ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Conflicts, Crimes and Regulations in Cyberspace

دانلود کتاب تعارضات، جرایم و مقررات در فضای مجازی

Conflicts, Crimes and Regulations in Cyberspace

مشخصات کتاب

Conflicts, Crimes and Regulations in Cyberspace

دسته بندی: امنیت
ویرایش:  
نویسندگان:   
سری: Information Systems, Web and Pervasive Computing Series: Cybersecurity Set 
ISBN (شابک) : 2021945731, 9781786306869 
ناشر: Wiley-ISTE 
سال نشر: 2022 
تعداد صفحات: 224 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 5 مگابایت 

قیمت کتاب (تومان) : 41,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 12


در صورت تبدیل فایل کتاب Conflicts, Crimes and Regulations in Cyberspace به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب تعارضات، جرایم و مقررات در فضای مجازی نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب تعارضات، جرایم و مقررات در فضای مجازی

مطالعه فضای مجازی در حوزه علوم اجتماعی نسبتاً جدید است، اما علاقه به این موضوع قابل توجه است. تعارضات، جرایم و مقررات در فضای مجازی با پرداختن به موضوعات بین المللی و روش شناختی، از طریق استفاده از مطالعات موردی، به مطرح شدن بحث علمی کمک می کند.


توضیحاتی درمورد کتاب به خارجی

The study of cyberspace is relatively new within the field of social sciences, yet interest in the subject is significant. Conflicts, Crimes and Regulations in Cyberspace contributes to the scientific debate being brought to the fore by addressing international and methodological issues, through the use of case studies.



فهرست مطالب

Cover
	Half-Title Page
	Title Page
	Copyright Page
	Contents
	Introduction
1 The United States, States and the False Claims of the End of the Global Internet
	1.1. Introduction
	1.2. The creation of the internet and the development of cyberspace by the United States
		1.2.1. The first international telecommunications systems developed by all states
		1.2.2. The creation and development of the internet by the United States
		1.2.3. International management controlled by the United States
		1.2.4. A sociotechnical system bearing a composite American ideology
		1.2.5. The false recomposition of the global sociotechnical system: the global summits on the information society
	1.3. Cyberspace transformed by the arrival in force of states
		1.3.1. State intentions in “national strategies”: a global approach
		1.3.2. Russian–American structural disagreements on information security and cybersecurity
		1.3.3. Discussions on cybersecurity: the symbolic international restoration of the coercive state
	1.4. Praxis of state coercion in cyberspace
		1.4.1. Intelligence and surveillance activities in the digital environment
		1.4.2. Non-military cyber operations
		1.4.3. Interstate digital conflicts, secrecy and coercive diplomacy
	1.5. The fragmentation of the global internet and the digital sovereignty of states
		1.5.1. Linguistic balkanization: Digital Babel
		1.5.2. Political fragmentation: alternative internets
	1.6. The strong constraint of interstate cooperation for all states
		1.6.1. Interstate agreements on an embryo of international law
		1.6.2. State dependence on international cooperation for cybersecurity
	1.7. Conclusion
	1.8. References
2 Cybersecurity in America: The US National Security Apparatus and Cyber Conflict Management
	2.1. Introduction
	2.2. Societal and institutional dynamics
	2.3. Organizational and bureaucratic dynamics
	2.4. Individual dynamics
	2.5. Conclusion
	2.6. References
3 Separation of Offensive and Defensive Functions: The Originality of the French Cyberdefense Model Called into Question?
	3.1. Introduction1
	3.2. A model designed and developed in response to the threats and challenges of the early 2010s
		3.2.1. An organizational model apparently based on two main actors
		3.2.2. The commitment to a strict offensive/defensive separation
	3.3. A strict separation of offensive and defensive functions and missions: an obstacle to better defense?
		3.3.1. A rapidly changing context: an increasingly significant threat from the most advanced states
		3.3.2. Limits that have become obstacles to accomplishing cyberdefense missions
		3.3.3. An institutionalized rapprochement of the actors of defensive and offensive parts in the name of cyberdefense missions: from mitigation to obliteration?
	3.4. Conclusion
	3.5. References
4 The Boundary Between Cybercrime and Cyberwar: An Uncertain No-Man’s Land
	4.1. Introduction
	4.2. The field of cybercrime up to the limits of the glass ceiling
		4.2.1. The field of cybercrime: an attempt at delimitation
		4.2.2. Cybercrime, the “21st century crime”
		4.2.3. Cyber conflict at the edge of the glass ceiling
	4.3. War in cyberspace, cyber in war
		4.3.1. Cyber in war, a daily reality
		4.3.2. Autonomous warfare in the cyber world: the test of the law of armed conflict
		4.3.3. Digital cyber persuasion
	4.5. References
5 Cyberdefense, the Digital Dimension of National Security
	5.1. Introduction
	5.2. Cyberdefense in the political and legal framework of digital security
		5.2.1. A definition of cyberdefense
		5.2.2. Linking cyberdefense to national security strategy
	5.3. The emergence of a coherent legal regime for cyberdefense
		5.3.1. The legal basis of the permanent cyberdefense posture
		5.3.2. Exceptional instruments for responding to a crisis
	5.4. Conclusion
	5.5. References
6 Omnipresence Without Omnipotence: The US Campaign Against Huawei in the 5G Era
	6.1. Introduction
	6.2. The unilateral American offensive against Huawei: a disruptive campaign causing significant collateral damage
	6.2.1. Huawei: an “unusual and extraordinary” threat to the United States’ position in the international order
	6.2.2. A political, legal and economic offensive against Huawei, causing significant collateral damage
	6.3. The American diplomatic offensive: the limits of American rhetorical coercion of their partners and allies
	6.3.1. Educating rather than persuading: an attempt to rhetorically coerce partners and allies
	6.3.2. Successful agenda setting but limited rhetorical coercion
	6.3.3. American rhetorical coercion in the special relationship
	6.4. The anti-Huawei offensive: a barometer of American power?
	6.5. References
7 The Issue of Personal and Sovereign Data in the Light of an Emerging “International Law of Intelligence”
	7.1. Introduction
	7.2. The legal rules invoked in the collection of personal and sovereign data
		7.2.1. Right to privacy versus general communications surveillance
		7.2.2. Violation of territorial sovereignty versus cyberespionage
	7.3. Data localization in the light of international intelligence law
		7.3.1. Data fluidity versus data storage
		7.3.2. Datasphere versus international intelligence law
	7.4. Conclusion
	7.5. Appendix: the quadrants of intelligence law
	7.6. Sources and references
		7.6.1. Sources
		7.6.2. References
8 International Cybersecurity Cooperation
	8.1. Current attack trends
	8.2. The multiple paths of international cooperation
	8.3. The issue of attack attribution
9 Cyberdefense and Cybersecurity Regulations in the United States: From the Failure of the “Comprehensive Policy” to the Success of the Sectoral Approach
	9.1. Introduction
	9.2. The identification of a new threat and the impact of cyber on how US security and defense policies are designed
	9.3. From the impact of cyber on policy to the impact of politics on cyber
	9.4. From a comprehensive cyber policy to a sectoral approach: the success of an undeclared regulatory policy
	9.5. Conclusion
	9.6. References
List of Authors
Index
Other titles from iSTE in Computer Engineering




نظرات کاربران