Cyber security policies and strategies of the world's leading states:
"Cyber-attacks significantly impact all sectors of the economy, reduce public confidence in e-services, and threaten the development of the economy using information and communication technologies. The security of information systems and electronic services is crucial to each citizen's soc...
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA)
IGI Global
2023.
|
Schlagworte: | |
Online-Zugang: | DE-862 DE-863 |
Zusammenfassung: | "Cyber-attacks significantly impact all sectors of the economy, reduce public confidence in e-services, and threaten the development of the economy using information and communication technologies. The security of information systems and electronic services is crucial to each citizen's social and economic well-being, health, and life. As cyber threats continue to grow, developing, introducing, and improving defense mechanisms becomes an important issue. Cyber Security Policies and Strategies of the World's Leading States is a comprehensive book that analyzes the impact of cyberwarfare on world politics, political conflicts, and the identification of new types of threats. It establishes a definition of civil cyberwarfare and explores its impact on political processes. This book is essential for government officials, academics, researchers, non-government organization (NGO) representatives, mass-media representatives, business sector representatives, and students interested in cyber warfare, cyber security, information security, defense and security, and world political issues. With its comprehensive coverage of cyber security policies and strategies of the world's leading states, it is a valuable resource for those seeking to understand the evolving landscape of cyber security and its impact on global politics. It provides methods to identify, prevent, reduce, and eliminate existing threats through a comprehensive understanding of cyber security policies and strategies used by leading countries worldwide."-- |
Beschreibung: | 25 PDFs (295 Seiten) Also available in print. |
Format: | Mode of access: World Wide Web. |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9781668488478 |
Zugangseinschränkungen: | Restricted to subscribers or individual electronic text purchasers. |
Internformat
MARC
LEADER | 00000nam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-98-IGB-00316140 | ||
003 | IGIG | ||
005 | 20231016134413.0 | ||
006 | m eo d | ||
007 | cr bn||||m|||a | ||
008 | 231016s2023 pau fob 001 0 eng d | ||
020 | |a 9781668488478 |q PDF | ||
020 | |z 1668488469 |q hardcover | ||
020 | |z 9781668488461 |q print | ||
024 | 7 | |a 10.4018/978-1-6684-8846-1 |2 doi | |
035 | |a (CaBNVSL)slc00005090 | ||
035 | |a (OCoLC)1404845029 | ||
040 | |a CaBNVSL |b eng |e rda |c CaBNVSL |d CaBNVSL | ||
050 | 4 | |a QA76.9.A25 |b C93 2023e | |
082 | 7 | |a 005.8 |2 23 | |
245 | 0 | 0 | |a Cyber security policies and strategies of the world's leading states |c Nika Chitadze, editor. |
264 | 1 | |a Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) |b IGI Global |c 2023. | |
300 | |a 25 PDFs (295 Seiten) | ||
336 | |a text |2 rdacontent | ||
337 | |a electronic |2 isbdmedia | ||
338 | |a online resource |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Chapter 1. The role and place of cyber warfare and cyber security in the world: past, present, future -- Chapter 2. The main historical stages of the development of cyber space -- Chapter 3. Information war as a result of the information-technological revolution -- Chapter 4. Virtual threats and asymmetric military challenges -- Chapter 5. Framework for detection of cyberbullying in text data using natural language processing and machine learning -- Chapter 6. Cognitive warfare: a psychological strategy to manipulate public opinion -- Chapter 7. The fifth space of military action and confrontation -- Chapter 8. Collective cyber defense: legalization of cyberspace -- Chapter 9. Cyber security strategies: international experience -- Chapter 10. War in Ukraine and US: Russian information warfare a comparative analysis -- Chapter 11. The EU's cyber security strategy: the question of cyber crime management and challenges in Europe -- Chapter 12. EU's cyber security strategy before and during the war in Ukraine -- Chapter 13. Understanding US cyber security policies during the Donald J. Trump and Biden-Harris administrations -- Chapter 14. Russian aggressive cyber-policy during Russia-Ukraine war -- Chapter 15. China's cyber security policy and the democratic world -- Chapter 16. Analyzing cybersecurity strategies in democratic and authoritarian regimes: a comparative study of the United States and China. | |
506 | |a Restricted to subscribers or individual electronic text purchasers. | ||
