Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Cover Contents Title page Copyright page Figures, Tables and Storyboxes
Figures Tables Storyboxes
Acknowledgments Abbreviations Introduction
Our approach Notes
1 The expanding scope of cybersecurity
A brief history of the computer An open network of networks The spread of the Internet The rise of cyber threats A global security issue
Discussion questions Further resources
Notes
2 What is cyberspace?
Defining cyberspace Physical-network layer Logical-network layer Persona layer Understanding cyberspace: The technical value
Discussion questions Further resources
Notes
3 Governing cyberspace
Technical governance of cyberspace The political, social and economic governance of cyberspace The laws and norms of cyberspace Internet governance is a complicated mess
Discussion questions Further resources
Notes
4 Cyber capabilities and insecurity
The arsenal of possibilities Developing offensive cyber capabilities Criminal cyber-capability development State cyber-capability development The effects and characteristics of cyber capabilities Cyber capabilities: A weapon?
Discussion questions Further resources
Notes
5 National cybersecurity and strategy
Cyber power, national security and strategy China: controlling information Russia’s holistic approach The United States: A pro-active cyber power Common lenses and challenges
Discussion questions Further reading
Notes
6 Cyber war
War in the fifth domain Cyber war is coming! Will cyber war take place? From cyber war to cyber conflict Cyberspace and military operations Conclusion
Discussion questions Further resources
Notes
7 Non-state threats: From cybercrime to terrorism
Criminals Hacktivists Cyberterrorists The non-state actor(s)
Discussion questions Further reading
Notes
8 Organizing deterrence and defense in cyberspace
Technical cyber defense and deterrence by denial Defense through deterrence by punishment Conclusion: The painful reality
Discussion questions Further resources
Notes
9 Cybersecurity and democracy
Democracy and security in cyberspace A liberation technology Whose cybersecurity? Encryption and cyber (in)security Conclusion
Discussion questions Further reading
Notes
10 The futures of cybersecurity
Toward an ever more interconnected world: The Internet of Things Big data and artificial intelligence Human–machine interactions Conclusion: Adapting to the evolving cybersecurity environment Notes
Bibliography Index End User License Agreement
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion