Cyber security and the politics of time /:
Explores how security communities think about time and how this shapes the politics of security in the information age.
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cambridge :
Cambridge University Press,
2015.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Explores how security communities think about time and how this shapes the politics of security in the information age. |
Beschreibung: | 1 online resource |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9781316271636 1316271633 9781316429198 1316429199 9781316428412 1316428419 1316427242 9781316427248 |
Internformat
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn924639161 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr |n||||||||| | ||
008 | 151014s2015 enk ob 001 0 eng d | ||
040 | |a YDXCP |b eng |e pn |c YDXCP |d IDEBK |d N$T |d EBLCP |d DEBSZ |d OCLCQ |d DEBBG |d COH |d OCLCQ |d UAB |d OCLCQ |d OCLCA |d KIJ |d OCLCQ |d LND |d OCLCF |d OCLCQ |d OTZ |d AU@ |d OCLCQ |d TKN |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d OCLCL | ||
019 | |a 927411135 |a 1033550854 |a 1058979037 |a 1097129943 | ||
020 | |a 9781316271636 |q (electronic bk.) | ||
020 | |a 1316271633 |q (electronic bk.) | ||
020 | |a 9781316429198 |q (electronic bk.) | ||
020 | |a 1316429199 |q (electronic bk.) | ||
020 | |a 9781316428412 | ||
020 | |a 1316428419 | ||
020 | |a 1316427242 | ||
020 | |a 9781316427248 | ||
020 | |z 9781107109421 |q (hardback) | ||
020 | |z 1107109426 |q (hardback) | ||
035 | |a (OCoLC)924639161 |z (OCoLC)927411135 |z (OCoLC)1033550854 |z (OCoLC)1058979037 |z (OCoLC)1097129943 | ||
050 | 4 | |a JZ1254 |b .S74 2015eb | |
072 | 7 | |a POL |x 040020 |2 bisacsh | |
072 | 7 | |a POL |x 011000 |2 bisacsh | |
082 | 7 | |a 327.10285/58 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Stevens, Tim, |d 1973- |0 http://id.loc.gov/authorities/names/no2012130696 | |
245 | 1 | 0 | |a Cyber security and the politics of time / |c Tim Stevens. |
264 | 1 | |a Cambridge : |b Cambridge University Press, |c 2015. | |
300 | |a 1 online resource | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
588 | 0 | |a Online resource; title from PDF title page (EBSCO, viewed October 22, 2015). | |
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Cover -- Half-title page -- Title page -- Copyright page -- Dedication -- Contents -- Acknowledgements -- Introduction -- A brief history of cyber security -- Aims of the book -- Plan of the book -- 1 Cyber security, community, time -- Interrogating cyber security -- Community and imagination -- Time in IR -- 2 Towards a politics of time -- From time to temporality -- Emergent sociotemporality -- Knowing nonhuman temporalities -- Now and the present -- Temporality and narrative -- The time of politics -- Towards a politics of time -- 3 Diagnosing the present -- The revolutionary present. | |
505 | 8 | |a Inhabiting the future -- 7 Cyber security and the politics of time -- Logics and chronopolitics -- The logic of assemblage -- The logic of real time -- The logic of event -- The logic of eschaton -- Cyber security and the politics of time -- 8 Conclusion -- References -- Index. | |
505 | 8 | |a Speed and acceleration -- Netspeed I: acceleration -- Netspeed II: deceleration -- Diagnosing the present -- 4 Imagining the future -- Future and futurity -- Imagination and dystopia -- Catastrophe and apocalypse -- Immanence and accident -- Revelation, transformation and desire -- Imagining the future -- 5 Arguing through the past -- Past, present and the appeal to history -- Provocative politics -- Memory and identity -- Arguing through the past -- 6 Inhabiting the future -- Anticipation and preparation -- Exercise and simulation -- The public sensorium -- Recruitment and education. | |
520 | 8 | |a Explores how security communities think about time and how this shapes the politics of security in the information age. | |
650 | 0 | |a Technology and international relations. |0 http://id.loc.gov/authorities/subjects/sh85133181 | |
650 | 0 | |a Internet and international relations. |0 http://id.loc.gov/authorities/subjects/sh2011003046 | |
650 | 0 | |a Computer security |x Government policy. | |
650 | 0 | |a Cyberspace |x Security measures |x Government policy. | |
650 | 0 | |a Computer networks |x Security measures |x Government policy. | |
650 | 6 | |a Technologie et relations internationales. | |
650 | 6 | |a Internet et relations internationales. | |
650 | 6 | |a Sécurité informatique |x Politique gouvernementale. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures |x Politique gouvernementale. | |
650 | 7 | |a POLITICAL SCIENCE |x Government |x International. |2 bisacsh | |
650 | 7 | |a POLITICAL SCIENCE |x International Relations |x General. |2 bisacsh | |
