• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Routledge Companion to Global Cyber-Security Strategy » książka

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2946600]
• Literatura piękna
 [1856966]

  więcej...
• Turystyka
 [72221]
• Informatyka
 [151456]
• Komiksy
 [35826]
• Encyklopedie
 [23190]
• Dziecięca
 [619653]
• Hobby
 [140543]
• AudioBooki
 [1577]
• Literatura faktu
 [228355]
• Muzyka CD
 [410]
• Słowniki
 [2874]
• Inne
 [445822]
• Kalendarze
 [1744]
• Podręczniki
 [167141]
• Poradniki
 [482898]
• Religia
 [510455]
• Czasopisma
 [526]
• Sport
 [61590]
• Sztuka
 [243598]
• CD, DVD, Video
 [3423]
• Technologie
 [219201]
• Zdrowie
 [101638]
• Książkowe Klimaty
 [124]
• Zabawki
 [2473]
• Puzzle, gry
 [3898]
• Literatura w języku ukraińskim
 [254]
• Art. papiernicze i szkolne
 [8170]
Kategorie szczegółowe BISAC

Routledge Companion to Global Cyber-Security Strategy

ISBN-13: 9780367620660 / Angielski / Miękka / 2023 / 24 str.

Scott N. Romaniuk; Mary Manjikian
Routledge Companion to Global Cyber-Security Strategy Scott N. Romaniuk Mary Manjikian 9780367620660 Routledge - książkaWidoczna okładka, to zdjęcie poglądowe, a rzeczywista szata graficzna może różnić się od prezentowanej.

Routledge Companion to Global Cyber-Security Strategy

ISBN-13: 9780367620660 / Angielski / Miękka / 2023 / 24 str.

Scott N. Romaniuk; Mary Manjikian
cena 214,58 zł
(netto: 204,36 VAT:  5%)

Najniższa cena z 30 dni: 201,44 zł
Termin realizacji zamówienia:
ok. 22 dni roboczych
Bez gwarancji dostawy przed świętami

Darmowa dostawa!
inne wydania

This companion provides the most comprehensive and up-to-date comparative overview of the cyber-security strategies and doctrines of the major states and actors in Europe, North America, South America, Africa and Asia.

This companion provides the most comprehensive and up-to-date comparative overview of the cyber-security strategies and doctrines of the major states and actors in Europe, North America, South America, Africa, and Asia.

The volume offers an introduction to each nation’s cyber-security strategy and policy, along with a list of resources in English that may be consulted for those wishing to go into greater depth. Each chapter is written by a leading academic or policy specialist, and contains the following sections:

  • overview of national cyber-security strategy;
  • concepts and definitions;
  • exploration of cyber-security issues as they relate to international law and governance;
  • critical examinations of cyber partners at home and abroad;
  • legislative developments and processes;
  • dimensions of cybercrime and cyberterrorism;
  • implications of cyber-security policies and strategies.

This book will be of much interest to students and practitioners in the fields of cyber-security, national security, strategic studies, foreign policy, and international relations.

Kategorie:
Nauka, Historia
Kategorie BISAC:
Political Science > Security (National & International)
History > Military - Strategy
Computers > Internet - Online Safety & Privacy
Wydawca:
Routledge
Język:
Angielski
ISBN-13:
9780367620660
Rok wydania:
2023
Dostępne języki:
Ilość stron:
24
Waga:
4.49 kg
Oprawa:
Miękka
Dodatkowe informacje:
Wydanie ilustrowane

