Browse Results

Showing 17,326 through 17,350 of 54,258 results

Cyber Attack Information System: Erfahrungen und Erkenntnisse aus der IKT-Sicherheitsforschung (Xpert.press)

by Florian Skopik Helmut Leopold Thomas Bleier

In den letzten Jahren hat sich das Internet schnell zu einem massiven wirtschaftlichen Betätigungsfeld entwickelt, leider auch für illegale Unternehmungen. Das Ausnutzen von Schwachstellen in IKT-Systemen ist inzwischen ein profitables Geschäftsmodell. Das staatlich geförderte Forschungsprojekt CAIS beschäftigte sich deshalb mit der Implementierung eines Cyber Attack Information Systems auf nationaler Ebene mit dem Ziel, die Widerstandsfähigkeit der heutigen vernetzten Systeme zu stärken und ihre Verfügbarkeit und Vertrauenswürdigkeit zu erhöhen. Hauptziele dieses Projektes waren die Identifizierung der künftigen Cyber-Risiken und -Bedrohungen, die Untersuchung neuartiger Techniken zur Anomalieerkennung, die Entwicklung modularer Infrastrukturmodelle und agentenbasierter Simulationen zur Risiko- und Bedrohungsanalyse, und schließlich die Analyse und mögliche Umsetzung eines nationalen Cyber Attack Information Systems.

Cyber Denial, Deception and Counter Deception: A Framework for Supporting Active Cyber Defense (Advances in Information Security #64)

by Kristin E. Heckman Frank J. Stech Roshan K. Thomas Ben Schmoker Alexander W. Tsow

This book presents the first reference exposition of the Cyber-Deception Chain: a flexible planning and execution framework for creating tactical, operational, or strategic deceptions. This methodology bridges the gap between the current uncoordinated patchwork of tactical denial and deception (D&D) techniques and their orchestration in service of an organization's mission. Concepts for cyber- D&D planning operations and management are detailed within the larger organizational, business, and cyber defense context. It examines the necessity of a comprehensive, active cyber denial scheme. The authors explain the organizational implications of integrating D&D with a legacy cyber strategy, and discuss trade-offs, maturity models, and lifecycle management. Chapters present the primary challenges in using deception as part of a security strategy, and guides users through the steps to overcome common obstacles. Both revealing and concealing fact and fiction have a critical role in securing private information. Detailed case studies are included. Cyber Denial, Deception and Counter Deception is designed as a reference for professionals, researchers and government employees working in cybersecurity. Advanced-level students in computer science focused on security will also find this book useful as a reference or secondary text book.

Cyber-Humans: Our Future with Machines

by Woodrow Barfield

It is predicted that robots will surpass human intelligence within the next fifty years. The ever increasing speed of advances in technology and neuroscience, coupled with the creation of super computers and enhanced body parts and artificial limbs, is paving the way for a merger of both human and machine. Devices which were once worn on the body are now being implanted into the body, and as a result, a class of true cyborgs, who are displaying a range of skills beyond those of normal humans-beings, are being created. There are cyborgs which can see colour by hearing sound, others have the ability to detect magnetic fields, some are equipped with telephoto lenses to aid their vision or implanted computers to monitor their heart, and some use thought to communicate with a computer or to manipulate a robotic arm. This is not science-fiction, these are developments that are really happening now, and will continue to develop in the future. However, a range of legal and policy questions has arisen alongside this rise of artificial intelligence. Cyber-Humans provides a deep and unique perspective on the technological future of humanity, and describes how law and policy will be particularly relevant in creating a fair and equal society and protecting the liberties of different life forms which will emerge in the 21st century. Dr Woodrow (Woody) Barfield previously headed up the Sensory Engineering Laboratory, holding the position of Industrial and Systems Engineering Professor at the University of Washington. His research revolves around the design and use of wearable computers and augmented reality systems and holds both JD and LLM degrees in intellectual property law and policy. He has published over 350 articles and major presentations in the areas of computer science, engineering and law. He currently lives in Chapel Hill, NC, USA.

