A Vulnerable System : : The History of Information Security in the Computer Age / / Andrew J. Stewart.

As threats to the security of information pervade the fabric of everyday life, A Vulnerable System, describes how, even as the demand for information security increases, the needs of society are not being met. The result is that the confidentiality of our personal data, the integrity of our election...

Full description

Saved in:
Bibliographic Details
Superior document:Title is part of eBook package: De Gruyter Cornell University Press Complete eBook-Package 2021
VerfasserIn:
Place / Publishing House:Ithaca, NY : : Cornell University Press, , [2021]
©2021
Year of Publication:2021
Language:English
Online Access:
Physical Description:1 online resource (312 p.)
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 05767nam a22008055i 4500
001 9781501759048
003 DE-B1597
005 20221201113901.0
006 m|||||o||d||||||||
007 cr || ||||||||
008 221201t20212021nyu fo d z eng d
010 |a 2021013835 
020 |a 9781501759048 
024 7 |a 10.1515/9781501759048  |2 doi 
035 |a (DE-B1597)576252 
035 |a (OCoLC)1269269158 
040 |a DE-B1597  |b eng  |c DE-B1597  |e rda 
041 0 |a eng 
044 |a nyu  |c US-NY 
050 0 0 |a QA76.9.A25 
072 7 |a COM053000  |2 bisacsh 
082 0 4 |a 005.8 
100 1 |a Stewart, Andrew J.,   |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 2 |a A Vulnerable System :  |b The History of Information Security in the Computer Age /  |c Andrew J. Stewart. 
264 1 |a Ithaca, NY :   |b Cornell University Press,   |c [2021] 
264 4 |c ©2021 
300 |a 1 online resource (312 p.) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 0 |t Frontmatter --   |t Contents --   |t Introduction: Three Stigmata --   |t 1. A “New Dimension” for the Security of Information --   |t 2. The Promise, Success, and Failure of the Early Researchers --   |t 3. The Creation of the Internet and the Web, and a Dark Portent --   |t 4. The Dot-Com Boom and the Genesis of a Lucrative Feedback Loop --   |t 5. Software Security and the “Hamster Wheel of Pain” --   |t 6. Usable Security, Economics, and Psychology --   |t 7. Vulnerability Disclosure, Bounties, and Markets --   |t 8. Data Breaches, Nation-State Hacking, and Epistemic Closure --   |t 9. The Wicked Nature of Information Security --   |t Epilogue: The Past, Present, and a Possible Future --   |t Acknowledgments --   |t Notes --   |t Select Bibliography --   |t Index 
506 0 |a restricted access  |u http://purl.org/coar/access_right/c_16ec  |f online access with authorization  |2 star 
520 |a As threats to the security of information pervade the fabric of everyday life, A Vulnerable System, describes how, even as the demand for information security increases, the needs of society are not being met. The result is that the confidentiality of our personal data, the integrity of our elections, and the stability of foreign relations between countries are increasingly at risk.Stewart convincingly shows that emergency software patches and new security products cannot provide the solution to threats such as computer hacking, viruses, software vulnerabilities, and electronic spying. Profound underlying structural problems must first be understood, confronted, and then addressed.A Vulnerable System delivers a long view of the history of information security, beginning with the creation of the first digital computers during the Cold War. From the key institutions of the so-called military industrial complex in the 1950s to Silicon Valley start-ups in the 2020s, the relentless pursuit of new technologies has come at great cost. The absence of knowledge regarding the history of information security has caused the lessons of the past to be forsaken for the novelty of the present, and has led us to be collectively unable to meet the needs of the current day. From the very beginning of the information age, claims of secure systems have been crushed by practical reality.The myriad risks to technology, Stewart reveals, cannot be addressed without first understanding how we arrived at this moment. A Vulnerable System is an enlightening and sobering history of a topic that affects crucial aspects of our lives. 
538 |a Mode of access: Internet via World Wide Web. 
546 |a In English. 
588 0 |a Description based on online resource; title from PDF title page (publisher's Web site, viewed 01. Dez 2022) 
650 0 |a Computer networks  |x Security measures  |x History. 
650 0 |a Computer security  |x History. 
650 4 |a History Of Technology. 
650 4 |a History. 
650 4 |a Security Studies. 
650 7 |a COMPUTERS / Security / General.  |2 bisacsh 
653 |a infosec, data breaches, cybersecurity, history of hacking, history of security vulnerabilities, information security failures,. 
773 0 8 |i Title is part of eBook package:  |d De Gruyter  |t Cornell University Press Complete eBook-Package 2021  |z 9783110739084 
773 0 8 |i Title is part of eBook package:  |d De Gruyter  |t EBOOK PACKAGE COMPLETE 2021 English  |z 9783110754001 
773 0 8 |i Title is part of eBook package:  |d De Gruyter  |t EBOOK PACKAGE COMPLETE 2021  |z 9783110753776  |o ZDB-23-DGG 
773 0 8 |i Title is part of eBook package:  |d De Gruyter  |t EBOOK PACKAGE Engineering, Computer Sciences 2021 English  |z 9783110754070 
773 0 8 |i Title is part of eBook package:  |d De Gruyter  |t EBOOK PACKAGE Engineering, Computer Sciences 2021  |z 9783110753837  |o ZDB-23-DEI 
776 0 |c print  |z 9781501758942 
856 4 0 |u https://doi.org/10.1515/9781501759048?locatt=mode:legacy 
856 4 0 |u https://www.degruyter.com/isbn/9781501759048 
856 4 2 |3 Cover  |u https://www.degruyter.com/document/cover/isbn/9781501759048/original 
912 |a 978-3-11-073908-4 Cornell University Press Complete eBook-Package 2021  |b 2021 
912 |a 978-3-11-075400-1 EBOOK PACKAGE COMPLETE 2021 English  |b 2021 
912 |a 978-3-11-075407-0 EBOOK PACKAGE Engineering, Computer Sciences 2021 English  |b 2021 
912 |a EBA_CL_CHCOMSGSEN 
912 |a EBA_EBKALL 
912 |a EBA_ECL_CHCOMSGSEN 
912 |a EBA_EEBKALL 
912 |a EBA_ESTMALL 
912 |a EBA_PPALL 
912 |a EBA_STMALL 
912 |a GBV-deGruyter-alles 
912 |a PDA12STME 
912 |a PDA13ENGE 
912 |a PDA18STMEE 
912 |a PDA5EBK 
912 |a ZDB-23-DEI  |b 2021 
912 |a ZDB-23-DGG  |b 2021