Listing 1 - 10 of 24 | << page >> |
Sort by
|
Choose an application
When most people think of piracy, they think of Bittorrent and The Pirate Bay. These public manifestations of piracy, though, conceal an elite worldwide, underground, organized network of pirate groups who specialize in obtaining media – music, videos, games, and software – before their official sale date and then racing against one another to release the material for free.Warez: The Infrastructure and Aesthetics of Piracy is the first scholarly research book about this underground subculture, which began life in the pre-internet era Bulletin Board Systems and moved to internet File Transfer Protocol servers (“topsites”) in the mid- to late-1990s. The “Scene,” as it is known, is highly illegal in almost every aspect of its operations. The term “Warez” itself refers to pirated media, a derivative of “software.” Taking a deep dive in the documentary evidence produced by the Scene itself, Warez describes the operations and infrastructures an underground culture with its own norms and rules of participation, its own forms of sociality, and its own artistic forms. Even though forms of digital piracy are often framed within ideological terms of equal access to knowledge and culture, Eve uncovers in the Warez Scene a culture of competitive ranking and one-upmanship that is at odds with the often communalist interpretations of piracy.Broad in scope and novel in its approach, Warez is indispensible reading for anyone interested in recent developments in digital culture, access to knowledge and culture, and the infrastructures that support our digital age.
Choose an application
Claudia Eckert beschreibt hier systematisch, welche Aspekte bei der Planung sicherer informationstechnischer Systeme eine Rolle spielen und welche verschiedenen Ansätze verfolgt werden können. Sie stellt die Verfahren und Protokolle, die zur Umsetzung der Sicherheitsanforderungen benötigt werden, detailliert vor und erläutert sie anhand von Fallbeispielen. Ein Muss für jeden, der sich mit der hochaktuellen Problematik "IT-Sicherheit" beschäftigt.
Information technology --- IT (Information technology) --- Technology --- Telematics --- Information superhighway --- Knowledge management --- Risk management. --- Security measures. --- Cloud computing --- Information technology. --- Electronic data processing --- Web services --- Distributed processing --- Internet, security models, network security, protocols, IT systems.
Choose an application
In this urgent wake-up call, Jonathan Zittrain shows how the Internet is on a path towards ruin - a victim of its own success - and how we have a chance to avoid this rapidly approaching future. The Internet is so ubiquitous that we take it for granted. But it is surprisingly delicate, and under threat. Just what is at stake? Zittrain gives a fascinating history of the rise of the PC and Internet and reveals how their 'generativity', their capacity to welcome unfiltered contributions from anyone, has driven them. He argues that generativity is the greatest benefit to us as users of the Internet: we are free to connect with other people and to reap the rewards of unanticipated opportunities. Ever-increasing security threats, however - in the form of viruses, spyware and invasions of privacy - are now driving us to a new form of 'tethered' appliances, unable to be modified by anyone except their vendors, such as iPods, iPhones, Xboxes and TIVos, which are set to eclipse the PC. Tethered appliances have unusual and worrisome features. They have already been used in remarkable but little-known ways: car GPS systems have been reconfigured to eavesdrop on their owners, and digital video recorders have been ordered to self-destruct in viewers' homes. New Web 2.0 platforms like Google mash-ups and Facebook are rightly celebrated - but their applications, even those written by outsiders, can similarly be monitored and controlled from a central source. Jonathan Zittrain argues that the generative Internet must be preserved for everybody. And he shows us how, through new technologies and behaviour, we can do it.
Computer architecture. Operating systems --- Internet --- Social aspects --- Security measures --- #SBIB:309H1710 --- #SBIB:309H1713 --- DARPA Internet --- Internet (Computer network) --- Wide area networks (Computer networks) --- World Wide Web --- Telematica, algemene werken --- Mediatechnologie: nieuwe toepassingen (abonnee-televisie, electronic mail, desk top publishing, virtuele realiteit...) --- Internet - Social aspects --- Internet - Security measures
Choose an application
Computer networks --- Telecommunication policy --- Internet --- Security measures --- Telecommunications --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Security measures. --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- E-books --- Computer networks - Security measures --- Telecommunication policy - United States --- Internet - Security measures
Choose an application
Windows is the largest operating system on desktops and servers worldwide, which means more intrusions, malware infections, and cybercrime happen on these systems. Author Harlan Carvey has brought his bestselling book up-to-date by covering the newest version of Windows, Windows 7. Windows Forensic Analysis Toolkit, 3e, covers live and postmortem response collection and analysis methodologies, addressing material that is applicable to law enforcement, the federal government, students, and consultants. The book is also accessible to system administrators, who are often the frontline w
Computer crimes - Investigation - United States - Methodology. --- Computer crimes -- Investigation -- United States -- Methodology. --- Computer networks - Security measures. --- Computer networks -- Security measures. --- Computer security. --- Internet - Security measures. --- Internet -- Security measures. --- Microsoft Windows (Computer file) -- Security measures. --- Computer crimes --- Computer networks --- Internet --- Computer security --- Social Welfare & Social Work --- Social Sciences --- Criminology, Penology & Juvenile Delinquency --- Methodology --- Investigation --- Security measures --- Methodology. --- Security measures. --- Microsoft Windows (Computer file) --- Information Technology --- General and Others --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computer network security --- Network security, Computer --- Security of computer networks --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Crime --- Privacy, Right of --- Protection --- Windows (Computer file) --- Chicago (Computer file) --- Microsoft Windows 95 --- Windows 95 --- Microsoft Windows CE --- Windows CE --- Pegasus (Computer file) --- Windows for workgroups --- Microsoft Windows for workgroups --- Windows 98 --- Microsoft Windows 98 --- Windows 2000 professional --- Windows 2000 --- Microsoft Windows 2000 --- Microsoft Windows Me millennium edition --- Windows Me --- Microsoft Windows XP (Computer file) --- Windows XP --- Microsoft Windows Vista --- Windows Vista --- Microsoft Windows 7 --- Windows 7 --- Windows 8 --- Windows 10
Choose an application
Communications and personal information that are posted online are usually accessible to a vast number of people. Yet when personal data exist online, they may be searched, reproduced and mined by advertisers, merchants, service providers or even stalkers. Many users know what may happen to their information, while at the same time they act as though their data are private or intimate. They expect their privacy will not be infringed while they willingly share personal information with the world via social network sites, blogs, and in online communities. The chapters collected by Trepte and Reinecke address questions arising from this disparity that has often been referred to as the privacy paradox. Works by renowned researchers from various disciplines including psychology, communication, sociology, and information science, offer new theoretical models on the functioning of online intimacy and public accessibility, and propose novel ideas on the how and why of online privacy. The contributing authors offer intriguing solutions for some of the most pressing issues and problems in the field of online privacy. They investigate how users abandon privacy to enhance social capital and to generate different kinds of benefits. They argue that trust and authenticity characterize the uses of social network sites. They explore how privacy needs affect users’ virtual identities. Ethical issues of privacy online are discussed as well as its gratifications and users’ concerns. The contributors of this volume focus on the privacy needs and behaviors of a variety of different groups of social media users such as young adults, older users, and genders. They also examine privacy in the context of particular online services such as social network sites, mobile internet access, online journalism, blogs, and micro-blogs. In sum, this book offers researchers and students working on issues related to internet communication not only a thorough and up-to-date treatment of online privacy and the social web. It also presents a glimpse of the future by exploring emergent issues concerning new technological applications and by suggesting theory-based research agendas that can guide inquiry beyond the current forms of social technologies. .
