Listing 1 - 10 of 24 << page
of 3
>>
Sort by

Book
Warez : the infrastructure and aesthetics of piracy
Author:
Year: 2021 Publisher: Brooklyn, NY punctum books

Loading...
Export citation

Choose an application

Bookmark

Abstract

When most people think of piracy, they think of Bittorrent and The Pirate Bay. These public manifestations of piracy, though, conceal an elite worldwide, underground, organized network of pirate groups who specialize in obtaining media – music, videos, games, and software – before their official sale date and then racing against one another to release the material for free.Warez: The Infrastructure and Aesthetics of Piracy is the first scholarly research book about this underground subculture, which began life in the pre-internet era Bulletin Board Systems and moved to internet File Transfer Protocol servers (“topsites”) in the mid- to late-1990s. The “Scene,” as it is known, is highly illegal in almost every aspect of its operations. The term “Warez” itself refers to pirated media, a derivative of “software.” Taking a deep dive in the documentary evidence produced by the Scene itself, Warez describes the operations and infrastructures an underground culture with its own norms and rules of participation, its own forms of sociality, and its own artistic forms. Even though forms of digital piracy are often framed within ideological terms of equal access to knowledge and culture, Eve uncovers in the Warez Scene a culture of competitive ranking and one-upmanship that is at odds with the often communalist interpretations of piracy.Broad in scope and novel in its approach, Warez is indispensible reading for anyone interested in recent developments in digital culture, access to knowledge and culture, and the infrastructures that support our digital age.


Book
IT-Sicherheit
Author:
ISBN: 348673587X 9783486735871 9783486859164 3486859161 9783110399103 3110399105 9783486721386 Year: 2013 Publisher: München [Germany]

Loading...
Export citation

Choose an application

Bookmark

Abstract

Claudia Eckert beschreibt hier systematisch, welche Aspekte bei der Planung sicherer informationstechnischer Systeme eine Rolle spielen und welche verschiedenen Ansätze verfolgt werden können. Sie stellt die Verfahren und Protokolle, die zur Umsetzung der Sicherheitsanforderungen benötigt werden, detailliert vor und erläutert sie anhand von Fallbeispielen. Ein Muss für jeden, der sich mit der hochaktuellen Problematik "IT-Sicherheit" beschäftigt.

The future of the Internet and how to stop it
Author:
ISBN: 9780300124873 0300124872 9780300144734 0300144733 9780300145342 0300145349 9780141951812 0141951818 1282089528 9781282089525 0300144776 9780300144772 9780300151244 0300151241 9781846140143 1846140145 Year: 2008 Publisher: New Haven [Conn.] Yale University Press

Loading...
Export citation

Choose an application

Bookmark

Abstract

In this urgent wake-up call, Jonathan Zittrain shows how the Internet is on a path towards ruin - a victim of its own success - and how we have a chance to avoid this rapidly approaching future.&#13;&#13;The Internet is so ubiquitous that we take it for granted. But it is surprisingly delicate, and under threat. Just what is at stake? Zittrain gives a fascinating history of the rise of the PC and Internet and reveals how their 'generativity', their capacity to welcome unfiltered contributions from anyone, has driven them. He argues that generativity is the greatest benefit to us as users of the Internet: we are free to connect with other people and to reap the rewards of unanticipated opportunities. Ever-increasing security threats, however - in the form of viruses, spyware and invasions of privacy - are now driving us to a new form of 'tethered' appliances, unable to be modified by anyone except their vendors, such as iPods, iPhones, Xboxes and TIVos, which are set to eclipse the PC.&#13;&#13;Tethered appliances have unusual and worrisome features. They have already been used in remarkable but little-known ways: car GPS systems have been reconfigured to eavesdrop on their owners, and digital video recorders have been ordered to self-destruct in viewers' homes. New Web 2.0 platforms like Google mash-ups and Facebook are rightly celebrated - but their applications, even those written by outsiders, can similarly be monitored and controlled from a central source. &#13;&#13;Jonathan Zittrain argues that the generative Internet must be preserved for everybody. And he shows us how, through new technologies and behaviour, we can do it.

