Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cover-Page
Halftitle
Title
Copyright
Contents
Acknowledgments
Foreword
Introduction
SECTION I: SECURING DATA, DEVICES, AND NETWORKS
1 Understanding Information Assurance
2 A Path to Collective Security: Information Sharing at the State and Local Level
3 Protecting Industrial Control Systems in Critical Infrastructure
4 Safer at Any Speed: The Roads Ahead for Automotive Cyber Safety Policy
5 Bad Code: Exploring Liability in Software Development
SECTION II: COMBATING CYBER CRIME
6 Understanding Cyber Crime
7 Disrupting Malware Markets
8 The Computer Fraud and Abuse Act: Structure, Controversies, and Proposals for Reform
9 Breach Notification Laws: The Policy and Practice
10 Cyber Insurance: A Market-Based Approach to Information Assurance
SECTION III: GOVERNING THE SECURITY OF THE INTERNET
11 Understanding Internet Security Governance
12 A Holistic Approach to the Encryption Debate
13 Certificate Authorities: Modernizing the Internet’s Chain of Trust
14 Multistakeholder Approaches to Cybersecurity Challenges
15 Countering the Proliferation of Malware
SECTION IV: MILITARY CYBER OPERATIONS
16 Understanding Military Cyber Operations
17 Government Acquisition and Use of Zero-Day Software Vulnerabilities
18 The Joint Cyber Force: Challenges and Opportunities
19 The Practical Impact of Classification Regarding Offensive Cyber Operations
20 Creating Influence through Information
Concluding Remarks
Glossary
Index
Contributors
← Prev
Back
Next →
← Prev
Back
Next →