A vulnerable system: the history of information security in the computer age
(eBook)

Book Cover
Published:
Ithaca [New York] Cornell University Press, 2021.
Format:
eBook
ISBN:
9781501759055, 1501759051, 1501759043, 9781501759048
Content Description:
1 online resource (viii, 299 pages)
Status:
Available Online
Description

"This book delivers a long view of the history of information security, beginning with the creation of the first digital computers"--

Copies
CCU Electronic Resources
More Like This
Citations
APA Citation (style guide)

Stewart, A. (2021). A vulnerable system: the history of information security in the computer age. Ithaca [New York], Cornell University Press.

Chicago / Turabian - Author Date Citation (style guide)

Stewart, Andrew, 1975-. 2021. A Vulnerable System: The History of Information Security in the Computer Age. Ithaca [New York], Cornell University Press.

Chicago / Turabian - Humanities Citation (style guide)

Stewart, Andrew, 1975-, A Vulnerable System: The History of Information Security in the Computer Age. Ithaca [New York], Cornell University Press, 2021.

MLA Citation (style guide)

Stewart, Andrew. A Vulnerable System: The History of Information Security in the Computer Age. Ithaca [New York], Cornell University Press, 2021.

Note! Citation formats are based on standards as of July 2022. Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy.
More Copies In Prospector
Loading Prospector Copies...
More Details
Language:
English

Notes

Bibliography
Includes bibliographical references and index.
Description
"This book delivers a long view of the history of information security, beginning with the creation of the first digital computers"--,Provided by publisher
Staff View
Grouped Work ID:
8777d34b-64d3-b0c4-f95c-a64b9a679fc4
Go To GroupedWork

Record Information

Last Sierra Extract TimeMar 24, 2024 07:31:32 AM
Last File Modification TimeMar 24, 2024 07:31:45 AM
Last Grouped Work Modification TimeApr 05, 2024 09:12:39 PM

MARC Record

LEADER03711cam a2200661 c 4500
0011243906022
003OCoLC
00520211022074430.0
006m     o  d        
007cr cnu---unuuu
008210323t20212021nyu     ob    001 0 eng  
010 |a 2021013835
020 |a 9781501759055|q electronic publication
020 |a 1501759051|q electronic publication
020 |a 1501759043|q electronic book
020 |a 9781501759048|q electronic book
020 |z 9781501758942|q hardcover
020 |z 1501758942|q hardcover
035 |a (OCoLC)1243906022
037 |a 22573/ctv1bw9csc|b JSTOR
040 |a DLC|b eng|e rda|e pn|c DLC|d OCLCO|d OCLCF|d CUV|d EBLCP|d P@U|d OCLCO|d JSTOR|d N$T|d YDX|d UKAHL
042 |a pcc
049 |a FCXA
05004|a QA76.9.A25|b S755 2021
072 7|a COM|x 053000|2 bisacsh
072 7|a COM|x 032000|2 bisacsh
072 7|a BUS|x 070030|2 bisacsh
08200|a 005.8|2 23
1001 |a Stewart, Andrew,|d 1975-|0 https://id.loc.gov/authorities/names/n2008002152|e author.
24512|a A vulnerable system|b the history of information security in the computer age /|c Andrew J. Stewart.
264 1|a Ithaca [New York]|b Cornell University Press|c 2021.
264 4|c ©2021
300 |a 1 online resource (viii, 299 pages)
336 |a text|b txt|2 rdacontent
337 |a computer|b c|2 rdamedia
338 |a online resource|b cr|2 rdacarrier
504 |a Includes bibliographical references and index.
5050 |a Introduction : Three Stigmata -- A "New Dimension" for the Security of Information -- The Promise, Success, and Failure of the Early Researchers -- The Creation of the Internet and the Web, and a Dark Portent -- The Dot-Com Boom and the Genesis of a Lucrative Feedback Loop -- Software Security and the "Hamster Wheel of Pain" -- Usable Security, Economics, and Psychology -- Vulnerability Disclosure, Bounties, and Markets -- Data Breaches, Nation-State Hacking, and Epistemic Closure -- The Wicked Nature of Information Security -- Epilogue : The Past, Present, and a Possible Future
520 |a "This book delivers a long view of the history of information security, beginning with the creation of the first digital computers"--|c Provided by publisher
588 |a Description based on online resource; title from digital title page (viewed on August 23, 2021).
650 0|a Computer security|0 https://id.loc.gov/authorities/subjects/sh90001862|x History.|0 https://id.loc.gov/authorities/subjects/sh99005024
650 0|a Computer networks|x Security measures|0 https://id.loc.gov/authorities/subjects/sh94001277|x History.|0 https://id.loc.gov/authorities/subjects/sh99005024
650 7|a COMPUTERS / Security / General.|2 bisacsh
650 7|a Computer networks|x Security measures.|2 fast|0 (OCoLC)fst00872341
650 7|a Computer security.|2 fast|0 (OCoLC)fst00872484
655 4|a Electronic books.
655 7|a History.|2 fast|0 (OCoLC)fst01411628
655 7|a Instructional and educational works.|2 lcgft|0 https://id.loc.gov/authorities/genreForms/gf2014026114
77608|i Print version:|a Stewart, Andrew, 1975-|t Vulnerable system|d Ithaca [New York] : Cornell University Press, 2021|z 9781501758942|w (DLC) 2021013834|w (OCoLC)1227917848
907 |a .b64762087
948 |a MARCIVE Comprehensive, in 2023.02
948 |a MARCIVE Over, 11/2021
989 |1 .i140387997|d cceb|g j|m |h 0|x 0|t 0|i 0|j 188|k 211022|o -|w CCU Owned|u https://ezproxy.ccu.edu/login?url=https://www.jstor.org/stable/10.7591/j.ctv1bxh5t3
994 |a C0|b FCX
995 |a Loaded with m2btab.ltiac in 2023.02
995 |a Loaded with m2btab.ltiac in 2021.11
995 |a Loaded with m2btab.elec in 2021.10
998 |e -|f eng|a cc