The book is a guided tour of the broad cyber-security landscape, suitable both for classroom use and for independent study.
This is the full text of my interdisciplinary “eCasebook” designed from the ground up to reflect the intertwined nature of the legal and policy questions associated with cyber-security. My aim is to help the reader understand the nature and functions of the various government and private-sector actors associated with cyber-security in the United States, the policy goals they pursue, the issues and challenges they face, and the legal environment in which all of this takes place. It is designed to be accessible for beginners from any disciplinary background, yet useful to experienced audiences too.
The first part of the book focuses on the “defensive” perspective (meaning that we will assume an overarching policy goal of minimizing unauthorized access to or disruption of computer systems). The second part focuses on the “offensive” perspective (meaning that there are contexts in which unauthorized access or disruption might actually be desirable as a matter of policy).
All contents on this page were gathered in good faith directly from the author or publisher. If you see errata or would like to discuss this listing, please send an email to info@ipillustrated.com.
This website uses cookies to understand how the website is being used and to support its growth. Our Cookie Policy