650 | 7 | |a Computer networks |x Security measures |x Government policy |2 fast | |
650 | 7 | |a Computer security |x Government policy |2 fast | |
650 | 7 | |a Internet and international relations |2 fast | |
650 | 7 | |a Technology and international relations |2 fast | |
758 | |i has work: |a Cyber security and the politics of time (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGh7xjTC3MCQjvTGtjDkKq |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Erscheint auch als: |n Druck-Ausgabe |t Stevens, Tim. Cyber Security and the Politics of Time |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1077367 |3 Volltext |
938 | |a ProQuest Ebook Central |b EBLB |n EBL4007553 | ||
938 | |a EBSCOhost |b EBSC |n 1077367 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n cis32866852 | ||
938 | |a YBP Library Services |b YANK |n 12650276 | ||
938 | |a YBP Library Services |b YANK |n 12644500 | ||
938 | |a YBP Library Services |b YANK |n 12678721 | ||
938 | |a YBP Library Services |b YANK |n 12909101 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn924639161 |
---|---|
_version_ | 1816882326751150081 |
adam_text | |
any_adam_object | |
author | Stevens, Tim, 1973- |
author_GND | http://id.loc.gov/authorities/names/no2012130696 |
author_facet | Stevens, Tim, 1973- |
author_role | |
author_sort | Stevens, Tim, 1973- |
author_variant | t s ts |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | J - Political Science |
callnumber-label | JZ1254 |
callnumber-raw | JZ1254 .S74 2015eb |
callnumber-search | JZ1254 .S74 2015eb |
callnumber-sort | JZ 41254 S74 42015EB |
callnumber-subject | JZ - International Relations |
collection | ZDB-4-EBA |
contents | Cover -- Half-title page -- Title page -- Copyright page -- Dedication -- Contents -- Acknowledgements -- Introduction -- A brief history of cyber security -- Aims of the book -- Plan of the book -- 1 Cyber security, community, time -- Interrogating cyber security -- Community and imagination -- Time in IR -- 2 Towards a politics of time -- From time to temporality -- Emergent sociotemporality -- Knowing nonhuman temporalities -- Now and the present -- Temporality and narrative -- The time of politics -- Towards a politics of time -- 3 Diagnosing the present -- The revolutionary present. Inhabiting the future -- 7 Cyber security and the politics of time -- Logics and chronopolitics -- The logic of assemblage -- The logic of real time -- The logic of event -- The logic of eschaton -- Cyber security and the politics of time -- 8 Conclusion -- References -- Index. Speed and acceleration -- Netspeed I: acceleration -- Netspeed II: deceleration -- Diagnosing the present -- 4 Imagining the future -- Future and futurity -- Imagination and dystopia -- Catastrophe and apocalypse -- Immanence and accident -- Revelation, transformation and desire -- Imagining the future -- 5 Arguing through the past -- Past, present and the appeal to history -- Provocative politics -- Memory and identity -- Arguing through the past -- 6 Inhabiting the future -- Anticipation and preparation -- Exercise and simulation -- The public sensorium -- Recruitment and education. |
ctrlnum | (OCoLC)924639161 |
dewey-full | 327.10285/58 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 327 - International relations |
dewey-raw | 327.10285/58 |
dewey-search | 327.10285/58 |
dewey-sort | 3327.10285 258 |
dewey-tens | 320 - Political science (Politics and government) |
discipline | Politologie |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05201cam a2200781 i 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn924639161</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr |n|||||||||</controlfield><controlfield tag="008">151014s2015 enk ob 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">YDXCP</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">YDXCP</subfield><subfield code="d">IDEBK</subfield><subfield code="d">N$T</subfield><subfield code="d">EBLCP</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">DEBBG</subfield><subfield code="d">COH</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UAB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCA</subfield><subfield code="d">KIJ</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">LND</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OTZ</subfield><subfield code="d">AU@</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">TKN</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">927411135</subfield><subfield code="a">1033550854</subfield><subfield code="a">1058979037</subfield><subfield