Cyberthreats and the Decline of the Nation-State
Series: Routledge Research in Information Technology and E-Commerce Law;
- Publisher's listprice GBP 150.00
-
71 662 Ft (68 250 Ft + 5% VAT)
The price is estimated because at the time of ordering we do not know what conversion rates will apply to HUF / product currency when the book arrives. In case HUF is weaker, the price increases slightly, in case HUF is stronger, the price goes lower slightly.
- Discount 20% (cc. 14 332 Ft off)
- Discounted price 57 330 Ft (54 600 Ft + 5% VAT)
Subcribe now and take benefit of a favourable price.
Subscribe
71 662 Ft
Availability
Estimated delivery time: In stock at the publisher, but not at Prospero's office. Delivery time approx. 3-5 weeks.
Not in stock at Prospero.
Why don't you give exact delivery time?
Delivery time is estimated on our previous experiences. We give estimations only, because we order from outside Hungary, and the delivery time mainly depends on how quickly the publisher supplies the book. Faster or slower deliveries both happen, but we do our best to supply as quickly as possible.
Product details:
- Edition number 1
- Publisher Routledge
- Date of Publication 4 March 2014
- ISBN 9780415823760
- Binding Hardback
- No. of pages184 pages
- Size 234x156 mm
- Weight 500 g
- Language English 0
Categories
Short description:
This book explores the nature of cyber-attacks to demonstrate how the traditional cyber threat-control systems used by nation-states are increasingly ineffective against transnational cyber threats, and how new ways of tackling these attacks can and are being developed. It considers how civilians, both individuals and corporations, could be integrated into a more decentralized, distributed system of cyber-threat control exploring the role such civilians could play in the maintenance of order online and the implications for sovereignty in the twenty first century.
MoreLong description:
This book explores the extraordinary difficulties a nation-state’s law enforcement and military face in attempting to prevent cyber-attacks. In the wake of recent assaults including the denial of service attack on Estonia in 2007 and the widespread use of the Zeus Trojan Horse software, Susan W. Brenner explores how traditional categories and procedures inherent in law enforcement and military agencies can obstruct efforts to respond to cyberthreats. Brenner argues that the use of a territorially-based system of sovereignty to combat cyberthreats is ineffective, as cyberspace erodes the import of territory. This problem is compounded by the nature of cybercrime as a continually evolving phenomenon driven by rapid and complex technological change.
Following an evaluation of the efficacy of the nation-state, the book goes on to explore how individuals and corporations could be integrated into a more decentralized, distributed system of cyberthreat control. Looking at initiatives in Estonia and Sweden which have attempted to incorporate civilians into their cyber-response efforts, Brenner suggests that civilian involvement may mediate the rigid hierarchies that exist among formal agencies and increase the flexibility of any response. This book will be of great interest to students and researchers of information technological law and security studies.
MoreTable of Contents:
1. Cyberchaos: Law and Disorder in Cyberspace 2. Threat Morphing in Cyberspace 3. Threats and the Evolution of Threat Control Strategies 4. Cyberspace and Eroding Threat-Control 5. Proposed –and Possible–Solutions 6. Lessons from History 7. Distributed Security 8. Medieval Cyberspace?
More
Mathematical Methods in Human Geography and Planning: Increasing Alpha with Options
17 199 HUF
15 479 HUF