A Vulnerable System: The History of Information Security in the Computer Age
As threats to the security of information pervade the fabric of everyday life, A Vulnerable System, describes how, even as the demand for information security increases, the needs of society are not being met. The result is that the confidentiality of our personal data, the integrity of our election...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Ithaca, NY
Cornell University Press
[2021]
|
Schlagworte: | |
Online-Zugang: | BSB01 FAW01 FCO01 FHA01 FHR01 FKE01 FLA01 FWS01 FWS02 TUM01 UBY01 UPA01 Volltext |
Zusammenfassung: | As threats to the security of information pervade the fabric of everyday life, A Vulnerable System, describes how, even as the demand for information security increases, the needs of society are not being met. The result is that the confidentiality of our personal data, the integrity of our elections, and the stability of foreign relations between countries are increasingly at risk.Stewart convincingly shows that emergency software patches and new security products cannot provide the solution to threats such as computer hacking, viruses, software vulnerabilities, and electronic spying. Profound underlying structural problems must first be understood, confronted, and then addressed.A Vulnerable System delivers a long view of the history of information security, beginning with the creation of the first digital computers during the Cold War. From the key institutions of the so-called military industrial complex in the 1950s to Silicon Valley start-ups in the 2020s, the relentless pursuit of new technologies has come at great cost. The absence of knowledge regarding the history of information security has caused the lessons of the past to be forsaken for the novelty of the present, and has led us to be collectively unable to meet the needs of the current day. From the very beginning of the information age, claims of secure systems have been crushed by practical reality.The myriad risks to technology, Stewart reveals, cannot be addressed without first understanding how we arrived at this moment. A Vulnerable System is an enlightening and sobering history of a topic that affects crucial aspects of our lives |
Beschreibung: | 1 online resource (312 pages) |
ISBN: | 9781501759048 |
DOI: | 10.1515/9781501759048 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV047524801 | ||
003 | DE-604 | ||
005 | 20230202 | ||
007 | cr|uuu---uuuuu | ||
008 | 211020s2021 |||| o||u| ||||||eng d | ||
020 | |a 9781501759048 |9 978-1-5017-5904-8 | ||
024 | 7 | |a 10.1515/9781501759048 |2 doi | |
035 | |a (ZDB-23-DGG)9781501759048 | ||
035 | |a (OCoLC)1284788294 | ||
035 | |a (DE-599)BVBBV047524801 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-858 |a DE-Aug4 |a DE-859 |a DE-860 |a DE-739 |a DE-91 |a DE-83 |a DE-12 |a DE-898 |a DE-863 |a DE-862 |a DE-706 | ||
082 | 0 | |a 005.8 | |
100 | 1 | |a Stewart, Andrew L. |e Verfasser |4 aut | |
245 | 1 | 0 | |a A Vulnerable System |b The History of Information Security in the Computer Age |c Andrew J. Stewart |
264 | 1 | |a Ithaca, NY |b Cornell University Press |c [2021] | |
264 | 4 | |c © 2021 | |
300 | |a 1 online resource (312 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
520 | |a As threats to the security of information pervade the fabric of everyday life, A Vulnerable System, describes how, even as the demand for information security increases, the needs of society are not being met. The result is that the confidentiality of our personal data, the integrity of our elections, and the stability of foreign relations between countries are increasingly at risk.Stewart convincingly shows that emergency software patches and new security products cannot provide the solution to threats such as computer hacking, viruses, software vulnerabilities, and electronic spying. Profound underlying structural problems must first be understood, confronted, and then addressed.A Vulnerable System delivers a long view of the history of information security, beginning with the creation of the first digital computers during the Cold War. From the key institutions of the so-called military industrial complex in the 1950s to Silicon Valley start-ups in the 2020s, the relentless pursuit of new technologies has come at great cost. The absence of knowledge regarding the history of information security has caused the lessons of the past to be forsaken for the novelty of the present, and has led us to be collectively unable to meet the needs of the current day. From the very beginning of the information age, claims of secure systems have been crushed by practical reality.The myriad risks to technology, Stewart reveals, cannot be addressed without first understanding how we arrived at this moment. A Vulnerable System is an enlightening and sobering history of a topic that affects crucial aspects of our lives | ||
650 | 4 | |a History Of Technology | |
650 | 4 | |a History | |
650 | 4 | |a Security Studies | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 4 | |a Computer networks |x Security measures |x History | |
650 | 4 | |a Computer security |x History | |
650 | 0 | 7 | |a Neue Technologie |0 (DE-588)4194462-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Trusted Computing |0 (DE-588)7562931-8 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Trusted Computing |0 (DE-588)7562931-8 |D s |