Computer networks -- Security measures. --- Electronic commerce -- Security measures. --- Internet -- Security measures. --- Online social networks --- Internet --- Sociology & Social History --- Engineering & Applied Sciences --- Social Sciences --- Computer Science --- Social Change --- Security measures --- Security measures. --- Electronic social networks --- Social networking Web sites --- Computer science. --- Industrial management. --- User interfaces (Computer systems). --- Computers and civilization. --- Communication. --- Community psychology. --- Environmental psychology. --- Computer Science. --- Computers and Society. --- Communication Studies. --- Community and Environmental Psychology. --- Media Management. --- User Interfaces and Human Computer Interaction. --- Social media --- Social networks --- Sociotechnical systems --- Web sites --- Applied psychology. --- Business administration --- Business enterprises --- Business management --- Corporate management --- Corporations --- Industrial administration --- Management, Industrial --- Rationalization of industry --- Scientific management --- Management --- Business --- Industrial organization --- Applied psychology --- Psychagogy --- Psychology, Practical --- Social psychotechnics --- Psychology --- Informatics --- Science --- Interfaces, User (Computer systems) --- Human-machine systems --- Human-computer interaction --- Cognitive ergonomics --- Ecological psychology --- Ecopsychology --- Ecotherapy --- Environmental quality --- Environmental social sciences --- Human factors science --- Psychoeology --- Psychotherapy --- Ecological Systems Theory --- Psychology, Applied --- Social psychology --- Communication, Primitive --- Mass communication --- Sociology --- Civilization and computers --- Civilization --- Psychological aspects
Choose an application
In today’s world, data must be sent around the world cheaply and securely, and that requires origin authentication, integrity protection, and confidentiality – the recipient of a message should be able to ascertain who sent the message, be sure that the message has not been changed en route, and be sure that the data arrives without having been read by anyone else. The second editor invented signcryption, an area of cryptography that studies systems that simultaneously provide origin authentication, integrity protection and confidentiality for data. Signcryption schemes combine the features of digital signature schemes with those of public-key encryption schemes and aim to provide security guarantees in a way that is provably correct and significantly less computationally expensive than the “encrypt-then-sign” method most commonly adopted in public-key cryptography. This is the first comprehensive book on signcryption, and brings together leading authors from the field of cryptography in a discussion of the different methods for building efficient and secure signcryption schemes, and the ways in which these schemes can be used in practical systems. Chapters deal with the theory of signcryption, methods for constructing practical signcryption schemes, and the advantages of using such schemes in practical situations. The book will be of benefit to cryptography researchers, graduate students and practitioners.
Computer security. --- Internet -- Security measures. --- Data encryption (Computer science) --- Cryptography --- Engineering & Applied Sciences --- Computer Science --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Security measures --- Protection of computer systems --- Protection --- Computer science. --- Data structures (Computer science). --- Computers. --- Computer Science. --- Data Structures, Cryptology and Information Theory. --- Information Systems and Communication Service. --- Data protection --- Security systems --- Hacking --- Computer security --- Data structures (Computer scienc. --- Information systems. --- Data Structures and Information Theory. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science)
Choose an application
This edited volume brings together experts from around the world to provide coverage and analysis of infrastructure's role in Internet governance, both now and in the future. Never in history have conflicts over Internet governance attracted such widespread attention. High-profile controversies include the disclosures about NSA surveillance by intelligence analyst Edward Snowden, controversy over a decision by the US government to relinquish its historic oversight of Internet names and numbers, and countless cybersecurity breaches involving unauthorized access to Internet users' personal data. Much of the Internet governance ecosystem—both technical architecture and coordinating institutions—is behind the scenes but increasingly carries significant public interest implications. An area once concealed in institutional and technological complexity is now rightly bracketed among other shared global issues—such as environmental protection and human rights—that have considerable global implications but are simply incongruous with national borders. This transformation into an era of global governance by Internet infrastructure presents a moment of opportunity for scholars to bring these politicized infrastructures to the foreground.
Internet governance --- Internet --- Internet industry --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Telecommunications --- Security measures --- International cooperation --- Internet governance. --- Internet industry. --- International cooperation. --- DARPA Internet --- Internet (Computer network) --- Governance, Internet --- Computer industry --- Wide area networks (Computer networks) --- World Wide Web --- Management --- Europe-Politics and government. --- Political sociology. --- Political science. --- European Politics. --- Political Sociology. --- Political Science. --- Sociology, general. --- Human Rights. --- Administration --- Civil government --- Commonwealth, The --- Government --- Political theory --- Political thought --- Politics --- Science, Political --- Social sciences --- State, The --- Mass political behavior --- Political behavior --- Political science --- Sociology --- Sociological aspects --- Europe—Politics and government. --- Sociology. --- Human rights. --- Basic rights --- Civil rights (International law) --- Human rights --- Rights, Human --- Rights of man --- Human security --- Transitional justice --- Truth commissions --- Social theory --- Law and legislation --- Internet - Security measures - International cooperation --- Europe --- Gay culture Europe --- Politics and government.
Choose an application
Despite the enormous potential of cloud computing, consumer uncertainty and concern regarding issues of privacy, security and trust remain a major barrier to the switch to cloud models. This comprehensive and authoritative text/reference provides an in-depth analysis of the latest advances in privacy, security and risk technologies within cloud environments. Containing contributions from leading experts in the field, the text presents both a thorough introduction to the core issues, and a practical selection of innovative solutions to common problems. A Glossary is also included at the end of the book. Topics and features: Considers the various forensic challenges for legal access to data in a cloud computing environment Discusses privacy impact assessments for the cloud, and examines the use of cloud audits to attenuate cloud security problems Reviews conceptual issues, basic requirements and practical suggestions for provisioning dynamically configured access control services in the cloud Proposes scoped invariants as a primitive for analyzing a cloud server for its integrity properties Investigates the applicability of existing controls for mitigating information security risks to cloud computing environments Describes risk management for cloud computing from an enterprise perspective This pioneering volume is essential reading for business professionals, students and researchers interested in the field of privacy and security protection for the cloud, and/or complex service provisioning. Newcomers to these areas will benefit from the solid overview of the field, whereas established experts will value the novel, cutting-edge research described in the work.
Cloud computing -- Security measures. --- Computer networks -- Security measures. --- Data protection. --- Internet -- Security measures. --- Cloud computing --- Engineering & Applied Sciences --- Computer Science --- Security measures --- Information technology --- Security measures. --- Computer science. --- Computer software --- Computer system failures. --- Architecture, Computer. --- Management information systems. --- Computer Science. --- Computer System Implementation. --- System Performance and Evaluation. --- Performance and Reliability. --- Management of Computing and Information Systems. --- Reusability. --- Electronic data processing --- Web services --- Distributed processing --- Computer network architectures. --- Computer system performance. --- Operating systems (Computers). --- Information Systems. --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Architectures, Computer network --- Network architectures, Computer --- Computer architecture --- Operating systems --- Computer software—Reusability. --- Informatics --- Science --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Computer failures --- Computer malfunctions --- Computer systems --- Failure of computer systems --- System failures (Engineering) --- Fault-tolerant computing --- Architecture, Computer --- Communication systems --- Failures
Choose an application
The Annual (ICGS) International Conference is an established platform in which se- rity, safety and sustainability issues can be examined from several global perspectives through dialogue between academics, students, government representatives, chief executives, security professionals, and research scientists from the United Kingdom and from around the globe. The 2009 two-day conference focused on the challenges of complexity, rapid pace of change and risk/opportunity issues associated with modern products, systems, s- cial events and infrastructures. The importance of adopting systematic and systemic approaches to the assurance of these systems was emphasized within a special stream focused on strategic frameworks, architectures and human factors. The conference provided an opportunity for systems scientists, assurance researchers, owners, ope- tors and maintainers of large, complex and advanced systems and infrastructures to update their knowledge with the state of best practice in these challenging domains while networking with the leading researchers and solution providers. ICGS3 2009 received paper submissions from more than 20 different countries around the world. Only 28 papers were selected and were presented as full papers. The program also included three keynote lectures by leading researchers, security professionals and government representatives. June 2009 Hamid Jahankhani Ali Hessami Feng Hsu.
Computer networks -- Access control -- Congresses. --- Computer networks -- Security measures -- Congresses. --- Computer security -- Congresses. --- Data protection -- Congresses. --- Internet -- Security measures -- Congresses. --- Computer networks --- Computer security --- Electronic data interchange --- Telecommunications --- Computer Science --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Security measures --- Data protection --- Internet --- Access control --- DARPA Internet --- Internet (Computer network) --- Computer science. --- Computer organization. --- Computer programming. --- Data structures (Computer science). --- Data encryption (Computer science). --- Pattern recognition. --- Computers and civilization. --- Computer Science. --- Programming Techniques. --- Computers and Society. --- Pattern Recognition. --- Data Structures, Cryptology and Information Theory. --- Computer Systems Organization and Communication Networks. --- Data Encryption. --- Wide area networks (Computer networks) --- World Wide Web --- Optical pattern recognition. --- Data structures (Computer scienc. --- Computer network architectures. --- Data Structures and Information Theory. --- Cryptology. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Architectures, Computer network --- Network architectures, Computer --- Computer architecture --- Optical data processing --- Pattern perception --- Perceptrons --- Visual discrimination --- Informatics --- Science --- Organization, Computer --- Electronic digital computers --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Design perception --- Pattern recognition --- Form perception --- Perception --- Figure-ground perception --- Civilization and computers --- Civilization --- Computers --- Electronic computer programming --- Programming (Electronic computers) --- Coding theory --- Programming --- Business data interchange, Electronic --- EDI (Electronic data interchange) --- Electronic business data interchange --- Business --- Data transmission systems --- Electronic commerce --- Data processing
Listing 1 - 10 of 24 | << page >> |
Sort by
|