Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Cover-Page Halftitle Title Copyright Contents Acknowledgments Foreword Introduction SECTION I: SECURING DATA, DEVICES, AND NETWORKS
1 Understanding Information Assurance 2 A Path to Collective Security: Information Sharing at the State and Local Level 3 Protecting Industrial Control Systems in Critical Infrastructure 4 Safer at Any Speed: The Roads Ahead for Automotive Cyber Safety Policy 5 Bad Code: Exploring Liability in Software Development
SECTION II: COMBATING CYBER CRIME
6 Understanding Cyber Crime 7 Disrupting Malware Markets 8 The Computer Fraud and Abuse Act: Structure, Controversies, and Proposals for Reform 9 Breach Notification Laws: The Policy and Practice 10 Cyber Insurance: A Market-Based Approach to Information Assurance
SECTION III: GOVERNING THE SECURITY OF THE INTERNET
11 Understanding Internet Security Governance 12 A Holistic Approach to the Encryption Debate 13 Certificate Authorities: Modernizing the Internet’s Chain of Trust 14 Multistakeholder Approaches to Cybersecurity Challenges 15 Countering the Proliferation of Malware
SECTION IV: MILITARY CYBER OPERATIONS
16 Understanding Military Cyber Operations 17 Government Acquisition and Use of Zero-Day Software Vulnerabilities 18 The Joint Cyber Force: Challenges and Opportunities 19 The Practical Impact of Classification Regarding Offensive Cyber Operations 20 Creating Influence through Information
Concluding Remarks Glossary Index Contributors
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion