A vulnerable system: the history of information security in the computer age
(eBook)
Author:
Published:
Ithaca [New York] Cornell University Press, 2021.
Format:
eBook
ISBN:
9781501759055, 1501759051, 1501759043, 9781501759048
Content Description:
1 online resource (viii, 299 pages)
Status:
Available Online
Description
"This book delivers a long view of the history of information security, beginning with the creation of the first digital computers"--
Copies
CCU Electronic Resources
Subjects
Bisac Subjects
OCLC Fast Subjects
Other Subjects
Citations
APA Citation (style guide)
Stewart, A. (2021). A vulnerable system: the history of information security in the computer age. Ithaca [New York], Cornell University Press.
Chicago / Turabian - Author Date Citation (style guide)Stewart, Andrew, 1975-. 2021. A Vulnerable System: The History of Information Security in the Computer Age. Ithaca [New York], Cornell University Press.
Chicago / Turabian - Humanities Citation (style guide)Stewart, Andrew, 1975-, A Vulnerable System: The History of Information Security in the Computer Age. Ithaca [New York], Cornell University Press, 2021.
MLA Citation (style guide)Stewart, Andrew. A Vulnerable System: The History of Information Security in the Computer Age. Ithaca [New York], Cornell University Press, 2021.
Note! Citation formats are based on standards as of July 2022. Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy.
More Copies In Prospector
Loading Prospector Copies...
More Details
Language:
English
Notes
Bibliography
Includes bibliographical references and index.
Description
"This book delivers a long view of the history of information security, beginning with the creation of the first digital computers"--,Provided by publisher
Staff View
Grouped Work ID:
8777d34b-64d3-b0c4-f95c-a64b9a679fc4
Record Information
Last Sierra Extract Time | Mar 24, 2024 07:31:32 AM |
---|---|
Last File Modification Time | Mar 24, 2024 07:31:45 AM |
Last Grouped Work Modification Time | Apr 05, 2024 09:12:39 PM |
MARC Record
LEADER | 03711cam a2200661 c 4500 | ||
---|---|---|---|
001 | 1243906022 | ||
003 | OCoLC | ||
005 | 20211022074430.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 210323t20212021nyu ob 001 0 eng | ||
010 | |a 2021013835 | ||
020 | |a 9781501759055|q electronic publication | ||
020 | |a 1501759051|q electronic publication | ||
020 | |a 1501759043|q electronic book | ||
020 | |a 9781501759048|q electronic book | ||
020 | |z 9781501758942|q hardcover | ||
020 | |z 1501758942|q hardcover | ||
035 | |a (OCoLC)1243906022 | ||
037 | |a 22573/ctv1bw9csc|b JSTOR | ||
040 | |a DLC|b eng|e rda|e pn|c DLC|d OCLCO|d OCLCF|d CUV|d EBLCP|d P@U|d OCLCO|d JSTOR|d N$T|d YDX|d UKAHL | ||
042 | |a pcc | ||
049 | |a FCXA | ||
050 | 0 | 4 | |a QA76.9.A25|b S755 2021 |
072 | 7 | |a COM|x 053000|2 bisacsh | |
072 | 7 | |a COM|x 032000|2 bisacsh | |
072 | 7 | |a BUS|x 070030|2 bisacsh | |
082 | 0 | 0 | |a 005.8|2 23 |
100 | 1 | |a Stewart, Andrew,|d 1975-|0 https://id.loc.gov/authorities/names/n2008002152|e author. | |
245 | 1 | 2 | |a A vulnerable system|b the history of information security in the computer age /|c Andrew J. Stewart. |
264 | 1 | |a Ithaca [New York]|b Cornell University Press|c 2021. | |
264 | 4 | |c ©2021 | |
300 | |a 1 online resource (viii, 299 pages) | ||
336 | |a text|b txt|2 rdacontent | ||
337 | |a computer|b c|2 rdamedia | ||
338 | |a online resource|b cr|2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Introduction : Three Stigmata -- A "New Dimension" for the Security of Information -- The Promise, Success, and Failure of the Early Researchers -- The Creation of the Internet and the Web, and a Dark Portent -- The Dot-Com Boom and the Genesis of a Lucrative Feedback Loop -- Software Security and the "Hamster Wheel of Pain" -- Usable Security, Economics, and Psychology -- Vulnerability Disclosure, Bounties, and Markets -- Data Breaches, Nation-State Hacking, and Epistemic Closure -- The Wicked Nature of Information Security -- Epilogue : The Past, Present, and a Possible Future | |
520 | |a "This book delivers a long view of the history of information security, beginning with the creation of the first digital computers"--|c Provided by publisher | ||
588 | |a Description based on online resource; title from digital title page (viewed on August 23, 2021). | ||
650 | 0 | |a Computer security|0 https://id.loc.gov/authorities/subjects/sh90001862|x History.|0 https://id.loc.gov/authorities/subjects/sh99005024 | |
650 | 0 | |a Computer networks|x Security measures|0 https://id.loc.gov/authorities/subjects/sh94001277|x History.|0 https://id.loc.gov/authorities/subjects/sh99005024 | |
650 | 7 | |a COMPUTERS / Security / General.|2 bisacsh | |
650 | 7 | |a Computer networks|x Security measures.|2 fast|0 (OCoLC)fst00872341 | |
650 | 7 | |a Computer security.|2 fast|0 (OCoLC)fst00872484 | |
655 | 4 | |a Electronic books. | |
655 | 7 | |a History.|2 fast|0 (OCoLC)fst01411628 | |
655 | 7 | |a Instructional and educational works.|2 lcgft|0 https://id.loc.gov/authorities/genreForms/gf2014026114 | |
776 | 0 | 8 | |i Print version:|a Stewart, Andrew, 1975-|t Vulnerable system|d Ithaca [New York] : Cornell University Press, 2021|z 9781501758942|w (DLC) 2021013834|w (OCoLC)1227917848 |
907 | |a .b64762087 | ||
948 | |a MARCIVE Comprehensive, in 2023.02 | ||
948 | |a MARCIVE Over, 11/2021 | ||
989 | |1 .i140387997|d cceb|g j|m |h 0|x 0|t 0|i 0|j 188|k 211022|o -|w CCU Owned|u https://ezproxy.ccu.edu/login?url=https://www.jstor.org/stable/10.7591/j.ctv1bxh5t3 | ||
994 | |a C0|b FCX | ||
995 | |a Loaded with m2btab.ltiac in 2023.02 | ||
995 | |a Loaded with m2btab.ltiac in 2021.11 | ||
995 | |a Loaded with m2btab.elec in 2021.10 | ||
998 | |e -|f eng|a cc |