Picture 1 of 1

Gallery
Picture 1 of 1

Have one to sell?
Cyber Insecurity: Navigating the Perils of the Next Information Age by Harrison
US $99.66
ApproximatelyAU $153.94
Condition:
Good
A book that has been read but is in good condition. Very minimal damage to the cover including scuff marks, but no holes or tears. The dust jacket for hard covers may not be included. Binding has minimal wear. The majority of pages are undamaged with minimal creasing or tearing, minimal pencil underlining of text, no highlighting of text, no writing in margins. No missing pages. See the seller’s listing for full details and description of any imperfections.
Oops! Looks like we're having trouble connecting to our server.
Refresh your browser window to try again.
Postage:
Free Standard Shipping.
Located in: Sparks, Nevada, United States
Delivery:
Estimated between Wed, 6 Aug and Tue, 12 Aug to 94104
Returns:
30-day returns. Buyer pays for return postage. If you use an eBay postage label, it will be deducted from your refund amount.
Payments:
Shop with confidence
Seller assumes all responsibility for this listing.
eBay item number:364388544232
Item specifics
- Condition
- Book Title
- Cyber Insecurity: Navigating the Perils of the Next Information A
- Publication Date
- 2016-10-18
- ISBN
- 9781442272842
About this product
Product Identifiers
Publisher
Rowman & Littlefield Publishers, Incorporated
ISBN-10
1442272848
ISBN-13
9781442272842
eBay Product ID (ePID)
234353088
Product Key Features
Number of Pages
412 Pages
Language
English
Publication Name
Cyber Insecurity : Navigating the Perils of the Next Information Age
Subject
Security / General, Security (National & International)
Publication Year
2016
Type
Textbook
Subject Area
Computers, Political Science
Format
Hardcover
Dimensions
Item Height
1.1 in
Item Weight
27.4 Oz
Item Length
9 in
Item Width
6 in
Additional Product Features
Intended Audience
Scholarly & Professional
LCCN
2016-041742
Dewey Edition
23
Reviews
Much of America seems to view all things cyber as being akin to the black arts... something more to be feared and placated than understood. No more. It's time to step out of the darkness and review the body of history and academic commentary that has been developed. And much of that has been conveniently captured in Cyber Insecurity, a real primer for anyone wanting to better understand the emerging age., Richard Harrison and Trey Herr have assembled as comprehensive a map as exists to many of the most vexing issues in computer security. Cyber Insecurity deserves to be read by policymakers, industry leaders, academics, and anyone concerned with these increasingly central issues., Cyber Insecurity provides a comprehensive understanding to the basic complexities of the cyber world. Its purpose is threefold: first, to the layperson, explaining the critical features of cyberspace and simplifying its essential components that include many key policy issues; second, to the initiated generalist, providing relevant details and references with respect to some of the more technical and policy details; and third, to policy makers and staffers, to serve as a resource for informed work in crafting public policy. . . . I recommend this book for all military members due to its application in military operations but more importantly in our everyday lives., We are just beginning to appreciate the limitless social, economic, and personal benefits of living in the hyper-connected, digital world. Cyber Insecurity identifies the risks and threats to the system upon which we become more dependent every day and the means to overcome them. A must read for those living in the digital forevermore!, Much of America seems to view all things cyber as being akin to the black arts... something more to be feared and placated than understood. No more. It's time to step out of the darkness and review the body of history and academic commentary that has been developed. And much of that has been conveniently captured in Cyber Insecurity: Navigating the Perils of the Next Information Age, a real primer for anyone wanting to better understand the emerging age., With careful cultivation, Richard M. Harrison and Trey Herr present a comprehensive manual for policymakers concerned about the growing barrage of cyberattacks but unsure how to address them. Part primer, part briefing, and part policy agenda, Harrison and Herr's compilation is best described as a series of field reports from the Wild West of cybersecurity law. In addition to bringing together the diverse perspectives of military leaders, legal practitioners, and academics, Harrison and Herr outline four categories for discussing and prioritizing avenues of reform. Section One focuses on Securing Data, Devices and Networks; Section Two on Combating Cyber Crime; section Three on Governing the Security of the Internet; and section Four on Military Cyber Operations. Within these analytical guideposts, each chapter covers a specific topic, from the risks of connectivity in the automobile industry to disrupting malware markets. Wherever each contributors' recommendations may lead, it is clear Harrison and Herr have taken a significant step in clarifying and guiding serious policy discussion on cybersecurity., With careful cultivation, Richard M. Harrison and Trey Herr present a comprehensive manual for policymakers concerned about the growing barrage of cyberattacks but unsure how to address them. Part primer, part briefing, and part policy agenda, Harrison and Herr's compilation is best described as a series of field reports from the Wild West of cybersecurity law. In addition to bringing together the diverse perspectives of military leaders, legal practitioners, and academics, Harrison and Herr outline four categories for discussing and prioritizing avenues of reform. Section One focuses on Securing Data, Devices and Networks; Section Two on Combating Cyber Crime; section Three on Governing the Security of the Internet; and section Four on Military Cyber Operations. Within these analytical guideposts, each chapter covers a specific topic, from the risks of connectivity in the automobile industry to disrupting malware markets. Wherever each contributors' recommendations may lead, it is clear Harrison and Herr have taken a significant step in clarifying and guiding serious policy discussion on cybersecurity.e taken a significant step in clarifying and guiding serious policy discussion on cybersecurity.e taken a significant step in clarifying and guiding serious policy discussion on cybersecurity.e taken a significant step in clarifying and guiding serious policy discussion on cybersecurity., "Cyber Insecurity provides a comprehensive understanding to the basic complexities of the cyber world. Its purpose is threefold: first, to the layperson, explaining the critical features of cyberspace and simplifying its essential components that include many key policy issues; second, to the initiated generalist, providing relevant details and references with respect to some of the more technical and policy details; and third, to policy makers and staffers, to serve as a resource for informed work in crafting public policy. . . . I recommend this book for all military members due to its application in military operations but more importantly in our everyday lives." -- Military Review "With careful cultivation, Richard M. Harrison and Trey Herr present a comprehensive manual for policymakers concerned about the growing barrage of cyberattacks but unsure how to address them. Part primer, part briefing, and part policy agenda, Harrison and Herr's compilation is best described as a series of field reports from the Wild West of cybersecurity law. In addition to bringing together the diverse perspectives of military leaders, legal practitioners, and academics, Harrison and Herr outline four categories for discussing and prioritizing avenues of reform. Section One focuses on Securing Data, Devices and Networks; Section Two on Combating Cyber Crime; section Three on Governing the Security of the Internet; and section Four on Military Cyber Operations. Within these analytical guideposts, each chapter covers a specific topic, from the risks of connectivity in the automobile industry to disrupting malware markets. Wherever each contributors' recommendations may lead, it is clear Harrison and Herr have taken a significant step in clarifying and guiding serious policy discussion on cybersecurity." -- Harvard Law Review "Much of America seems to view all things cyber as being akin to the black arts... something more to be feared and placated than understood. No more. It's time to step out of the darkness and review the body of history and academic commentary that has been developed. And much of that has been conveniently captured in Cyber Insecurity, a real primer for anyone wanting to better understand the emerging age." --Michael V. Hayden, Former Director of the National Security Agency, Principal Deputy Director of National Intelligence, and Director of the Central Intelligence Agency "Richard Harrison and Trey Herr have assembled as comprehensive a map as exists to many of the most vexing issues in computer security. Cyber Insecurity deserves to be read by policymakers, industry leaders, academics, and anyone concerned with these increasingly central issues." --Nate Fick, CEO of Endgame Inc., and NYT bestselling author of ONE BULLET AWAY "We are just beginning to appreciate the limitless social, economic, and personal benefits of living in the hyper-connected, digital world. Cyber Insecurity identifies the risks and threats to the system upon which we become more dependent every day and the means to overcome them. A must read for those living in the digital forevermore!" --Tom Ridge, First Secretary of the Department of Homeland Security and 43rd Governor of Pennsylvania
Illustrated
Yes
Dewey Decimal
364.4
Table Of Content
Acknowledgments Foreword by the Honorable Richard J. Danzig Introduction by Trey Herr and Richard M. Harrison SECTION I: SECURING DATA, DEVICES, AND NETWORKS 1. Understanding Information Assurance, by Eric Ormes and Trey Herr 2. A Path to Collective Security: Information Sharing at the State and Local Level, by David Weinstein 3. Protecting Industrial Control Systems in Critical Infrastructure, by Robert M. Lee 4. Safer at Any Speed: The Roads Ahead for Automotive Cyber Safety Policy, by Joshua Corman and Beau Woods 5. Bad Code: Exploring Liability in Software Development, by Jane Chong SECTION II: COMBATING CYBER CRIME 6. Understanding Cyber Crime, by Sasha Romanosky and Trey Herr 7. Disrupting Malware Markets, by Trey Herr and Ryan Ellis 8. The Computer Fraud and Abuse Act: Structure, Controversies, and Proposals for Reform, by Paul Ohm 9. Breach Notification Laws: The Policy and Practice, by Sasha Romanosky 10. Cyber Insurance: A Market-Based Approach to Information Assurance, by Robert Morgus SECTION III: GOVERNING THE SECURITY OF THE INTERNET 11. Understanding Internet Security Governance, by Trey Herr and Heather West 12. A Holistic Approach to the Encryption Debate, by Aaron Brantly 13. Certificate Authorities: Modernizing the Internet's Chain of Trust, by Adrienne Allen 14. Multistakeholder Approaches to Cybersecurity Challenges, by Allan Friedman and Jonah F. Hill 15. Countering the Proliferation of Malware, by Trey Herr and Paul Rosenzweig SECTION IV: MILITARY CYBER OPERATIONS 16. Understanding Military Cyber Operations, by Trey Herr and Drew Herrick 17. Government Acquisition and Use of Zero-Day Software Vulnerabilities, by Mailyn Fidler 18. The Joint Cyber Force: Challenges and Opportunities, by Jason Rivera, Lauren Boas Hayes, Anastasia Mark, Matthew Russell, and Nathaniel Tisa 19. The Practical Impact of Classification Regarding Offensive Cyber Operations, by Herbert S. Lin and Taylor Grossman 20. Creating Influence through Information, by Kat Dransfield, Abraham Wagner, and Rand Waltzman Concluding Remarks by Trey Herr and Richard M. Harrison Glossary Index Contributors
Synopsis
Growing dependence on cyberspace for commerce, communication, governance, and military operations has left society vulnerable to a multitude of security threats. Mitigating the inherent risks associated with the use of cyberspace poses a series of thorny public policy problems. In this volume, academics, practitioners from both private sector and government, along with former service members come together to highlight sixteen of the most pressing contemporary challenges in cybersecurity, and to offer recommendations for the future. As internet connectivity continues to spread, this book will offer readers greater awareness of the threats of tomorrow-and serve to inform public debate into the next information age. Contributions by Adrienne Allen, Aaron Brantly, Lauren Boas Hayes, Jane Chong, Joshua Corman, Honorable Richard J. Danzig, Kat Dransfield, Ryan Ellis, Mailyn Fidler, Allan Friedman, Taylor Grossman, Richard M. Harrison , Trey Herr, Drew Herrick, Jonah F. Hill, Robert M. Lee, Herbert S. Lin, Anastasia Mark, Robert Morgus, Paul Ohm , Eric Ormes, Jason Rivera, Sasha Romanosky, Paul Rosenzweig , Matthew Russell, Nathaniel Tisa, Abraham Wagner, Rand Waltzman, David Weinstein, Heather West , and Beau Woods. * Learn more at the book's website at http://www.cyberinsecuritybook.org, Growing dependence on cyberspace for commerce, communication, governance, and military operations has left society vulnerable to a multitude of security threats. Mitigating the inherent risks