code="a">1097129943</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781316271636</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1316271633</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781316429198</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1316429199</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781316428412</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1316428419</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1316427242</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781316427248</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781107109421</subfield><subfield code="q">(hardback)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1107109426</subfield><subfield code="q">(hardback)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)924639161</subfield><subfield code="z">(OCoLC)927411135</subfield><subfield code="z">(OCoLC)1033550854</subfield><subfield code="z">(OCoLC)1058979037</subfield><subfield code="z">(OCoLC)1097129943</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">JZ1254</subfield><subfield code="b">.S74 2015eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">POL</subfield><subfield code="x">040020</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">POL</subfield><subfield code="x">011000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">327.10285/58</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Stevens, Tim,</subfield><subfield code="d">1973-</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2012130696</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber security and the politics of time /</subfield><subfield code="c">Tim Stevens.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cambridge :</subfield><subfield code="b">Cambridge University Press,</subfield><subfield code="c">2015.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Online resource; title from PDF title page (EBSCO, viewed October 22, 2015).</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cover -- Half-title page -- Title page -- Copyright page -- Dedication -- Contents -- Acknowledgements -- Introduction -- A brief history of cyber security -- Aims of the book -- Plan of the book -- 1 Cyber security, community, time -- Interrogating cyber security -- Community and imagination -- Time in IR -- 2 Towards a politics of time -- From time to temporality -- Emergent sociotemporality -- Knowing nonhuman temporalities -- Now and the present -- Temporality and narrative -- The time of politics -- Towards a politics of time -- 3 Diagnosing the present -- The revolutionary present.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Inhabiting the future -- 7 Cyber security and the politics of time -- Logics and chronopolitics -- The logic of assemblage -- The logic of real time -- The logic of event -- The logic of eschaton -- Cyber security and the politics of time -- 8 Conclusion -- References -- Index.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Speed and acceleration -- Netspeed I: acceleration -- Netspeed II: deceleration -- Diagnosing the present -- 4 Imagining the future -- Future and futurity -- Imagination and dystopia -- Catastrophe and apocalypse -- Immanence and accident -- Revelation, transformation and desire -- Imagining the future -- 5 Arguing through the past -- Past, present and the appeal to history -- Provocative politics -- Memory and identity -- Arguing through the past -- 6 Inhabiting the future -- Anticipation and preparation -- Exercise and simulation -- The public sensorium -- Recruitment and education.</subfield></datafield><datafield tag="520" ind1="8" ind2=" "><subfield code="a">Explores how security communities think about time and how this shapes the politics of security in the information age.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Technology and international relations.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85133181</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet and international relations.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2011003046</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="x">Government policy.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberspace</subfield><subfield code="x">Security measures</subfield><subfield code="x">Government policy.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="x">Government policy.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Technologie et relations internationales.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Internet et relations internationales.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique</subfield><subfield code="x">Politique gouvernementale.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures</subfield><subfield code="x">Politique gouvernementale.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE</subfield><subfield code="x">Government</subfield><subfield code="x">International.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE</subfield><subfield code="x">International Relations</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="x">Government policy</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="x">Government policy</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet and international relations</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Technology and international relations</subfield><subfield code="2">fast</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Cyber security and the politics of time (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCGh7xjTC3MCQjvTGtjDkKq</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als:</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="t">Stevens, Tim. Cyber Security and the Politics of Time</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1077367</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest Ebook Central</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL4007553</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">1077367</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest MyiLibrary Digital eBook Collection</subfield><subfield code="b">IDEB</subfield><subfield code="n">cis32866852</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">12650276</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">12644500</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">12678721</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">12909101</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn924639161 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:26:50Z |
institution | BVB |
isbn | 9781316271636 1316271633 9781316429198 1316429199 9781316428412 1316428419 1316427242 9781316427248 |
language | English |
oclc_num | 924639161 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource |
psigel | ZDB-4-EBA |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Cambridge University Press, |
record_format | marc |
spelling | Stevens, Tim, 1973- http://id.loc.gov/authorities/names/no2012130696 Cyber security and the politics of time / Tim Stevens. Cambridge : Cambridge University Press, 2015. 1 online resource text txt rdacontent computer c rdamedia online resource cr rdacarrier Online resource; title from PDF title page (EBSCO, viewed October 22, 2015). Includes bibliographical references and index. Cover -- Half-title page -- Title page -- Copyright page -- Dedication -- Contents -- Acknowledgements -- Introduction -- A brief history of cyber security -- Aims of the book -- Plan of the book -- 1 Cyber security, community, time -- Interrogating cyber security -- Community and imagination -- Time in IR -- 2 Towards a politics of time -- From time to temporality -- Emergent sociotemporality -- Knowing nonhuman temporalities -- Now and the present -- Temporality and narrative -- The time of politics -- Towards a politics of time -- 3 Diagnosing the present -- The revolutionary present. Inhabiting the future -- 7 Cyber security and the politics of time -- Logics and chronopolitics -- The logic of assemblage -- The logic of real time -- The logic of event -- The logic of eschaton -- Cyber security and the politics of time -- 8 Conclusion -- References -- Index. Speed and acceleration -- Netspeed I: acceleration -- Netspeed II: deceleration -- Diagnosing the present -- 4 Imagining the future -- Future and futurity -- Imagination and dystopia -- Catastrophe and apocalypse -- Immanence and accident -- Revelation, transformation and desire -- Imagining the future -- 5 Arguing through the past -- Past, present and the appeal to history -- Provocative politics -- Memory and identity -- Arguing through the past -- 6 Inhabiting the future -- Anticipation and preparation -- Exercise and simulation -- The public sensorium -- Recruitment and education. Explores how security communities think about time and how this shapes the politics of security in the information age. Technology and international relations. http://id.loc.gov/authorities/subjects/sh85133181 Internet and international relations. http://id.loc.gov/authorities/subjects/sh2011003046 Computer security Government policy. Cyberspace Security measures Government policy. Computer networks Security measures Government policy. Technologie et relations internationales. Internet et relations internationales. Sécurité informatique Politique gouvernementale. Réseaux d'ordinateurs Sécurité Mesures Politique gouvernementale. POLITICAL SCIENCE Government International. bisacsh POLITICAL SCIENCE International Relations General. bisacsh Computer networks Security measures Government policy fast Computer security Government policy fast Internet and international relations fast Technology and international relations fast has work: Cyber security and the politics of time (Text) https://id.oclc.org/worldcat/entity/E39PCGh7xjTC3MCQjvTGtjDkKq https://id.oclc.org/worldcat/ontology/hasWork Erscheint auch als: Druck-Ausgabe Stevens, Tim. Cyber Security and the Politics of Time FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1077367 Volltext |
