Now Australia's Biggest Toy Store

We won't be beaten by anyone. Guaranteed

Cyber Security and Policy
By

Rating

Product Description
Product Details

Promotional Information

Online service authentication; emerging cyber security threats in cloud computing and big data infrastructure; revenue fraud in e-commerce platforms; using complex systems analytics to detect and understand crime; cyber counterintelligence; the concept of neutrality and how it is applied in cyberspace in times of war; the internet of things and its cybersecurity challenges and policy solutions; the role of cryptography in providing information security; failures of public and private sector cyber security regulation; globalisation and the rise of the 'jihadist virtual network'; and Edward Snowden and the GCSB.

Table of Contents

Foreword 9 Professor Rouben Azizian Introduction 13 Andrew Colarik Part 1: Cyber Security 1. Online services authentication 27 Arno Leist and Daniel P. Playne 2. Emerging cyber-security threats in cloud computing and big data 48 Julian Jang-Jaccard 3. Revenue fraud in e-commerce platforms: Challenges and solutions for affiliate marketing 67 Bede Amarasekara and Anuradha Mathrani 4. Picking high-level fruit in dark trees: Using complex systems analytics to detect and understand crime 87 David Robinson and Chris Scogings 5. Cyber counterintelligence: Concept, actors and implications for security 109 Courteney J. O'Connor Part 2: Cyber Policy 6. Challenges in governance of cyber neutrality 131 Thomas Potter 7. The internet of things: Cyber-security challenges and policy solutions 144 Des T. R. Gilmore 8. Limitations of cryptography within the information security environment 161 Robin Behersing 9. The failure of public and private sector regulation in cyber security: A Singaporean case study 177 Paul A. Watters, Jacqueline Ziegler, Seung Jun Lee and Maya F. Watters 10. Globalisation and the rise of the jihadist virtual network 203 Nicola Port 11. Snowden and GCSB: Illuminating neoliberal governmentality? 217 Damien Rogers About the editors 240 About the contributors 242

About the Author

Dr Andrew Colarik is a senior lecturer at Massey University's Centre for Defence and Security Studies. He has published multiple security books and publications in the areas of cyber terrorism, cyber warfare and cyber security. Dr Julian Jang-Jaccard is an associate professor in the College of Science at Massey University. She is an experienced IT professional whose career has spanned over 20 years across industries, universities and a top government research agency. Dr Anuradha Mathrani is a senior lecturer in Information Technology within the School of Engineering and Advanced Technology, Massey University. Her research interests include software assessment and governance methods, quality and reliability measurements, distributed software architectures, application lifecycle management, and technology enhanced teaching/learning practices.

Ask a Question About this Product More...
Write your question below:
Look for similar items by category
People also searched for
How Fishpond Works
Fishpond works with suppliers all over the world to bring you a huge selection of products, really great prices, and delivery included on over 25 million products that we sell. We do our best every day to make Fishpond an awesome place for customers to shop and get what they want — all at the best prices online.
Webmasters, Bloggers & Website Owners
You can earn a 5% commission by selling Cyber Security and Policy: A substantive dialogue on your website. It's easy to get started - we will give you example code. After you're set-up, your website can earn you money while you work, play or even sleep! You should start right now!
Authors / Publishers
Are you the Author or Publisher of a book? Or the manufacturer of one of the millions of products that we sell. You can improve sales and grow your revenue by submitting additional information on this title. The better the information we have about a product, the more we will sell!
Back to top