Trust in cyberspace
Authors: ---
ISBN: 0309065585 9786610185887 0309519705 1280185880 0585022674 9780585022673 9781280185885 6610185883 9780309519700 9780309065580 0309173981 9780309173988 Year: 1999 Publisher: Washington, D.C. National Academy Press


Book
Windows forensic analysis toolkit
Authors: ---
ISBN: 1283448009 9786613448002 1597497282 1597497274 9781597497282 9781597497275 Year: 2012 Publisher: Amsterdam Elsevier/Syngress

Loading...
Export citation

Choose an application

Bookmark

Abstract

Windows is the largest operating system on desktops and servers worldwide, which means more intrusions, malware infections, and cybercrime happen on these systems. Author Harlan Carvey has brought his bestselling book up-to-date by covering the newest version of Windows, Windows 7. Windows Forensic Analysis Toolkit, 3e, covers live and postmortem response collection and analysis methodologies, addressing material that is applicable to law enforcement, the federal government, students, and consultants. The book is also accessible to system administrators, who are often the frontline w

Keywords

Computer crimes - Investigation - United States - Methodology. --- Computer crimes -- Investigation -- United States -- Methodology. --- Computer networks - Security measures. --- Computer networks -- Security measures. --- Computer security. --- Internet - Security measures. --- Internet -- Security measures. --- Microsoft Windows (Computer file) -- Security measures. --- Computer crimes --- Computer networks --- Internet --- Computer security --- Social Welfare & Social Work --- Social Sciences --- Criminology, Penology & Juvenile Delinquency --- Methodology --- Investigation --- Security measures --- Methodology. --- Security measures. --- Microsoft Windows (Computer file) --- Information Technology --- General and Others --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computer network security --- Network security, Computer --- Security of computer networks --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Crime --- Privacy, Right of --- Protection --- Windows (Computer file) --- Chicago (Computer file) --- Microsoft Windows 95 --- Windows 95 --- Microsoft Windows CE --- Windows CE --- Pegasus (Computer file) --- Windows for workgroups --- Microsoft Windows for workgroups --- Windows 98 --- Microsoft Windows 98 --- Windows 2000 professional --- Windows 2000 --- Microsoft Windows 2000 --- Microsoft Windows Me millennium edition --- Windows Me --- Microsoft Windows XP (Computer file) --- Windows XP --- Microsoft Windows Vista --- Windows Vista --- Microsoft Windows 7 --- Windows 7 --- Windows 8 --- Windows 10


Book
Privacy online : perspectives on privacy and self-disclosure in the social web
Authors: ---
ISBN: 3642443389 3642215203 9786613801012 3642215211 1282107666 Year: 2011 Publisher: Berlin ; Heidelberg : Springer-Verlag,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Communications and personal information that are posted online are usually accessible to a vast number of people. Yet when personal data exist online, they may be searched, reproduced and mined by advertisers, merchants, service providers or even stalkers. Many users know what may happen to their information, while at the same time they act as though their data are private or intimate. They expect their privacy will not be infringed while they willingly share personal information with the world via social network sites, blogs, and in online communities. The chapters collected by Trepte and Reinecke address questions arising from this disparity that has often been referred to as the privacy paradox. Works by renowned researchers from various disciplines including psychology, communication, sociology, and information science, offer new theoretical models on the functioning of online intimacy and public accessibility, and propose novel ideas on the how and why of online privacy. The contributing authors offer intriguing solutions for some of the most pressing issues and problems in the field of online privacy. They investigate how users abandon privacy to enhance social capital and to generate different kinds of benefits. They argue that trust and authenticity characterize the uses of social network sites. They explore how privacy needs affect users’ virtual identities. Ethical issues of privacy online are discussed as well as its gratifications and users’ concerns. The contributors of this volume focus on the privacy needs and behaviors of a variety of different groups of social media users such as young adults, older users, and genders. They also examine privacy in the context of particular online services such as social network sites, mobile internet access, online journalism, blogs, and micro-blogs. In sum, this book offers researchers and students working on issues related to internet communication not only a thorough and up-to-date treatment of online privacy and the social web. It also presents a glimpse of the future by exploring emergent issues concerning new technological applications and by suggesting theory-based research agendas that can guide inquiry beyond the current forms of social technologies. .

