A Vulnerable System : : The History of Information Security in the Computer Age / / Andrew J. Stewart.

As threats to the security of information pervade the fabric of everyday life, A Vulnerable System, describes how, even as the demand for information security increases, the needs of society are not being met. The result is that the confidentiality of our personal data, the integrity of our election...

Full description

Saved in:
Bibliographic Details
Superior document:Title is part of eBook package: De Gruyter Cornell University Press Complete eBook-Package 2021
VerfasserIn:
Place / Publishing House:Ithaca, NY : : Cornell University Press, , [2021]
©2021
Year of Publication:2021
Language:English
Online Access:
Physical Description:1 online resource (312 p.)
Tags: Add Tag
No Tags, Be the first to tag this record!
id 9781501759048
lccn 2021013835
ctrlnum (DE-B1597)576252
(OCoLC)1269269158
collection bib_alma
record_format marc
spelling Stewart, Andrew J., author. aut http://id.loc.gov/vocabulary/relators/aut
A Vulnerable System : The History of Information Security in the Computer Age / Andrew J. Stewart.
Ithaca, NY : Cornell University Press, [2021]
©2021
1 online resource (312 p.)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
text file PDF rda
Frontmatter -- Contents -- Introduction: Three Stigmata -- 1. A “New Dimension” for the Security of Information -- 2. The Promise, Success, and Failure of the Early Researchers -- 3. The Creation of the Internet and the Web, and a Dark Portent -- 4. The Dot-Com Boom and the Genesis of a Lucrative Feedback Loop -- 5. Software Security and the “Hamster Wheel of Pain” -- 6. Usable Security, Economics, and Psychology -- 7. Vulnerability Disclosure, Bounties, and Markets -- 8. Data Breaches, Nation-State Hacking, and Epistemic Closure -- 9. The Wicked Nature of Information Security -- Epilogue: The Past, Present, and a Possible Future -- Acknowledgments -- Notes -- Select Bibliography -- Index
restricted access http://purl.org/coar/access_right/c_16ec online access with authorization star
As threats to the security of information pervade the fabric of everyday life, A Vulnerable System, describes how, even as the demand for information security increases, the needs of society are not being met. The result is that the confidentiality of our personal data, the integrity of our elections, and the stability of foreign relations between countries are increasingly at risk.Stewart convincingly shows that emergency software patches and new security products cannot provide the solution to threats such as computer hacking, viruses, software vulnerabilities, and electronic spying. Profound underlying structural problems must first be understood, confronted, and then addressed.A Vulnerable System delivers a long view of the history of information security, beginning with the creation of the first digital computers during the Cold War. From the key institutions of the so-called military industrial complex in the 1950s to Silicon Valley start-ups in the 2020s, the relentless pursuit of new technologies has come at great cost. The absence of knowledge regarding the history of information security has caused the lessons of the past to be forsaken for the novelty of the present, and has led us to be collectively unable to meet the needs of the current day. From the very beginning of the information age, claims of secure systems have been crushed by practical reality.The myriad risks to technology, Stewart reveals, cannot be addressed without first understanding how we arrived at this moment. A Vulnerable System is an enlightening and sobering history of a topic that affects crucial aspects of our lives.
Mode of access: Internet via World Wide Web.
In English.
Description based on online resource; title from PDF title page (publisher's Web site, viewed 01. Dez 2022)
Computer networks Security measures History.
Computer security History.
History Of Technology.
History.
Security Studies.
COMPUTERS / Security / General. bisacsh
infosec, data breaches, cybersecurity, history of hacking, history of security vulnerabilities, information security failures,.
Title is part of eBook package: De Gruyter Cornell University Press Complete eBook-Package 2021 9783110739084
Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2021 English 9783110754001
Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2021 9783110753776 ZDB-23-DGG
Title is part of eBook package: De Gruyter EBOOK PACKAGE Engineering, Computer Sciences 2021 English 9783110754070
Title is part of eBook package: De Gruyter EBOOK PACKAGE Engineering, Computer Sciences 2021 9783110753837 ZDB-23-DEI
print 9781501758942
https://doi.org/10.1515/9781501759048?locatt=mode:legacy
https://www.degruyter.com/isbn/9781501759048
Cover https://www.degruyter.com/document/cover/isbn/9781501759048/original
language English
format eBook
author Stewart, Andrew J.,
Stewart, Andrew J.,
spellingShingle Stewart, Andrew J.,
Stewart, Andrew J.,
A Vulnerable System : The History of Information Security in the Computer Age /
Frontmatter --
Contents --
Introduction: Three Stigmata --
1. A “New Dimension” for the Security of Information --
2. The Promise, Success, and Failure of the Early Researchers --
3. The Creation of the Internet and the Web, and a Dark Portent --
4. The Dot-Com Boom and the Genesis of a Lucrative Feedback Loop --
5. Software Security and the “Hamster Wheel of Pain” --
6. Usable Security, Economics, and Psychology --
7. Vulnerability Disclosure, Bounties, and Markets --
8. Data Breaches, Nation-State Hacking, and Epistemic Closure --
9. The Wicked Nature of Information Security --
Epilogue: The Past, Present, and a Possible Future --
Acknowledgments --
Notes --
Select Bibliography --
Index
author_facet Stewart, Andrew J.,
Stewart, Andrew J.,
author_variant a j s aj ajs
a j s aj ajs
author_role VerfasserIn
VerfasserIn
author_sort Stewart, Andrew J.,
title A Vulnerable System : The History of Information Security in the Computer Age /
title_sub The History of Information Security in the Computer Age /
title_full A Vulnerable System : The History of Information Security in the Computer Age / Andrew J. Stewart.
