Listing 1 - 10 of 18 << page
of 2
>>
Sort by

Book
Déclic [: comment profiter du numérique sans tomber dans le piège des géants du web]
Authors: ---
ISBN: 9782711201976 Year: 2020 Publisher: Paris Les Arènes

Loading...
Export citation

Choose an application

Bookmark

Abstract

"Exploitation des données privées, surveillance généralisée, addiction au smartphone, disparition de pans entiers de l'économie… Les critiques du monde numérique ne cessent de s'amplifier ; difficile d'ignorer les conséquences de l'utilisation d'Amazon, Facebook, Google, Instagram ou Netflix. Et s'il existait un autre Internet, respectueux de nos libertés ? L'ancien start-uper Maxime Guedj et la journaliste Anne-Sophie Jacques proposent de s'engager sur une nouvelle voie. Ils expliquent de l'intérieur comment l'utopie des débuts a engendré des entre­prises tentaculaires. Ils sont allés à la rencontre de celles et ceux qui (re)font d'Internet un bien commun, un outil d'émancipation et de liberté : logiciels libres, design éthique, protection de la vie privée, information décentralisée…Véritable manuel d'autodéfense du citoyen connecté, Déclic contient des fiches pratiques proposant des solutions pour ralentir, pour échanger, s'informer et agir autrement. Un autre Internet existe déjà : libre à nous de le découvrir."


Book
Mindfuck : le complot Cambridge Analytica pour s'emparer de nos cerveaux
Authors: ---
ISBN: 2246824737 9782246824732 Year: 2020 Publisher: Paris Grasset

Loading...
Export citation

Choose an application

Bookmark

Abstract

Le 17 mars 2018, le monde entier se réveille en découvrant les noms de Cambridge Analytica et de Christopher Wylie. "The Guardian" et "The New York Times" révèlent une opération sans précédent d'utilisation de données à grande échelle pour influencer des élections. Convoqué devant le Congrès américain, l'ex-directeur de recherche de Cambridge Analytica dévoile tout: les financements, les liens avec les équipes de campagne de Trump, celles en faveur du Brexit, les techniques utilisées pour exploiter les failles de sécurité de Facebook, les tests effectués dans plusieurs pays africains, le recours aux hackers et les opérations des services russes. Christopher Wylie raconte avec précision et talent l'histoire d'une arme de manipulation massive. En s'attaquant à nos données, nos cerveaux et nos bulletins de vote, la société Cambridge Analytica a déclaré une guerre silencieuse à la démocratie. [Quatrième de couverture]

Les autoroutes de l'information
Author:
ISBN: 2275015647 Year: 1997 Publisher: Paris Université Panthéon-Assas (Paris II)

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Economie des données personnelles et de la vie privée
Author:
ISBN: 9782707157652 2707157651 Year: 2010 Volume: 546 Publisher: Paris : La Découverte,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Les technologies de l'information et de la communication ont permis de réduire considérablement les coûts de collecte et de traitement des données personnelles. Certains estiment qu'Internet, la biométrie, la géolocalisation ou encore les puces RFID menacent nos vies privées à un niveau jamais atteint jusqu'à présent: surveillance, usurpation d'identité, invasion du marketing en ligne, etc. D'autres soulignent les bienfaits de l'exploitation des données personnelles ouvrant des perspectives nouvelles (personnalisation des services, marketing mieux ciblé, services de mobilité...) et contribuant à la croissance économique. Cet ouvrage a pour ambition d'éclairer ce débat actuel, obscurci par des enjeux industriels et partisans. En s'appuyant sur de nombreux exemples, il dresse un état des lieux de la réflexion économique sur les conséquences de l'exploitation des données personnelles sur la vie privée et le bien-être des individus. Il propose une évaluation des solutions institutionnelles visant à réguler ces évolutions, de l'autorégulation à l'octroi de droits de propriété aux individus sur leurs données personnelles.


Book
The right to erasure in EU data protection law : from individual rights to effective protection
Author:
ISBN: 0198847971 9780198847977 0191882569 0192587218 9780191882562 Year: 2020 Publisher: New York Oxford university press

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book critically investigates the role of data subject rights in countering information and power asymmetries online. It aims at dissecting 'data subject empowerment' in the information society through the lens of the right to erasure ('right to be forgotten') in Article 17 of the General Data Protection Regulation (GDPR). In doing so, it provides an extensive analysis of the interaction between the GDPR and the fundamental right to data protection in Article 8 of the Charter of Fundamental Rights of the EU (Charter), how data subject rights affect fair balancing of fundamental rights, and what the practical challenges are to effective data subject rights.