520 | 3 | |a "Cyber-attacks significantly impact all sectors of the economy, reduce public confidence in e-services, and threaten the development of the economy using information and communication technologies. The security of information systems and electronic services is crucial to each citizen's social and economic well-being, health, and life. As cyber threats continue to grow, developing, introducing, and improving defense mechanisms becomes an important issue. Cyber Security Policies and Strategies of the World's Leading States is a comprehensive book that analyzes the impact of cyberwarfare on world politics, political conflicts, and the identification of new types of threats. It establishes a definition of civil cyberwarfare and explores its impact on political processes. This book is essential for government officials, academics, researchers, non-government organization (NGO) representatives, mass-media representatives, business sector representatives, and students interested in cyber warfare, cyber security, information security, defense and security, and world political issues. With its comprehensive coverage of cyber security policies and strategies of the world's leading states, it is a valuable resource for those seeking to understand the evolving landscape of cyber security and its impact on global politics. It provides methods to identify, prevent, reduce, and eliminate existing threats through a comprehensive understanding of cyber security policies and strategies used by leading countries worldwide."-- |c Provided by publisher. | |
530 | |a Also available in print. | ||
538 | |a Mode of access: World Wide Web. | ||
588 | |a Description based on title screen (IGI Global, viewed 10/16/2023). | ||
650 | 0 | |a Computer security |x Government policy |v Case studies. | |
650 | 0 | |a Cyberspace operations (Military science) |v Case studies. | |
653 | |a Analysis of Virtual Threats. | ||
653 | |a Asymmetric Military Challenges. | ||
653 | |a Asymmetric Threat Phenomenon. | ||
653 | |a Basic Parameters of Conflict Transformation. | ||
653 | |a Combat Mechanisms. | ||
653 | |a Cyber Policy. | ||
653 | |a Cyber Theory in Modern World Politics. | ||
653 | |a Cyber Warfare Development. | ||
653 | |a Hybrid Warfare. | ||
653 | |a Identification of Threats. | ||
653 | |a Main Aspects of Information Security. | ||
653 | |a New Geopolitical Order. | ||
653 | |a New Geostrategic Tasks. | ||
655 | 4 | |a Electronic books. | |
700 | 1 | |a Chitadze, Nika |d 1969- |e editor. | |
710 | 2 | |a IGI Global, |e publisher. | |
776 | 0 | 8 | |i Print version: |z 1668488469 |z 9781668488461 |
966 | 4 | 0 | |l DE-862 |p ZDB-98-IGB |q FWS_PDA_IGB |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-6684-8846-1 |3 Volltext |
966 | 4 | 0 | |l DE-863 |p ZDB-98-IGB |q FWS_PDA_IGB |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-6684-8846-1 |3 Volltext |
912 | |a ZDB-98-IGB | ||
049 | |a DE-862 | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-98-IGB-00316140 |
---|---|
_version_ | 1826942601911074816 |
adam_text | |
any_adam_object | |
author2 | Chitadze, Nika 1969- |
author2_role | edt |
author2_variant | n c nc |
author_facet | Chitadze, Nika 1969- |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 C93 2023e |
callnumber-search | QA76.9.A25 C93 2023e |
callnumber-sort | QA 276.9 A25 C93 42023E |
callnumber-subject | QA - Mathematics |
collection | ZDB-98-IGB |
contents | Chapter 1. The role and place of cyber warfare and cyber security in the world: past, present, future -- Chapter 2. The main historical stages of the development of cyber space -- Chapter 3. Information war as a result of the information-technological revolution -- Chapter 4. Virtual threats and asymmetric military challenges -- Chapter 5. Framework for detection of cyberbullying in text data using natural language processing and machine learning -- Chapter 6. Cognitive warfare: a psychological strategy to manipulate public opinion -- Chapter 7. The fifth space of military action and confrontation -- Chapter 8. Collective cyber defense: legalization of cyberspace -- Chapter 9. Cyber security strategies: international experience -- Chapter 10. War in Ukraine and US: Russian information warfare a comparative analysis -- Chapter 11. The EU's cyber security strategy: the question of cyber crime management and challenges in Europe -- Chapter 12. EU's cyber security strategy before and during the war in Ukraine -- Chapter 13. Understanding US cyber security policies during the Donald J. Trump and Biden-Harris administrations -- Chapter 14. Russian aggressive cyber-policy during Russia-Ukraine war -- Chapter 15. China's cyber security policy and the democratic world -- Chapter 16. Analyzing cybersecurity strategies in democratic and authoritarian regimes: a comparative study of the United States and China. |
