Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.
     
Limit search to available items
33 results found. Sorted by relevance | date | title .
Results Page:  Previous Next

Title Routledge companion to global cyber-security strategy / edited by Scott M. Romaniuk and Mary Manjikian. [O'Reilly electronic resource]

Publication Info. New York, NY : Routledge, 2021
©2021
QR Code
Description 1 online resource (xxiii, 632 pages) : illustrations
Bibliography Includes bibliographical references and index.
Summary This companion provides the most comprehensive and up-to-date comparative overview of the cyber-security strategies and doctrines of the major states and actors in Europe, North America, South America, Africa, and Asia. The volume offers an introduction to each nation's cyber-security strategy and policy, along with a list of resources in English that may be consulted for those wishing to go into greater depth. Each chapter is written by a leading academic or policy specialist, and contains the following sections: overview of national cyber-security strategy; concepts and definitions; exploration of cyber-security issues as they relate to international law and governance; critical examinations of cyber partners at home and abroad; legislative developments and processes; dimensions of cybercrime and cyberterrorism; implications of cyber-security policies and strategies. This book will be of much interest to students and practitioners in the fields of cyber-security, national security, strategic studies, foreign policy, and international relations.
Contents Part I: Europe -- Securing the kingdom's cyberspace: cybersecurity and cyber intelligence in Spain -- Albania's cybersecurity pivot: between Western architectures and great power competition -- Armenian national policy in cyber space: toward a global cyber security architecture -- Czech Republic: a new cyber security leader in Central Europe -- Cyber security in the French Republic -- Germany's cybersecurity strategy: confronting future challeges -- Cybersecurity of Poland: legal and organizational framework -- Hungary's evolving cyber security strategyy -- Romanian cybersecurity efforts: a work in progress -- Italy's cyber security architecture and critical infrastructure -- Dutch cyber security strategy -- Norwegian cyber security: a small-state approach to building international cyber cooperation -- Seeking a new order for global cybersecurity: the Russian approach to cyber-sovereignty -- Slovakia: the Tatra Tiger without teeth -- Slovenia: a fragmented cyber security -- In the line of Russian Ukraine. hybrid warfare, and cybersecurity defense aggression: Ukraine, hybrid warfare, and cybersecurity defense -- United Kingdom: pragmatism and adaptability in the cyber realm -- European Union: policy, cohesion, and supranational experiences with cybersecurity -- Estonia: from the "Bronze Night" to cybersecurity pioneers -- NATO's evolving cyber security policy and strategy -- Part II: Asia and Australia -- Japan's challenges, capabilities, and preparedness in cyberspace -- An effective shield? Analyzing South Korea's cybersecurity strategy -- In the line of fire: Taiwan's legal, political, and technological cybersecurity posture -- Serving the people: China's cybersecurity policy and its implications -- Cybersecurity in a one-party state: policies and implications for Vietnam's economy and online freedom -- The Philippines' cybersecurity strategy: strengthening partnerships to enhance cybersecurity capability -- Malaysia: balancing national development, national security, and cybersecurity policy -- Cyber governance and data protection in India: a critical legal analysis -- Cybersecurity: a national priority in Bangledesh -- Managing a digital revolution: cyber security capacity building in Myanmar -- Australia's cyber security: a unique opportunity -- Singapore: a leading actor in ASEAN cybersecurity -- Part III: The Middle East -- Between multi-stakeholderism and cyber sovereignty: understanding Turkey's cybersecurity strategy -- Israel: cyber securitization as national trademark -- Palestinian territory occupied: cybersecurity at reduced sovereignty -- The "Silicon Valley of the Middle East": cybersecurity, Saudi Arabia, and the path to Vision 2030 -- The Islamic Republic of Iran's cyber security strategy: challenges in an era of cyber uncertainty -- Part IV: The Americas -- Canada's cyber security in a globalized environment: challenges and opportunities -- The United States: a declining hegemon in cyberspace? -- Jamaica's cybercrime and cyber-security: policies, laws, and strategies -- Mexico and cybersecurity: policies, challenges, and concerns -- Colombia's cybersecurity predicament: state making, strategic challenges, and cyberspace -- Cyber security governance in Brazil: keeping silos or building bridges? -- Part V: Africa -- Securitizing cyberspace in Egypt: the dilemma of cybersecurity and democracy -- Security through the Arab Winter: cyber strategies in postrevolutionary Tunisia -- Cyber security policy in Nigeria: a tool for national security and economic prosperity -- Cybersecurity in Ghana: past, present, and future -- Building a cyber fortress in Africa: Uganda's cyber security capacities and challenges -- Cybersecurity in South Africa: status, governance, and prospects -- Algorithms of oppression? AU's cybersecurity policy and its enforcement in Africa.
Subject Cyberspace -- Security measures -- Government policy.
Cyberterrorism -- Prevention -- Government policy.
Computer crimes -- Prevention -- Government policy.
Computer security -- Government policy.
Internet -- Security measures -- Government policy.
Computer networks -- Security measures -- Government policy.
Sécurité informatique -- Politique gouvernementale.
Internet -- Sécurité -- Mesures -- Politique gouvernementale.
Réseaux d'ordinateurs -- Sécurité -- Mesures -- Politique gouvernementale.
Computer networks -- Security measures -- Government policy
Computer security -- Government policy
Added Author Romaniuk, Scott N., editor.
Manjikian, Mary, editor.
ISBN 0429680368
9780429680366 (electronic bk.)
Patron reviews: add a review
Click for more information
EBOOK
No one has rated this material

You can...
Also...
- Find similar reads
- Add a review
- Sign-up for Newsletter
- Suggest a purchase
- Can't find what you want?
More Information