Listing 1 - 10 of 36 | << page >> |
Sort by
|
Choose an application
"A trade book on the economics of the internet and the policies that have shaped our view of online activity"--
Choose an application
Choose an application
Computer security --- Computerbeveiliging --- Computers--Beveiliging --- Informatique--Sécurité --- Sécurité informatique --- Computer networks --- Internet --- Security measures --- Computer networks - Security measures --- Internet - Security measures
Choose an application
Choose an application
Secret service --- Internet --- Computer crimes --- Service secret --- Criminalité informatique --- Délits par ordinateur --- Business intelligence --- Computer security --- Information superhighway --- Intelligence service --- World Wide Web --- Security measures --- Information superhighway - Security measures --- Internet - Security measures --- World Wide Web - Security measures
Choose an application
The Internet of Things (IoT) is the notion that nearly everything we use, from gym shorts to streetlights, will soon be connected to the Internet; the Internet of Everything (IoE) encompasses not just objects, but the social connections, data, and processes that the IoT makes possible. As more devices and systems become intertwined, the growing scale of the threat from hackers can easily get lost in the excitement of lower costs and smarter tech. The goal of this book is to demystify our increasingly 'smart' world, and offer practical guidance for consumers, managers, and policymakers seeking to navigate this new frontier.
Internet of things. --- Internet --- Information society. --- Sociology --- Information superhighway --- IoT (Computer networks) --- Things, Internet of --- Computer networks --- Embedded Internet devices --- Machine-to-machine communications --- Social aspects. --- Security measures. --- Internet of things --- Internet - Social aspects --- Internet - Security measures --- Information society
Choose an application
In this urgent wake-up call, Jonathan Zittrain shows how the Internet is on a path towards ruin - a victim of its own success - and how we have a chance to avoid this rapidly approaching future. The Internet is so ubiquitous that we take it for granted. But it is surprisingly delicate, and under threat. Just what is at stake? Zittrain gives a fascinating history of the rise of the PC and Internet and reveals how their 'generativity', their capacity to welcome unfiltered contributions from anyone, has driven them. He argues that generativity is the greatest benefit to us as users of the Internet: we are free to connect with other people and to reap the rewards of unanticipated opportunities. Ever-increasing security threats, however - in the form of viruses, spyware and invasions of privacy - are now driving us to a new form of 'tethered' appliances, unable to be modified by anyone except their vendors, such as iPods, iPhones, Xboxes and TIVos, which are set to eclipse the PC. Tethered appliances have unusual and worrisome features. They have already been used in remarkable but little-known ways: car GPS systems have been reconfigured to eavesdrop on their owners, and digital video recorders have been ordered to self-destruct in viewers' homes. New Web 2.0 platforms like Google mash-ups and Facebook are rightly celebrated - but their applications, even those written by outsiders, can similarly be monitored and controlled from a central source. Jonathan Zittrain argues that the generative Internet must be preserved for everybody. And he shows us how, through new technologies and behaviour, we can do it.
Computer architecture. Operating systems --- Internet --- Social aspects --- Security measures --- #SBIB:309H1710 --- #SBIB:309H1713 --- DARPA Internet --- Internet (Computer network) --- Wide area networks (Computer networks) --- World Wide Web --- Telematica, algemene werken --- Mediatechnologie: nieuwe toepassingen (abonnee-televisie, electronic mail, desk top publishing, virtuele realiteit...) --- Internet - Social aspects --- Internet - Security measures
Choose an application
Computer networks --- Telecommunication policy --- Internet --- Security measures --- Telecommunications --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Security measures. --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- E-books --- Computer networks - Security measures --- Telecommunication policy - United States --- Internet - Security measures
Choose an application
IPSec (Computer network protocol) --- Internet --- Intranets (Computer networks) --- Extranets (Computer networks) --- Security measures --- 681.3*C20 --- Computerwetenschap--?*C20 --- IP Securing Protocol (Computer network protocol) --- Computer network protocols --- Computer networks --- Internal internets (Computer networks) --- Business enterprises --- Wide area networks (Computer networks) --- Virtual private networks (Computer networks) --- VPNs (Computer networks) --- 6813*C20 --- Internet - Security measures --- Intranets (Computer networks) - Security measures --- Extranets (Computer networks) - Security measures
Choose an application
Le Darknet suscite depuis plusieurs années fascination et inquiétude. Internet caché, web profond, darknet, deep web, ces termes souvent confondus désignent des réalités pourtant bien différentes. Depuis l'apparition du hacking et le développement du téléchargement illégal jusqu’à la création des véritables réseaux parallèles que constituent Tor, I2P ou Freenet, les darknets sont un phénomène informatique en passe de devenir un phénomène de société. Alors que Facebook ou Twitter ont déjà fait leur entrée sur Tor, cryptoanarchistes, activistes et lanceurs d'alerte côtoient encore pirates informatiques et vendeurs de stupéfiants sur des réseaux cachés qui s'ouvrent lentement au grand public. Géopolitique du Darknet retrace l'historique de la création et du développement de ces réseaux parallèles et analyse les implications géopolitiques, économiques et socioculturelles du phénomène en termes de cybersécurité, de préservation des libertés individuelles et de gouvernance globale d'Internet.
Réseaux anonymes (informatique) --- Médias numériques. --- Réseaux d'ordinateurs. --- Technologies de l'information et de la communication. --- Invisible Web --- Cyberspace --- Internet --- Computer security --- Social aspects --- Political aspects --- Security measures --- Technologies de l'information et de la communication --- Cyberspace - Social aspects --- Cyberspace - Political aspects --- Internet - Security measures
Listing 1 - 10 of 36 | << page >> |
Sort by
|