Routledge Handbook of International Cybersecurity (eBook, ePUB)
Redaktion: Tikk, Eneken; Kerttunen, Mika
44,95 €
44,95 €
inkl. MwSt.
Sofort per Download lieferbar
22 °P sammeln
44,95 €
Als Download kaufen
44,95 €
inkl. MwSt.
Sofort per Download lieferbar
22 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
44,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
22 °P sammeln
Routledge Handbook of International Cybersecurity (eBook, ePUB)
Redaktion: Tikk, Eneken; Kerttunen, Mika
- Format: ePub
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
The Routledge Handbook of International Cybersecurity examines the development and use of information and communication technologies (ICTs) from the perspective of international peace and security.
- Geräte: eReader
- ohne Kopierschutz
- eBook Hilfe
- Größe: 2.47MB
Andere Kunden interessierten sich auch für
- National Cyber Emergencies (eBook, ePUB)40,95 €
- Routledge Handbook of International Cybersecurity (eBook, PDF)44,95 €
- Cyber Warfare (eBook, ePUB)40,95 €
- Brigitte L. NacosTerrorism and Counterterrorism (eBook, ePUB)72,95 €
- Lev ToporPhishing for Nazis (eBook, ePUB)34,95 €
- Routledge Handbook of Terrorism and Counterterrorism (eBook, ePUB)44,95 €
- COVID-19 in South, West, and Southeast Asia (eBook, ePUB)40,95 €
-
-
-
The Routledge Handbook of International Cybersecurity examines the development and use of information and communication technologies (ICTs) from the perspective of international peace and security.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis
- Seitenzahl: 416
- Erscheinungstermin: 28. Januar 2020
- Englisch
- ISBN-13: 9781351038881
- Artikelnr.: 58578079
- Verlag: Taylor & Francis
- Seitenzahl: 416
- Erscheinungstermin: 28. Januar 2020
- Englisch
- ISBN-13: 9781351038881
- Artikelnr.: 58578079
Eneken Tikk is Executive Producer of the Cyber Policy Institute, Estonia, and lead of the 1nternat10nal Law project at CPI and the Erik Castrén Institute, University of Helsinki, Finland. Mika Kerttunen is Director of Strategy at the Cyber Policy Institute, and Senior Research Scientist at the Tallinn University of Technology, Estonia.
Foreword Joseph S. Nye, Jr. Introduction Eneken Tikk and Mika Kerttunen
Part I: Concepts and frameworks 1. Cybersecurity between
hypersecuritization and technological routine Myriam Dunn-Cavelty 2.
Correlates of state-sponsored cyber conflict George E. Mitchell and Allison
Pytlak 3. Cybered conflict, hybrid war, informatization wars Chris Demchak
4. The Politics of Stability: Cement and Change in Cyber Affairs Mika
Kerttunen and Eneken Tikk 5. In search of human rights in multilateral
cybersecurity dialogues Allison Pytlak 6. International governance of/in
cyberspace Tang Lan (translated by Nigel Inkster) 7. The becoming of
cyber-military capabilities Mirva Salminen and Mika Kerttunen Part II:
Challenges to secure and peaceful cyberspace 8. Cyber vulnerability Brian
Martin 9. Ensuring the security and availability of critical infrastructure
in a changing cyber-threat environment: Living dangerously Vytautas
Butrimas 10. Steps to an ecology of cyberspace as a contested domain
Martin Libicki 11. Cybercrime: setting international standards Tatiana
Tropina 12. Cyberterrorism: a Schrödinger's cat Mika Kerttunen 13.
Information operations Jouni Flyktman, Aki-Mauri Huhtinen and Lars Koreman
14. National cyber commands Piret Pernik Part III: National and regional
perspectives on cybersecurity 15. Cyber capacity building and international
security Souhila Amazouz 16. Challenges in building regional capacities in
cybersecurity-A regional organizational reflection Belisario Contreras and
Kerry-Ann Barrett 17. Singapore, ASEAN and international cybersecurity
Benjamin Ang 18. Sub-regional views on International Cybersecurity: CLMV
Lim Ratha and Sok Kunvath 19. Regional cybersecurity approaches in Africa
and Latin America Lucy Purdon and Francisco Vera 20. A regional view on
international cybersecurity: The scope, problem and remedies as seen in
West Africa Folake Olagunju Oyelola 21. Risk, resilience and retaliation:
American perspectives on international cybersecurity James A. Lewis 22.
International information security: problems and ways of solving them
Andrej Krutskikh & Anatoli Streltsov 23. People's Republic of China: seven
cybersecurity considerations Zhang Li Part IV: Global approaches to
cybersecurity 24. Cyber Diplomacy: an Australian perspective Tobias Feakin
and Johanna Weaver 25. Confidence-building measures in cyberspace: new
applications for an old concept Paul Meyer 26. Export controls: The
Wassenaar Experience and its lessons for international regulation of cyber
tools Elaine Korzak 27. Global cybersecurity and the private sector
Anne-Marie Buzatu 28. Putting the technical community back into cyber
(policy) Pablo Hinojosa, Klée Aiken and Louise Marie Hurel 29. Economic
cybersecurity law: a short primer Kathleen Claussen 30. The role of the UN
Security Council in cybersecurity: International peace and security in the
digital age Eneken Tikk and Niels Nagelhus Schia 31. International law and
cyber conflict Gary D. Brown 32. Exploring the General Principles of
International Law in Cybersecurity Context Nohyoung Park and Myung-Hyun
Chung Conclusion: What are we talking about when we are talking about
cybersecurity Eneken Tikk
Part I: Concepts and frameworks 1. Cybersecurity between
hypersecuritization and technological routine Myriam Dunn-Cavelty 2.