689 | 0 | 2 | |a Neue Technologie |0 (DE-588)4194462-8 |D s |
689 | 0 | |5 DE-604 | |
856 | 4 | 0 | |u https://doi.org/10.1515/9781501759048 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-23-DGG |a ZDB-23-DEI | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-032925472 | ||
966 | e | |u https://doi.org/10.1515/9781501759048 |l BSB01 |p ZDB-23-DGG |q BSB_PDA_DGG_Kauf |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9781501759048 |l FAW01 |p ZDB-23-DGG |q FAW_PDA_DGG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9781501759048 |l FCO01 |p ZDB-23-DGG |q FCO_PDA_DGG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9781501759048 |l FHA01 |p ZDB-23-DGG |q FHA_PDA_DGG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9781501759048 |l FHR01 |p ZDB-23-DEI |q ZDB-23-DEI21 |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9781501759048 |l FKE01 |p ZDB-23-DGG |q FKE_PDA_DGG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9781501759048 |l FLA01 |p ZDB-23-DGG |q FLA_PDA_DGG |x Verlag |3 Volltext | |
966 | e | |u https://www.gruyter.com/document/isbn/9781501759048/html |l FWS01 |p ZDB-23-DEI |x Verlag |3 Volltext | |
966 | e | |u https://www.gruyter.com/document/isbn/9781501759048/html |l FWS02 |p ZDB-23-DEI |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9781501759048 |l TUM01 |p ZDB-23-DEI |q TUM_Paketkauf |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9781501759048 |l UBY01 |p ZDB-23-DEI |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9781501759048 |l UPA01 |p ZDB-23-DGG |q UPA_PDA_DGG |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-FWS_katkey | 926998 |
---|---|
_version_ | 1806194913962885120 |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Stewart, Andrew L. |
author_facet | Stewart, Andrew L. |
author_role | aut |
author_sort | Stewart, Andrew L. |
author_variant | a l s al als |
building | Verbundindex |
bvnumber | BV047524801 |
collection | ZDB-23-DGG ZDB-23-DEI |
ctrlnum | (ZDB-23-DGG)9781501759048 (OCoLC)1284788294 (DE-599)BVBBV047524801 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
doi_str_mv | 10.1515/9781501759048 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04714nmm a2200637zc 4500</leader><controlfield tag="001">BV047524801</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20230202 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">211020s2021 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781501759048</subfield><subfield code="9">978-1-5017-5904-8</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1515/9781501759048</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-23-DGG)9781501759048</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1284788294</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047524801</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-858</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-12</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-706</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Stewart, Andrew L.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">A Vulnerable System</subfield><subfield code="b">The History of Information Security in the Computer Age</subfield><subfield code="c">Andrew J. Stewart</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Ithaca, NY</subfield><subfield code="b">Cornell University Press</subfield><subfield code="c">[2021]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2021</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (312 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">As threats to the security of information pervade the fabric of everyday life, A Vulnerable System, describes how, even as the demand for information security increases, the needs of society are not being met. The result is that the confidentiality of our personal data, the integrity of our elections, and the stability of foreign relations between countries are increasingly at risk.Stewart convincingly shows that emergency software patches and new security products cannot provide the solution to threats such as computer hacking, viruses, software vulnerabilities, and electronic spying. Profound underlying structural problems must first be understood, confronted, and then addressed.A Vulnerable System delivers a long view of the history of information security, beginning with the creation of the first digital computers during the Cold War. From the key institutions of the so-called military industrial complex in the 1950s to Silicon Valley start-ups in the 2020s, the relentless pursuit of new technologies has come at great cost. The absence of knowledge regarding the history of information security has caused the lessons of the past to be forsaken for the novelty of the present, and has led us to be collectively unable to meet the needs of the current day. From the very beginning of the information age, claims of secure systems have been crushed by practical reality.The myriad risks to technology, Stewart reveals, cannot be addressed without first understanding how we arrived at this moment. A Vulnerable System is an enlightening and sobering history of a topic that affects crucial aspects of our lives</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">History Of Technology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">History</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security