Keywords

Computer networks -- Security measures. --- Electronic commerce -- Security measures. --- Internet -- Security measures. --- Online social networks --- Internet --- Sociology & Social History --- Engineering & Applied Sciences --- Social Sciences --- Computer Science --- Social Change --- Security measures --- Security measures. --- Electronic social networks --- Social networking Web sites --- Computer science. --- Industrial management. --- User interfaces (Computer systems). --- Computers and civilization. --- Communication. --- Community psychology. --- Environmental psychology. --- Computer Science. --- Computers and Society. --- Communication Studies. --- Community and Environmental Psychology. --- Media Management. --- User Interfaces and Human Computer Interaction. --- Social media --- Social networks --- Sociotechnical systems --- Web sites --- Applied psychology. --- Business administration --- Business enterprises --- Business management --- Corporate management --- Corporations --- Industrial administration --- Management, Industrial --- Rationalization of industry --- Scientific management --- Management --- Business --- Industrial organization --- Applied psychology --- Psychagogy --- Psychology, Practical --- Social psychotechnics --- Psychology --- Informatics --- Science --- Interfaces, User (Computer systems) --- Human-machine systems --- Human-computer interaction --- Cognitive ergonomics --- Ecological psychology --- Ecopsychology --- Ecotherapy --- Environmental quality --- Environmental social sciences --- Human factors science --- Psychoeology --- Psychotherapy --- Ecological Systems Theory --- Psychology, Applied --- Social psychology --- Communication, Primitive --- Mass communication --- Sociology --- Civilization and computers --- Civilization --- Psychological aspects


Book
Practical signcryption
Authors: ---
ISBN: 3540894098 9786612981074 354089411X 1282981072 Year: 2010 Publisher: Heidelberg ; New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

In today’s world, data must be sent around the world cheaply and securely, and that requires origin authentication, integrity protection, and confidentiality – the recipient of a message should be able to ascertain who sent the message, be sure that the message has not been changed en route, and be sure that the data arrives without having been read by anyone else. The second editor invented signcryption, an area of cryptography that studies systems that simultaneously provide origin authentication, integrity protection and confidentiality for data. Signcryption schemes combine the features of digital signature schemes with those of public-key encryption schemes and aim to provide security guarantees in a way that is provably correct and significantly less computationally expensive than the “encrypt-then-sign” method most commonly adopted in public-key cryptography. This is the first comprehensive book on signcryption, and brings together leading authors from the field of cryptography in a discussion of the different methods for building efficient and secure signcryption schemes, and the ways in which these schemes can be used in practical systems. Chapters deal with the theory of signcryption, methods for constructing practical signcryption schemes, and the advantages of using such schemes in practical situations. The book will be of benefit to cryptography researchers, graduate students and practitioners.


Book
The Turn to Infrastructure in Internet Governance
Authors: --- --- ---
ISBN: 1137533269 1349578460 1137483598 9781137533265 Year: 2016 Publisher: New York : Palgrave Macmillan US : Imprint: Palgrave Macmillan,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This edited volume brings together experts from around the world to provide coverage and analysis of infrastructure's role in Internet governance, both now and in the future. Never in history have conflicts over Internet governance attracted such widespread attention. High-profile controversies include the disclosures about NSA surveillance by intelligence analyst Edward Snowden, controversy over a decision by the US government to relinquish its historic oversight of Internet names and numbers, and countless cybersecurity breaches involving unauthorized access to Internet users' personal data. Much of the Internet governance ecosystem—both technical architecture and coordinating institutions—is behind the scenes but increasingly carries significant public interest implications. An area once concealed in institutional and technological complexity is now rightly bracketed among other shared global issues—such as environmental protection and human rights—that have considerable global implications but are simply incongruous with national borders. This transformation into an era of global governance by Internet infrastructure presents a moment of opportunity for scholars to bring these politicized infrastructures to the foreground.


Book
Privacy and security for cloud computing
Authors: ---
ISBN: 1447141881 1447157931 9786613934505 144714189X 128362205X Year: 2013 Publisher: New York : Springer-Verlag,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Despite the enormous potential of cloud computing, consumer uncertainty and concern regarding issues of privacy, security and trust remain a major barrier to the switch to cloud models. This comprehensive and authoritative text/reference provides an in-depth analysis of the latest advances in privacy, security and risk technologies within cloud environments. Containing contributions from leading experts in the field, the text presents both a thorough introduction to the core issues, and a practical selection of innovative solutions to common problems. A Glossary is also included at the end of the book. Topics and features: Considers the various forensic challenges for legal access to data in a cloud computing environment Discusses privacy impact assessments for the cloud, and examines the use of cloud audits to attenuate cloud security problems Reviews conceptual issues, basic requirements and practical suggestions for provisioning dynamically configured access control services in the cloud Proposes scoped invariants as a primitive for analyzing a cloud server for its integrity properties Investigates the applicability of existing controls for mitigating information security risks to cloud computing environments Describes risk management for cloud computing from an enterprise perspective This pioneering volume is essential reading for business professionals, students and researchers interested in the field of privacy and security protection for the cloud, and/or complex service provisioning. Newcomers to these areas will benefit from the solid overview of the field, whereas established experts will value the novel, cutting-edge research described in the work.

