OverDrive would like to use cookies to store information on your computer to improve your user experience at our Website. One of the cookies we use is critical for certain aspects of the site to operate and has already been set. You may delete and block all cookies from this site, but this could affect certain features or services of the site. To find out more about the cookies we use and how to delete them, click here to see our Privacy Policy.
This book presents a holistic view of the geopolitics of cyberspace that have arisen over the past decade, utilizing recent events to explain the international security dimension of cyber threat and vulnerability, and to document the challenges of controlling information resources and protecting computer systems. How are the evolving cases of cyber attack and breach as well as the actions of government and corporations shaping how cyberspace is governed? What object lessons are there in security cases such as those involving Wikileaks and the Snowden affair? An essential read for practitioners, scholars, and students of international affairs and security, this book examines the widely pervasive and enormously effective nature of cyber threats today, explaining why cyber attacks happen, how they matter, and how they may be managed. The book addresses a chronology of events starting in 2005 to comprehensively explain the international security dimension of cyber threat and vulnerability. It begins with an explanation of contemporary information technology, including the economics of contemporary cloud, mobile, and control systems software as well as how computing and networking—principally the Internet—are interwoven in the concept of cyberspace. Author Chris Bronk, PhD, then documents the national struggles with controlling information resources and protecting computer systems. The book considers major security cases such as Wikileaks, Stuxnet, the cyber attack on Estonia, Shamoon, and the recent exploits of the Syrian Electronic Army. Readers will understand how cyber security in the 21st century is far more than a military or defense issue, but is a critical matter of international law, diplomacy, commerce, and civil society as well.
This book presents a holistic view of the geopolitics of cyberspace that have arisen over the past decade, utilizing recent events to explain the international security dimension of cyber threat and vulnerability, and to document the challenges of controlling information resources and protecting computer systems. How are the evolving cases of cyber attack and breach as well as the actions of government and corporations shaping how cyberspace is governed? What object lessons are there in security cases such as those involving Wikileaks and the Snowden affair? An essential read for practitioners, scholars, and students of international affairs and security, this book examines the widely pervasive and enormously effective nature of cyber threats today, explaining why cyber attacks happen, how they matter, and how they may be managed. The book addresses a chronology of events starting in 2005 to comprehensively explain the international security dimension of cyber threat and vulnerability. It begins with an explanation of contemporary information technology, including the economics of contemporary cloud, mobile, and control systems software as well as how computing and networking—principally the Internet—are interwoven in the concept of cyberspace. Author Chris Bronk, PhD, then documents the national struggles with controlling information resources and protecting computer systems. The book considers major security cases such as Wikileaks, Stuxnet, the cyber attack on Estonia, Shamoon, and the recent exploits of the Syrian Electronic Army. Readers will understand how cyber security in the 21st century is far more than a military or defense issue, but is a critical matter of international law, diplomacy, commerce, and civil society as well.
Due to publisher restrictions the library cannot purchase additional copies of this title, and we apologize if there is a long waiting list. Be sure to check for other copies, because there may be other editions available.
Due to publisher restrictions the library cannot purchase additional copies of this title, and we apologize if there is a long waiting list. Be sure to check for other copies, because there may be other editions available.
About the Author-
Chris Bronk, PhD, is assistant professor of computer and information systems and associate director of the Center for Information Security Research and Education at the University of Houston's College of Technology.
Title Information+
Publisher
Bloomsbury Publishing
OverDrive Read
Release date:
EPUB eBook
Release date:
Digital Rights Information+
Copyright Protection (DRM) required by the Publisher may be applied to this title to limit or prohibit printing or copying. File sharing or redistribution is prohibited. Your rights to access this material expire at the end of the lending period. Please see Important Notice about Copyrighted Materials for terms applicable to this content.
Please update to the latest version of the OverDrive app to stream videos.
Device Compatibility Notice
The OverDrive app is required for this format on your current device.
Bahrain, Egypt, Hong Kong, Iraq, Israel, Jordan, Kuwait, Lebanon, Libya, Mauritania, Morocco, Oman, Palestine, Qatar, Saudi Arabia, the Sudan, the Syrian Arab Republic, Tunisia, Turkey, the United Arab Emirates, and Yemen
You've reached your library's checkout limit for digital titles.
To make room for more checkouts, you may be able to return titles from your Checkouts page.
Excessive Checkout Limit Reached.
There have been too many titles checked out and returned by your account within a short period of time.
Try again in several days. If you are still not able to check out titles after 7 days, please contact Support.
You have already checked out this title. To access it, return to your Checkouts page.
This title is not available for your card type. If you think this is an error contact support.
There are no copies of this issue left to borrow. Please try to borrow this title again when a new issue is released.
| Sign In
You will be prompted to sign into your library account on the next page.
If this is your first time selecting “Send to NOOK,” you will then be taken to a Barnes & Noble page to sign into (or create) your NOOK account. You should only have to sign into your NOOK account once to link it to your library account. After this one-time step, periodicals will be automatically sent to your NOOK account when you select "Send to NOOK."
The first time you select “Send to NOOK,” you will be taken to a Barnes & Noble page to sign into (or create) your NOOK account. You should only have to sign into your NOOK account once to link it to your library account. After this one-time step, periodicals will be automatically sent to your NOOK account when you select "Send to NOOK."
You can read periodicals on any NOOK tablet or in the free NOOK reading app for iOS, Android or Windows 8.