Listing 1 - 10 of 38 | << page >> |
Sort by
|
Choose an application
The book explores the concept of digital sovereignty in the context of a postliberal era, addressing issues such as private governance and the influence of liberal practices on internet governance. It examines the geopolitical dimensions of digital technologies and the challenges posed by digital sovereignty to traditional liberalism. The author, Johannes Thumfart, draws on a decade of research and collaboration with various scholars and institutions, providing a comprehensive analysis of digital sovereignty and its implications on global security, ethics, and governance. The book targets scholars, policymakers, and individuals interested in digital governance and global Internet policies.
Choose an application
Choose an application
Choose an application
The grandest accomplishments of engineering took place in the twentieth century. The widespread development and distribution of electricity and clean water, automobiles and airplanes, radio and television, spacecraft and lasers, antibiotics and medical imaging, computers and the Internet are just some of the highlights from a century in which engineering revolutionized and improved virtually every aspect of human life. In this book, the authors provide a glimpse of the new trends of technologies pertaining to control, management, computational intelligence and network systems.
Computer networks --- Access control. --- Data sovereignty --- Network management
Choose an application
Computer networks --- Security measures. --- Access control. --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Data sovereignty
Choose an application
Computer networks --- Security measures. --- Access control. --- Data sovereignty --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security
Choose an application
"Trafficking Data argues that the movement of human data across borders for political and financial gain is disenfranchising consumers, eroding national autonomy, and destabilizing sovereignty. Focusing on the United States and China, it traces how US government leadership failures, Silicon Valley's disruption fetish, and Wall Street's addiction to growth have yielded an unprecedented opportunity for Chinese firms to gather data in the United States and quietly send it back to China, and by extension, the Chinese government. Such "data trafficking," as the book names this insidious phenomenon, is enabled by the competing governance models of the world's two largest economies: mass government data aggregation in China and impenetrable corporate data management policies in the United States. China is stepping up its data trafficking efforts through national regulations, soft power persuasion, and tech investment, extending the scope of state control over domestic and international data and tech infrastructure, and thereby expanding its global influence. The United States, by contrast, is retreating from participation in foreign alliances, international organizations, and the systemic regulation of the tech industry-practices with the potential to counter data trafficking. Confronting data trafficking as the defining international competition of the twenty-first century, this book ultimately advocates for an alternative future of data stabilization. To stem data trafficking and stabilize data flows, it shows, policymakers can synthesize tools from across the private sector, public sector, multi-national organizations, and consumers to protect users, secure national sovereignty, and establish valuable international standards"--
Data mining --- Data sovereignty --- Data privacy --- Business intelligence --- Personal information management --- Disclosure of information --- Data privacy. --- Political aspects
Choose an application
The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The APT bypasses most of an organization's current security devices, and is typically carried out by an organized group, such as a foreign nation state or rogue group with both the capability and the intent to persistently and effectively target a specific entity and wreak havoc. Most organizations do not understand how to deal with it and what is needed to protect their network from compromise. In Advanced Persistent Threat: Understanding the Danger and How to Protect your Organization Eric
Computer networks --- Internet --- Security measures. --- Access control. --- Information Technology --- General and Others --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Data sovereignty
Choose an application
Traditionally, network security (firewalls to block unauthorized users, Intrusion Prevention Systems (IPS) to keep attackers out, Web filters to avoid misuse of Internet browsing, and antivirus software to block malicious programs) required separate boxes with increased cost and complexity. Unified Threat Management (UTM) makes network security less complex, cheaper, and more effective by consolidating all these components. This book explains the advantages of using UTM and how it works, presents best practices on deployment, and is a hands-on, step-by-step guide to deploying Fortinet's For
Computer networks --- Security measures. --- Access control. --- Information Technology --- General and Others --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Data sovereignty
Choose an application
Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need Seven Deadliest Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of ServiceWar DialingPenetration ""Test
Computer networks --- Security measures. --- Access control. --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Information Technology --- General and Others --- Data sovereignty
Listing 1 - 10 of 38 | << page >> |
Sort by
|