Disclosure of security vulnerabilities: legal and ethical issues
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
London [u.a.]
Springer
2013
|
Schriftenreihe: | SpringerBriefs in cybersecurity
|
Online-Zugang: | BTU01 FHA01 FHM01 FHN01 FKE01 UBG01 UBR01 UBT01 UBW01 UER01 UPA01 Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online-Ressource |
ISBN: | 9781447150039 9781447150046 |
DOI: | 10.1007/978-1-4471-5004-6 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV040981881 | ||
003 | DE-604 | ||
005 | 20130507 | ||
007 | cr|uuu---uuuuu | ||
008 | 130506s2013 |||| o||u| ||||||eng d | ||
015 | |a 13,O05 |2 dnb | ||
016 | 7 | |a 103389544X |2 DE-101 | |
020 | |a 9781447150039 |9 978-1-4471-5003-9 | ||
020 | |a 9781447150046 |c Online |9 978-1-4471-5004-6 | ||
024 | 7 | |a 10.1007/978-1-4471-5004-6 |2 doi | |
024 | 3 | |a 9781447150046 | |
035 | |a (OCoLC)846968819 | ||
035 | |a (DE-599)DNB103389544X | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-473 |a DE-M347 |a DE-20 |a DE-703 |a DE-Aug4 |a DE-92 |a DE-29 |a DE-859 |a DE-634 |a DE-739 |a DE-355 | ||
082 | 0 | |a 343.0999 | |
084 | |a 004 |2 sdnb | ||
100 | 1 | |a Maurushat, Alana |e Verfasser |0 (DE-588)1034270052 |4 aut | |
245 | 1 | 0 | |a Disclosure of security vulnerabilities |b legal and ethical issues |c Alana Maurushat |
264 | 1 | |a London [u.a.] |b Springer |c 2013 | |
300 | |a 1 Online-Ressource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a SpringerBriefs in cybersecurity | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-1-4471-5004-6 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025959857&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025959857&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-025959857 | ||
966 | e | |u https://doi.org/10.1007/978-1-4471-5004-6 |l BTU01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4471-5004-6 |l FHA01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4471-5004-6 |l FHM01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4471-5004-6 |l FHN01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4471-5004-6 |l FKE01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4471-5004-6 |l UBG01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4471-5004-6 |l UBR01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4471-5004-6 |l UBT01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4471-5004-6 |l UBW01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4471-5004-6 |l UER01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4471-5004-6 |l UPA01 |p ZDB-2-SCS |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804150301327884288 |
---|---|
adam_text | DISCLOSURE OF SECURITY VULNERABILITIES
/ MAURUSHAT, ALANA
: 2013
TABLE OF CONTENTS / INHALTSVERZEICHNIS
FOREWORD
INTRODUCTION
TYPES OF DISCLOSURE
METHODS OF DISCOVERING SECURITY VULNERABILITIES
CRIMINAL OFFENCES: UNAUTHORISED ACCESS, MODIFICATION OR INTERFERENCE
COMPROVISIONS
OTHER LEGAL AND ETHICAL ISSUES
CONCLUSION
GLOSSARY OF TERMS
APPENDIX: COMPARATIVE TABLES
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
DISCLOSURE OF SECURITY VULNERABILITIES
/ MAURUSHAT, ALANA
: 2013
ABSTRACT / INHALTSTEXT
MUCH DEBATE HAS BEEN GIVEN AS TO WHETHER COMPUTER SECURITY IS IMPROVED
THROUGH THE FULL DISCLOSURE OF SECURITY VULNERABILITIES VERSUS KEEPING
THE PROBLEMS PRIVATE AND UNSPOKEN. ALTHOUGH THERE IS STILL TENSION
BETWEEN THOSE WHO FEEL STRONGLY ABOUT THE SUBJECT, A MIDDLE GROUND OF
RESPONSIBLE DISCLOSURE SEEMS TO HAVE EMERGED. UNFORTUNATELY, JUST AS
WE’VE MOVED INTO AN ERA WITH MORE RESPONSIBLE DISCLOSURE, IT WOULD
SEEM THAT A MARKET HAS EMERGED FOR SECURITY VULNERABILITIES AND ZERO DAY
EXPLOITS.DISCLOSURE OF SECURITY VULNERABILITIES: LEGAL AND ETHICAL
ISSUES CONSIDERS BOTH THE ETHICAL AND LEGAL ISSUES INVOLVED WITH THE
DISCLOSURE OF VULNERABILITIES AND EXPLORES THE WAYS IN WHICH LAW MIGHT
RESPOND TO THESE CHALLENGES
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author | Maurushat, Alana |
author_GND | (DE-588)1034270052 |
author_facet | Maurushat, Alana |
author_role | aut |
author_sort | Maurushat, Alana |
author_variant | a m am |
building | Verbundindex |
bvnumber | BV040981881 |
collection | ZDB-2-SCS |
ctrlnum | (OCoLC)846968819 (DE-599)DNB103389544X |
dewey-full | 343.0999 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 343 - Military, tax, trade & industrial law |
dewey-raw | 343.0999 |
dewey-search | 343.0999 |
dewey-sort | 3343.0999 |
dewey-tens | 340 - Law |
discipline | Rechtswissenschaft Informatik |
