The Secure Information Society (Record no. 94689)

000 -LEADER
fixed length control field 03741nam a22005055i 4500
001 - CONTROL NUMBER
control field 978-1-4471-4763-3
003 - CONTROL NUMBER IDENTIFIER
control field DE-He213
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20140220082807.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 121116s2013 xxk| s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781447147633
-- 978-1-4471-4763-3
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1007/978-1-4471-4763-3
Source of number or code doi
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.C66
072 #7 - SUBJECT CATEGORY CODE
Subject category code UBJ
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM079000
Source bisacsh
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 004
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Krüger, Jörg.
Relator term editor.
245 14 - TITLE STATEMENT
Title The Secure Information Society
Medium [electronic resource] :
Remainder of title Ethical, Legal and Political Challenges /
Statement of responsibility, etc edited by Jörg Krüger, Bertram Nickolay, Sandro Gaycken.
264 #1 -
-- London :
-- Springer London :
-- Imprint: Springer,
-- 2013.
300 ## - PHYSICAL DESCRIPTION
Extent X, 213 p. 41 illus.
Other physical details online resource.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Preface -- Section 1 – New Strategic Cybersecurity -- Between War & Peace: Considering the Statecraft of Cyberspace -- Laying an Intellectual Foundation for Cyberdeterrence: Some Initial Steps -- Section 2 – New Regulatory Cybersecurity -- Duties of Care on the Internet -- The Governance of Network and Information Security in the European Union: The European Public-Private Partnership for Resilience (EP3R) -- Data Insecurity: Scams, Blags & Scalawags -- Section 3 – New Technological Cybersecurity -- Content Analysis in the Digital Age: Tools, Functions, and Implications for Security -- Secure Products Using Inherent Features -- Assistant-based Reconstruction of Believed Destroyed Shredded Documents -- In-Memory Technology Enables History-Based Access Control for RFID-Aided Supply Chains.
520 ## - SUMMARY, ETC.
Summary, etc In our modern information societies, we not only use and welcome computers; we are highly dependent upon them. There is a downside of this kind of progress, however. Computers are not 100% reliable. They are insecure. They are vulnerable to attackers. They can either be attacked directly, to disrupt their services, or they can be abused in clever ways to do the bidding of an attacker as a dysfunctional user. Decision-makers and experts alike always struggle with the amount of interdisciplinary knowledge needed to understand the nuts and bolts of modern information societies and their relation to security, the implications of technological or political progress or the lack thereof. This holds in particular for new challenges to come. These are harder to understand and to categorize; their development is difficult to predict. To mitigate this problem and to enable more foresight, The Secure Information Society provides an interdisciplinary spotlight onto some new and unfolding aspects of the uneasy relationship between information technology and information society, to aid the dialogue not only in its current and ongoing struggle, but to anticipate the future in time and prepare perspectives for the challenges ahead.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer science.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Technology
General subdivision Philosophy.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element System safety.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Economics.
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer Science.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computers and Society.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Quality Control, Reliability, Safety and Risk.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Philosophy of Technology.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element R & D/Technology Policy.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Political Science, general.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Nickolay, Bertram.
Relator term editor.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Gaycken, Sandro.
Relator term editor.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
773 0# - HOST ITEM ENTRY
Title Springer eBooks
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9781447147626
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://dx.doi.org/10.1007/978-1-4471-4763-3
912 ## -
-- ZDB-2-SCS

No items available.

2017 | The Technical University of Kenya Library | +254(020) 2219929, 3341639, 3343672 | library@tukenya.ac.ke | Haile Selassie Avenue