title_fullStr A Vulnerable System : The History of Information Security in the Computer Age / Andrew J. Stewart.
title_full_unstemmed A Vulnerable System : The History of Information Security in the Computer Age / Andrew J. Stewart.
title_auth A Vulnerable System : The History of Information Security in the Computer Age /
title_alt Frontmatter --
Contents --
Introduction: Three Stigmata --
1. A “New Dimension” for the Security of Information --
2. The Promise, Success, and Failure of the Early Researchers --
3. The Creation of the Internet and the Web, and a Dark Portent --
4. The Dot-Com Boom and the Genesis of a Lucrative Feedback Loop --
5. Software Security and the “Hamster Wheel of Pain” --
6. Usable Security, Economics, and Psychology --
7. Vulnerability Disclosure, Bounties, and Markets --
8. Data Breaches, Nation-State Hacking, and Epistemic Closure --
9. The Wicked Nature of Information Security --
Epilogue: The Past, Present, and a Possible Future --
Acknowledgments --
Notes --
Select Bibliography --
Index
title_new A Vulnerable System :
title_sort a vulnerable system : the history of information security in the computer age /
publisher Cornell University Press,
publishDate 2021
physical 1 online resource (312 p.)
contents Frontmatter --
Contents --
Introduction: Three Stigmata --
1. A “New Dimension” for the Security of Information --
2. The Promise, Success, and Failure of the Early Researchers --
3. The Creation of the Internet and the Web, and a Dark Portent --
4. The Dot-Com Boom and the Genesis of a Lucrative Feedback Loop --
5. Software Security and the “Hamster Wheel of Pain” --
6. Usable Security, Economics, and Psychology --
7. Vulnerability Disclosure, Bounties, and Markets --
8. Data Breaches, Nation-State Hacking, and Epistemic Closure --
9. The Wicked Nature of Information Security --
Epilogue: The Past, Present, and a Possible Future --
Acknowledgments --
Notes --
Select Bibliography --
Index
isbn 9781501759048
9783110739084
9783110754001
9783110753776
9783110754070
9783110753837
9781501758942
callnumber-first Q - Science
callnumber-subject QA - Mathematics
callnumber-label QA76
callnumber-sort QA 276.9 A25
url https://doi.org/10.1515/9781501759048?locatt=mode:legacy
https://www.degruyter.com/isbn/9781501759048
https://www.degruyter.com/document/cover/isbn/9781501759048/original
illustrated Not Illustrated
dewey-hundreds 000 - Computer science, information & general works
dewey-tens 000 - Computer science, knowledge & systems
dewey-ones 005 - Computer programming, programs & data
dewey-full 005.8
dewey-sort 15.8
dewey-raw 005.8
dewey-search 005.8
doi_str_mv 10.1515/9781501759048?locatt=mode:legacy
oclc_num 1269269158
work_keys_str_mv AT stewartandrewj avulnerablesystemthehistoryofinformationsecurityinthecomputerage
AT stewartandrewj vulnerablesystemthehistoryofinformationsecurityinthecomputerage
status_str n
ids_txt_mv (DE-B1597)576252
(OCoLC)1269269158
carrierType_str_mv cr
hierarchy_parent_title Title is part of eBook package: De Gruyter Cornell University Press Complete eBook-Package 2021
Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2021 English
Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2021
Title is part of eBook package: De Gruyter EBOOK PACKAGE Engineering, Computer Sciences 2021 English
Title is part of eBook package: De Gruyter EBOOK PACKAGE Engineering, Computer Sciences 2021
is_hierarchy_title A Vulnerable System : The History of Information Security in the Computer Age /
container_title Title is part of eBook package: De Gruyter Cornell University Press Complete eBook-Package 2021
_version_ 1806143951261925376
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05767nam a22008055i 4500</leader><controlfield tag="001">9781501759048</controlfield><controlfield tag="003">DE-B1597</controlfield><controlfield tag="005">20221201113901.0</controlfield><controlfield tag="006">m|||||o||d||||||||</controlfield><controlfield tag="007">cr || ||||||||</controlfield><controlfield tag="008">221201t20212021nyu fo d z eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2021013835</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781501759048</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1515/9781501759048</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-B1597)576252</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1269269158</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-B1597</subfield><subfield code="b">eng</subfield><subfield code="c">DE-B1597</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">nyu</subfield><subfield code="c">US-NY</subfield></datafield><datafield tag="050" ind1="0" ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">005.8</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Stewart, Andrew J., </subfield><subfield code="e">author.</subfield><subfield code="4">aut</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/aut</subfield></datafield><datafield tag="245" ind1="1" ind2="2"><subfield code="a">A Vulnerable System :</subfield><subfield code="b">The History of Information Security in the Computer Age /</subfield><subfield code="c">Andrew J. Stewart.