Titre : | Cyberpower : crime, conflict and security in cyberspace | Type de document : | Livres, articles, périodiques | Auteurs : | Solange Ghernaouti-Hélie (1958-....), Auteur | Editeur : | Lausanne (Suisse) : EPFL press | Année de publication : | 2013 | Autre Editeur : | Boca Raton (États-Unis) : CRC press | Collection : | Forensic sciences (Lausanne) | Importance : | XV-449 p. | Présentation : | graphiques, figures | Format : | 25 cm | ISBN/ISSN/EAN : | 978-2-940222-66-7 | Prix : | 75 € | Note générale : | Webliographie p. 443-445. Bibliographie p. 445-446. Glossaire. Index. Résumés
| Langues : | Anglais (eng) | Mots-clés : | Informatique Criminalité informatique Prévention Réseaux d'ordinateurs Mesures de sûreté Protection de l'information (informatique) | Index. décimale : | 004.056 Sécurité informatique. Protection. Sauvegarde. Piratage. Antivirus | Résumé : | Today, cyberspace is where new forms of criminality are being exploited; and cyberspace has become the economic and military battlefield where conflicts of all kinds are played out. the ability to control information and telecommunication infrastructure, to respond to cyberattacks and to ensure cybersecurity offers real power and has become one of the most significant political, economic and technological issues of this twenty-first century.
Information and communication technologies (ICT) have grown to become a critical part of our society’s infrastructure, and their potential misuse affects us all, from the individual citizen to private and public organizations and states. thus cyberpower has become the newest means for organisations – both legitimate and criminal – to demonstrate their capabilities.
This book explains the stakes of cyberpower in terms of its various manifestations, including cybercriminality, cyberterrorism, cyberconflicts and cyberwarfare. It evaluates the impacts on, and consequences for, individuals, organisations and states. it provides a panorama of the actors and their means of operating and describes the strategies, methodologies and kinds of measures that can be employed to combat the abusive and criminal uses of digital technologies, and thus improve security within cyberspace and in real life. The book’s educational approach, including numerous illustrations, exercises and case studies, makes a complex subject accessible to a wide public. |
Cyberpower : crime, conflict and security in cyberspace [Livres, articles, périodiques] / Solange Ghernaouti-Hélie (1958-....), Auteur . - Lausanne (Suisse) : EPFL press : Boca Raton (États-Unis) : CRC press, 2013 . - XV-449 p. : graphiques, figures ; 25 cm. - ( Forensic sciences (Lausanne)) . ISBN : 978-2-940222-66-7 : 75 € Webliographie p. 443-445. Bibliographie p. 445-446. Glossaire. Index. Résumés
Langues : Anglais ( eng) Mots-clés : | Informatique Criminalité informatique Prévention Réseaux d'ordinateurs Mesures de sûreté Protection de l'information (informatique) | Index. décimale : | 004.056 Sécurité informatique. Protection. Sauvegarde. Piratage. Antivirus | Résumé : | Today, cyberspace is where new forms of criminality are being exploited; and cyberspace has become the economic and military battlefield where conflicts of all kinds are played out. the ability to control information and telecommunication infrastructure, to respond to cyberattacks and to ensure cybersecurity offers real power and has become one of the most significant political, economic and technological issues of this twenty-first century.
Information and communication technologies (ICT) have grown to become a critical part of our society’s infrastructure, and their potential misuse affects us all, from the individual citizen to private and public organizations and states. thus cyberpower has become the newest means for organisations – both legitimate and criminal – to demonstrate their capabilities.
This book explains the stakes of cyberpower in terms of its various manifestations, including cybercriminality, cyberterrorism, cyberconflicts and cyberwarfare. It evaluates the impacts on, and consequences for, individuals, organisations and states. it provides a panorama of the actors and their means of operating and describes the strategies, methodologies and kinds of measures that can be employed to combat the abusive and criminal uses of digital technologies, and thus improve security within cyberspace and in real life. The book’s educational approach, including numerous illustrations, exercises and case studies, makes a complex subject accessible to a wide public. |
| |