A vulnerable system: the history of information security in the computer age
Introduction : Three Stigmata -- A "New Dimension" for the Security of Information -- The Promise, Success, and Failure of the Early Researchers -- The Creation of the Internet and the Web, and a Dark Portent -- The Dot-Com Boom and the Genesis of a Lucrative Feedback Loop -- Software Secu...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Ithaca ; London
Cornell University Press
2021
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Zusammenfassung: | Introduction : Three Stigmata -- A "New Dimension" for the Security of Information -- The Promise, Success, and Failure of the Early Researchers -- The Creation of the Internet and the Web, and a Dark Portent -- The Dot-Com Boom and the Genesis of a Lucrative Feedback Loop -- Software Security and the "Hamster Wheel of Pain" -- Usable Security, Economics, and Psychology -- Vulnerability Disclosure, Bounties, and Markets -- Data Breaches, Nation-State Hacking, and Epistemic Closure -- The Wicked Nature of Information Security -- Epilogue : The Past, Present, and a Possible Future. "This book delivers a long view of the history of information security, beginning with the creation of the first digital computers"-- |
Beschreibung: | Literaturverzeichnis Seite [283]-287. - Index |
Beschreibung: | viii, 299 Seiten 24 cm |
ISBN: | 9781501758942 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV049434815 | ||
003 | DE-604 | ||
005 | 20240207 | ||
007 | t | ||
008 | 231128s2021 xxu |||| 00||| eng d | ||
020 | |a 9781501758942 |c hardcover |9 978-1-5017-5894-2 | ||
035 | |a (OCoLC)1276779969 | ||
035 | |a (DE-599)KXP1752843584 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a xxu |c XD-US |a xxk |c XA-GB | ||
049 | |a DE-210 | ||
082 | 0 | |a 005.8 | |
084 | |a HIST |q DE-210 |2 fid | ||
084 | |a 54.08 |2 bkl | ||
084 | |a 54.01 |2 bkl | ||
084 | |a 54.80 |2 bkl | ||
100 | 1 | |a Stewart, Andrew J. |d 1975- |e Verfasser |0 (DE-588)1253807000 |4 aut | |
245 | 1 | 0 | |a A vulnerable system |b the history of information security in the computer age |c Andrew J. Stewart |
264 | 1 | |a Ithaca ; London |b Cornell University Press |c 2021 | |
300 | |a viii, 299 Seiten |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Literaturverzeichnis Seite [283]-287. - Index | ||
520 | 3 | |a Introduction : Three Stigmata -- A "New Dimension" for the Security of Information -- The Promise, Success, and Failure of the Early Researchers -- The Creation of the Internet and the Web, and a Dark Portent -- The Dot-Com Boom and the Genesis of a Lucrative Feedback Loop -- Software Security and the "Hamster Wheel of Pain" -- Usable Security, Economics, and Psychology -- Vulnerability Disclosure, Bounties, and Markets -- Data Breaches, Nation-State Hacking, and Epistemic Closure -- The Wicked Nature of Information Security -- Epilogue : The Past, Present, and a Possible Future. | |
520 | 3 | |a "This book delivers a long view of the history of information security, beginning with the creation of the first digital computers"-- | |
648 | 7 | |a Geschichte |2 gnd |9 rswk-swf | |
650 | 0 | 7 | |a Informationssicherheit |0 (DE-588)1217680330 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Trusted Computing |0 (DE-588)7562931-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
653 | 0 | |a Computer security / History | |
653 | 0 | |a Computer networks / Security measures / History | |
689 | 0 | 0 | |a Informationssicherheit |0 (DE-588)1217680330 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 2 | |a Trusted Computing |0 (DE-588)7562931-8 |D s |
689 | 0 | 3 | |a Geschichte |A z |
689 | 0 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe, PDF |z 9781501759048 |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe, EPUB |z 9781501759055 |
856 | 4 | 2 | |m Digitalisierung Deutsches Museum |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=034780883&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-034780883 |
Datensatz im Suchindex
_version_ | 1804186180527325185 |
---|---|
adam_text | CONTENTS
INTRODUCTION: THREE STIGMATA 1
1. A NEW DIMENSION
FOR
THE
SECURITY
OF
INFORMATION
5
2. THE PROMISE, SUCCESS,
AND
FAILURE
OF
THE
EARLY RESEARCHERS 13
3. THE CREATION
OF
THE
INTERNET
AND
THE
WEB,
AND A
DARK PORTENT 32
4. THE DOT-COM BOOM
AND
THE
GENESIS
OF A
LUCRATIVE
FEEDBACK LOOP 55
5. SOFTWARE SECURITY
AND
THE
HAMSTER WHEEL
OF
PAIN 78
6. USABLE SECURITY, ECONOMICS,
AND
PSYCHOLOGY 100
