Theoretical cybersecurity : (Record no. 26164)

MARC details
000 -LEADER
fixed length control field 02247nam a22002777a 4500
003 - CONTROL NUMBER IDENTIFIER
control field NULRC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250804095311.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250804b ph ||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781484282991
040 ## - CATALOGING SOURCE
Transcribing agency NULRC
050 ## - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA 76.9.A25 .T44 2022
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Oakley, Jacob G.
Relator term author
245 ## - TITLE STATEMENT
Title Theoretical cybersecurity :
Remainder of title principles and advanced concepts /
Statement of responsibility, etc. Jacob G. Oakley [and four others].
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. USA :
Name of publisher, distributor, etc. Apress,
Date of publication, distribution, etc. c2022.
300 ## - PHYSICAL DESCRIPTION
Extent xvi, 213 pages :
Other physical details illustrations ;
Dimensions 24 cm.
365 ## - TRADE PRICE
Price amount USD44.00
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes index.
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 1. Introduction -- Chapter 2. A Cyber Taxonomy -- Chapter 3. Cost Benefit -- Chapter 4. Roles and Responsibilities -- Chapter 5. Experimentation -- Chapter 6. Strategic Cybersecurity -- Chapter 7. Strategic Defensive Security -- Chapter 8. Infinite Cybersecurity -- Chapter 9. Cybersecurity and Game Theory -- Chapter 10. Game Theory Case Study: Ransomware -- Index.
520 ## - SUMMARY, ETC.
Summary, etc. There is a distinct lack of theoretical innovation in the cybersecurity industry. This is not to say that innovation is lacking, as new technologies, services, and solutions (as well as buzzwords) are emerging every day. This book will be the first cybersecurity text aimed at encouraging abstract and intellectual exploration of cybersecurity from the philosophical and speculative perspective. Technological innovation is certainly necessary, as it furthers the purveying of goods and services for cybersecurity producers in addition to securing the attack surface of cybersecurity consumers where able. The issue is that the industry, sector, and even academia are largely technologically focused. There is not enough work done to further the trade—the craft of cybersecurity. This book frames the cause of this and other issues, and what can be done about them. Potential methods and directions are outlined regarding how the industry can evolve to embrace theoretical cybersecurity innovation as it pertains to the art, as much as to the science.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element CYBERSECURITY
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Butler, Michael
Relator term co-author
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name York, Wayne
Relator term co-author
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Puckett, Matthew
Relator term co-author
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Sewell, J. Louis
Relator term co-author
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Library of Congress Classification
Koha item type Books
Suppress in OPAC No
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection Home library Current library Shelving location Date acquired Source of acquisition Cost, normal purchase price Total checkouts Full call number Barcode Date last seen Copy number Koha item type
    Library of Congress Classification     Multimedia Arts and Animation LRC - Main National University - Manila General Circulation 01/25/2025 Purchased - Amazon 44.00   GC QA 76.9.A25 .T44 2022 NULIB000020635 08/04/2025 c.1 Books