【Kinoppy】

サイバー空間のセキュリティ/犯罪/紛争
洋書電子書籍ご案内

「IoT」がメディアをにぎわす一方で、2016年アメリカ大統領選挙期間中のロシアによるサイバー攻撃疑惑、SNSを媒介した過激思想の伝播などにより、サイバー・セキュリティの維持・確保が社会生活・企業活動・国際政治における重要な課題となっています。サイバー・セキュリティをめぐる社会的・政治的・技術的考察について2016年1月以降に刊行された洋書のなかから、電子書籍タイトル21点をご案内いたします。

【2017年9月29日更新】

※当ページの出版年は紙の書籍の情報を表示しています。電子書籍の出版年はタイトルクリック後の電子書籍詳細画面をご覧ください。
「紙の書籍はこちら」は、複数の装丁刊行がある場合、その中の一つにリンクされています。紙の書籍詳細画面上に 「装丁違いISBN」のリンクがある場合、こちらから他の装丁刊行情報もご確認いただけます。

商品詳細へ米国のサイバー・セキュリティ
US National Cybersecurity : International Politics, Concepts and Organization (Routledge Studies in Conflict, Security and Technology)

Van Puyvelde, Damien/ Brantly, Aaron F. (EDT)
紙版刊行: 2017/07
Taylor & Francis




Contributions by leading experts working at the intersection between academia and government showcase the diversity of approaches and issues shaping contemporary understandings of cybersecurity in the West, such as deterrence and governance, cyber intelligence and big data, international cooperation, and public–private collaboration.

商品詳細へデジタル・フォレンジックス入門
Digital Forensics

Arnes, Andre (EDT)
紙版刊行: 2017/07
John Wiley & Sons Inc




The definitive text for students as well as professionals looking to deepen their understanding of an increasingly critical field of digital forensics. Encompasses all aspects of the field, including methodological, scientific, technical and legal matters.

商品詳細へサイバー犯罪と被害者
Cybercrime and Its Victims (Routledge Studies in Crime and Society)

Martellozzo, Elena/ Jane, Emma A. (EDT)
紙版刊行: 2017/05
Routledge




Drawing on a range of pressing contemporary issues such as online grooming, sexting, cyber-hate, cyber-bulling and online radicalization, this book examines how cyberspace makes us more vulnerable to crime and violence, how it gives rise to new forms of surveillance and social control and how cybercrime can be prevented.

商品詳細へサイバー詐欺と被害者
Cyber Frauds, Scams and Their Victims

Button, Mark/ Cross, Cassandra
紙版刊行: 2017/05
Routledge




This book takes a case study-based approach to exploring the types, perpetrators and victims of cyber frauds and argues for a greater need to understand and respond to cyber fraud and scams in a more effective and victim-centered manner. Essential reading for students and researchers engaged in cyber crime, victimology and international fraud.

商品詳細へフランスの情報セキュリティ
Cybersecurity in France (SpringerBriefs in Cybersecurity)

Baumard, Philippe
紙版刊行: 2017/05
Springer




This book brings a unique perspective on modern cyberwarfare campaigns, escalation and de-escalation of cyber-conflicts. By analyzing the particular case of France national strategy and capabilities, this book suggests a paradigm shift in handling and anchoring cyber-regulation into a new realm of behavioral and cognitive sciences, and their application to machine learning and cyber-defense.

商品詳細へハッキング上級技術
Advanced Penetration Testing : Hacking the World's Most Secure Networks

Allsopp, Wil
紙版刊行: 2017/03
John Wiley & Sons Inc




Featuring techniques not taught in any certification prep or covered by common defensive scanners, this book integrates social engineering, programming, and vulnerability exploits into a multidisciplinary approach for targeting and compromising high security environments and provides a more complex attack simulation. It contains the crucial techniques that provide a more accurate picture of your system's defense.

商品詳細へスマートカード、トークン、セキュリティ、応用(テキスト・第2版)
Smart Cards, Tokens, Security and Applications 2ND

Mayes, K./ Markantonakis, K. (EDT)
紙版刊行: 2017/02
Springer




Provides a broad overview of the many card systems and solutions that are in practical use today. The new edition adds content on RFIDs, embedded security, attacks and countermeasures, security evaluation, javacards, banking or payment cards, identity cards and passports, mobile systems security, and security management.

商品詳細へIoTの情報セキュリティ
Securing the Internet of Things

Li, Shancang/ Xu, Li Da
紙版刊行: 2017/01
Syngress Media Inc




Explains the fundamental concepts of IoT security, describing practical solutions that account for resource limitations at IoT end-node, hybrid network architecture, communication protocols, and application characteristics. Highlighting the most important potential IoT security risks and threats, the book covers both the general theory and practical implications for people working in security in the Internet of Things.

商品詳細へサイバー戦争の倫理学
Ethics and Cyber Warfare : The Quest for Responsible Security in the Age of Digital Warfare

Lucas, George
紙版刊行: 2016/12
Oxford Univ Pr




As attacks on military, civilian, and commercial targets have escalated, there is not yet a clear set of ethical guidelines that apply to cyber warfare. Internationally-respected ethicist George Lucas delves into the confounding realm of cyber conflict, provides a framework for understanding these newly-emerging standards for cyber conflict, and ultimately presents a professional code of ethics for a new generation of "cyber warriors". A must-read for anyone with an interest in philosophy, ethics, or cybercrime.

