000 -LEADER |
fixed length control field |
03654nam a22004815i 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
OSt |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20140310151112.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
cr nn 008mamaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
121116s2013 xxk| s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781447147633 |
|
978-1-4471-4763-3 |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA76.9.C66 |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
004 |
Edition number |
23 |
264 #1 - |
-- |
London : |
-- |
Springer London : |
-- |
Imprint: Springer, |
-- |
2013. |
912 ## - |
-- |
ZDB-2-SCS |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Krüger, Jörg. |
Relator term |
editor. |
245 14 - IMMEDIATE SOURCE OF ACQUISITION NOTE |
Title |
The Secure Information Society |
Medium |
[electronic resource] : |
Remainder of title |
Ethical, Legal and Political Challenges / |
Statement of responsibility, etc |
edited by Jörg Krüger, Bertram Nickolay, Sandro Gaycken. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
X, 213 p. 41 illus. |
Other physical details |
online resource. |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Preface -- Section 1 – New Strategic Cybersecurity -- Between War & Peace: Considering the Statecraft of Cyberspace -- Laying an Intellectual Foundation for Cyberdeterrence: Some Initial Steps -- Section 2 – New Regulatory Cybersecurity -- Duties of Care on the Internet -- The Governance of Network and Information Security in the European Union: The European Public-Private Partnership for Resilience (EP3R) -- Data Insecurity: Scams, Blags & Scalawags -- Section 3 – New Technological Cybersecurity -- Content Analysis in the Digital Age: Tools, Functions, and Implications for Security -- Secure Products Using Inherent Features -- Assistant-based Reconstruction of Believed Destroyed Shredded Documents -- In-Memory Technology Enables History-Based Access Control for RFID-Aided Supply Chains. |
520 ## - SUMMARY, ETC. |
Summary, etc |
In our modern information societies, we not only use and welcome computers; we are highly dependent upon them. There is a downside of this kind of progress, however. Computers are not 100% reliable. They are insecure. They are vulnerable to attackers. They can either be attacked directly, to disrupt their services, or they can be abused in clever ways to do the bidding of an attacker as a dysfunctional user. Decision-makers and experts alike always struggle with the amount of interdisciplinary knowledge needed to understand the nuts and bolts of modern information societies and their relation to security, the implications of technological or political progress or the lack thereof. This holds in particular for new challenges to come. These are harder to understand and to categorize; their development is difficult to predict. To mitigate this problem and to enable more foresight, The Secure Information Society provides an interdisciplinary spotlight onto some new and unfolding aspects of the uneasy relationship between information technology and information society, to aid the dialogue not only in its current and ongoing struggle, but to anticipate the future in time and prepare perspectives for the challenges ahead. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer science. |
|
Topical term or geographic name as entry element |
Technology |
General subdivision |
Philosophy. |
|
Topical term or geographic name as entry element |
System safety. |
|
Topical term or geographic name as entry element |
Economics. |
|
Topical term or geographic name as entry element |
Computer Science. |
|
Topical term or geographic name as entry element |
Computers and Society. |
|
Topical term or geographic name as entry element |
Quality Control, Reliability, Safety and Risk. |
|
Topical term or geographic name as entry element |
Philosophy of Technology. |
|
Topical term or geographic name as entry element |
R & D/Technology Policy. |
|
Topical term or geographic name as entry element |
Political Science, general. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Nickolay, Bertram. |
Relator term |
editor. |
|
Personal name |
Gaycken, Sandro. |
Relator term |
editor. |
710 2# - ADDED ENTRY--CORPORATE NAME |
Corporate name or jurisdiction name as entry element |
SpringerLink (Online service) |
773 0# - HOST ITEM ENTRY |
Title |
Springer eBooks |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
Display text |
Printed edition: |
International Standard Book Number |
9781447147626 |
856 40 - ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
http://dx.doi.org/10.1007/978-1-4471-4763-3 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Item type |
E-Book |