Listing 1 - 10 of 44 | << page >> |
Sort by
|
Choose an application
Computer networks --- -Computer security --- Computer security --- -Security measures --- Security measures
Choose an application
Choose an application
Nuclear industry --- Nuclear terrorism --- Security measures --- Prevention
Choose an application
Computer networks --- Computers --- Privacy, Right of --- Security measures --- Access control
Choose an application
Dependence on computers has had a transformative effect on human society. Cybernetics is now woven into the core functions of virtually every basic institution, including our oldest ones. War is one such institution, and the digital revolution's impact on it has been profound. The American military, which has no peer, is almost completely reliant on high-tech computer systems. Given the Internet's potential for full-spectrum surveillance and information disruption, the marshaling of computer networks represents the next stage of cyberwar. Indeed, it is upon us already. The recent Stuxnet episode, in which Israel fed a malignant computer virus into Iran's nuclear facilities, is one such example. Penetration into US government computer systems by Chinese hackers - presumably sponsored by the Chinese government - is another. Together, they point to a new era in the evolution of human conflict. In Cybersecurity: What Everyone Needs to Know, noted experts Peter W. Singer and Allan Friedman lay out how the revolution in military cybernetics occurred and explain where it is headed. They begin with an explanation of what cyberspace is before moving on to discussions of how it can be exploited and why it is so hard to defend. Throughout, they discuss the latest developments in military and security technology. Singer and Friedman close with a discussion of how people and governments can protect themselves. In sum, Cybersecurity is the definitive account on the subject for the educated layman who wants to know more about the nature of war, conflict, and security in the twenty first century.
Computer security --- Computer networks --- Cyberspace --- Cyberterrorism --- Information warfare --- Security measures --- Prevention --- Human rights --- Artificial intelligence. Robotics. Simulation. Graphics --- Sociology of culture --- Military art and science --- Space and time --- Computers --- Telematics --- Prevention. --- Computer security - United States --- Computer networks - Security measures - United States --- Cyberspace - Security measures - United States --- Cyberterrorism - United States - Prevention --- Information warfare - United States - Prevention
Choose an application
Electronic data processing departments --- Informatique, Centres d' --- Security measures --- Sûreté --- Mesures --- Computer viruses --- 681.3.067 --- Software viruses --- Viruses, Computer --- Malware (Computer software) --- Computer. Automation --- Computer crimes
Choose an application
BPB0804 --- 347.78 --- 621.39* --- 621.39* Internet --- Internet --- 347.78 Auteursrecht --- Auteursrecht --- Computer networks --- Copyright --- Data protection --- Information technology --- DARPA Internet --- Internet (Computer network) --- Wide area networks (Computer networks) --- World Wide Web --- IT (Information technology) --- Technology --- Telematics --- Information superhighway --- Knowledge management --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Literary property --- Property, Literary --- Intangible property --- Intellectual property --- Anti-copyright movement --- Authors and publishers --- Book registration, National --- Patent laws and legislation --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Law and legislation --- Security measures --- Electronic information resources --- Distributed processing --- Data protection - Law and legislation - France - Congresses --- Internet - Security measures - France - Congresses --- Computer networks - Law and legislation - France - Congresses --- Information technology - Law and legislation - France - Congresses --- Copyright - Electronic information resources - Congresses --- Computer networks - Law and legislation - Congresses --- Computer networks - Security measures - Congresses
Choose an application
Library automation --- Computer architecture. Operating systems --- Library information networks --- Libraries --- Smart cards --- Réseaux de bibliothèques --- Bibliothèques --- Cartes à mémoire --- Security measures --- Automation --- Sécurité --- Mesures --- Automatisation --- 021.63*2 --- 025.6 --- Réseaux de bibliothèques --- Bibliothèques --- Cartes à mémoire --- Sécurité --- Report
Choose an application
621.039.58 --- 347.51 --- 347.512.5 --- 13.04.b --- Wettelijke en contractuele aansprakelijkheid ; Zaken ; Kernrisico's --- Liability for nuclear damages --- Responsabilité nucléaire. --- Nuclear facilities --- Installations nucléaires --- Radiation --- Radioprotection. --- Security measures. --- Mesures de sûreté. --- Safety measures --- Responsabilité nucléaire. --- Installations nucléaires --- Mesures de sûreté.
Choose an application
Communications and personal information that are posted online are usually accessible to a vast number of people. Yet when personal data exist online, they may be searched, reproduced and mined by advertisers, merchants, service providers or even stalkers. Many users know what may happen to their information, while at the same time they act as though their data are private or intimate. They expect their privacy will not be infringed while they willingly share personal information with the world via social network sites, blogs, and in online communities. The chapters collected by Trepte and Reinecke address questions arising from this disparity that has often been referred to as the privacy paradox. Works by renowned researchers from various disciplines including psychology, communication, sociology, and information science, offer new theoretical models on the functioning of online intimacy and public accessibility, and propose novel ideas on the how and why of online privacy. The contributing authors offer intriguing solutions for some of the most pressing issues and problems in the field of online privacy. They investigate how users abandon privacy to enhance social capital and to generate different kinds of benefits. They argue that trust and authenticity characterize the uses of social network sites. They explore how privacy needs affect users' virtual identities. Ethical issues of privacy online are discussed as well as its gratifications and users' concerns. The contributors of this volume focus on the privacy needs and behaviors of a variety of different groups of social media users such as young adults, older users, and genders. They also examine privacy in the context of particular online services such as social network sites, mobile internet access, online journalism, blogs, and micro-blogs. In sum, this book offers researchers and students working on issues related to internet communication not only a thorough and up-to-date treatment of online privacy and the social web. It also presents a glimpse of the future by exploring emergent issues concerning new technological applications and by suggesting theory-based research agendas that can guide inquiry beyond the current forms of social technologies.
persbeleid --- Computer. Automation --- informatica --- Journalism --- maatschappij --- Internet --- Online social networks --- Electronic social networks --- Social networking Web sites --- Virtual communities --- Social media --- Social networks --- Sociotechnical systems --- Web sites --- Security measures --- Communities, Online (Online social networks) --- Communities, Virtual (Online social networks) --- Online communities (Online social networks)
Listing 1 - 10 of 44 | << page >> |
Sort by
|