skip to content
Covid-19 virus
COVID-19 Resources

Reliable information about the coronavirus (COVID-19) is available from the World Health Organization (current situation, international travel). Numerous and frequently-updated resource results are available from this WorldCat.org search. OCLC’s WebJunction has pulled together information and resources to assist library staff as they consider how to handle coronavirus issues in their communities.

Image provided by: CDC/ Alissa Eckert, MS; Dan Higgins, MAM
Getting Beyond Norms : New Approaches to International Cyber Security Challenges Preview this item
ClosePreview this item
Checking...

Getting Beyond Norms : New Approaches to International Cyber Security Challenges

Author: Fen Osler Hampson; Michael Sulmeyer
Publisher: Waterloo, ON, CA: Centre for International Governance Innovation, 2017.
Edition/Format:   eBook : Document : English
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Fen Osler Hampson; Michael Sulmeyer
OCLC Number: 1005273630
Notes: Issued as part of the desLibris documents collection.
Description: 1 online resource (46 pages).
Responsibility: Fen Osler Hampson.
More information:

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


\n\n

Primary Entity<\/h3>\n
<http:\/\/www.worldcat.org\/oclc\/1005273630<\/a>> # Getting Beyond Norms : New Approaches to International Cyber Security Challenges<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Book<\/a>, schema:MediaObject<\/a>, schema:CreativeWork<\/a> ;\u00A0\u00A0\u00A0\nlibrary:oclcnum<\/a> \"1005273630<\/span>\" ;\u00A0\u00A0\u00A0\nlibrary:placeOfPublication<\/a> <http:\/\/id.loc.gov\/vocabulary\/countries\/onc<\/a>> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4529231844#Topic\/internet<\/a>> ; # Internet<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4529231844#Topic\/human_activities<\/a>> ; # Human activities<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4529231844#Topic\/computer_security<\/a>> ; # Computer security<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4529231844#Topic\/government<\/a>> ; # Government<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4529231844#Topic\/internet_of_things<\/a>> ; # Internet of things<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4529231844#Topic\/mirai_malware<\/a>> ; # Mirai (malware)<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4529231844#Topic\/computer_network<\/a>> ; # Computer network<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4529231844#Topic\/denial_of_service_attack<\/a>> ; # Denial-of-service attack<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4529231844#Topic\/cyberwarfare<\/a>> ; # Cyberwarfare<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4529231844#Topic\/cyberattack<\/a>> ; # Cyberattack<\/span>\n\u00A0\u00A0\u00A0\nschema:bookFormat<\/a> schema:EBook<\/a> ;\u00A0\u00A0\u00A0\nschema:contributor<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4529231844#Person\/sulmeyer_michael<\/a>> ; # Michael Sulmeyer<\/span>\n\u00A0\u00A0\u00A0\nschema:contributor<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4529231844#Person\/hampson_fen_osler<\/a>> ; # Fen Osler Hampson<\/span>\n\u00A0\u00A0\u00A0\nschema:datePublished<\/a> \"2017<\/span>\" ;\u00A0\u00A0\u00A0\nschema:exampleOfWork<\/a> <http:\/\/worldcat.org\/entity\/work\/id\/4529231844<\/a>> ;\u00A0\u00A0\u00A0\nschema:genre<\/a> \"Electronic books<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:inLanguage<\/a> \"en<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isPartOf<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4529231844#Series\/<\/a>> ; # <\/span>\n\u00A0\u00A0\u00A0\nschema:name<\/a> \"Getting Beyond Norms : New Approaches to International Cyber Security Challenges<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:productID<\/a> \"1005273630<\/span>\" ;\u00A0\u00A0\u00A0\nschema:url<\/a> <https:\/\/www.cigionline.org\/sites\/default\/files\/documents\/Getting%20Beyond%20Norms.pdf<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <https:\/\/login.ezproxy.cbu.ca\/login?url=http:\/\/www.deslibris.ca\/ID\/10092204<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <https:\/\/ezproxy.library.dal.ca\/login?url=http:\/\/www.deslibris.ca\/ID\/10092204<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/libproxy.stfx.ca\/login?url=http:\/\/www.deslibris.ca\/ID\/10092204<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <https:\/\/ezproxy.kpu.ca:2443\/login?url=http:\/\/www.deslibris.ca\/ID\/10092204<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <https:\/\/library.smu.ca\/login?url=http:\/\/www.deslibris.ca\/ID\/10092204<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <https:\/\/ezproxy.kpu.ca:2443\/login?url=https:\/\/www.cigionline.org\/sites\/default\/files\/documents\/Getting%20Beyond%20Norms.pdf<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/dproxy.library.dc-uoit.ca\/login?url=http:\/\/www.deslibris.ca\/ID\/10092204<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/www.deslibris.ca\/ID\/10092204<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <https:\/\/login.library.sheridanc.on.ca\/login?url=https:\/\/www.deslibris.ca\/ID\/10092204<\/a>> ;\u00A0\u00A0\u00A0\nwdrs:describedby<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/1005273630<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n\n

Related Entities<\/h3>\n
<http:\/\/dproxy.library.dc-uoit.ca\/login?url=http:\/\/www.deslibris.ca\/ID\/10092204<\/a>>\u00A0\u00A0\u00A0\nrdfs:comment<\/a> \"eBook available for Durham College via DesLibris. Click link to access<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4529231844#Person\/hampson_fen_osler<\/a>> # Fen Osler Hampson<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Hampson<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Fen Osler<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Fen Osler Hampson<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4529231844#Person\/sulmeyer_michael<\/a>> # Michael Sulmeyer<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Sulmeyer<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Michael<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Michael Sulmeyer<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4529231844#Series\/<\/a>> # <\/span>\n\u00A0\u00A0\u00A0\u00A0a \nbgn:PublicationSeries<\/a> ;\u00A0\u00A0\u00A0\nschema:hasPart<\/a> <http:\/\/www.worldcat.org\/oclc\/1005273630<\/a>> ; # Getting Beyond Norms : New Approaches to International Cyber Security Challenges<\/span>\n\u00A0\u00A0\u00A0\nschema:name<\/a> \"\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4529231844#Topic\/computer_network<\/a>> # Computer network<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Computer network<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4529231844#Topic\/computer_security<\/a>> # Computer security<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Computer security<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4529231844#Topic\/cyberattack<\/a>> # Cyberattack<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Cyberattack<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4529231844#Topic\/cyberwarfare<\/a>> # Cyberwarfare<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Cyberwarfare<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4529231844#Topic\/denial_of_service_attack<\/a>> # Denial-of-service attack<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Denial-of-service attack<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4529231844#Topic\/government<\/a>> # Government<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Government<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4529231844#Topic\/human_activities<\/a>> # Human activities<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Human activities<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4529231844#Topic\/internet<\/a>> # Internet<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Internet<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4529231844#Topic\/internet_of_things<\/a>> # Internet of things<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Internet of things<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4529231844#Topic\/mirai_malware<\/a>> # Mirai (malware)<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Mirai (malware)<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.loc.gov\/vocabulary\/countries\/onc<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\ndcterms:identifier<\/a> \"onc<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/libproxy.stfx.ca\/login?url=http:\/\/www.deslibris.ca\/ID\/10092204<\/a>>\u00A0\u00A0\u00A0\nrdfs:comment<\/a> \"Access restricted: STFX users only<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/www.deslibris.ca\/ID\/10092204<\/a>>\u00A0\u00A0\u00A0\nrdfs:comment<\/a> \"For Subscription see www.canadianelectroniclibrary.ca<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/www.worldcat.org\/title\/-\/oclc\/1005273630<\/a>>\u00A0\u00A0\u00A0\u00A0a \ngenont:InformationResource<\/a>, genont:ContentTypeGenericResource<\/a> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/www.worldcat.org\/oclc\/1005273630<\/a>> ; # Getting Beyond Norms : New Approaches to International Cyber Security Challenges<\/span>\n\u00A0\u00A0\u00A0\nschema:dateModified<\/a> \"2019-02-13<\/span>\" ;\u00A0\u00A0\u00A0\nvoid:inDataset<\/a> <http:\/\/purl.oclc.org\/dataset\/WorldCat<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<https:\/\/ezproxy.kpu.ca:2443\/login?url=http:\/\/www.deslibris.ca\/ID\/10092204<\/a>>\u00A0\u00A0\u00A0\nrdfs:comment<\/a> \"For Subscription see www.canadianelectroniclibrary.ca<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<https:\/\/ezproxy.kpu.ca:2443\/login?url=https:\/\/www.cigionline.org\/sites\/default\/files\/documents\/Getting%20Beyond%20Norms.pdf<\/a>>\u00A0\u00A0\u00A0\nrdfs:comment<\/a> \"Document originally acquired from<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<https:\/\/ezproxy.library.dal.ca\/login?url=http:\/\/www.deslibris.ca\/ID\/10092204<\/a>>\u00A0\u00A0\u00A0\nrdfs:comment<\/a> \"Access restricted: DAL users only<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<https:\/\/library.smu.ca\/login?url=http:\/\/www.deslibris.ca\/ID\/10092204<\/a>>\u00A0\u00A0\u00A0\nrdfs:comment<\/a> \"Access restricted: SMU users only<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<https:\/\/login.ezproxy.cbu.ca\/login?url=http:\/\/www.deslibris.ca\/ID\/10092204<\/a>>\u00A0\u00A0\u00A0\nrdfs:comment<\/a> \"Access restricted: CBU users only<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n