A vulnerable system: the history of information security in the computer age
"This book delivers a long view of the history of information security, beginning with the creation of the first digital computers"--
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Ithaca [New York]
Cornell University Press
2021
|
Schlagworte: | |
Online-Zugang: | Volltext Volltext |
Zusammenfassung: | "This book delivers a long view of the history of information security, beginning with the creation of the first digital computers"-- |
Beschreibung: | 1 online resource (viii, 299 pages) |
Bibliographie: | Includes bibliographical references and index |
ISBN: | 9781501759055 1501759051 1501759043 9781501759048 |
Internformat
MARC
LEADER | 00000cam a2200000 c 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-on1243906022 | ||
003 | OCoLC | ||
005 | 20240705115654.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 210323t20212021nyu ob 001 0 eng | ||
010 | |a 2021013835 | ||
040 | |a DLC |b eng |e rda |e pn |c DLC |d OCLCO |d OCLCF |d CUV |d EBLCP |d P@U |d OCLCO |d JSTOR |d N$T |d YDX |d UKAHL |d OCLCO |d OCL |d STBDS |d OCLCO |d OCLCQ |d OCLCO |d OCLCL | ||
020 | |a 9781501759055 |q electronic publication | ||
020 | |a 1501759051 |q electronic publication | ||
020 | |a 1501759043 |q electronic book | ||
020 | |a 9781501759048 |q electronic book | ||
020 | |z 9781501758942 |q hardcover | ||
020 | |z 1501758942 |q hardcover | ||
035 | |a (OCoLC)1243906022 | ||
037 | |a 22573/ctv1bw9csc |b JSTOR | ||
042 | |a pcc | ||
050 | 0 | 4 | |a QA76.9.A25 |b S755 2021 |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
072 | 7 | |a COM |x 032000 |2 bisacsh | |
072 | 7 | |a BUS |x 070030 |2 bisacsh | |
082 | 7 | |a 005.8 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Stewart, Andrew, |d 1975- |e author. |1 https://id.oclc.org/worldcat/entity/E39PCjvFMChJxv6DCQQpr77pKd |0 http://id.loc.gov/authorities/names/n2008002152 | |
245 | 1 | 2 | |a A vulnerable system |b the history of information security in the computer age |c Andrew J. Stewart |
264 | 1 | |a Ithaca [New York] |b Cornell University Press |c 2021 | |
264 | 4 | |c ©2021 | |
300 | |a 1 online resource (viii, 299 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
504 | |a Includes bibliographical references and index | ||
505 | 0 | |a Introduction : Three Stigmata -- A "New Dimension" for the Security of Information -- The Promise, Success, and Failure of the Early Researchers -- The Creation of the Internet and the Web, and a Dark Portent -- The Dot-Com Boom and the Genesis of a Lucrative Feedback Loop -- Software Security and the "Hamster Wheel of Pain" -- Usable Security, Economics, and Psychology -- Vulnerability Disclosure, Bounties, and Markets -- Data Breaches, Nation-State Hacking, and Epistemic Closure -- The Wicked Nature of Information Security -- Epilogue : The Past, Present, and a Possible Future | |
520 | |a "This book delivers a long view of the history of information security, beginning with the creation of the first digital computers"-- |c Provided by publisher | ||
588 | |a Description based on online resource; title from digital title page (viewed on August 23, 2021). | ||
650 | 0 | |a Computer security |x History. | |
650 | 0 | |a Computer networks |x Security measures |x History. | |
650 | 6 | |a Sécurité informatique |x Histoire. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures |x Histoire. | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
655 | 7 | |a Instructional and educational works |2 fast | |
655 | 7 | |a History |2 fast | |
655 | 7 | |a Instructional and educational works. |2 lcgft |0 http://id.loc.gov/authorities/genreForms/gf2014026114 | |
655 | 7 | |a Matériel d'éducation et de formation. |2 rvmgf | |
758 | |i has work: |a A vulnerable system (Text) |1 https://id.oclc.org/worldcat/entity/E39PCG4d36MFWfjrqkyxK8Pfbd |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Stewart, Andrew, 1975- |t Vulnerable system |d Ithaca [New York] : Cornell University Press, 2021 |z 9781501758942 |w (DLC) 2021013834 |w (OCoLC)1227917848 |
856 | 1 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2889278 |3 Volltext | |
856 | 1 | |l CBO01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2889278 |3 Volltext | |
856 | 1 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN= |3 Volltext | |
856 | 1 | |l CBO01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN= |3 Volltext | |
938 | |a Oxford University Press USA |b OUPR |n EDZ0002656144 | ||
938 | |a Askews and Holts Library Services |b ASKH |n AH39109756 | ||
938 | |a YBP Library Services |b YANK |n 17608654 | ||
938 | |a Project MUSE |b MUSE |n muse97134 | ||
938 | |a ProQuest Ebook Central |b EBLB |n EBL6423755 | ||
938 | |a EBSCOhost |b EBSC |n 2889278 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-on1243906022 |
---|---|
_version_ | 1813901699169910784 |
adam_text | |
any_adam_object | |
author | Stewart, Andrew, 1975- |
author_GND | http://id.loc.gov/authorities/names/n2008002152 |
author_facet | Stewart, Andrew, 1975- |
author_role | aut |
author_sort | Stewart, Andrew, 1975- |
author_variant | a s as |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 S755 2021 |
callnumber-search | QA76.9.A25 S755 2021 |
callnumber-sort | QA 276.9 A25 S755 42021 |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Introduction : Three Stigmata -- A "New Dimension" for the Security of Information -- The Promise, Success, and Failure of the Early Researchers -- The Creation of the Internet and the Web, and a Dark Portent -- The Dot-Com Boom and the Genesis of a Lucrative Feedback Loop -- Software Security and the "Hamster Wheel of Pain" -- Usable Security, Economics, and Psychology -- Vulnerability Disclosure, Bounties, and Markets -- Data Breaches, Nation-State Hacking, and Epistemic Closure -- The Wicked Nature of Information Security -- Epilogue : The Past, Present, and a Possible Future |