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Ithaca, NY : </subfield><subfield code="b">Cornell University Press, </subfield><subfield code="c">[2021]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2021</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (312 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield><subfield code="b">PDF</subfield><subfield code="2">rda</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Frontmatter -- </subfield><subfield code="t">Contents -- </subfield><subfield code="t">Introduction: Three Stigmata -- </subfield><subfield code="t">1. A “New Dimension” for the Security of Information -- </subfield><subfield code="t">2. The Promise, Success, and Failure of the Early Researchers -- </subfield><subfield code="t">3. The Creation of the Internet and the Web, and a Dark Portent -- </subfield><subfield code="t">4. The Dot-Com Boom and the Genesis of a Lucrative Feedback Loop -- </subfield><subfield code="t">5. Software Security and the “Hamster Wheel of Pain” -- </subfield><subfield code="t">6. Usable Security, Economics, and Psychology -- </subfield><subfield code="t">7. Vulnerability Disclosure, Bounties, and Markets -- </subfield><subfield code="t">8. Data Breaches, Nation-State Hacking, and Epistemic Closure -- </subfield><subfield code="t">9. The Wicked Nature of Information Security -- </subfield><subfield code="t">Epilogue: The Past, Present, and a Possible Future -- </subfield><subfield code="t">Acknowledgments -- </subfield><subfield code="t">Notes -- </subfield><subfield code="t">Select Bibliography -- </subfield><subfield code="t">Index</subfield></datafield><datafield tag="506" ind1="0" ind2=" "><subfield code="a">restricted access</subfield><subfield code="u">http://purl.org/coar/access_right/c_16ec</subfield><subfield code="f">online access with authorization</subfield><subfield code="2">star</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">As threats to the security of information pervade the fabric of everyday life, A Vulnerable System, describes how, even as the demand for information security increases, the needs of society are not being met. The result is that the confidentiality of our personal data, the integrity of our elections, and the stability of foreign relations between countries are increasingly at risk.Stewart convincingly shows that emergency software patches and new security products cannot provide the solution to threats such as computer hacking, viruses, software vulnerabilities, and electronic spying. Profound underlying structural problems must first be understood, confronted, and then addressed.A Vulnerable System delivers a long view of the history of information security, beginning with the creation of the first digital computers during the Cold War. From the key institutions of the so-called military industrial complex in the 1950s to Silicon Valley start-ups in the 2020s, the relentless pursuit of new technologies has come at great cost. The absence of knowledge regarding the history of information security has caused the lessons of the past to be forsaken for the novelty of the present, and has led us to be collectively unable to meet the needs of the current day. From the very beginning of the information age, claims of secure systems have been crushed by practical reality.The myriad risks to technology, Stewart reveals, cannot be addressed without first understanding how we arrived at this moment. A Vulnerable System is an enlightening and sobering history of a topic that affects crucial aspects of our lives.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: Internet via World Wide Web.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">In English.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (publisher's Web site, viewed 01. Dez 2022)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="x">History.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="x">History.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">History Of Technology.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">History.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security Studies.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">infosec, data breaches, cybersecurity, history of hacking, history of security vulnerabilities, information security failures,.</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">Cornell University Press Complete eBook-Package 2021</subfield><subfield code="z">9783110739084</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">EBOOK PACKAGE COMPLETE 2021 English</subfield><subfield code="z">9783110754001</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">EBOOK PACKAGE COMPLETE 2021</subfield><subfield code="z">9783110753776</subfield><subfield code="o">ZDB-23-DGG</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">EBOOK PACKAGE Engineering, Computer Sciences 2021 English</subfield><subfield code="z">9783110754070</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">EBOOK PACKAGE Engineering, Computer Sciences 2021</subfield><subfield code="z">9783110753837</subfield><subfield code="o">ZDB-23-DEI</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">print</subfield><subfield code="z">9781501758942</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1515/9781501759048?locatt=mode:legacy</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.degruyter.com/isbn/9781501759048</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="3">Cover</subfield><subfield code="u">https://www.degruyter.com/document/cover/isbn/9781501759048/original</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-073908-4 Cornell University Press Complete eBook-Package 2021</subfield><subfield code="b">2021</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-075400-1 EBOOK PACKAGE COMPLETE 2021 English</subfield><subfield code="b">2021</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-075407-0 EBOOK PACKAGE Engineering, Computer Sciences 2021 English</subfield><subfield code="b">2021</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_CL_CHCOMSGSEN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ECL_CHCOMSGSEN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EEBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ESTMALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_PPALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_STMALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV-deGruyter-alles</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA12STME</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA13ENGE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA18STMEE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA5EBK</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-23-DEI</subfield><subfield code="b">2021</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-23-DGG</subfield><subfield code="b">2021</subfield></datafield></record></collection>