ctrlnum | (CaBNVSL)slc00005090 (OCoLC)1404845029 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05253nam a2200601 i 4500</leader><controlfield tag="001">ZDB-98-IGB-00316140</controlfield><controlfield tag="003">IGIG</controlfield><controlfield tag="005">20231016134413.0</controlfield><controlfield tag="006">m eo d </controlfield><controlfield tag="007">cr bn||||m|||a</controlfield><controlfield tag="008">231016s2023 pau fob 001 0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781668488478</subfield><subfield code="q">PDF</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1668488469</subfield><subfield code="q">hardcover</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781668488461</subfield><subfield code="q">print</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-6684-8846-1</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaBNVSL)slc00005090</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1404845029</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">CaBNVSL</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">CaBNVSL</subfield><subfield code="d">CaBNVSL</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">C93 2023e</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Cyber security policies and strategies of the world's leading states </subfield><subfield code="c">Nika Chitadze, editor.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) </subfield><subfield code="b">IGI Global</subfield><subfield code="c">2023.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">25 PDFs (295 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">electronic</subfield><subfield code="2">isbdmedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Chapter 1. The role and place of cyber warfare and cyber security in the world: past, present, future -- Chapter 2. The main historical stages of the development of cyber space -- Chapter 3. Information war as a result of the information-technological revolution -- Chapter 4. Virtual threats and asymmetric military challenges -- Chapter 5. Framework for detection of cyberbullying in text data using natural language processing and machine learning -- Chapter 6. Cognitive warfare: a psychological strategy to manipulate public opinion -- Chapter 7. The fifth space of military action and confrontation -- Chapter 8. Collective cyber defense: legalization of cyberspace -- Chapter 9. Cyber security strategies: international experience -- Chapter 10. War in Ukraine and US: Russian information warfare a comparative analysis -- Chapter 11. The EU's cyber security strategy: the question of cyber crime management and challenges in Europe -- Chapter 12. EU's cyber security strategy before and during the war in Ukraine -- Chapter 13. Understanding US cyber security policies during the Donald J. Trump and Biden-Harris administrations -- Chapter 14. Russian aggressive cyber-policy during Russia-Ukraine war -- Chapter 15. China's cyber security policy and the democratic world -- Chapter 16. Analyzing cybersecurity strategies in democratic and authoritarian regimes: a comparative study of the United States and China.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="a">Restricted to subscribers or individual electronic text purchasers.</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"Cyber-attacks significantly impact all sectors of the economy, reduce public confidence in e-services, and threaten the development of the economy using information and communication technologies. The security of information systems and electronic services is crucial to each citizen's social and economic well-being, health, and life. As cyber threats continue to grow, developing, introducing, and improving defense mechanisms becomes an important issue. Cyber Security Policies and Strategies of the World's Leading States is a comprehensive book that analyzes the impact of cyberwarfare on world politics, political conflicts, and the identification of new types of threats. It establishes a definition of civil cyberwarfare and explores its impact on political processes. This book is essential for government officials, academics, researchers, non-government organization (NGO) representatives, mass-media representatives, business sector representatives, and students interested in cyber warfare, cyber security, information security, defense and security, and world political issues. With its comprehensive coverage of cyber security policies and strategies of the world's leading states, it is a valuable resource for those seeking to understand the evolving landscape of cyber security and its impact on global politics. It provides methods to identify, prevent, reduce, and eliminate existing threats through a comprehensive understanding of cyber security policies and strategies used by leading countries worldwide."--</subfield><subfield code="c">Provided by publisher.