| 000 | 01341pam a2200277 i 4500 | ||
|---|---|---|---|
| 001 | on2016041237 | ||
| 003 | DLC | ||
| 005 | 20250529154629.0 | ||
| 008 | 161212s2017 enka b 001 0 eng | ||
| 010 | _a2016041237 | ||
| 020 | _a9781498729116 (hardback) | ||
| 020 | _a9781138033290 (paperback) | ||
| 040 |
_aDLC _beng _erda _cDLC _dDLC _dUK-RwCLS |
||
| 050 | 0 |
_aTK5105.59 _b.G85 2017 |
|
| 100 | 1 |
_aGuiora, Amos N., _d1957- _eauthor. |
|
| 245 | 1 | 0 |
_aCybersecurity : _bgeopolitics, law and policy / _cAmos N. Guiora. |
| 300 |
_a170 pages : _billustrations ; _c22 cm. |
||
| 504 | _aIncludes bibliographical references (pages 164-165) and index. | ||
| 505 | 0 | _aAn introduction to cyber-security -- What is cyber-security? -- Geo-politics & cyber-security -- International law & cyber-security -- Development & implementation of cyber-security policy -- How do corporations respond to cyber-crime? -- How can individuals mitigate cyber-security? -- How does law enforcement mitigate cyber-security? -- Cyber-security in the future -- Final word. | |
| 650 | 0 |
_aComputer networks _xSecurity measures _xGovernment policy. |
|
| 650 | 0 |
_aComputer security _xGovernment policy. |
|
| 650 | 0 |
_aComputer crimes _xPrevention. |
|
| 650 | 0 | _aTechnology and international relations. | |
| 650 | 0 | _aCyber intelligence (Computer security) | |
| 942 |
_2lcc _cBK |
||
| 999 |
_c3487 _d3487 |
||