Record ID | marc_columbia/Columbia-extract-20221130-031.mrc:43778793:4282 |
Source | marc_columbia |
Download Link | /show-records/marc_columbia/Columbia-extract-20221130-031.mrc:43778793:4282?format=raw |
LEADER: 04282cam a2200685 a 4500
001 15071015
005 20220618231108.0
006 m o d
007 cr cnu---unuuu
008 071213s2008 enk ob 001 0 eng d
035 $a(OCoLC)ocn183601162
035 $a(NNC)15071015
040 $aN$T$beng$epn$cN$T$dYDXCP$dBUF$dOCLCQ$dOSU$dCDX$dIDEBK$dE7B$dOCLCQ$dREDDC$dOCLCQ$dTYFRS$dDEBSZ$dOCLCQ$dOTZ$dOCLCQ$dOCLCA$dOCLCF$dOCLCQ$dU3W$dUKAHL$dOCLCQ$dUWK$dK6U$dOCLCO$dOCLCQ$dOCLCO
019 $a213384458$a243828301$a648328857$a1086490011
020 $a0203937414$q(electronic bk.)
020 $a9780203937419$q(electronic bk.)
020 $z0415429811
020 $z9780415429818
035 $a(OCoLC)183601162$z(OCoLC)213384458$z(OCoLC)243828301$z(OCoLC)648328857$z(OCoLC)1086490011
043 $an-us---
050 4 $aQA76.9.A25$bD87 2008eb
072 7 $aCOM$x060040$2bisacsh
072 7 $aCOM$x043050$2bisacsh
072 7 $aCOM$x053000$2bisacsh
082 04 $a005.8$222
049 $aZCUA
100 1 $aDunn Cavelty, Myriam.
245 10 $aCyber-security and threat politics :$bUS efforts to secure the information age /$cMyriam Dunn Cavelty.
260 $aMilton Park, Abingdon, Oxon ;$aNew York :$bRoutledge,$c2008.
300 $a1 online resource (ix, 182 pages)
336 $atext$btxt$2rdacontent
337 $acomputer$bc$2rdamedia
338 $aonline resource$bcr$2rdacarrier
490 1 $aCSS studies in security and international relations
504 $aIncludes bibliographical references and index.
505 0 $aIntroduction -- The information age and cyber-threats : shifting meanings and interpretations -- Politics and threat construction : theoretical underpinnings -- The hostile intelligence threat, data security, and encryption set the stage -- Asymmetric vulnerabilities and the double-edged sword of information warfare : developments in the military domain -- Critical infrastructures and homeland security -- Securing the information age : failed securitisation or a new logic of security? -- Cyber-threats and security in the information age : issues and implications.
588 0 $aPrint version record.
520 $aThis book explores the political process behind the construction of cyber-threats as one of the quintessential security threats of modern times in the US. Myriam Dunn Cavelty posits that cyber-threats are definable by their unsubstantiated nature. Despite this, they have been propelled to the forefront of the political agenda. Using an innovative theoretical approach, this book examines how, under what conditions, by whom, for what reasons, and with what impact cyber-threats have been moved on to the political agenda. In particular, it analyses how governments have used threat frames,
650 0 $aComputer security$zUnited States.
650 0 $aComputer security$xGovernment policy$zUnited States.
650 0 $aThreats$xGovernment policy$zUnited States.
650 0 $aComputer networks$xSecurity measures$zUnited States.
650 0 $aNational security$zUnited States.
650 6 $aSécurité informatique$zÉtats-Unis.
650 6 $aSécurité informatique$xPolitique gouvernementale$zÉtats-Unis.
650 6 $aMenaces$xPolitique gouvernementale$zÉtats-Unis.
650 6 $aRéseaux d'ordinateurs$xSécurité$xMesures$zÉtats-Unis.
650 7 $aCOMPUTERS$xInternet$xSecurity.$2bisacsh
650 7 $aCOMPUTERS$xNetworking$xSecurity.$2bisacsh
650 7 $aCOMPUTERS$xSecurity$xGeneral.$2bisacsh
650 7 $aComputer networks$xSecurity measures.$2fast$0(OCoLC)fst00872341
650 7 $aComputer security.$2fast$0(OCoLC)fst00872484
650 7 $aComputer security$xGovernment policy.$2fast$0(OCoLC)fst00872490
650 7 $aNational security.$2fast$0(OCoLC)fst01033711
651 7 $aUnited States.$2fast$0(OCoLC)fst01204155
655 4 $aElectronic books.
776 08 $iPrint version:$aDunn Cavelty, Myriam.$tCyber-security and threat politics.$dMilton Park, Abingdon, Oxon ; New York : Routledge, 2007$z9780415429818$w(DLC) 2007022679$w(OCoLC)137331503
830 0 $aCSS studies in security and international relations.
856 40 $uhttp://www.columbia.edu/cgi-bin/cul/resolve?clio15071015$zTaylor & Francis eBooks
852 8 $blweb$hEBOOKS