Listing 1 - 10 of 570 | << page >> |
Sort by
|
Choose an application
Cyberspace operations (Military science) --- Cyberspace --- Security, International
Choose an application
Choose an application
Religion --- Internet --- Cyberspace
Choose an application
INFORMATION WARFARE --- CYBERSPACE --- CYBERSPACE--SECURITY MEASURES --- COMPUTER NETWORKS--SECURITY MEASURES --- Cyberspace --- Information warfare --- Electronics in military engineering --- Strategy
Choose an application
"En construction" rappelle les gifs qui peuplaient les premières pages de la Toile, mais fait aussi référence à un chantier historique inédit, celui de l’historien explorant les archives du Web, des Newsgroups ou de la communauté Usenet. À partir de cette archéologie numérique, cet ouvrage propose une histoire de l’adoption d’Internet et du Web par les Français. Le réseau est raconté ici à travers l’aventure de ceux qui ont créé les infrastructures, qui ont inventé les usages d’une pratique qui allait révolutionner notre vie quotidienne. On croise au cours de cette navigation des informaticiens, des entrepreneurs, des politiques, des passionnés de science-fiction, des militants, autant d’acteurs qui se confrontent, débattent, co-construisent. À travers cette analyse nationale d’un phénomène pourtant transnational, l’auteure dessine les contours du Web à la française, en s’intéressant à l’attribution des noms de domaine et à la francophonie au sein de la Toile, à la transition entre la culture Minitel et celle du Web, ou encore à la place d’un État qui passe du volontarisme et du monopole des télécommunications à la dérégulation et aux imaginaires des autoroutes puis de la société de l’information
Internet --- Cyberespace --- NTIC --- nouvelle économie --- France --- Cyberspace
Choose an application
"On évalue aujourd'hui à plus d'un million le nombre de cyberattaques quotidiennes qui mettent en péril les particuliers, les entreprises et les organismes d'État les plus sensibles. Un chiffre qui ne cesse de croître et qui laisse craindre que le jour du grand black-out se rapproche... Pendant plus d'un an, Gilles Fontaine a enquêté sur les cybermafias à l'oeuvre sur le black net, lieu de l'affrontement permanent entre des hackers de génie et des as de la sécurité. Il a recueilli des témoignages vertigineux : entre autres celui de Guillaume Vassault-Houlière, bête noire de la police avant de créer sa start-up spécialisée dans les tests d'intrusion, celui d'Eugene Kaspersky, ex du KGB aujourd'hui à la tête d'une des plus grandes entreprises de cybersécurité et accusé d'espionnage au profit du Kremlin ! Malgré les affaires qui nous sont tous les jours révélées : ransomwares, entreprises et hôpitaux paralysés, fraudes électorales... de nouvelles menaces s'organisent dans le monde silencieux de nos ordinateurs. La déflagration qui risque de paralyser notre monde exige la mobilisation de tous nos cerveaux et de toutes nos ressources."
Computer networks --- Computer crimes --- Cyberspace --- Computer security
Choose an application
Cyber security has become a topic of concern over the past decade. As many individual and organizational activities continue to evolve digitally, it is important to examine the psychological and behavioral aspects of cyber security. Psychological and Behavioral Examinations in Cyber Security is a critical scholarly resource that examines the relationship between human behavior and interaction and cyber security. Featuring coverage on a broad range of topics, such as behavioral analysis, cyberpsychology, and online privacy, this book is geared towards IT specialists, administrators, business managers, researchers, and students interested in online decision making in cybersecurity
Electronic commerce --- Decision making --- Computer networks --- Cyberspace
Choose an application
"In 2011, the United States government declared a cyber attack as equal to an act of war, punishable with conventional military means. Cyber operations, cyber crime, and other forms of cyber activities directed by one state against another are now considered part of the normal relations range of combat and conflict, and the rising fear of cyber conflict has brought about a reorientation of military affairs. Despite the alarmist discussion surrounding the threat of cyber attack, the authors of this book (in a vein similar to Thomas Rid) argue that there is very little evidence that cyber war is, or is likely to become, a serious threat. What Valeriano and Maness provide in this manuscript is an empirically-grounded discussion of the reality of cyber conflict, based on an analysis of cyber incidents and disputes experienced by international states since 2001. They delineate patterns of cyber conflict to develop a larger theory of cyber war that gets at the processes leading to cyber conflict. They find that, in addition to being a little-used tactic, cyber incidents thus far have been of a rather low-level intensity and with few to no long-term effects. Interestingly, they also find that many cyber incidents are motivated by regional conflict. They argue that restraint is the norm in cyberspace and suggest there is evidence this norm can influence how the tactic is used in the future. In conclusion, the authors lay out a set of policy recommendations for proper defense against cyber threats that is built on restraint and regionalism"--
Cyberterrorism --- Information warfare --- Cyberspace operations (Military science)
Choose an application
Computer networks --- Computer security --- Computer crimes --- Cyberspace
Choose an application
Internet --- Cyberspace --- Digital media --- Social aspects --- Digital media. --- Social aspects. --- Internet - Social aspects --- Cyberspace - Social aspects
Listing 1 - 10 of 570 | << page >> |
Sort by
|