Cybersecurity in context : technology, policy, and law
Publication details: John Wiley 2025 Hoboken, New JerseyDescription: xxvii, 506 pISBN:- 9781394262441
- 343.995 H761c
Item type | Current library | Collection | Call number | Status | Date due | Barcode | Item holds | |
---|---|---|---|---|---|---|---|---|
![]() |
PK Kelkar Library, IIT Kanpur | General Stacks | 343.995 H761c (Browse shelf(Opens below)) | Available | A186891 |
Browsing PK Kelkar Library, IIT Kanpur shelves, Shelving location: General Stacks, Collection: General Stacks Close shelf browser (Hides shelf browser)
![]() |
![]() |
![]() |
![]() |
![]() |
No cover image available | No cover image available | ||
006.31 M366d Deep learning a practical introduction | 006.31 Z61m Mathematical analysis of machine learning algorithms | 333.79 R498e4 Energy and the environment [4th ed.] | 343.995 H761c Cybersecurity in context technology, policy, and law | 363.728 H27i Introduction to waste management a textbook | 510 An72 AOMS no.211 Annals of mathematics studies [56-books series] | 510 An72 AOMS no.81 Annals of mathematics studies [56-books series] |
Includes bibliographical references and index
What is cybersecurity? Technology basics & attribution -- Cybersecurity's contours. Economics and the human factor -- The Military & intelligence community -- Cybersecurity
theory -- Cybersecurity law & policy. Consumer protection law -- Criminal Law -- Critical infrastructure -- Intellectual property rights -- The private sector -- Cybersecurity and the
future. Cybersecurity tussles -- Cybersecurity futures
Cybersecurity integrates aspects of both computer science and social sciences, ranging from economics to psychology to law. To understand cybersecurity, one must have fundamental familiarity with a variety of concepts. These include the "halting problem" which makes it impossible to use a computer to tell whether another system is secure, issues with how new security problems emerge from computer networks, the difference between data and information and which should be the focus of cybersecurity, the science of analyzing computers and networks for malicious software, and the need for security balanced with psychological, economic, and practical impediments that prevent us from realizing secure systems
There are no comments on this title.