doi_str_mv | 10.1007/978-1-4471-5004-6 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02782nmm a2200529zc 4500</leader><controlfield tag="001">BV040981881</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20130507 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">130506s2013 |||| o||u| ||||||eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">13,O05</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">103389544X</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781447150039</subfield><subfield code="9">978-1-4471-5003-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781447150046</subfield><subfield code="c">Online</subfield><subfield code="9">978-1-4471-5004-6</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-1-4471-5004-6</subfield><subfield code="2">doi</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9781447150046</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)846968819</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB103389544X</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">343.0999</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Maurushat, Alana</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1034270052</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Disclosure of security vulnerabilities</subfield><subfield code="b">legal and ethical issues</subfield><subfield code="c">Alana Maurushat</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">London [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">SpringerBriefs in cybersecurity</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-1-4471-5004-6</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025959857&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025959857&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-025959857</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4471-5004-6</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4471-5004-6</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4471-5004-6</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4471-5004-6</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4471-5004-6</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4471-5004-6</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4471-5004-6</subfield><subfield code="l">UBR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4471-5004-6</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4471-5004-6</subfield><subfield code="l">UBW01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4471-5004-6</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4471-5004-6</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV040981881 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T00:36:45Z |
institution | BVB |
isbn | 9781447150039 9781447150046 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-025959857 |
oclc_num | 846968819 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG DE-M347 DE-20 DE-703 DE-Aug4 DE-92 DE-29 DE-859 DE-634 DE-739 DE-355 DE-BY-UBR |
owner_facet | DE-473 DE-BY-UBG DE-M347 DE-20 DE-703 DE-Aug4 DE-92 DE-29 DE-859 DE-634 DE-739 DE-355 DE-BY-UBR |
physical | 1 Online-Ressource |
psigel | ZDB-2-SCS |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Springer |
record_format | marc |
series2 | SpringerBriefs in cybersecurity |
spelling | Maurushat, Alana Verfasser (DE-588)1034270052 aut Disclosure of security vulnerabilities legal and ethical issues Alana Maurushat London [u.a.] Springer 2013 1 Online-Ressource txt rdacontent c rdamedia cr rdacarrier SpringerBriefs in cybersecurity https://doi.org/10.1007/978-1-4471-5004-6 Verlag Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025959857&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025959857&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract |
spellingShingle | Maurushat, Alana Disclosure of security vulnerabilities legal and ethical issues |
title | Disclosure of security vulnerabilities legal and ethical issues |
title_auth | Disclosure of security vulnerabilities legal and ethical issues |
title_exact_search | Disclosure of security vulnerabilities legal and ethical issues |
title_full | Disclosure of security vulnerabilities legal and ethical issues Alana Maurushat |
title_fullStr | Disclosure of security vulnerabilities legal and ethical issues Alana Maurushat |
title_full_unstemmed | Disclosure of security vulnerabilities legal and ethical issues Alana Maurushat |
title_short | Disclosure of security vulnerabilities |
title_sort | disclosure of security vulnerabilities legal and ethical issues |
title_sub | legal and ethical issues |
url | https://doi.org/10.1007/978-1-4471-5004-6 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025959857&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025959857&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT maurushatalana disclosureofsecurityvulnerabilitieslegalandethicalissues |