ctrlnum | (OCoLC)1243906022 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03988cam a2200709 c 4500</leader><controlfield tag="001">ZDB-4-EBA-on1243906022</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20240705115654.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">210323t20212021nyu ob 001 0 eng </controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a"> 2021013835</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DLC</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">DLC</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCF</subfield><subfield code="d">CUV</subfield><subfield code="d">EBLCP</subfield><subfield code="d">P@U</subfield><subfield code="d">OCLCO</subfield><subfield code="d">JSTOR</subfield><subfield code="d">N$T</subfield><subfield code="d">YDX</subfield><subfield code="d">UKAHL</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCL</subfield><subfield code="d">STBDS</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781501759055</subfield><subfield code="q">electronic publication</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1501759051</subfield><subfield code="q">electronic publication</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1501759043</subfield><subfield code="q">electronic book</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781501759048</subfield><subfield code="q">electronic book</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781501758942</subfield><subfield code="q">hardcover</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1501758942</subfield><subfield code="q">hardcover</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1243906022</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">22573/ctv1bw9csc</subfield><subfield code="b">JSTOR</subfield></datafield><datafield tag="042" ind1=" " ind2=" "><subfield code="a">pcc</subfield></datafield><datafield tag="050" ind1="0" ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">S755 2021</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">032000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="x">070030</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Stewart, Andrew,</subfield><subfield code="d">1975-</subfield><subfield code="e">author.</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjvFMChJxv6DCQQpr77pKd</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2008002152</subfield></datafield><datafield tag="245" ind1="1" ind2="2"><subfield code="a">A vulnerable system</subfield><subfield code="b">the history of information security in the computer age</subfield><subfield code="c">Andrew J. Stewart</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Ithaca [New York]</subfield><subfield code="b">Cornell University Press</subfield><subfield code="c">2021</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2021</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (viii, 299 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Introduction : Three Stigmata -- A "New Dimension" for the Security of Information -- The Promise, Success, and Failure of the Early Researchers -- The Creation of the Internet and the Web, and a Dark Portent -- The Dot-Com Boom and the Genesis of a Lucrative Feedback Loop -- Software Security and the "Hamster Wheel of Pain" -- Usable Security, Economics, and Psychology -- Vulnerability Disclosure, Bounties, and Markets -- Data Breaches, Nation-State Hacking, and Epistemic Closure -- The Wicked Nature of Information Security -- Epilogue : The Past, Present, and a Possible Future</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This book delivers a long view of the history of information security, beginning with the creation of the first digital computers"--</subfield><subfield code="c">Provided by publisher</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on online resource; title from digital title page (viewed on August 23, 2021).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="x">History.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="x">History.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique</subfield><subfield code="x">Histoire.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures</subfield><subfield code="x">Histoire.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Instructional and educational works</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">History</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Instructional and educational works.</subfield><subfield code="2">lcgft</subfield><subfield code="0">http://id.loc.gov/authorities/genreForms/gf2014026114</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Matériel d'éducation et de formation.</subfield><subfield code="2">rvmgf</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">A vulnerable system (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCG4d36MFWfjrqkyxK8Pfbd</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Stewart, Andrew, 1975-</subfield><subfield code="t">Vulnerable system</subfield><subfield code="d">Ithaca [New York] : Cornell University Press, 2021</subfield><subfield code="z">9781501758942</subfield><subfield code="w">(DLC) 2021013834</subfield><subfield code="w">(OCoLC)1227917848</subfield></datafield><datafield tag="856" ind1="1" ind2=" "><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2889278</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="1" ind2=" "><subfield code="l">CBO01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2889278</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="1" ind2=" "><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="1" ind2=" "><subfield code="l">CBO01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Oxford University Press USA</subfield><subfield code="b">OUPR</subfield><subfield code="n">EDZ0002656144</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH39109756</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">17608654</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Project MUSE</subfield><subfield code="b">MUSE</subfield><subfield code="n">muse97134</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest Ebook Central</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL6423755</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">2889278</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield></record></collection> |