Foreword: Global cybersecurity in the 21st century; Introduction: cybersecurity strategy and policy in a comparative context (Mary Manjikian and Scott N. Romaniuk); Part I: Europe; 1 Securing the kingdom’s cyberspace: cybersecurity and cyber intelligence in Spain (Rubén Arcos); 2 Albania’s cybersecurity pivot: between western architectures and great power competition (Alexander Fotescu and Mihai Chihaia); 3 Armenian national policy in cyber space: toward a global cyber security architecture (Ruben Elamiryan); 4 Czech Republic: a new cyber security leader in Central Europe (Lucie Kadlecová and Michaela Semecká); 5 Cybersecurity in the French Republic (Amber Darwish and Scott N. Romaniuk); 6 Germany’s cybersecurity strategy: confronting future challenges (Scott N. Romaniuk and Michael Claus); 7 Cybersecurity of Poland: legal and organizational framework (Dominika Dziwisz); 8 Hungary: from the groundworks to an evolving cyber security landscape (Annamária Beláz and Dániel Berzsenyi); 9 Romanian cybersecurity efforts: a work in progress (Oana-Elena Brânda); 10 Italy’s cybersecurity architecture and critical infrastructure (Tommaso De Zan, Giampiero Giacomello, and Luigi Martino); 11 Dutch cyber security strategy (Joost Bunk and Max Smeets); 12 Norwegian cybersecurity: a small-state approach to building international cyber cooperation (Lars Gjesvik); 13 Seeking a new order for global cybersecurity: the Russian approach to cyber-sovereignty (Ilona Stadnik); 14 Slovakia: the Tatra Tiger without teeth (Aaron T. Walter); 15 Slovenia: a fragmented cyber security (Laris Gaiser); 16 In the line of Russian aggression: Ukraine, hybrid warfare, and cyber security defense (Olya Zaporozhets and Oleksiy Syvak); 17 United Kingdom: pragmatism and adaptability in the cyber realm (Tim Stevens); 18 European Union: policy, cohesion, and supranational experiences with cybersecurity (Christopher Whyte); 19 Estonia: from the "Bronze Night" to cybersecurity pioneers (Nick Robinson and Alex Hardy); 20 NATO’s evolving cyber security policy and strategy (Scott N. Romaniuk, Alexander Fotescu, and Mihai Chihaia); Part II: Asia and Australia; 21 Japan’s challenges, capabilities, and preparedness in cyberspace (Tobias Burgers, Scott N. Romaniuk, and Cherry H. Y. Wong); 22 An effective shield? Analyzing South Korea’s cybersecurity strategy (Yangmo Ku); 23 In the line of fire: Taiwan’s legal, political, and technological cybersecurity posture (Tobias Burgers, Moritz Hellmann and Scott N. Romaniuk); 24 Serving the people: China’s cybersecurity policy and its implications (Yu-Cheng Chen, Tony Tai-Ting Liu, and Scott N. Romaniuk); 25 Cybersecurity in a one-party state: policies and implications for Vietnam’s economy and online freedom (Phan Le); 26 The Philippines’ cybersecurity strategy: strengthening partnerships to enhance cybersecurity capability (Amparo Pamela, H. Fabe, and Ella Zarcilla-Genecela); 27 Malaysia: balancing national development, national security, and cybersecurity policy (Ahmad El-Muhammady); 28 Cyber governance and data protection in India: a critical legal analysis (Debarati Halder and K. Jaishankar); 29 Cyber security: a national priority for Bangladesh (Md. Shariful Islam); 30 Managing a digital revolution: cyber security capacity building in Myanmar (Niels Nagelhus Schia and Lars Gjesvik); 31 Australia’s cyber security: a unique opportunity (Ana Stuparu); 32 Singapore: a leading actor in ASEAN cybersecurity (Benjamin Ang); Part III: The Middle East; 33 Between multi-stakeholderism and cyber sovereignty: uunderstanding Turkey’s cybersecurity strategy (Tuba Eldem); 34 Israel: cyber defence and security as national trademarks of international legitimacy (Fabio Cristiano); 35 Palestine: Whose cybersecurity without cyber sovereignty? (Fabio Cristiano); 36 The "Silicon Valley of the Middle East": cybersecurity, Saudi Arabia, and the path to vision 2030 (Anwar Ouassini and Kimeu W. Boynton); 37 The Islamic Republic of Iran’s cybersecurity strategy: challenges in an era of cyber uncertainty (Filiz Katman); Part IV: The Americas; 38 Canada’s cyber security in a globalized environment: challenges and opportunities (Kawser Ahmed); 39 The United States: a declining hegemon in Cyberspace? (Mary Manjikian); 40 Jamaica’s cybercrime and cyber-security: policies, laws, and strategies (Suzette A. Haughton); 41 Mexico and cybersecurity: policies, challenges, and concerns (Saúl Mauricio Rodriguez-Hernandez and Nicolás Velásquez); 42 Colombia’s cybersecurity predicament: state making, strategic challenges and the cyberspace (Florent Frasson-Quenoz and Cesar Augusto Niño González);  43 Cybersecurity Governance in Brazil: Keeping Silos or Building Bridges? (Louise Marie Hurel and Luisa Cruz Lobato)  Part V: Africa; 44 Securitizing Cyber Space in Egypt: the Dilemma of Cybersecurity and Democracy (Bassant Hassib and Nardine Alnemr); 45 Security through the Arab Winter: cyber strategies in postrevolutionary Tunisia (Nabil Ouassini); 46 Cyber security in Kenya: balancing economic security and internet freedom (James D. Fielder); 47 Cybersecurity policy in Nigeria: a tool for national security and economic prosperity (Adewunmi J. Falode); 48 Cybersecurity in Ghana: past, present, and future (Anwar Ouassini and Mostafa Amini); 49 Building a Cyber Fortress in Africa: uganda’s cyber security capacities and challenges (Scott N. Romaniuk and David Andrew Omona); 50 Cybersecurity in South Africa: status, governance, and prospects (Raymond Steenkamp Fonseca and Jo-Ansie van Wyk); 51 Algorithms of oppression? AU’s cybersecurity policy and its enforcement in Africa (Joshua Oreoluwa Akintayo); Index



Udostępnij

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia