Listing 1 - 2 of 2 |
Sort by
|
Choose an application
In the last decade, the proliferation of billions of new Internet-enabled devices and users has significantly expanded concerns about cybersecurity. But should we believe the prophets of cyber war or worry about online government surveillance ? Are such security concerns real, exaggerated or just poorly understood ? The authors provide here a cutting-edge introduction to the key concepts, controversies and policy debates in cybersecurity. Exploring the interactions of individuals, groups and states in cyberspace, and the integrated security risks to which these give rise, they examine cyberspace as a complex socio-technical-economic domain that fosters both great potential and peril. Structured around ten chapters, the book explores the complexities and challenges of cybersecurity using case studies - from the Morris Worm and Titan Rain to BlackEnergy and the Cyber Caliphate - to highlight the evolution of attacks that can exploit and damage individual systems and critical infrastructures.
Internet --- Computer security --- Internet governance --- Computer crimes --- Security, International --- Security measures --- Government policy --- Political aspects --- Prevention --- Internet governance. --- Security, International. --- Systèmes informatiques --- Gouvernance d'Internet --- Criminalité informatique --- Sécurité internationale --- Government policy. --- Political aspects. --- Prevention. --- Mesures de sûreté --- Politique publique. --- Aspect politique --- Prévention. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- CYBERSPACE--SECURITY MEASURES --- INTERNET--SECURITY MEASURES --- COMPUTER SECURITY --- INTERNET--POLITICAL ASPECTS --- COMPUTER CRIMES--PREVENTION --- Computerbeveiliging --- Internet : beveiliging --- Computercriminaliteit --- Computernetwerken --- 681.3 --- 004.7 --- Internet - Security measures - Government policy --- Computer security - Government policy --- Internet - Political aspects --- Computer crimes - Prevention --- Cybercriminalité --- Systèmes informatiques --- Cybercriminalité --- Sécurité internationale --- Mesures de sûreté --- Prévention.
Choose an application
A thorough multidisciplinary analysis of various perspectives on internet privacy was published as the first volume of a study, revealing the results of the achatech project "Internet Privacy - A Culture of Privacy and Trust on the Internet." The second publication from this project presents integrated, interdisciplinary options for improving privacy on the Internet utilising a normative, value-oriented approach. The ways in which privacy promotes and preconditions fundamental societal values and how privacy violations endanger the flourishing of said values are exemplified. The conditions which must be fulfilled in order to achieve a culture of privacy and trust on the internet are illuminated. This volume presents options for policy-makers, educators, businesses and technology experts how to facilitate solutions for more privacy on the Internet and identifies further research requirements in this area.
Data protection -- Government policy -- European Union countries. --- Internet -- Security measures -- Government policy -- European Union countries. --- Privacy, Right of -- European Union countries. --- Law, Politics & Government --- Human Rights --- Privacy, Right of. --- Internet --- Law and legislation --- Law and legislation. --- Cyberspace --- Invasion of privacy --- Privacy, Right of --- Right of privacy --- Engineering. --- Information technology. --- Business --- Computer graphics. --- Mass media. --- Law. --- Electrical engineering. --- Social sciences. --- Communications Engineering, Networks. --- Computer Imaging, Vision, Pattern Recognition and Graphics. --- Social Sciences, general. --- IT in Business. --- Media Law. --- Data processing. --- Civil rights --- Libel and slander --- Personality (Law) --- Press law --- Computer crimes --- Confidential communications --- Data protection --- Right to be forgotten --- Secrecy --- Telecommunication. --- Computer vision. --- Mass media --- IT Law, Media Law, Intellectual Property. --- IT (Information technology) --- Technology --- Telematics --- Information superhighway --- Knowledge management --- Behavioral sciences --- Human sciences --- Sciences, Social --- Social science --- Social studies --- Civilization --- Machine vision --- Vision, Computer --- Artificial intelligence --- Image processing --- Pattern recognition systems --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting --- Optical data processing. --- Business—Data processing. --- Optical computing --- Visual data processing --- Bionics --- Electronic data processing --- Integrated optics --- Photonics --- Computers --- Electric engineering --- Engineering --- Acts, Legislative --- Enactments, Legislative --- Laws (Statutes) --- Legislative acts --- Legislative enactments --- Jurisprudence --- Legislation --- Media, Mass --- Media, The --- Optical equipment
Listing 1 - 2 of 2 |
Sort by
|