000 -LEADER |
fixed length control field |
04643nam a22003617a 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
CITU |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20230222100809.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
ca aa aaaaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
211125b ||||| |||| 00| 0 eng d |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2018932685 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781786302021 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781119425502 |
041 ## - LANGUAGE CODE |
Language code of text/sound track or separate title |
eng. |
042 ## - AUTHENTICATION CODE |
Authentication code |
pcc |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
004.678 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Preferred name for the person |
Gayard, Laurent. |
245 10 - TITLE STATEMENT |
Title |
Darknet : |
Remainder of title |
Geopolitics and uses / |
Statement of responsibility, etc |
Laurent Gayard. |
263 ## - PROJECTED PUBLICATION DATE |
Projected publication date |
1802 |
264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
Hoboken, NJ : |
Name of publisher, distributor, etc |
ISTE Ltd/John Wiley and Sons Inc, |
Date of publication, distribution, etc |
2018. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
1 online resource |
336 ## - CONTENT TYPE |
Content type term |
text |
Content type code |
txt |
Source |
rdacontent |
337 ## - MEDIA TYPE |
Media type term |
unmediated |
Media type code |
n |
Source |
rdamedia |
338 ## - CARRIER TYPE |
Carrier type term |
volume |
Carrier type code |
nc |
Source |
rdacarrier |
500 ## - GENERAL NOTE |
General note |
ABOUT THE AUTHOR<br/>Gayard Laurent, professor at the institut Catholique, Paris, France. |
505 0# - CONTENTS |
Formatted contents note |
TABLE OF CONTENTS<br/>Preface ix<br/><br/>Introduction xiii<br/><br/>Part 1. New Frontiers And Governance of Digital Space 1<br/><br/>Chapter 1. Fragmentation and Compartmentalization of Virtual Space 3<br/><br/>1.1 The nymph Carna and Internet census 3<br/><br/>1.2 Dimensions of cyberspace 5<br/><br/>1.3 Deep web, darknet and dark web 8<br/><br/>Chapter 2. A Society Of Control And Panopticism 13<br/><br/>2.1 Horizontal panopticism and cyber-narcissism 13<br/><br/>2.2 The neutrality of the network in question 15<br/><br/>2.2.1 How can network neutrality be preserved? 18<br/><br/>2.2.2 A threatened principle 19<br/><br/>2.3 Going toward an Internet 3.0 and a new form of digital civility? 22<br/><br/>2.3.1 Is cyberspace a public space? 22<br/><br/>2.3.2 Tyrannies of privacy 24<br/><br/>Chapter 3. The Internet, A Governance Subject To Controversy 27<br/><br/>3.1 ICANN, an influenced institution 27<br/><br/>3.1.1 Is this the end of US supremacy? 28<br/><br/>3.1.2 The role of the GAC 29<br/><br/>3.2 Cybersecurity, domains and electronic addressing 32<br/><br/>3.2.1 The essential role of WHOIS 34<br/><br/>3.2.2 Domain name extension and migration from IPv4 to IPv6 37<br/><br/>3.3 Who regulates those who are in control? 39<br/><br/>3.3.1 Conflict within ICANN 40<br/><br/>3.3.2 Encrypted networks: a major security issue for ICANN 42<br/><br/>Part 2. Crypto-Anarchism, Cryptography and Hidden Networks 45<br/><br/>Chapter 4. From The Arpanet To The Darknet: When States Lose Cryptographic Warfare 49<br/><br/>4.1 From Minitel to ARPANET 49<br/><br/>4.1.1 Rapid growth 51<br/><br/>4.1.2 The privatization of the Internet 52<br/><br/>4.2 The rise of asymmetric cryptography 53<br/><br/>4.2.1 Steganography 53<br/><br/>4.2.2 Modern cryptographic methods 56<br/><br/>4.2.3 Asymmetric cryptography 57<br/><br/>4.3 “The Crypto Wars are over!” 60<br/><br/>4.3.1 Planetary electronic monitoring 62<br/><br/>4.3.2 “Rendering Big Brother obsolete” 64<br/><br/>4.3.3 Cryptography at the service of hidden networks 68<br/><br/>Chapter 5. From Sneaker Nets To Darknets 71<br/><br/>5.1 Peer to peer: the first darknets 71<br/><br/>5.1.1 P2P against the entertainment industry: David versus Goliath 73<br/><br/>5.1.2 The BitTorrent revolution 77<br/><br/>5.1.3 The emergence of darknets 81<br/><br/>5.2 “Netopias” and darknets: the appearance of parallel networks 84<br/><br/>5.2.1 Cypherpunks and cyberpunk 84<br/><br/>5.2.2 Crypto-anarchism and activism: Peekabooty 88<br/><br/>5.2.3 Freenet 90<br/><br/>5.2.4 It is a small world… 93<br/><br/>5.3 The Tor network 98<br/><br/>5.3.1 The origins of Tor 100<br/><br/>5.3.2 The Tor paradox 103<br/><br/>5.3.3 How Tor works 105<br/><br/>5.3.4 The principle of the .onion address 108<br/><br/>5.3.5 An evolution of Tor uses thanks to Tor2Web? 112<br/><br/>Chapter 6. Geopolitics and Cybersecurity 117<br/><br/>6.1 From “hacktivism” to “cyberwarfare” 117<br/><br/>6.1.1 The first hackers 118<br/><br/>6.1.2 When states engage in cyberwarfare 120<br/><br/>6.1.3 Computer attacks of an unprecedented magnitude 122<br/><br/>6.1.4 The darknet: cybercrime market 124<br/><br/>6.2 Cybercrime, politics and subversion in the “half-world” 126<br/><br/>6.2.1 The “half-world” appeal 130<br/><br/>6.2.2 Fighting crime and Bitcoins: current and future economic and security issues 134<br/><br/>Conclusion 141<br/><br/>Appendices 145<br/><br/>Appendix 1 147<br/><br/>Appendix 2 153<br/><br/>Glossary 157<br/><br/>Bibliography 163<br/><br/>Index 169 |
520 ## - SUMMARY, ETC. |
Summary, etc |
This collaborative research project allows for fundamental advances not only in the understanding of the phenomena but also in the development of practical calculation methods that can be used by engineers. This collaborative research project allows for fundamental advances not only in the understanding of the phenomena but also in the development of practical calculation methods that can be used by engineers. |
655 #0 - INDEX TERM--GENRE/FORM |
Genre/form data or focus term |
Electronic books. |
856 ## - ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
https://onlinelibrary.wiley.com/doi/book/10.1002/9781119425502 |
Link text |
Full text available at Wiley Online Library Click here to view |
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) |
a |
0 |
b |
ibc |
c |
orignew |
d |
2 |
e |
epcn |
f |
20 |
g |
y-gencatlg |
942 ## - ADDED ENTRY ELEMENTS |
Source of classification or shelving scheme |
|
Item type |
EBOOK |