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Also available in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: World Wide Web.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on title screen (IGI Global, viewed 10/16/2023).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="x">Government policy</subfield><subfield code="v">Case studies.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberspace operations (Military science)</subfield><subfield code="v">Case studies.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Analysis of Virtual Threats.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Asymmetric Military Challenges.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Asymmetric Threat Phenomenon.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Basic Parameters of Conflict Transformation.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Combat Mechanisms.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cyber Policy.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cyber Theory in Modern World Politics.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cyber Warfare Development.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Hybrid Warfare.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Identification of Threats.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Main Aspects of Information Security.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">New Geopolitical Order.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">New Geostrategic Tasks.</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Chitadze, Nika</subfield><subfield code="d">1969-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IGI Global,</subfield><subfield code="e">publisher.</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">1668488469</subfield><subfield code="z">9781668488461</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-862</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FWS_PDA_IGB</subfield><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-6684-8846-1</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-863</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FWS_PDA_IGB</subfield><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-6684-8846-1</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-862</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | Electronic books. |
genre_facet | Electronic books. |
id | ZDB-98-IGB-00316140 |
illustrated | Not Illustrated |
indexdate | 2025-03-18T14:30:36Z |
institution | BVB |
isbn | 9781668488478 |
language | English |
oclc_num | 1404845029 |
open_access_boolean | |
owner | DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
owner_facet | DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
physical | 25 PDFs (295 Seiten) Also available in print. |
psigel | ZDB-98-IGB FWS_PDA_IGB ZDB-98-IGB |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | IGI Global |
record_format | marc |
spelling | Cyber security policies and strategies of the world's leading states Nika Chitadze, editor. Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) IGI Global 2023. 25 PDFs (295 Seiten) text rdacontent electronic isbdmedia online resource rdacarrier Includes bibliographical references and index. Chapter 1. The role and place of cyber warfare and cyber security in the world: past, present, future -- Chapter 2. The main historical stages of the development of cyber space -- Chapter 3. Information war as a result of the information-technological revolution -- Chapter 4. Virtual threats and asymmetric military challenges -- Chapter 5. Framework for detection of cyberbullying in text data using natural language processing and machine learning -- Chapter 6. Cognitive warfare: a psychological strategy to manipulate public opinion -- Chapter 7. The fifth space of military action and confrontation -- Chapter 8. Collective cyber defense: legalization of cyberspace -- Chapter 9. Cyber security strategies: international experience -- Chapter 10. War in Ukraine and US: Russian information warfare a comparative analysis -- Chapter 11. The EU's cyber security strategy: the question of cyber crime management and challenges in Europe -- Chapter 12. EU's cyber security strategy before and during the war in Ukraine -- Chapter 13. Understanding US cyber security policies during the Donald J. Trump and Biden-Harris administrations -- Chapter 14. Russian aggressive cyber-policy during Russia-Ukraine war -- Chapter 15. China's cyber security policy and the democratic world -- Chapter 16. Analyzing cybersecurity strategies in democratic and authoritarian regimes: a comparative study of the United States and China. Restricted to subscribers or individual electronic text purchasers. "Cyber-attacks significantly impact all sectors of the economy, reduce public confidence in e-services, and threaten the development of the economy using information and communication technologies. The security of information systems and electronic services is crucial to each citizen's social and economic well-being, health, and life. As cyber threats continue to grow, developing, introducing, and improving defense mechanisms becomes an important issue. Cyber Security Policies and Strategies of the World's Leading States is a comprehensive book that analyzes the impact of cyberwarfare on world politics, political conflicts, and the identification of new types of threats. It establishes a definition of civil cyberwarfare and explores its impact on political processes. This book is essential for government officials, academics, researchers, non-government organization (NGO) representatives, mass-media representatives, business sector representatives, and students interested in cyber warfare, cyber security, information security, defense and security, and world political issues. With its comprehensive coverage of cyber security policies and strategies of the world's leading states, it is a valuable resource for those seeking to understand the evolving landscape of cyber security and its impact on global politics. It provides methods to identify, prevent, reduce, and eliminate existing threats through a comprehensive understanding of cyber security policies and strategies used by leading countries worldwide."-- Provided by publisher. Also available in print. Mode of access: World Wide Web. Description based on title screen (IGI Global, viewed 10/16/2023). Computer security Government policy Case studies. Cyberspace operations (Military science) Case studies. Analysis of Virtual Threats. Asymmetric Military Challenges. Asymmetric Threat Phenomenon. Basic Parameters of Conflict Transformation. Combat Mechanisms. Cyber Policy. Cyber Theory in Modern World Politics. Cyber Warfare Development. Hybrid Warfare. Identification of Threats. Main Aspects of Information Security. New Geopolitical Order. New Geostrategic Tasks. Electronic books. Chitadze, Nika 1969- editor. IGI Global, publisher. Print version: 1668488469 9781668488461 |
spellingShingle | Cyber security policies and strategies of the world's leading states Chapter 1. The role and place of cyber warfare and cyber security in the world: past, present, future -- Chapter 2. The main historical stages of the development of cyber space -- Chapter 3. Information war as a result of the information-technological revolution -- Chapter 4. Virtual threats and asymmetric military challenges -- Chapter 5. Framework for detection of cyberbullying in text data using natural language processing and machine learning -- Chapter 6. Cognitive warfare: a psychological strategy to manipulate public opinion -- Chapter 7. The fifth space of military action and confrontation -- Chapter 8. Collective cyber defense: legalization of cyberspace -- Chapter 9. Cyber security strategies: international experience -- Chapter 10. War in Ukraine and US: Russian information warfare a comparative analysis -- Chapter 11. The EU's cyber security strategy: the question of cyber crime management and challenges in Europe -- Chapter 12. EU's cyber security strategy before and during the war in Ukraine -- Chapter 13. Understanding US cyber security policies during the Donald J. Trump and Biden-Harris administrations -- Chapter 14. Russian aggressive cyber-policy during Russia-Ukraine war -- Chapter 15. China's cyber security policy and the democratic world -- Chapter 16. Analyzing cybersecurity strategies in democratic and authoritarian regimes: a comparative study of the United States and China. Computer security Government policy Case studies. Cyberspace operations (Military science) Case studies. |
title | Cyber security policies and strategies of the world's leading states |
title_auth | Cyber security policies and strategies of the world's leading states |
title_exact_search | Cyber security policies and strategies of the world's leading states |
title_full | Cyber security policies and strategies of the world's leading states Nika Chitadze, editor. |
title_fullStr | Cyber security policies and strategies of the world's leading states Nika Chitadze, editor. |
title_full_unstemmed | Cyber security policies and strategies of the world's leading states Nika Chitadze, editor. |
title_short | Cyber security policies and strategies of the world's leading states |
title_sort | cyber security policies and strategies of the world s leading states |
topic | Computer security Government policy Case studies. Cyberspace operations (Military science) Case studies. |
topic_facet | Computer security Government policy Case studies. Cyberspace operations (Military science) Case studies. Electronic books. |
work_keys_str_mv | AT chitadzenika cybersecuritypoliciesandstrategiesoftheworldsleadingstates AT igiglobal cybersecuritypoliciesandstrategiesoftheworldsleadingstates |