Cyber Operations

by Mike O'Leary

Cyber Operations walks you through all the processes to set up, defend, and attack computer networks. This book focuses on networks and real attacks, offers extensive coverage of offensive and defensive techniques, and is supported by a rich collection of exercises and resources.You'll learn how to configure your network from the ground up, starting by setting up your virtual test environment with basics like DNS and active directory, through common network services, and ending with complex web applications involving web servers and backend databases.Key defensive techniques are integrated throughout the exposition. You will develop situational awareness of your network and will build a complete defensive infrastructure—including log servers, network firewalls, web application firewalls, and intrusion detection systems.Of course, you cannot truly understand how to defend a network if you do not know how to attack it, so you will attack your test systems in a variety of ways beginning with elementary attacks against browsers and culminating with a case study of the compromise of a defended e-commerce site.The author, who has coached his university’s cyber defense team three times to the finals of the National Collegiate Cyber Defense Competition, provides a practical, hands-on approach to cyber security.

Cyber Physical Systems. Design, Modeling, and Evaluation: 5th International Workshop, CyPhy 2015, Amsterdam, The Netherlands, October 8, 2015, Proceedings (Lecture Notes in Computer Science #9361)

by Mohammad Reza Mousavi Christian Berger

This book constitutes the proceedings of the 5th International Workshop on Design, Modeling, and Evaluation of Cyber Physical Systems, CyPhy 2015, held as part of ESWeek 2015, in Amsterdam, The Netherlands, in October 2015. The 10 papers presented in this volume were carefully reviewed and selected from 13 submissions. They broadly interpret, from a diverse set of disciplines, the modeling, simulation, and evaluation of cyber-physical systems.

Cyber Physical Systems. Design, Modeling, and Evaluation: 6th International Workshop, CyPhy 2016, Pittsburgh, PA, USA, October 6, 2016, Revised Selected Papers (Lecture Notes in Computer Science #10107)

by Mohammad Reza Mousavi Christian Berger Rafael Wisniewski

This book constitutes the proceedings of the 5th International Workshop on Design, Modeling, and Evaluation of Cyber Physical Systems, CyPhy 2015, held as part of ESWeek 2015, in Amsterdam, The Netherlands, in October 2015. The 10 papers presented in this volume were carefully reviewed and selected from 13 submissions. They broadly interpret, from a diverse set of disciplines, the modeling, simulation, and evaluation of cyber-physical systems.

Cyber Security: Analytics, Technology and Automation (Intelligent Systems, Control and Automation: Science and Engineering #78)

by Pekka Neittaanmäki Martti Lehto

The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomenon and how the implementation of the cyber security strategy is carried out. The book gives a profound idea of the most spoken phenomenon of this time. The book is suitable for a wide-ranging audience from graduate to professionals/practitioners and researchers. Relevant disciplines for the book are Telecommunications / Network security, Applied mathematics / Data analysis, Mobile systems / Security, Engineering / Security of critical infrastructure and Military science / Security.

Cyber Security: Ein Einblick für Wirtschaftswissenschaftler (essentials)

by Sebastian Klipper

In diesem Buch erfahren Wirtschaftswissenschaftler, wie Firmen nach Hackerangriffen vom Markt verschwinden und wie Hacker Aktienkurse beeinflussen können. Lernen Sie, wie Homo oeconomicus beim Thema Cyber Security zum Homo carens securitate wird und wie es gelingt, mithilfe der wirtschaftswissenschaftlichen ,,Brille" (oder: Perspektive/Sicht) ganz neue Lösungsansätze und Sichtweisen im Kampf gegen Wirtschaftsspione, Hacker und Cyber-Kriminelle zu erkennen. Cyber Security bzw. IT-Sicherheit ist ein Zukunftsthema, an dem kaum jemand vorbeikommt. Dieses Buch beschreibt anhand aktueller Vorfälle - ohne technisches Grundwissen vorauszusetzen -, was Ökonomen wissen müssen, um sich am Gespräch über eines der wichtigsten Zukunftsthemen unserer Zeit beteiligen zu können.

Cyber Security: An Introduction for Non-Technical Managers

by Jeremy Swinfen Green

Cyber security involves protecting organisations from cyber risks, the threats to organisations caused by digital technology. These risks can cause direct damage to revenues and profits as well as indirect damage through reduced efficiency, lower employee morale, and reputational damage. Cyber security is often thought to be the domain of specialist IT professionals however, cyber risks are found across and within organisations. Unfortunately, many managers outside IT feel they are ill equipped to deal with cyber risks and the use of jargon makes the subject especially hard to understand. For this reason cyber threats are worse than they really need to be. The reality is that the threat from cyber risks is constantly growing, thus non-technical managers need to understand and manage it. As well as offering practical advice, the author guides readers through the processes that will enable them to manage and mitigate such threats and protect their organisations.