Correlates of state-sponsored cyber conflict George E. Mitchell and Allison
Pytlak 3. Cybered conflict, hybrid war, informatization wars Chris Demchak
4. The Politics of Stability: Cement and Change in Cyber Affairs Mika
Kerttunen and Eneken Tikk 5. In search of human rights in multilateral
cybersecurity dialogues Allison Pytlak 6. International governance of/in
cyberspace Tang Lan (translated by Nigel Inkster) 7. The becoming of
cyber-military capabilities Mirva Salminen and Mika Kerttunen Part II:
Challenges to secure and peaceful cyberspace 8. Cyber vulnerability Brian
Martin 9. Ensuring the security and availability of critical infrastructure
in a changing cyber-threat environment: Living dangerously Vytautas
Butrimas 10. Steps to an ecology of cyberspace as a contested domain
Martin Libicki 11. Cybercrime: setting international standards Tatiana
Tropina 12. Cyberterrorism: a Schrödinger's cat Mika Kerttunen 13.
Information operations Jouni Flyktman, Aki-Mauri Huhtinen and Lars Koreman
14. National cyber commands Piret Pernik Part III: National and regional
perspectives on cybersecurity 15. Cyber capacity building and international
security Souhila Amazouz 16. Challenges in building regional capacities in
cybersecurity-A regional organizational reflection Belisario Contreras and
Kerry-Ann Barrett 17. Singapore, ASEAN and international cybersecurity
Benjamin Ang 18. Sub-regional views on International Cybersecurity: CLMV
Lim Ratha and Sok Kunvath 19. Regional cybersecurity approaches in Africa
and Latin America Lucy Purdon and Francisco Vera 20. A regional view on
international cybersecurity: The scope, problem and remedies as seen in
West Africa Folake Olagunju Oyelola 21. Risk, resilience and retaliation:
American perspectives on international cybersecurity James A. Lewis 22.
International information security: problems and ways of solving them
Andrej Krutskikh & Anatoli Streltsov 23. People's Republic of China: seven
cybersecurity considerations Zhang Li Part IV: Global approaches to
cybersecurity 24. Cyber Diplomacy: an Australian perspective Tobias Feakin
and Johanna Weaver 25. Confidence-building measures in cyberspace: new
applications for an old concept Paul Meyer 26. Export controls: The
Wassenaar Experience and its lessons for international regulation of cyber
tools Elaine Korzak 27. Global cybersecurity and the private sector
Anne-Marie Buzatu 28. Putting the technical community back into cyber
(policy) Pablo Hinojosa, Klée Aiken and Louise Marie Hurel 29. Economic
cybersecurity law: a short primer Kathleen Claussen 30. The role of the UN
Security Council in cybersecurity: International peace and security in the
digital age Eneken Tikk and Niels Nagelhus Schia 31. International law and
cyber conflict Gary D. Brown 32. Exploring the General Principles of
International Law in Cybersecurity Context Nohyoung Park and Myung-Hyun
Chung Conclusion: What are we talking about when we are talking about
cybersecurity Eneken Tikk
Foreword Joseph S. Nye, Jr. Introduction Eneken Tikk and Mika Kerttunen
Part I: Concepts and frameworks 1. Cybersecurity between
hypersecuritization and technological routine Myriam Dunn-Cavelty 2.
Correlates of state-sponsored cyber conflict George E. Mitchell and Allison
Pytlak 3. Cybered conflict, hybrid war, informatization wars Chris Demchak
4. The Politics of Stability: Cement and Change in Cyber Affairs Mika
Kerttunen and Eneken Tikk 5. In search of human rights in multilateral
cybersecurity dialogues Allison Pytlak 6. International governance of/in
cyberspace Tang Lan (translated by Nigel Inkster) 7. The becoming of
cyber-military capabilities Mirva Salminen and Mika Kerttunen Part II:
Challenges to secure and peaceful cyberspace 8. Cyber vulnerability Brian
Martin 9. Ensuring the security and availability of critical infrastructure
in a changing cyber-threat environment: Living dangerously Vytautas
Butrimas 10. Steps to an ecology of cyberspace as a contested domain
Martin Libicki 11. Cybercrime: setting international standards Tatiana
Tropina 12. Cyberterrorism: a Schrödinger's cat Mika Kerttunen 13.
