• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History

عنوان
Exploding data :reclaiming our cybersecurity in the digital age

پدید آورنده
Chertoff, Michael

موضوع
Law and legislation ، Data protection - United States,Government policy ، Data protection - United States,Data protection ، Conflict of laws - United States,Law and legislation ، Computer security - United States,Government policy ، Computer security - United States,، Privacy, Right of - United States,Law and legislation ، Internet - United States,، Information warfare )International law(

رده
KF
1263
.
C65
C44
2018

کتابخانه
Library of Razi Metallurgical Research Center

محل استقرار
استان: Tehran ـ شهر: Tehran

Library of Razi Metallurgical Research Center

تماس با کتابخانه : 46831570-021

OTHER STANDARD IDENTIFIER

Standard Number
electronic

TITLE AND STATEMENT OF RESPONSIBILITY

author
First Statement of Responsibility
Chertoff, Michael
Title Proper by Another Author
3591-
Title Proper
Exploding data :reclaiming our cybersecurity in the digital age

.PUBLICATION, DISTRIBUTION, ETC

Place of Publication, Distribution, etc.
New York
Name of Publisher, Distributor, etc.
Atlantic Monthly Press
Date of Publication, Distribution, etc.
2018

PHYSICAL DESCRIPTION

Specific Material Designation and Extent of Item
vii, 254 pages : illustrations ; 24 cm

GENERAL NOTES

Text of Note
Includes bibliographical references

NOTES PERTAINING TO TITLE AND STATEMENT OF RESPONSIBILITY

Text of Note
Michael Chertoff

NOTES PERTAINING TO EDITION AND BIBLIOGRAPHIC HISTORY

Text of Note
First edition

CONTENTS NOTE

Text of Note
Introduction : big data is watching you -- What is the Internet and how did it change data? -- How did law and policy evolve to address data 1.0 and 2.0? -- Data 3.0 and the challenges of privacy and security -- Reconfiguring privacy and security in the data 3.0 universe - Data 3.0 and controls on private sector use of data -- Data 3.0 and sovereignty : a question of conflict of laws -- Cyber warfare : deterrence and response -- Conclusion : meeting the challenge of data 3.0 : recommendations for law and policy

TOPICAL NAME USED AS SUBJECT

Entry Element
Law and legislation ، Data protection - United States
Entry Element
Government policy ، Data protection - United States
Entry Element
Data protection ، Conflict of laws - United States
Entry Element
Law and legislation ، Computer security - United States
Entry Element
Government policy ، Computer security - United States
Entry Element
، Privacy, Right of - United States
Entry Element
Law and legislation ، Internet - United States
Entry Element
، Information warfare )International law(

LIBRARY OF CONGRESS CLASSIFICATION

Class number
KF
1263
.
C65
C44
2018

PERSONAL NAME - PRIMARY RESPONSIBILITY

Relator Code
AU

TI

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival