Computer Network Security and Cyber Ethics
Seiten
2006
|
2nd Revised edition
McFarland & Co Inc (Verlag)
978-0-7864-2595-2 (ISBN)
McFarland & Co Inc (Verlag)
978-0-7864-2595-2 (ISBN)
- Titel ist leider vergriffen;
keine Neuauflage - Artikel merken
Demonstrates the role of morality and ethics in the deliberations and decisions of people handling information technology. This work discusses the value technology adds and the role it plays in the decision-making process. It focuses on security issues with the intent of increasing the public's awareness of the magnitude of cyber vandalism.
This fully updated edition of the 2002 Choice Outstanding Academic Title opens with three chapters new to this edition introducing morality, ethics, and technology and value. The author demonstrates the central role of morality and ethics in the deliberations and decisions of people handling information technology. Also discussed in depth is the value technology adds and the role it plays in the decision-making process. Like the first edition, this book focuses on security issues with the intent of increasing the public's awareness of the magnitude of cyber vandalism, the weaknesses and loopholes inherent in the cyberspace infrastructure, and the ways to protect ourselves and our societies. The goal is public understanding of the nature and motives of cyber acts, how such acts are committed, and the efforts being undertaken to prevent future occurrences.
This fully updated edition of the 2002 Choice Outstanding Academic Title opens with three chapters new to this edition introducing morality, ethics, and technology and value. The author demonstrates the central role of morality and ethics in the deliberations and decisions of people handling information technology. Also discussed in depth is the value technology adds and the role it plays in the decision-making process. Like the first edition, this book focuses on security issues with the intent of increasing the public's awareness of the magnitude of cyber vandalism, the weaknesses and loopholes inherent in the cyberspace infrastructure, and the ways to protect ourselves and our societies. The goal is public understanding of the nature and motives of cyber acts, how such acts are committed, and the efforts being undertaken to prevent future occurrences.
Erscheint lt. Verlag | 15.7.2006 |
---|---|
Zusatzinfo | illustrations, notes, bibliography, index |
Verlagsort | Jefferson, NC |
Sprache | englisch |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Recht / Steuern ► Privatrecht / Bürgerliches Recht ► IT-Recht | |
ISBN-10 | 0-7864-2595-4 / 0786425954 |
ISBN-13 | 978-0-7864-2595-2 / 9780786425952 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
Mehr entdecken
aus dem Bereich
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …
Buch | Softcover (2022)
Springer Vieweg (Verlag)
CHF 48,95
Management der Informationssicherheit und Vorbereitung auf die …
Buch (2024)
Carl Hanser (Verlag)
CHF 97,95