Vulnerable system : (Record no. 346302)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 02139nam a22001817a 4500 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | 0 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20221107105823.0 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781501758942 |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 |
Item number | STE |
100 ## - MAIN ENTRY--PERSONAL NAME | |
Personal name | Stewart, Andrew J. |
245 ## - TITLE STATEMENT | |
Title | Vulnerable system : |
Remainder of title | the history of information security in the computer age |
260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
Place of publication, distribution, etc. | New York |
Name of publisher, distributor, etc. | Cornell University Press |
Date of publication, distribution, etc. | 2021 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 299 p. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | As threats to the security of information pervade the fabric of everyday life, A Vulnerable System describes how, even as the demand for information security increases, the needs of society are not being met. The result is that the confidentiality of our personal data, the integrity of our elections, and the stability of foreign relations between countries are increasingly at risk.<br/><br/>Andrew J. Stewart convincingly shows that emergency software patches and new security products cannot provide the solution to threats such as computer hacking, viruses, software vulnerabilities, and electronic spying. Profound underlying structural problems must first be understood, confronted, and then addressed.<br/><br/>A Vulnerable System delivers a long view of the history of information security, beginning with the creation of the first digital computers during the Cold War. From the key institutions of the so-called military industrial complex in the 1950s to Silicon Valley start-ups in the 2020s, the relentless pursuit of new technologies has come at great cost. The absence of knowledge regarding the history of information security has caused the lessons of the past to be forsaken for the novelty of the present, and has led us to be collectively unable to meet the needs of the current day. From the very beginning of the information age, claims of secure systems have been crushed by practical reality.<br/><br/>The myriad risks to technology, Stewart reveals, cannot be addressed without first understanding how we arrived at this moment. A Vulnerable System is an enlightening and sobering history of a topic that affects crucial aspects of our lives. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer networks--Security measures |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer security |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | Books |
Withdrawn status | Lost status | Damaged status | Not for loan | Home library | Current library | Date acquired | Total checkouts | Total renewals | Full call number | Barcode | Date last seen | Date last checked out | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Not Missing | Not Damaged | Gandhi Smriti Library | Gandhi Smriti Library | 2022-04-13 | 2 | 1 | 005.8 STE | 164087 | 2025-04-15 | 2024-12-07 | 2022-04-13 | Books |