genre | Instructional and educational works fast History fast Instructional and educational works. lcgft http://id.loc.gov/authorities/genreForms/gf2014026114 Matériel d'éducation et de formation. rvmgf |
genre_facet | Instructional and educational works History Instructional and educational works. Matériel d'éducation et de formation. |
id | ZDB-4-EBA-on1243906022 |
illustrated | Not Illustrated |
indexdate | 2024-10-25T15:51:02Z |
institution | BVB |
isbn | 9781501759055 1501759051 1501759043 9781501759048 |
language | English |
lccn | 2021013835 |
oclc_num | 1243906022 |
open_access_boolean | |
owner | MAIN |
owner_facet | MAIN |
physical | 1 online resource (viii, 299 pages) |
psigel | ZDB-4-EBA |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | Cornell University Press |
record_format | marc |
spelling | Stewart, Andrew, 1975- author. https://id.oclc.org/worldcat/entity/E39PCjvFMChJxv6DCQQpr77pKd http://id.loc.gov/authorities/names/n2008002152 A vulnerable system the history of information security in the computer age Andrew J. Stewart Ithaca [New York] Cornell University Press 2021 ©2021 1 online resource (viii, 299 pages) text txt rdacontent computer c rdamedia online resource cr rdacarrier Includes bibliographical references and index Introduction : Three Stigmata -- A "New Dimension" for the Security of Information -- The Promise, Success, and Failure of the Early Researchers -- The Creation of the Internet and the Web, and a Dark Portent -- The Dot-Com Boom and the Genesis of a Lucrative Feedback Loop -- Software Security and the "Hamster Wheel of Pain" -- Usable Security, Economics, and Psychology -- Vulnerability Disclosure, Bounties, and Markets -- Data Breaches, Nation-State Hacking, and Epistemic Closure -- The Wicked Nature of Information Security -- Epilogue : The Past, Present, and a Possible Future "This book delivers a long view of the history of information security, beginning with the creation of the first digital computers"-- Provided by publisher Description based on online resource; title from digital title page (viewed on August 23, 2021). Computer security History. Computer networks Security measures History. Sécurité informatique Histoire. Réseaux d'ordinateurs Sécurité Mesures Histoire. COMPUTERS / Security / General bisacsh Computer networks Security measures fast Computer security fast Instructional and educational works fast History fast Instructional and educational works. lcgft http://id.loc.gov/authorities/genreForms/gf2014026114 Matériel d'éducation et de formation. rvmgf has work: A vulnerable system (Text) https://id.oclc.org/worldcat/entity/E39PCG4d36MFWfjrqkyxK8Pfbd https://id.oclc.org/worldcat/ontology/hasWork Print version: Stewart, Andrew, 1975- Vulnerable system Ithaca [New York] : Cornell University Press, 2021 9781501758942 (DLC) 2021013834 (OCoLC)1227917848 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2889278 Volltext CBO01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2889278 Volltext FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN= Volltext CBO01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN= Volltext |
spellingShingle | Stewart, Andrew, 1975- A vulnerable system the history of information security in the computer age Introduction : Three Stigmata -- A "New Dimension" for the Security of Information -- The Promise, Success, and Failure of the Early Researchers -- The Creation of the Internet and the Web, and a Dark Portent -- The Dot-Com Boom and the Genesis of a Lucrative Feedback Loop -- Software Security and the "Hamster Wheel of Pain" -- Usable Security, Economics, and Psychology -- Vulnerability Disclosure, Bounties, and Markets -- Data Breaches, Nation-State Hacking, and Epistemic Closure -- The Wicked Nature of Information Security -- Epilogue : The Past, Present, and a Possible Future Computer security History. Computer networks Security measures History. Sécurité informatique Histoire. Réseaux d'ordinateurs Sécurité Mesures Histoire. COMPUTERS / Security / General bisacsh Computer networks Security measures fast Computer security fast |
subject_GND | http://id.loc.gov/authorities/genreForms/gf2014026114 |
title | A vulnerable system the history of information security in the computer age |
title_auth | A vulnerable system the history of information security in the computer age |
title_exact_search | A vulnerable system the history of information security in the computer age |
title_full | A vulnerable system the history of information security in the computer age Andrew J. Stewart |
title_fullStr | A vulnerable system the history of information security in the computer age Andrew J. Stewart |
title_full_unstemmed | A vulnerable system the history of information security in the computer age Andrew J. Stewart |
title_short | A vulnerable system |
title_sort | vulnerable system the history of information security in the computer age |
title_sub | the history of information security in the computer age |
topic | Computer security History. Computer networks Security measures History. Sécurité informatique Histoire. Réseaux d'ordinateurs Sécurité Mesures Histoire. COMPUTERS / Security / General bisacsh Computer networks Security measures fast Computer security fast |
topic_facet | Computer security History. Computer networks Security measures History. Sécurité informatique Histoire. Réseaux d'ordinateurs Sécurité Mesures Histoire. COMPUTERS / Security / General Computer networks Security measures Computer security Instructional and educational works History Instructional and educational works. Matériel d'éducation et de formation. |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2889278 https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN= |
work_keys_str_mv | AT stewartandrew avulnerablesystemthehistoryofinformationsecurityinthecomputerage AT stewartandrew vulnerablesystemthehistoryofinformationsecurityinthecomputerage |