Computer system security : basic concepts and solved exercises
Authors: --- ---
ISBN: 9781420046205 1420046209 9782940222148 2940222142 Year: 2007 Publisher: Lausanne : Boca Raton, FL. : EPFL Press, CRC Press

Loading...
Export citation

Choose an application

Bookmark

Abstract

Computer networks are the spinal cord of our civilisation; because of the huge stakes involved, universities and certain companies must now teach the basics of computer system security. The purpose of this book is to help people learn about the fundamentals of this field through the study of solved exercices. The primary goal is not to create experts in this domain, but rather to teach the concepts required to understand the risks and consequences of computer system misuse. This book thus handles the basic aspects of computer security, including e-mail; viruses and antivirus programs; program and network vulnerabilities; fire walls, address translation and filtering; cryptography; secure communications; secure applications; and security management.This work is a novel addition to the literature in that it gives, for each subject, a short summary of the main principles followed by a series of exercises (with solutions), resulting in a self-contained book that provides a solid foundation in computer security to students. Chapters in this book have been conceived to be as independent as possible. All of them, nevertheless, require a background in computer science and a familiarity with the most common network protocols. [Publisher]


Book
Research methods for cyber security
Authors: ---
ISBN: 0128129301 0128053496 9780128129302 9780128053492 Year: 2017 Publisher: Cambridge, Massachusetts : Syngress, an imprint of Elsevier,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Research Methods for Cyber Security teaches scientific methods for generating impactful knowledge, validating theories, and adding critical rigor to the cyber security field. This book shows how to develop a research plan, beginning by starting research with a question, then offers an introduction to the broad range of useful research methods for cyber security research: observational, mathematical, experimental, and applied. Each research method chapter concludes with recommended outlines and suggested templates for submission to peer reviewed venues. This book concludes with information on cross-cutting issues within cyber security research. Cyber security research contends with numerous unique issues, such as an extremely fast environment evolution, adversarial behavior, and the merging of natural and social science phenomena. Research Methods for Cyber Security addresses these concerns and much more by teaching readers not only the process of science in the context of cyber security research, but providing assistance in execution of research as well. Presents research methods from a cyber security science perspective Catalyzes the rigorous research necessary to propel the cyber security field forward Provides a guided method selection for the type of research being conducted, presented in the context of real-world usage


Book
Les virus : méthodes et techniques de sécurité
Authors: ---
ISBN: 2100000101 9782100000104 Year: 1991 Publisher: Paris : Dunod,

Writing Secure Code : Practical strategies and techniques for secure application coding in a networked world
Authors: ---
ISBN: 9780735617223 0735617228 Year: 2003 Publisher: Redmond Microsoft Corporation

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keep black-hat hackers at bay with the tips and techniques in this entertaining, eye-opening book! Developers will learn how to padlock their applications throughout the entire development process—from designing secure applications to writing robust code that can withstand repeated attacks to testing applications for security flaws. Easily digested chapters reveal proven principles, strategies, and coding techniques. The authors—two battle-scarred veterans who have solved some of the industry’s toughest security problems—provide sample code in several languages. This edition includes updated information about threat modeling, designing a security process, international issues, file-system issues, adding privacy to applications, and performing security code reviews. It also includes enhanced coverage of buffer overruns, Microsoft® .NET security, and Microsoft ActiveX® development, plus practical checklists for developers, testers, and program managers.


Book
Handbook of system safety and security
Author:
ISBN: 1786849895 0128037733 0128038381 9780128038383 9780128037737 Year: 2017 Publisher: Cambridge, MA

Loading...
Export citation

Choose an application

Bookmark

Abstract

Handbook of System Safety and Security: Cyber Risk and Risk Management, Cyber Security, Adversary Modeling, Threat Analysis, Business of Safety, Functional Safety, Software Systems, and Cyber Physical Systems presents an update on the world's increasing adoption of computer-enabled products and the essential services they provide to our daily lives. The tailoring of these products and services to our personal preferences is expected and made possible by intelligence that is enabled by communication between them. Ensuring that the systems of these connected products operate safely, without creating hazards to us and those around us, is the focus of this book, which presents the central topics of current research and practice in systems safety and security as it relates to applications within transportation, energy, and the medical sciences. Each chapter is authored by one of the leading contributors to the current research and development on the topic. The perspective of this book is unique, as it takes the two topics, systems safety and systems security, as inextricably intertwined. Each is driven by concern about the hazards associated with a system’s performance. Presents the most current and leading edge research on system safety and security, featuring a panel of top experts in the field Includes several research advancements published for the first time, including the use of ‘goal structured notation’ together with a ‘judgment calculus’ and their automation as a ‘rule set’ to facilitate systems safety and systems security process execution in compliance with existing standards Presents for the first time the latest research in the field with the unique perspective that systems safety and systems security are inextricably intertwined Includes coverage of systems architecture, cyber physical systems, tradeoffs between safety, security, and performance, as well as the current methodologies and technologies and implantation practices for system safety and security

Listing 1 - 10 of 18 << page
of 2
>>
Sort by