Information operations Jouni Flyktman, Aki-Mauri Huhtinen and Lars Koreman
14. National cyber commands Piret Pernik Part III: National and regional
perspectives on cybersecurity 15. Cyber capacity building and international
security Souhila Amazouz 16. Challenges in building regional capacities in
cybersecurity-A regional organizational reflection Belisario Contreras and
Kerry-Ann Barrett 17. Singapore, ASEAN and international cybersecurity
Benjamin Ang 18. Sub-regional views on International Cybersecurity: CLMV
Lim Ratha and Sok Kunvath 19. Regional cybersecurity approaches in Africa
and Latin America Lucy Purdon and Francisco Vera 20. A regional view on
international cybersecurity: The scope, problem and remedies as seen in
West Africa Folake Olagunju Oyelola 21. Risk, resilience and retaliation:
American perspectives on international cybersecurity James A. Lewis 22.
International information security: problems and ways of solving them
Andrej Krutskikh & Anatoli Streltsov 23. People's Republic of China: seven
cybersecurity considerations Zhang Li Part IV: Global approaches to
cybersecurity 24. Cyber Diplomacy: an Australian perspective Tobias Feakin
and Johanna Weaver 25. Confidence-building measures in cyberspace: new
applications for an old concept Paul Meyer 26. Export controls: The
Wassenaar Experience and its lessons for international regulation of cyber
tools Elaine Korzak 27. Global cybersecurity and the private sector
Anne-Marie Buzatu 28. Putting the technical community back into cyber
(policy) Pablo Hinojosa, Klée Aiken and Louise Marie Hurel 29. Economic
cybersecurity law: a short primer Kathleen Claussen 30. The role of the UN
Security Council in cybersecurity: International peace and security in the
digital age Eneken Tikk and Niels Nagelhus Schia 31. International law and
cyber conflict Gary D. Brown 32. Exploring the General Principles of
International Law in Cybersecurity Context Nohyoung Park and Myung-Hyun
Chung Conclusion: What are we talking about when we are talking about
cybersecurity Eneken Tikk
Part I: Concepts and frameworks 1. Cybersecurity between
hypersecuritization and technological routine Myriam Dunn-Cavelty 2.
Correlates of state-sponsored cyber conflict George E. Mitchell and Allison
Pytlak 3. Cybered conflict, hybrid war, informatization wars Chris Demchak
4. The Politics of Stability: Cement and Change in Cyber Affairs Mika
Kerttunen and Eneken Tikk 5. In search of human rights in multilateral
cybersecurity dialogues Allison Pytlak 6. International governance of/in
cyberspace Tang Lan (translated by Nigel Inkster) 7. The becoming of
cyber-military capabilities Mirva Salminen and Mika Kerttunen Part II:
Challenges to secure and peaceful cyberspace 8. Cyber vulnerability Brian
Martin 9. Ensuring the security and availability of critical infrastructure
in a changing cyber-threat environment: Living dangerously Vytautas
Butrimas 10. Steps to an ecology of cyberspace as a contested domain
Martin Libicki 11. Cybercrime: setting international standards Tatiana
Tropina 12. Cyberterrorism: a Schrödinger's cat Mika Kerttunen 13.
Information operations Jouni Flyktman, Aki-Mauri Huhtinen and Lars Koreman
14. National cyber commands Piret Pernik Part III: National and regional
perspectives on cybersecurity 15. Cyber capacity building and international
security Souhila Amazouz 16. Challenges in building regional capacities in
cybersecurity-A regional organizational reflection Belisario Contreras and
Kerry-Ann Barrett 17. Singapore, ASEAN and international cybersecurity
Benjamin Ang 18. Sub-regional views on International Cybersecurity: CLMV
Lim Ratha and Sok Kunvath 19. Regional cybersecurity approaches in Africa
and Latin America Lucy Purdon and Francisco Vera 20. A regional view on
international cybersecurity: The scope, problem and remedies as seen in
West Africa Folake Olagunju Oyelola 21. Risk, resilience and retaliation:
American perspectives on international cybersecurity James A. Lewis 22.
International information security: problems and ways of solving them
Andrej Krutskikh & Anatoli Streltsov 23. People's Republic of China: seven
cybersecurity considerations Zhang Li Part IV: Global approaches to
cybersecurity 24. Cyber Diplomacy: an Australian perspective Tobias Feakin
and Johanna Weaver 25. Confidence-building measures in cyberspace: new
applications for an old concept Paul Meyer 26. Export controls: The
Wassenaar Experience and its lessons for international regulation of cyber
tools Elaine Korzak 27. Global cybersecurity and the private sector
Anne-Marie Buzatu 28. Putting the technical community back into cyber
(policy) Pablo Hinojosa, Klée Aiken and Louise Marie Hurel 29. Economic
cybersecurity law: a short primer Kathleen Claussen 30. The role of the UN
Security Council in cybersecurity: International peace and security in the
digital age Eneken Tikk and Niels Nagelhus Schia 31. International law and
cyber conflict Gary D. Brown 32. Exploring the General Principles of
International Law in Cybersecurity Context Nohyoung Park and Myung-Hyun
Chung Conclusion: What are we talking about when we are talking about
cybersecurity Eneken Tikk