Listing 1 - 10 of 44 << page
of 5
>>
Sort by
Secrets and lies : digital security in a networked world
Author:
ISBN: 0471453803 Year: 2004 Publisher: New York (N.Y.): Wiley

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
The nuclear power debate : issues and choices
Author:
ISBN: 0030590744 Year: 1981 Publisher: New York (N.Y.): Praeger

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Preventing nuclear terrorism : the report and papers of the International task force on prevention of nuclear terrorism
Authors: ---
ISBN: 0669148849 Year: 1987 Publisher: Lexington Lexington books

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Droit d'usage et protection de l'information numérique.
Authors: --- --- ---
ISBN: 2352020107 9782352020103 Year: 2007 Publisher: Paris Editea

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Cybersecurity and cyberware : what everyone needs to know
Author:
ISBN: 9780199918119 9780199918096 0199918090 0199918112 9781306081993 0199918104 9780199918102 1306081998 0199364575 Year: 2013 Publisher: Oxford: Oxford university press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Dependence on computers has had a transformative effect on human society. Cybernetics is now woven into the core functions of virtually every basic institution, including our oldest ones. War is one such institution, and the digital revolution's impact on it has been profound. The American military, which has no peer, is almost completely reliant on high-tech computer systems. Given the Internet's potential for full-spectrum surveillance and information disruption, the marshaling of computer networks represents the next stage of cyberwar. Indeed, it is upon us already. The recent Stuxnet episode, in which Israel fed a malignant computer virus into Iran's nuclear facilities, is one such example. Penetration into US government computer systems by Chinese hackers - presumably sponsored by the Chinese government - is another. Together, they point to a new era in the evolution of human conflict. In Cybersecurity: What Everyone Needs to Know, noted experts Peter W. Singer and Allan Friedman lay out how the revolution in military cybernetics occurred and explain where it is headed. They begin with an explanation of what cyberspace is before moving on to discussions of how it can be exploited and why it is so hard to defend. Throughout, they discuss the latest developments in military and security technology. Singer and Friedman close with a discussion of how people and governments can protect themselves. In sum, Cybersecurity is the definitive account on the subject for the educated layman who wants to know more about the nature of war, conflict, and security in the twenty first century.

Computer virus handbook
Author:
ISBN: 0946395462 Year: 1990 Publisher: Oxford Elsevier


Book
La sécurité aujourd'hui dans la société de l'information : actes des séminaires de recherche du programme Asphales ACI Sécurité informatique 2004-2007
Author:
ISBN: 9782296042766 2296042767 Year: 2007 Publisher: Paris: L'Harmattan,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

BPB0804 --- 347.78 --- 621.39* --- 621.39* Internet --- Internet --- 347.78 Auteursrecht --- Auteursrecht --- Computer networks --- Copyright --- Data protection --- Information technology --- DARPA Internet --- Internet (Computer network) --- Wide area networks (Computer networks) --- World Wide Web --- IT (Information technology) --- Technology --- Telematics --- Information superhighway --- Knowledge management --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Literary property --- Property, Literary --- Intangible property --- Intellectual property --- Anti-copyright movement --- Authors and publishers --- Book registration, National --- Patent laws and legislation --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Law and legislation --- Security measures --- Electronic information resources --- Distributed processing --- Data protection - Law and legislation - France - Congresses --- Internet - Security measures - France - Congresses --- Computer networks - Law and legislation - France - Congresses --- Information technology - Law and legislation - France - Congresses --- Copyright - Electronic information resources - Congresses --- Computer networks - Law and legislation - Congresses --- Computer networks - Security measures - Congresses


Book
Chipcard use in libraries and information webs : recommendations to create intelligent libraries in Europe
Authors: --- ---
ISSN: 10185593 ISBN: 928274602X 9789282746028 Year: 1995 Volume: 16135 EN Publisher: Luxembourg: Office for official publications of the European Communities,


Book
Responsabilité civile = Nuclear legislation, third party liability
Author:
ISBN: 9264234217 9789264234215 Year: 1990 Publisher: Paris: OCDE,


Book
Privacy Online : Perspectives on Privacy and Self-Disclosure in the Social Web
Authors: --- ---
ISBN: 9783642215216 9783642215209 Year: 2011 Publisher: Berlin Heidelberg Springer Berlin Heidelberg

Loading...
Export citation

Choose an application

Bookmark

Abstract

Communications and personal information that are posted online are usually accessible to a vast number of people. Yet when personal data exist online, they may be searched, reproduced and mined by advertisers, merchants, service providers or even stalkers. Many users know what may happen to their information, while at the same time they act as though their data are private or intimate. They expect their privacy will not be infringed while they willingly share personal information with the world via social network sites, blogs, and in online communities. The chapters collected by Trepte and Reinecke address questions arising from this disparity that has often been referred to as the privacy paradox. Works by renowned researchers from various disciplines including psychology, communication, sociology, and information science, offer new theoretical models on the functioning of online intimacy and public accessibility, and propose novel ideas on the how and why of online privacy. The contributing authors offer intriguing solutions for some of the most pressing issues and problems in the field of online privacy. They investigate how users abandon privacy to enhance social capital and to generate different kinds of benefits. They argue that trust and authenticity characterize the uses of social network sites. They explore how privacy needs affect users' virtual identities. Ethical issues of privacy online are discussed as well as its gratifications and users' concerns. The contributors of this volume focus on the privacy needs and behaviors of a variety of different groups of social media users such as young adults, older users, and genders. They also examine privacy in the context of particular online services such as social network sites, mobile internet access, online journalism, blogs, and micro-blogs. In sum, this book offers researchers and students working on issues related to internet communication not only a thorough and up-to-date treatment of online privacy and the social web. It also presents a glimpse of the future by exploring emergent issues concerning new technological applications and by suggesting theory-based research agendas that can guide inquiry beyond the current forms of social technologies. 

Listing 1 - 10 of 44 << page
of 5
>>
Sort by