7. VULNERABILITY DISCLOSURE, BOUNTIES,
AND
MARKETS 127
8. DATA BREACHES, NATION-STATE
HACKING,
AND
EPISTEMIC CLOSURE 152
$
B1IOTHEK
DEUTSCHES
MUSEUM
HLUENCHE A
VIII
CONTENTS
9. THE WICKED NATURE
OF
INFORMATION SECURITY
176
EPILOGUE:
THE PAST, PRESENT,
AND A
POSSIBLE FUTURE
200
ACKNOWLEDGMENTS
205
NOTES
207
SELECT BIBLIOGRAPHY
283
INDEX
289
|
adam_txt |
CONTENTS
INTRODUCTION: THREE STIGMATA 1
1. A "NEW DIMENSION"
FOR
THE
SECURITY
OF
INFORMATION
5
2. THE PROMISE, SUCCESS,
AND
FAILURE
OF
THE
EARLY RESEARCHERS 13
3. THE CREATION
OF
THE
INTERNET
AND
THE
WEB,
AND A
DARK PORTENT 32
4. THE DOT-COM BOOM
AND
THE
GENESIS
OF A
LUCRATIVE
FEEDBACK LOOP 55
5. SOFTWARE SECURITY
AND
THE
"HAMSTER WHEEL
OF
PAIN" 78
6. USABLE SECURITY, ECONOMICS,
AND
PSYCHOLOGY 100
7. VULNERABILITY DISCLOSURE, BOUNTIES,
AND
MARKETS 127
8. DATA BREACHES, NATION-STATE
HACKING,
AND
EPISTEMIC CLOSURE 152
$
B1IOTHEK
DEUTSCHES
MUSEUM
HLUENCHE'A
VIII
CONTENTS
9. THE WICKED NATURE
OF
INFORMATION SECURITY
176
EPILOGUE:
THE PAST, PRESENT,
AND A
POSSIBLE FUTURE
200
ACKNOWLEDGMENTS
205
NOTES
207
SELECT BIBLIOGRAPHY
283
INDEX
289 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Stewart, Andrew J. 1975- |
author_GND | (DE-588)1253807000 |
author_facet | Stewart, Andrew J. 1975- |
author_role | aut |
author_sort | Stewart, Andrew J. 1975- |
author_variant | a j s aj ajs |
building | Verbundindex |
bvnumber | BV049434815 |
ctrlnum | (OCoLC)1276779969 (DE-599)KXP1752843584 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
era | Geschichte gnd |
era_facet | Geschichte |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02797nam a2200529 c 4500</leader><controlfield tag="001">BV049434815</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20240207 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">231128s2021 xxu |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781501758942</subfield><subfield code="c">hardcover</subfield><subfield code="9">978-1-5017-5894-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1276779969</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KXP1752843584</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">XD-US</subfield><subfield code="a">xxk</subfield><subfield code="c">XA-GB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-210</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">HIST</subfield><subfield code="q">DE-210</subfield><subfield code="2">fid</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">54.08</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">54.01</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">54.80</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Stewart, Andrew J.</subfield><subfield code="d">1975-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1253807000</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">A vulnerable system</subfield><subfield code="b">the history of information security in the computer age</subfield><subfield code="c">Andrew J. Stewart</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Ithaca ; London</subfield><subfield code="b">Cornell University Press</subfield><subfield code="c">2021</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">viii, 299 Seiten</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturverzeichnis Seite [283]-287. - Index</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">Introduction : Three Stigmata -- A "New Dimension" for the Security of Information -- The Promise, Success, and Failure of the Early Researchers -- The Creation of the Internet and the Web, and a Dark Portent -- The Dot-Com Boom and the Genesis of a Lucrative Feedback Loop -- Software Security and the "Hamster Wheel of Pain" -- Usable Security, Economics, and Psychology -- Vulnerability Disclosure, Bounties, and Markets -- Data Breaches, Nation-State Hacking, and Epistemic Closure -- The Wicked Nature of Information Security -- Epilogue : The Past, Present, and a Possible Future.