A vulnerable system: the history of information security in the computer age
(eBook)
Author:
Published:
Ithaca [New York] Cornell University Press, 2021.
Format:
eBook
ISBN:
9781501759055, 1501759051, 1501759043, 9781501759048
Physical Desc:
1 online resource (viii, 299 pages)
Status:
Ebsco (CCU)
Description
"This book delivers a long view of the history of information security, beginning with the creation of the first digital computers"--
Copies
Ebsco (CCU)
Subjects
Bisac Subjects
OCLC Fast Subjects
Citations
APA Citation (style guide)
Stewart, A. (2021). A vulnerable system: the history of information security in the computer age. Ithaca [New York], Cornell University Press.
Chicago / Turabian - Author Date Citation (style guide)Stewart, Andrew, 1975-. 2021. A Vulnerable System: The History of Information Security in the Computer Age. Ithaca [New York], Cornell University Press.
Chicago / Turabian - Humanities Citation (style guide)Stewart, Andrew, 1975-, A Vulnerable System: The History of Information Security in the Computer Age. Ithaca [New York], Cornell University Press, 2021.
MLA Citation (style guide)Stewart, Andrew. A Vulnerable System: The History of Information Security in the Computer Age. Ithaca [New York], Cornell University Press, 2021.
Note! Citation formats are based on standards as of July 2022. Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy.
More Copies In Prospector
Loading Prospector Copies...
More Details
Language:
English
Notes
Bibliography
Includes bibliographical references and index
Description
"This book delivers a long view of the history of information security, beginning with the creation of the first digital computers"--,Provided by publisher
Staff View
Grouped Work ID:
8777d34b-64d3-b0c4-f95c-a64b9a679fc4
Record Information
Last File Modification Time | May 07, 2024 09:20:30 PM |
---|---|
Last Grouped Work Modification Time | May 07, 2024 08:57:32 PM |
MARC Record
LEADER | 03950cam a2200733 c 4500 | ||
---|---|---|---|
001 | on1243906022 | ||
003 | OCoLC | ||
005 | 20240426145527.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 210323t20212021nyu ob 001 0 eng | ||
010 | |a 2021013835 | ||
040 | |a DLC|b eng|e rda|e pn|c DLC|d OCLCO|d OCLCF|d CUV|d EBLCP|d P@U|d OCLCO|d JSTOR|d N$T|d YDX|d UKAHL|d OCLCO|d OCL|d STBDS|d OCLCO|d OCLCQ|d OCLCO|d OCLCL | ||
020 | |a 9781501759055|q electronic publication | ||
020 | |a 1501759051|q electronic publication | ||
020 | |a 1501759043|q electronic book | ||
020 | |a 9781501759048|q electronic book | ||
020 | |z 9781501758942|q hardcover | ||
020 | |z 1501758942|q hardcover | ||
029 | 1 | |a AU@|b 000068919424 | |
029 | 1 | |a AU@|b 000070411268 | |
035 | |a (OCoLC)1243906022 | ||
037 | |a 22573/ctv1bw9csc|b JSTOR | ||
042 | |a pcc | ||
050 | 0 | 4 | |a QA76.9.A25|b S755 2021 |
072 | 7 | |a COM|x 053000|2 bisacsh | |
072 | 7 | |a COM|x 032000|2 bisacsh | |
072 | 7 | |a BUS|x 070030|2 bisacsh | |
082 | 0 | 0 | |a 005.8|2 23 |
049 | |a MAIN | ||
100 | 1 | |a Stewart, Andrew,|d 1975-|e author.|1 https://id.oclc.org/worldcat/entity/E39PCjvFMChJxv6DCQQpr77pKd | |
245 | 1 | 2 | |a A vulnerable system|b the history of information security in the computer age|c Andrew J. Stewart |
264 | 1 | |a Ithaca [New York]|b Cornell University Press|c 2021 | |
264 | 4 | |c ©2021 | |
300 | |a 1 online resource (viii, 299 pages) | ||
336 | |a text|b txt|2 rdacontent | ||
337 | |a computer|b c|2 rdamedia | ||
338 | |a online resource|b cr|2 rdacarrier | ||
504 | |a Includes bibliographical references and index | ||
505 | 0 | |a Introduction : Three Stigmata -- A "New Dimension" for the Security of Information -- The Promise, Success, and Failure of the Early Researchers -- The Creation of the Internet and the Web, and a Dark Portent -- The Dot-Com Boom and the Genesis of a Lucrative Feedback Loop -- Software Security and the "Hamster Wheel of Pain" -- Usable Security, Economics, and Psychology -- Vulnerability Disclosure, Bounties, and Markets -- Data Breaches, Nation-State Hacking, and Epistemic Closure -- The Wicked Nature of Information Security -- Epilogue : The Past, Present, and a Possible Future | |
520 | |a "This book delivers a long view of the history of information security, beginning with the creation of the first digital computers"--|c Provided by publisher | ||
588 | |a Description based on online resource; title from digital title page (viewed on August 23, 2021). | ||
650 | 0 | |a Computer security|x History. | |
650 | 0 | |a Computer networks|x Security measures|x History. | |
650 | 6 | |a Sécurité informatique|x Histoire. | |
650 | 6 | |a Réseaux d'ordinateurs|x Sécurité|x Mesures|x Histoire. | |
650 | 7 | |a COMPUTERS / Security / General|2 bisacsh | |
650 | 7 | |a Computer networks|x Security measures|2 fast | |
650 | 7 | |a Computer security|2 fast | |
655 | 7 | |a Instructional and educational works|2 fast | |
655 | 7 | |a History|2 fast | |
655 | 7 | |a Instructional and educational works.|2 lcgft | |
655 | 7 | |a Matériel d'éducation et de formation.|2 rvmgf | |
758 | |i has work:|a A vulnerable system (Text)|1 https://id.oclc.org/worldcat/entity/E39PCG4d36MFWfjrqkyxK8Pfbd|4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version:|a Stewart, Andrew, 1975-|t Vulnerable system|d Ithaca [New York] : Cornell University Press, 2021|z 9781501758942|w (DLC) 2021013834|w (OCoLC)1227917848 |
856 | 4 | 0 | |u http://ezproxy.ccu.edu/login?url=https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2889278 |
938 | |a Oxford University Press USA|b OUPR|n EDZ0002656144 | ||
938 | |a Askews and Holts Library Services|b ASKH|n AH39109756 | ||
938 | |a YBP Library Services|b YANK|n 17608654 | ||
938 | |a Project MUSE|b MUSE|n muse97134 | ||
938 | |a ProQuest Ebook Central|b EBLB|n EBL6423755 | ||
938 | |a EBSCOhost|b EBSC|n 2889278 | ||
949 | 0 | 1 | |h 9|l cceb|s j|t 188|w EBSCO Academic : External |
994 | |a 92|b FCX |