000 | 03625nam a22003855i 4500 | ||
---|---|---|---|
001 | 286693 | ||
003 | MX-SnUAN | ||
005 | 20160429154512.0 | ||
007 | cr nn 008mamaa | ||
008 | 150903s2013 xxk| o |||| 0|eng d | ||
020 |
_a9781447147633 _99781447147633 |
||
024 | 7 |
_a10.1007/9781447147633 _2doi |
|
035 | _avtls000339911 | ||
039 | 9 |
_a201509030320 _bVLOAD _c201404300407 _dVLOAD _y201402061012 _zstaff |
|
040 |
_aMX-SnUAN _bspa _cMX-SnUAN _erda |
||
050 | 4 | _aQA76.9.C66 | |
100 | 1 |
_aKrüger, Jörg. _eeditor. _9315468 |
|
245 | 1 | 4 |
_aThe Secure Information Society : _bEthical, Legal and Political Challenges / _cedited by Jörg Krüger, Bertram Nickolay, Sandro Gaycken. |
264 | 1 |
_aLondon : _bSpringer London : _bImprint: Springer, _c2013. |
|
300 |
_ax, 213 páginas 41 ilustraciones _brecurso en línea. |
||
336 |
_atexto _btxt _2rdacontent |
||
337 |
_acomputadora _bc _2rdamedia |
||
338 |
_arecurso en línea _bcr _2rdacarrier |
||
347 |
_aarchivo de texto _bPDF _2rda |
||
500 | _aSpringer eBooks | ||
505 | 0 | _aPreface -- Section 1 – New Strategic Cybersecurity -- Between War & Peace: Considering the Statecraft of Cyberspace -- Laying an Intellectual Foundation for Cyberdeterrence: Some Initial Steps -- Section 2 – New Regulatory Cybersecurity -- Duties of Care on the Internet -- The Governance of Network and Information Security in the European Union: The European Public-Private Partnership for Resilience (EP3R) -- Data Insecurity: Scams, Blags & Scalawags -- Section 3 – New Technological Cybersecurity -- Content Analysis in the Digital Age: Tools, Functions, and Implications for Security -- Secure Products Using Inherent Features -- Assistant-based Reconstruction of Believed Destroyed Shredded Documents -- In-Memory Technology Enables History-Based Access Control for RFID-Aided Supply Chains. | |
520 | _aIn our modern information societies, we not only use and welcome computers; we are highly dependent upon them. There is a downside of this kind of progress, however. Computers are not 100% reliable. They are insecure. They are vulnerable to attackers. They can either be attacked directly, to disrupt their services, or they can be abused in clever ways to do the bidding of an attacker as a dysfunctional user. Decision-makers and experts alike always struggle with the amount of interdisciplinary knowledge needed to understand the nuts and bolts of modern information societies and their relation to security, the implications of technological or political progress or the lack thereof. This holds in particular for new challenges to come. These are harder to understand and to categorize; their development is difficult to predict. To mitigate this problem and to enable more foresight, The Secure Information Society provides an interdisciplinary spotlight onto some new and unfolding aspects of the uneasy relationship between information technology and information society, to aid the dialogue not only in its current and ongoing struggle, but to anticipate the future in time and prepare perspectives for the challenges ahead. | ||
590 | _aPara consulta fuera de la UANL se requiere clave de acceso remoto. | ||
700 | 1 |
_aNickolay, Bertram. _eeditor. _9315469 |
|
700 | 1 |
_aGaycken, Sandro. _eeditor. _9315470 |
|
710 | 2 |
_aSpringerLink (Servicio en línea) _9299170 |
|
776 | 0 | 8 |
_iEdición impresa: _z9781447147626 |
856 | 4 | 0 |
_uhttp://remoto.dgb.uanl.mx/login?url=http://dx.doi.org/10.1007/978-1-4471-4763-3 _zConectar a Springer E-Books (Para consulta externa se requiere previa autentificación en Biblioteca Digital UANL) |
942 | _c14 | ||
999 |
_c286693 _d286693 |