Cyber Security and Privacy: Third Cyber Security and Privacy EU Forum, CSP Forum 2014, Athens, Greece, May 21-22, 2014, Revised Selected Papers (Communications in Computer and Information Science #470)

by Massimo Felici Frances Cleary

This book constitutes the thoroughly refereed selected papers on the 4th Cyber Security and Privacy Innovation Forum, CSP Forum 2015, held in Brussels, Belgium, in April 2015. The 12 revised full papers presented were carefully reviewed and selected from various submissions. The papers are organized in topical sections such as security and privacy in the cloud; security and privacy technologies; risk and trust; research and innovation in cyber security and privacy.

Cyber Security and Privacy: 4th Cyber Security and Privacy Innovation Forum, CSP Innovation Forum 2015, Brussels, Belgium April 28-29, 2015, Revised Selected Papers (Communications in Computer and Information Science #530)

by Massimo Felici Frances Cleary

This book constitutes the thoroughly refereed selected papers on the 4th Cyber Security and Privacy Innovation Forum, CSP Forum 2015, held in Brussels, Belgium, in April 2015. The 12 revised full papers presented were carefully reviewed and selected from various submissions. The papers are organized in topical sections such as security and privacy in the cloud; security and privacy technologies; risk and trust; research and innovation in cyber security and privacy.

Cyber Warfare: Building the Scientific Foundation (Advances in Information Security #56)

by Sushil Jajodia Cliff Wang V. S. Subrahmanian Vipin Swarup Paulo Shakarian

This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. It is the first book to explore the scientific foundation of cyber warfare and features research from the areas of artificial intelligence, game theory, programming languages, graph theory and more. The high-level approach and emphasis on scientific rigor provides insights on ways to improve cyber warfare defense worldwide. Cyber Warfare: Building the Scientific Foundation targets researchers and practitioners working in cyber security, especially government employees or contractors. Advanced-level students in computer science and electrical engineering with an interest in security will also find this content valuable as a secondary textbook or reference.

Cyber Warfare: A Multidisciplinary Analysis (Routledge Studies in Conflict, Security and Technology)

by James Green

This book is a multi-disciplinary analysis of cyber warfare, featuring contributions by leading experts from a mixture of academic and professional backgrounds. Cyber warfare, meaning interstate cyber aggression, is an increasingly important emerging phenomenon in international relations, with state-orchestrated (or apparently state-orchestrated) computer network attacks occurring in Estonia (2007), Georgia (2008) and Iran (2010). This method of waging warfare – given its potential to, for example, make planes fall from the sky or cause nuclear power plants to melt down – has the capacity to be as devastating as any conventional means of conducting armed conflict. Every state in the world now has a cyber-defence programme and over 120 states also have a cyber-attack programme. While the amount of literature on cyber warfare is growing within disciplines, our understanding of the subject has been limited by a lack of cross-disciplinary engagement. In response, this book, drawn from the fields of computer science, military strategy, international law, political science and military ethics, provides a critical overview of cyber warfare for those approaching the topic from whatever angle. Chapters consider the emergence of the phenomena of cyber warfare in international affairs; what cyber-attacks are from a technological standpoint; the extent to which cyber-attacks can be attributed to state actors; the strategic value and danger posed by cyber conflict; the legal regulation of cyber-attacks, both as international uses of force and as part of an on-going armed conflict, and the ethical implications of cyber warfare. This book will be of great interest to students of cyber warfare, cyber security, military ethics, international law, security studies and IR in general.

Cybercrime, Digital Forensics and Jurisdiction (Studies in Computational Intelligence #593)

by Mohamed Chawki Ashraf Darwish Mohammad Ayoub Khan Sapna Tyagi

The purpose of law is to prevent the society from harm by declaring what conduct is criminal, and prescribing the punishment to be imposed for such conduct. The pervasiveness of the internet and its anonymous nature make cyberspace a lawless frontier where anarchy prevails. Historically, economic value has been assigned to visible and tangible assets. With the increasing appreciation that intangible data disseminated through an intangible medium can possess economic value, cybercrime is also being recognized as an economic asset. The Cybercrime, Digital Forensics and Jurisdiction disseminate knowledge for everyone involved with understanding and preventing cybercrime - business entities, private citizens, and government agencies. The book is firmly rooted in the law demonstrating that a viable strategy to confront cybercrime must be international in scope.