Studies</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="x">History</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="x">History</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Neue Technologie</subfield><subfield code="0">(DE-588)4194462-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Neue Technologie</subfield><subfield code="0">(DE-588)4194462-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1515/9781501759048</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-23-DGG</subfield><subfield code="a">ZDB-23-DEI</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032925472</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9781501759048</subfield><subfield code="l">BSB01</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">BSB_PDA_DGG_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9781501759048</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">FAW_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9781501759048</subfield><subfield code="l">FCO01</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">FCO_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9781501759048</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">FHA_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9781501759048</subfield><subfield code="l">FHR01</subfield><subfield code="p">ZDB-23-DEI</subfield><subfield code="q">ZDB-23-DEI21</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9781501759048</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">FKE_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9781501759048</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">FLA_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://www.gruyter.com/document/isbn/9781501759048/html</subfield><subfield code="l">FWS01</subfield><subfield code="p">ZDB-23-DEI</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://www.gruyter.com/document/isbn/9781501759048/html</subfield><subfield code="l">FWS02</subfield><subfield code="p">ZDB-23-DEI</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9781501759048</subfield><subfield code="l">TUM01</subfield><subfield code="p">ZDB-23-DEI</subfield><subfield code="q">TUM_Paketkauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9781501759048</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-23-DEI</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9781501759048</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">UPA_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV047524801 |
illustrated | Not Illustrated |
index_date | 2024-07-03T18:24:19Z |
indexdate | 2024-08-01T16:14:59Z |
institution | BVB |
isbn | 9781501759048 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032925472 |
oclc_num | 1284788294 |
open_access_boolean | |
owner | DE-1046 DE-858 DE-Aug4 DE-859 DE-860 DE-739 DE-91 DE-BY-TUM DE-83 DE-12 DE-898 DE-BY-UBR DE-863 DE-BY-FWS DE-862 DE-BY-FWS DE-706 |
owner_facet | DE-1046 DE-858 DE-Aug4 DE-859 DE-860 DE-739 DE-91 DE-BY-TUM DE-83 DE-12 DE-898 DE-BY-UBR DE-863 DE-BY-FWS DE-862 DE-BY-FWS DE-706 |
physical | 1 online resource (312 pages) |
psigel | ZDB-23-DGG ZDB-23-DEI ZDB-23-DGG BSB_PDA_DGG_Kauf ZDB-23-DGG FAW_PDA_DGG ZDB-23-DGG FCO_PDA_DGG ZDB-23-DGG FHA_PDA_DGG ZDB-23-DEI ZDB-23-DEI21 ZDB-23-DGG FKE_PDA_DGG ZDB-23-DGG FLA_PDA_DGG ZDB-23-DEI TUM_Paketkauf ZDB-23-DGG UPA_PDA_DGG |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | Cornell University Press |
record_format | marc |
spellingShingle | Stewart, Andrew L. A Vulnerable System The History of Information Security in the Computer Age History Of Technology History Security Studies COMPUTERS / Security / General bisacsh Computer networks Security measures History Computer security History Neue Technologie (DE-588)4194462-8 gnd Computersicherheit (DE-588)4274324-2 gnd Trusted Computing (DE-588)7562931-8 gnd |
subject_GND | (DE-588)4194462-8 (DE-588)4274324-2 (DE-588)7562931-8 |
title | A Vulnerable System The History of Information Security in the Computer Age |
title_auth | A Vulnerable System The History of Information Security in the Computer Age |
title_exact_search | A Vulnerable System The History of Information Security in the Computer Age |
title_exact_search_txtP | A Vulnerable System The History of Information Security in the Computer Age |
title_full | A Vulnerable System The History of Information Security in the Computer Age Andrew J. Stewart |
title_fullStr | A Vulnerable System The History of Information Security in the Computer Age Andrew J. Stewart |
title_full_unstemmed | A Vulnerable System The History of Information Security in the Computer Age Andrew J. Stewart |
title_short | A Vulnerable System |
title_sort | a vulnerable system the history of information security in the computer age |
title_sub | The History of Information Security in the Computer Age |
topic | History Of Technology History Security Studies COMPUTERS / Security / General bisacsh Computer networks Security measures History Computer security History Neue Technologie (DE-588)4194462-8 gnd Computersicherheit (DE-588)4274324-2 gnd Trusted Computing (DE-588)7562931-8 gnd |
topic_facet | History Of Technology History Security Studies COMPUTERS / Security / General Computer networks Security measures History Computer security History Neue Technologie Computersicherheit Trusted Computing |
url | https://doi.org/10.1515/9781501759048 |
work_keys_str_mv | AT stewartandrewl avulnerablesystemthehistoryofinformationsecurityinthecomputerage |