The second economy : the race for trust, treasure and time in the cybersecurity war /: the race for trust, treasure and time in the cybersecurity war. (2016)
- Record Type:
- Book
- Title:
- The second economy : the race for trust, treasure and time in the cybersecurity war /: the race for trust, treasure and time in the cybersecurity war. (2016)
- Main Title:
- The second economy : the race for trust, treasure and time in the cybersecurity war
- Further Information:
- Note: Steve Grobman, Allison Cerra ; foreword by Christopher Young.
- Authors:
- Grobman, Steve
Cerra, Allison - Contents:
- At a Glance; Contents; About the Authors; About the Technical Reviewer; Acknowledgements; Foreword; Prologue; Part I: A Second Bite at the Problem; Chapter 1: The Second Side of the Story; The Cryptowars; Follow the Silk Road; "You Must Be Punished"; Enemy Within the Gates; Gone Phishing; A State of Emergency; A Second Thought; Notes; Chapter 2: The Second Nature of Markets; Making It Up in Volume; Without a Trace; Follow the Money Trail; Tick Tock; Rise of the Machines; A Second Thought; Notes; Chapter 3: Seconding the Cause; Déjà vu; Leaking Secrets; A Legion Joins the Fight. A Second ThoughtNotes; Chapter 4: No Second Chance; Somebody Crossed the Rubicon; A Cyber Pearl Harbor; Fun with a Dash of Smarts; A Second Thought; Notes; Chapter 5: Second-Guessing the Obvious; Enough, Already!; Passing the Buck; The Long Game; A Second Thought; Notes; Part II: A Second Look at Conventional Wisdom; Chapter 6: Playing Second Fiddle; Initial Battle Lines Are Drawn; The Underestimated Troublemakers; The Domesticated Heroes; A Second Thought; Notes; Chapter 7: Take a Second Look; Taking the Keep; Securing the Virtual Castle; Erring on the Side of Caution. Ignoring One's DefensesA Second Thought; Notes; Chapter 8: When Seconds Matter; Losing the Race; The More Things Change . . .; The Red Queen's Head Start; A Second Thought; Notes; Chapter 9: Second to None; Doing the Unthinkable; Protecting One's Advantage; Celebrating a Hollow Victory; Facing the Dilemma; Punishing the Free Rider;At a Glance; Contents; About the Authors; About the Technical Reviewer; Acknowledgements; Foreword; Prologue; Part I: A Second Bite at the Problem; Chapter 1: The Second Side of the Story; The Cryptowars; Follow the Silk Road; "You Must Be Punished"; Enemy Within the Gates; Gone Phishing; A State of Emergency; A Second Thought; Notes; Chapter 2: The Second Nature of Markets; Making It Up in Volume; Without a Trace; Follow the Money Trail; Tick Tock; Rise of the Machines; A Second Thought; Notes; Chapter 3: Seconding the Cause; Déjà vu; Leaking Secrets; A Legion Joins the Fight. A Second ThoughtNotes; Chapter 4: No Second Chance; Somebody Crossed the Rubicon; A Cyber Pearl Harbor; Fun with a Dash of Smarts; A Second Thought; Notes; Chapter 5: Second-Guessing the Obvious; Enough, Already!; Passing the Buck; The Long Game; A Second Thought; Notes; Part II: A Second Look at Conventional Wisdom; Chapter 6: Playing Second Fiddle; Initial Battle Lines Are Drawn; The Underestimated Troublemakers; The Domesticated Heroes; A Second Thought; Notes; Chapter 7: Take a Second Look; Taking the Keep; Securing the Virtual Castle; Erring on the Side of Caution. Ignoring One's DefensesA Second Thought; Notes; Chapter 8: When Seconds Matter; Losing the Race; The More Things Change . . .; The Red Queen's Head Start; A Second Thought; Notes; Chapter 9: Second to None; Doing the Unthinkable; Protecting One's Advantage; Celebrating a Hollow Victory; Facing the Dilemma; Punishing the Free Rider; Raising the Elevation; A Second Thought; Notes; Chapter 10: Cybersecurity's Second Wind; Raising the Noise; Obeying the Law; Running the Gauntlet; A Second Thought; Notes; Epilogue; Index. … (more)
- Publisher Details:
- United States : Apress
- Publication Date:
- 2016
- Extent:
- 1 online resource (xxviii, 200 pages), illustrations (some color)
- Subjects:
- 005.8
Computer science
Computer security
Computer networks -- Security measures
Internet -- Security measures
COMPUTERS -- Security -- General
Computer networks -- Security measures
Computer security
Internet -- Security measures
Computer Science
Computer Communication Networks
Systems and Data Security
Computer security
Computer Communication Networks
Computers -- Hardware -- Network Hardware
Network hardware
Electronic books
Electronic books - Languages:
- English
- ISBNs:
- 9781484222294
1484222296 - Related ISBNs:
- 9781484222287
1484222288 - Notes:
- Note: Includes bibliographical references and index.
Note: Print version record. - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.353555
- Ingest File:
- 01_313.xml