Keywords

Cloud computing -- Security measures. --- Computer networks -- Security measures. --- Data protection. --- Internet -- Security measures. --- Cloud computing --- Engineering & Applied Sciences --- Computer Science --- Security measures --- Information technology --- Security measures. --- Computer science. --- Computer software --- Computer system failures. --- Architecture, Computer. --- Management information systems. --- Computer Science. --- Computer System Implementation. --- System Performance and Evaluation. --- Performance and Reliability. --- Management of Computing and Information Systems. --- Reusability. --- Electronic data processing --- Web services --- Distributed processing --- Computer network architectures. --- Computer system performance. --- Operating systems (Computers). --- Information Systems. --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Architectures, Computer network --- Network architectures, Computer --- Computer architecture --- Operating systems --- Computer software—Reusability. --- Informatics --- Science --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Computer failures --- Computer malfunctions --- Computer systems --- Failure of computer systems --- System failures (Engineering) --- Fault-tolerant computing --- Architecture, Computer --- Communication systems --- Failures


Book
Global security, safety, and sustainability : 5th International Conference, ICGS3 2009, London, UK, September 1-2, 2009 proceedings
Authors: --- --- --- ---
ISBN: 3642040616 9786612331893 1282331892 3642040624 Year: 2009 Publisher: Berlin, Germany ; New York, New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The Annual (ICGS) International Conference is an established platform in which se- rity, safety and sustainability issues can be examined from several global perspectives through dialogue between academics, students, government representatives, chief executives, security professionals, and research scientists from the United Kingdom and from around the globe. The 2009 two-day conference focused on the challenges of complexity, rapid pace of change and risk/opportunity issues associated with modern products, systems, s- cial events and infrastructures. The importance of adopting systematic and systemic approaches to the assurance of these systems was emphasized within a special stream focused on strategic frameworks, architectures and human factors. The conference provided an opportunity for systems scientists, assurance researchers, owners, ope- tors and maintainers of large, complex and advanced systems and infrastructures to update their knowledge with the state of best practice in these challenging domains while networking with the leading researchers and solution providers. ICGS3 2009 received paper submissions from more than 20 different countries around the world. Only 28 papers were selected and were presented as full papers. The program also included three keynote lectures by leading researchers, security professionals and government representatives. June 2009 Hamid Jahankhani Ali Hessami Feng Hsu.

Keywords

Computer networks -- Access control -- Congresses. --- Computer networks -- Security measures -- Congresses. --- Computer security -- Congresses. --- Data protection -- Congresses. --- Internet -- Security measures -- Congresses. --- Computer networks --- Computer security --- Electronic data interchange --- Telecommunications --- Computer Science --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Security measures --- Data protection --- Internet --- Access control --- DARPA Internet --- Internet (Computer network) --- Computer science. --- Computer organization. --- Computer programming. --- Data structures (Computer science). --- Data encryption (Computer science). --- Pattern recognition. --- Computers and civilization. --- Computer Science. --- Programming Techniques. --- Computers and Society. --- Pattern Recognition. --- Data Structures, Cryptology and Information Theory. --- Computer Systems Organization and Communication Networks. --- Data Encryption. --- Wide area networks (Computer networks) --- World Wide Web --- Optical pattern recognition. --- Data structures (Computer scienc. --- Computer network architectures. --- Data Structures and Information Theory. --- Cryptology. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Architectures, Computer network --- Network architectures, Computer --- Computer architecture --- Optical data processing --- Pattern perception --- Perceptrons --- Visual discrimination --- Informatics --- Science --- Organization, Computer --- Electronic digital computers --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Design perception --- Pattern recognition --- Form perception --- Perception --- Figure-ground perception --- Civilization and computers --- Civilization --- Computers --- Electronic computer programming --- Programming (Electronic computers) --- Coding theory --- Programming --- Business data interchange, Electronic --- EDI (Electronic data interchange) --- Electronic business data interchange --- Business --- Data transmission systems --- Electronic commerce --- Data processing

Listing 1 - 10 of 24 << page
of 3
>>
Sort by