associated with the use of cyberspace poses a series of thorny public policy problems. In this volume, academics, practitioners from both private sector and government, along with former service members come together to highlight sixteen of the most pressing contemporary challenges in cybersecurity, and to offer recommendations for the future. As internet connectivity continues to spread, this book will offer readers greater awareness of the threats of tomorrow--and serve to inform public debate into the next information age. Contributions by Adrienne Allen, Aaron Brantly, Lauren Boas Hayes, Jane Chong, Joshua Corman, Honorable Richard J. Danzig, Kat Dransfield, Ryan Ellis, Mailyn Fidler, Allan Friedman, Taylor Grossman, Richard M. Harrison, Trey Herr, Drew Herrick, Jonah F. Hill, Robert M. Lee, Herbert S. Lin, Anastasia Mark, Robert Morgus, Paul Ohm, Eric Ormes, Jason Rivera, Sasha Romanosky, Paul Rosenzweig, Matthew Russell, Nathaniel Tisa, Abraham Wagner, Rand Waltzman, David Weinstein, Heather West, and Beau Woods. - Learn more at the book's website at http: //www.cyberinsecuritybook.org, As Internet connectivity continues to spread, this book will offer readers greater awareness of the cyber threats of tomorrow--and serve to inform the policy debates about how to mitigate them., Growing dependence on cyberspace for commerce, communication, governance, and military operations has left society vulnerable to a multitude of security threats. Mitigating the inherent risks associated with the use of cyberspace poses a series of thorny public policy problems. In this volume, academics, practitioners from both private sector and government, along with former service members come together to highlight sixteen of the most pressing contemporary challenges in cybersecurity, and to offer recommendations for the future. As internet connectivity continues to spread, this book will offer readers greater awareness of the threats of tomorrow--and serve to inform public debate into the next information age. Contributions by Adrienne Allen, Aaron Brantly, Lauren Boas Hayes, Jane Chong, Joshua Corman, Honorable Richard J. Danzig, Kat Dransfield, Ryan Ellis, Mailyn Fidler, Allan Friedman, Taylor Grossman, Richard M. Harrison , Trey Herr, Drew Herrick, Jonah F. Hill, Robert M. Lee, Herbert S. Lin, Anastasia Mark, Robert Morgus, Paul Ohm , Eric Ormes, Jason Rivera, Sasha Romanosky, Paul Rosenzweig , Matthew Russell, Nathaniel Tisa, Abraham Wagner, Rand Waltzman, David Weinstein, Heather West , and Beau Woods. * Learn more at the book's website at http://www.cyberinsecuritybook.org
LC Classification Number
HV6773.C9174 2016
Item description from the seller
Seller feedback (513,655)
- m***m (2297)- Feedback left by buyer.Past 6 monthsVerified purchaseI’m thrilled with my recent purchase . The website was user-friendly, and the product descriptions were accurate. Customer service was prompt and helpful, answering all my questions. My order arrived quickly, well-packaged, and the product exceeded my expectations in quality. I’m impressed with the attention to detail and the overall experience. I’ll definitely shop here again and highly recommend from this seller to others. Thank you for a fantastic experience!
- a***n (43)- Feedback left by buyer.Past 6 monthsVerified purchaseMistakenly ordered a paperback that I thought was a hardcover, not sellers fault; it was described properly on the listing. Seller still processed a refund the day I went to return the item and let me keep the item anyway. A+++ service. Book arrived quickly in great condition and for a great price. Thank you so much! Amazing seller!
- n***c (94)- Feedback left by buyer.Past 6 monthsVerified purchaseseller was communicative about my shipment, media mail took a while and tracking wasn't updated frequently, but seller communicated to me very quickly on status. the item came new and wrapped as described, though the packaging in it was packed wasn't sturdy and falling apart when it got to me.
More to explore:
- Harry Harrison Fiction & Fiction Books,
- Kim Harrison Fiction & Fiction Books,
- Kim Harrison Paperback Fiction & Fiction Books,
- Kim Harrison Fiction & Fiction Books in English,
- Harry Harrison Fiction Paperback Fiction & Books,
- Fiction Coming of Age Fiction & Books,
- David Walliams Fiction Books & Ages 9-12 Intended Audience,
- Bronze Age (1970-83) Era Comics, Graphic Novels & TPBs,
- Board Fiction Ages 2-3 Intended Audience & Books,
- Paperback Fiction & Ages 4-8 Intended Audience Books