spellingShingle | Stevens, Tim, 1973- Cyber security and the politics of time / Cover -- Half-title page -- Title page -- Copyright page -- Dedication -- Contents -- Acknowledgements -- Introduction -- A brief history of cyber security -- Aims of the book -- Plan of the book -- 1 Cyber security, community, time -- Interrogating cyber security -- Community and imagination -- Time in IR -- 2 Towards a politics of time -- From time to temporality -- Emergent sociotemporality -- Knowing nonhuman temporalities -- Now and the present -- Temporality and narrative -- The time of politics -- Towards a politics of time -- 3 Diagnosing the present -- The revolutionary present. Inhabiting the future -- 7 Cyber security and the politics of time -- Logics and chronopolitics -- The logic of assemblage -- The logic of real time -- The logic of event -- The logic of eschaton -- Cyber security and the politics of time -- 8 Conclusion -- References -- Index. Speed and acceleration -- Netspeed I: acceleration -- Netspeed II: deceleration -- Diagnosing the present -- 4 Imagining the future -- Future and futurity -- Imagination and dystopia -- Catastrophe and apocalypse -- Immanence and accident -- Revelation, transformation and desire -- Imagining the future -- 5 Arguing through the past -- Past, present and the appeal to history -- Provocative politics -- Memory and identity -- Arguing through the past -- 6 Inhabiting the future -- Anticipation and preparation -- Exercise and simulation -- The public sensorium -- Recruitment and education. Technology and international relations. http://id.loc.gov/authorities/subjects/sh85133181 Internet and international relations. http://id.loc.gov/authorities/subjects/sh2011003046 Computer security Government policy. Cyberspace Security measures Government policy. Computer networks Security measures Government policy. Technologie et relations internationales. Internet et relations internationales. Sécurité informatique Politique gouvernementale. Réseaux d'ordinateurs Sécurité Mesures Politique gouvernementale. POLITICAL SCIENCE Government International. bisacsh POLITICAL SCIENCE International Relations General. bisacsh Computer networks Security measures Government policy fast Computer security Government policy fast Internet and international relations fast Technology and international relations fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh85133181 http://id.loc.gov/authorities/subjects/sh2011003046 |
title | Cyber security and the politics of time / |
title_auth | Cyber security and the politics of time / |
title_exact_search | Cyber security and the politics of time / |
title_full | Cyber security and the politics of time / Tim Stevens. |
title_fullStr | Cyber security and the politics of time / Tim Stevens. |
title_full_unstemmed | Cyber security and the politics of time / Tim Stevens. |
title_short | Cyber security and the politics of time / |
title_sort | cyber security and the politics of time |
topic | Technology and international relations. http://id.loc.gov/authorities/subjects/sh85133181 Internet and international relations. http://id.loc.gov/authorities/subjects/sh2011003046 Computer security Government policy. Cyberspace Security measures Government policy. Computer networks Security measures Government policy. Technologie et relations internationales. Internet et relations internationales. Sécurité informatique Politique gouvernementale. Réseaux d'ordinateurs Sécurité Mesures Politique gouvernementale. POLITICAL SCIENCE Government International. bisacsh POLITICAL SCIENCE International Relations General. bisacsh Computer networks Security measures Government policy fast Computer security Government policy fast Internet and international relations fast Technology and international relations fast |
topic_facet | Technology and international relations. Internet and international relations. Computer security Government policy. Cyberspace Security measures Government policy. Computer networks Security measures Government policy. Technologie et relations internationales. Internet et relations internationales. Sécurité informatique Politique gouvernementale. Réseaux d'ordinateurs Sécurité Mesures Politique gouvernementale. POLITICAL SCIENCE Government International. POLITICAL SCIENCE International Relations General. Computer networks Security measures Government policy Computer security Government policy Internet and international relations Technology and international relations |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1077367 |
work_keys_str_mv | AT stevenstim cybersecurityandthepoliticsoftime |