A vulnerable system: the history of information security in the computer age
(eBook)

Book Cover
Published:
Ithaca [New York] Cornell University Press, 2021.
Format:
eBook
ISBN:
9781501759055, 1501759051, 1501759043, 9781501759048
Content Description:
1 online resource (viii, 299 pages)
Status:
Available Online

Description

"This book delivers a long view of the history of information security, beginning with the creation of the first digital computers"--

Copies

CCU Electronic Resources

More Like This

Citations

APA Citation (style guide)

Stewart, A. (2021). A vulnerable system: the history of information security in the computer age. Ithaca [New York], Cornell University Press.

Chicago / Turabian - Author Date Citation (style guide)

Stewart, Andrew, 1975-. 2021. A Vulnerable System: The History of Information Security in the Computer Age. Ithaca [New York], Cornell University Press.

Chicago / Turabian - Humanities Citation (style guide)

Stewart, Andrew, 1975-, A Vulnerable System: The History of Information Security in the Computer Age. Ithaca [New York], Cornell University Press, 2021.

MLA Citation (style guide)

Stewart, Andrew. A Vulnerable System: The History of Information Security in the Computer Age. Ithaca [New York], Cornell University Press, 2021.

Note! Citation formats are based on standards as of July 2022. Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy.

More Copies In Prospector

Loading Prospector Copies...

More Details

Language:
English

Notes

Bibliography
Includes bibliographical references and index.
Description
"This book delivers a long view of the history of information security, beginning with the creation of the first digital computers"--,Provided by publisher

Staff View

Grouped Work ID:
8777d34b-64d3-b0c4-f95c-a64b9a679fc4
Go To Grouped Work

Record Information

Last Sierra Extract TimeDec 14, 2024 08:43:29 PM
Last File Modification TimeDec 14, 2024 08:43:49 PM
Last Grouped Work Modification TimeDec 15, 2024 06:25:30 AM

MARC Record

LEADER03711cam a2200661 c 4500
0011243906022
003OCoLC
00520211022074430.0
006m     o  d        
007cr cnu---unuuu
008210323t20212021nyu     ob    001 0 eng  
010 |a 2021013835
020 |a 9781501759055 |q electronic publication
020 |a 1501759051 |q electronic publication
020 |a 1501759043 |q electronic book
020 |a 9781501759048 |q electronic book
020 |z 9781501758942 |q hardcover
020 |z 1501758942 |q hardcover
035 |a (OCoLC)1243906022
037 |a 22573/ctv1bw9csc |b JSTOR
040 |a DLC |b eng |e rda |e pn |c DLC |d OCLCO |d OCLCF |d CUV |d EBLCP |d P@U |d OCLCO |d JSTOR |d N$T |d YDX |d UKAHL
042 |a pcc
049 |a FCXA
05004 |a QA76.9.A25 |b S755 2021
0727 |a COM |x 053000 |2 bisacsh
0727 |a COM |x 032000 |2 bisacsh
0727 |a BUS |x 070030 |2 bisacsh
08200 |a 005.8 |2 23
1001 |a Stewart, Andrew, |d 1975- |0 https://id.loc.gov/authorities/names/n2008002152 |e author.
24512 |a A vulnerable system |b the history of information security in the computer age / |c Andrew J. Stewart.
2641 |a Ithaca [New York] |b Cornell University Press |c 2021.
2644 |c ©2021
300 |a 1 online resource (viii, 299 pages)
336 |a text |b txt |2 rdacontent
337 |a computer |b c |2 rdamedia
338 |a online resource |b cr |2 rdacarrier
504 |a Includes bibliographical references and index.
5050 |a Introduction : Three Stigmata -- A "New Dimension" for the Security of Information -- The Promise, Success, and Failure of the Early Researchers -- The Creation of the Internet and the Web, and a Dark Portent -- The Dot-Com Boom and the Genesis of a Lucrative Feedback Loop -- Software Security and the "Hamster Wheel of Pain" -- Usable Security, Economics, and Psychology -- Vulnerability Disclosure, Bounties, and Markets -- Data Breaches, Nation-State Hacking, and Epistemic Closure -- The Wicked Nature of Information Security -- Epilogue : The Past, Present, and a Possible Future
520 |a "This book delivers a long view of the history of information security, beginning with the creation of the first digital computers"-- |c Provided by publisher
588 |a Description based on online resource; title from digital title page (viewed on August 23, 2021).
6500 |a Computer security |0 https://id.loc.gov/authorities/subjects/sh90001862 |x History. |0 https://id.loc.gov/authorities/subjects/sh99005024
6500 |a Computer networks |x Security measures |0 https://id.loc.gov/authorities/subjects/sh94001277 |x History. |0 https://id.loc.gov/authorities/subjects/sh99005024
6507 |a COMPUTERS / Security / General. |2 bisacsh
6507 |a Computer networks |x Security measures. |2 fast |0 (OCoLC)fst00872341
6507 |a Computer security. |2 fast |0 (OCoLC)fst00872484
6554 |a Electronic books.
6557 |a History. |2 fast |0 (OCoLC)fst01411628
6557 |a Instructional and educational works. |2 lcgft |0 https://id.loc.gov/authorities/genreForms/gf2014026114
77608 |i Print version: |a Stewart, Andrew, 1975- |t Vulnerable system |d Ithaca [New York] : Cornell University Press, 2021 |z 9781501758942 |w (DLC) 2021013834 |w (OCoLC)1227917848
907 |a .b64762087
948 |a MARCIVE Comprehensive, in 2023.02
948 |a MARCIVE Over, 11/2021
989 |1 .i140387997 |d cceb |g j |m  |h 0 |x 0 |t 0 |i 0 |j 188 |k 211022 |o - |w CCU Owned |u https://ezproxy.ccu.edu/login?url=https://www.jstor.org/stable/10.7591/j.ctv1bxh5t3
994 |a C0 |b FCX
995 |a Loaded with m2btab.ltiac in 2023.02
995 |a Loaded with m2btab.ltiac in 2021.11
995 |a Loaded with m2btab.elec in 2021.10
998 |e - |f eng |a cc