</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"This book delivers a long view of the history of information security, beginning with the creation of the first digital computers"--</subfield></datafield><datafield tag="648" ind1=" " ind2="7"><subfield code="a">Geschichte</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informationssicherheit</subfield><subfield code="0">(DE-588)1217680330</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer security / History</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer networks / Security measures / History</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Informationssicherheit</subfield><subfield code="0">(DE-588)1217680330</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Geschichte</subfield><subfield code="A">z</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe, PDF</subfield><subfield code="z">9781501759048</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe, EPUB</subfield><subfield code="z">9781501759055</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung Deutsches Museum</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=034780883&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034780883</subfield></datafield></record></collection> |
id | DE-604.BV049434815 |
illustrated | Not Illustrated |
index_date | 2024-07-03T23:10:52Z |
indexdate | 2024-07-10T10:07:02Z |
institution | BVB |
isbn | 9781501758942 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034780883 |
oclc_num | 1276779969 |
open_access_boolean | |
owner | DE-210 |
owner_facet | DE-210 |
physical | viii, 299 Seiten 24 cm |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | Cornell University Press |
record_format | marc |
spelling | Stewart, Andrew J. 1975- Verfasser (DE-588)1253807000 aut A vulnerable system the history of information security in the computer age Andrew J. Stewart Ithaca ; London Cornell University Press 2021 viii, 299 Seiten 24 cm txt rdacontent n rdamedia nc rdacarrier Literaturverzeichnis Seite [283]-287. - Index Introduction : Three Stigmata -- A "New Dimension" for the Security of Information -- The Promise, Success, and Failure of the Early Researchers -- The Creation of the Internet and the Web, and a Dark Portent -- The Dot-Com Boom and the Genesis of a Lucrative Feedback Loop -- Software Security and the "Hamster Wheel of Pain" -- Usable Security, Economics, and Psychology -- Vulnerability Disclosure, Bounties, and Markets -- Data Breaches, Nation-State Hacking, and Epistemic Closure -- The Wicked Nature of Information Security -- Epilogue : The Past, Present, and a Possible Future. "This book delivers a long view of the history of information security, beginning with the creation of the first digital computers"-- Geschichte gnd rswk-swf Informationssicherheit (DE-588)1217680330 gnd rswk-swf Trusted Computing (DE-588)7562931-8 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Computer security / History Computer networks / Security measures / History Informationssicherheit (DE-588)1217680330 s Computersicherheit (DE-588)4274324-2 s Trusted Computing (DE-588)7562931-8 s Geschichte z DE-604 Erscheint auch als Online-Ausgabe, PDF 9781501759048 Erscheint auch als Online-Ausgabe, EPUB 9781501759055 Digitalisierung Deutsches Museum application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=034780883&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Stewart, Andrew J. 1975- A vulnerable system the history of information security in the computer age Informationssicherheit (DE-588)1217680330 gnd Trusted Computing (DE-588)7562931-8 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)1217680330 (DE-588)7562931-8 (DE-588)4274324-2 |
title | A vulnerable system the history of information security in the computer age |
title_auth | A vulnerable system the history of information security in the computer age |
title_exact_search | A vulnerable system the history of information security in the computer age |
title_exact_search_txtP | A vulnerable system the history of information security in the computer age |
title_full | A vulnerable system the history of information security in the computer age Andrew J. Stewart |
title_fullStr | A vulnerable system the history of information security in the computer age Andrew J. Stewart |
title_full_unstemmed | A vulnerable system the history of information security in the computer age Andrew J. Stewart |
title_short | A vulnerable system |
title_sort | a vulnerable system the history of information security in the computer age |
title_sub | the history of information security in the computer age |
topic | Informationssicherheit (DE-588)1217680330 gnd Trusted Computing (DE-588)7562931-8 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Informationssicherheit Trusted Computing Computersicherheit |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=034780883&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT stewartandrewj avulnerablesystemthehistoryofinformationsecurityinthecomputerage |