商品詳細へシステム安全・セキュリティ・ハンドブック
Handbook of System Safety and Security : Cyber Risk and Risk Management, Cyber Security, Threat Analysis, Functional Safety, Software Systems, and Cyb

Griffor, Edward (EDT)
紙版刊行: 2016/10
Syngress Media Inc




This informative guide presents topics from the latest research, applications, and practices in systems safety and security in the context of transportation, energy, and the medical sciences, featuring unpublished advancements that include the use of 'goalstructured notation' and its automation as a 'rule set'.

商品詳細へデジタル科学捜査におけるクラウド&モバイル・アプリの最前線
Contemporary Digital Forensic Investigations of Cloud and Mobile Applications

Choo, Kim-kwang Raymond/ Dehghantanha, Ali
紙版刊行: 2016/10
Syngress Media Inc




Drawing upon the expertise of world-renowned researchers and experts, this book comprehensively discusses the implication of cloud (storage) services and mobile applications on digital forensic investigations.

商品詳細へ社会工学ベースのネット詐欺の理解
Understanding Social Engineering Based Scams

Jakobsson, M. (EDT)
紙版刊行: 2016/10
Springer




This book describes trends in email scams and provides a good starting point for practitioners, decision makers and researchers in that it includes alternatives and complementary tools to the currently deployed email security tools, with a focus on understanding the metrics of scams.

商品詳細へデータ泥棒の実態:盗まれた個人情報の国際市場の検証
Data Thieves in Action : Examining the International Market for Stolen Personal Information (Palgrave Studies in Cybercrime and Cybersecurity)

Holt, T. J./ Smirnova, O./ Chua, Y.
紙版刊行: 2016/09
Palgrave Macmillan




Examines the practices of cybercriminals who steal and sell personal information acquired through various means, including mass data breaches. The authors identify the range of products sold in these active on-line marketplaces and the prospective profits earned by these actors. The book will appeal to both social and computer scientists alike with an interest in the human aspects of cybercrime.

商品詳細へモバイル・セキュリティとプライバシー
Mobile Security and Privacy : Advances, Challenges and Future Research Directions

Au, Man Ho/ Choo, Raymond
紙版刊行: 2016/09
Syngress Media Inc




This book provides the first truly holistic view of leading edge mobile security research from leading researchers. It will enable practitioners to learn about upcoming trends, scientists to share new directions in research, and government and industry decision-makers to prepare for major strategic decisions regarding implementation of mobile technology security and privacy.

商品詳細へクラウドコンピューティング・セキュリティ
Cloud Computing Security : Foundations and Challenges

Vacca, John R. (EDT)
紙版刊行: 2016/08
CRC Pr I Llc




This handbook offers a comprehensive overview of cloud computing security technology and implementation while exploring practical solutions to a wide range of cloud computing security issues.

商品詳細へサイバー詐欺の科学
Cyber Deception : Building the Scientific Foundation

Jajodia, S./ Subrahmanian, V. S./ Swarup, V. (EDT)
紙版刊行: 2016/07
Springer




This edited volume features work from the areas of artificial intelligence, game theory, programming languages, graph theory, and more.

商品詳細へサイバーセキュリティと応用数学
Cybersecurity and Applied Mathematics

Metcalf, Leigh/ Casey, William
紙版刊行: 2016/06
Syngress Media Inc




Covers methods of statistical exploratory data analysis and visualization as a type of model for driving decisions, as well as key topics such as graph theory, topological complexes, and persistent homology.

商品詳細へ情報セキュリティの科学
Information Security Science : Measuring the Vulnerability to Data Compromises

Young, Carl
紙版刊行: 2016/06
Syngress Media Inc




Provides the scientific background, analytic methods, and quantitative metrics to allow scientists and engineers with no background in security to estimate vulnerability to a spectrum of information security threats.

商品詳細へサイバースペースにおける紛争
Conflict in Cyber Space : Theoretical, Strategic and Legal Pespectives (Routledge Studies in Conflict, Security and Technology)

Friis, Karsten/ Ringsmose, Jens (EDT)
紙版刊行: 2016/04
Routledge




Addresses the challenges posed by cyberspace hostility from theoretical, political, strategic and legal perspectives. Cyber-security is analysed through a multidimensional lens, and by asking important strategic questions on the implications and challenges of the proliferation of cyber warfare capabilities, the book seeks to stimulate research into an area that has hitherto been neglected.

商品詳細へクラウドコンピューティングのためのセキュリティ確保ガイド
Guide to Security Assurance for Cloud Computing (Computer Communications and Networks)

Zhu, S. Y./ Hill, R./ Trovati, M. (EDT)
紙版刊行: 2016/03
Springer




This practical and didactic text/reference discusses the leading edge of secure cloud computing, exploring the essential concepts and principles, tools, techniques and deployment models in this field.

商品詳細へ小国とサイバー紛争
Cyber Conflicts and Small States

Janczewski, Lech J./ Caelli, William (EDT)
紙版刊行: 2016/02
Ashgate Pub Co




Looking at a cyber-warfare, cyber-terrorism, cyber-crime and associatd concerns, national experts from New Zealand, Australia, The Netherlands, and Poland present analyses of cyber-defence realities, priorities and options for smaller countries.