br/>In this fully revised and updated second edition of their popular text, Damien Van Puyvelde and Aaron F. Brantly provide a cutting-edge introduction to the key concepts, controversies and policy debates in cybersecurity today. Exploring the interactions of individuals, groups and states in cyberspace, and the integrated security risks to which these give rise, they examine cyberspace as a complex socio-technical-economic domain that fosters both great potential and peril. <br/>Across its ten chapters, the book explores the complexities and challenges of cybersecurity using new case studies – such as NotPetya and Colonial Pipeline – to highlight the evolution of attacks that can exploit and damage individual systems and critical infrastructures. This edition also includes “reader’s guides” and active-learning exercises, in addition to questions for group discussion. Cybersecurity is essential reading for anyone interested in understanding the challenges and opportunities presented by the continued expansion of cyberspace. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical Term | Computer crimes prevention |
-- | Computer security government policy |
-- | Computers and IT |
700 ## - ADDED ENTRY--PERSONAL NAME | |
Personal name | Brantly, Aaron F. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | Books |
Withdrawn status | Lost status | Damaged status | Not for loan | Collection code | Home library | Current library | Date acquired | Source of acquisition | Cost, normal purchase price | Full call number | Accession Number | Cost, replacement price | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Under Process | General Stacks | PK Kelkar Library, IIT Kanpur | PK Kelkar Library, IIT Kanpur | 15/09/2025 | 2 | 1781.53 | 005.8 P991c2 | A187038 | 2375.37 | Books |