Nous utilisons des cookies pour améliorer votre expérience. Pour nous conformer à la nouvelle directive sur la vie privée, nous devons demander votre consentement à l’utilisation de ces cookies. En savoir plus.
Cyberpower
EAN : 9782940222667
Paru le : 19 avr. 2013
-
Livraison gratuite
en France sans minimum
de commande -
Manquants maintenus
en commande
automatiquement -
Un interlocuteur
unique pour toutes
vos commandes -
Toutes les licences
numériques du marché
au tarif éditeur -
Assistance téléphonique
personalisée sur le
numérique -
Service client
Du Lundi au vendredi
de 9h à 18h
- EAN13 : 9782940222667
- Réf. éditeur : G16840
- Collection : EPFL PRESS
- Editeur : Pu Polytechnique
- Date Parution : 19 avr. 2013
- Disponibilite : Disponible
- Barème de remise : NS
- Nombre de pages : 450
- Format : H:247 mm L:164 mm E:32 mm
- Poids : 968gr
- Interdit de retour : Retour interdit
-
Résumé :
Today, cyberspace is where new forms of criminality are being exploited; and cyberspace has become the economic and military battlefield where conflicts of all kinds are played out. the ability to control information and telecommunication infrastructure, to respond to cyberattacks and to ensure cybersecurity offers real power and has become one of the most significant political, economic and technological issues of this twenty-first century.
Information and communication technologies (ICT) have grown to become a critical part of our society's infrastructure, and their potential misuse affects us all, from the individual citizen to private and public organizations and states. thus cyberpower has become the newest means for organisations - both legitimate and criminal - to demonstrate their capabilities.
This book explains the stakes of cyberpower in terms of its various manifestations, including cybercriminality, cyberterrorism, cyberconflicts and cyberwarfare. It evaluates the impacts on, and consequences for, individuals, organisations and states. it provides a panorama of the actors and their means of operating and describes the strategies, methodologies and kinds of measures that can be employed to combat the abusive and criminal uses of digital technologies, and thus improve security within cyberspace and in real life. The book's educational approach, including numerous illustrations, exercises and case studies, makes a complex subject accessible to a wide public.