Cybercrime Risks and Responses: Eastern And Western Perspectives (Palgrave Macmillan's Studies In Cybercrime And Cybersecurity Ser.)

by Russell Smith Laurie Yiu-Chung Lau Ray Chak-Chung Cheung

This book series addresses the urgent need to advance knowledge in the fields of cybercrime and cybersecurity. Because the exponential expansion of computer technologies and use of the Internet have greatly increased the access by criminals to people, institutions, and businesses around the globe, the series will be international in scope. It provides a home for cutting-edge long-form research. Further, the series seeks to spur conversation about how traditional criminological theories apply to the online environment. The series welcomes contributions from early career researchers as well as established scholars on a range of topics in the cybercrime and cybersecurity fields.

Cybergefahr: Wie wir uns gegen Cyber-Crime und Online-Terror wehren können

by Eddy Willems

Man kann online wählen, Rechnungen bezahlen und Tickets kaufen - aber wie sicher ist das? Überall lauern Viren, Spam, Hackerangriffe und sogar Cyber-Spione. Wie kann man sich schützen und wie sollte man dem Phänomen Cyber-Crime begegnen? Der bekannte Security-Experte Eddy Willems gibt einen Überblick über Online-Gefahren und Möglichkeiten, sich vor ihnen zu schützen. Er erläutert spannend die Vergangenheit, Gegenwart und Zukunft des Cyber-Crime.

Cyberphysical Systems for Epilepsy and Related Brain Disorders: Multi-parametric Monitoring and Analysis for Diagnosis and Optimal Disease Management

by Nikolaos S. Voros Christos P. Antonopoulos

This book introduces a new cyberphysical system that combines clinical and basic neuroscience research with advanced data analysis and medical management tools for developing novel applications for the management of epilepsy. The authors describe the algorithms and architectures needed to provide ambulatory, diagnostic and long-term monitoring services, through multi parametric data collection. Readers will see how to achieve in-hospital quality standards, addressing conventional "routine" clinic-based service purposes, at reduced cost, enhanced capability and increased geographical availability. The cyberphysical system described in this book is flexible, can be optimized for each patient and is demonstrated in several case studies.

Cybersecurity in Israel (SpringerBriefs in Cybersecurity)

by Lior Tabansky Isaac Ben Israel

This SpringerBrief gives the reader a detailed account of how cybersecurity in Israel has evolved over the past two decades. The formation of the regions cybersecurity strategy is explored and an in-depth analysis of key developments in cybersecurity policy is provided. The authors examine cybersecurity from an integrative national perspective and see it as a set of policies and actions with two interconnected goals: to mitigate security risks and increase resilience and leverage opportunities enabled by cyber-space. Chapters include an insight into the planning and implementation of the National Security Concept strategy which facilitated the Critical Infrastructure Protection (CIP) agreement in 2002, (one of the first of its kind), the foundation of the Israeli Cyber-strategy in 2011, and details of the current steps being taken to establish a National Cyber Security Authority (NCSA). Cybersecurity in Israel will be essential reading for anybody interested in cyber-security policy, including students, researchers, analysts and policy makers alike.

Cybervetting: Internet Searches for Vetting, Investigations, and Open-Source Intelligence, Second Edition

by Edward J. Appel

Researching an individual‘s, firm‘s or brands online presence has become standard practice for many employers, investigators, and intelligence officers, including law enforcement. Countless companies and organizations are implementing their own policies, procedures, and practices for Internet investigations, cybervetting, and intelligence.

Cython

by Kurt W. Smith

Build software that combines Python's expressivity with the performance and control of C (and C++). It's possible with Cython, the compiler and hybrid programming language used by foundational packages such as NumPy, and prominent in projects including Pandas, h5py, and scikits-learn. In this practical guide, you'll learn how to use Cython to improve Python's performance--up to 3000x-- and to wrap C and C++ libraries in Python with ease.Author Kurt Smith takes you through Cython's capabilities, with sample code and in-depth practice exercises. If you're just starting with Cython, or want to go deeper, you'll learn how this language is an essential part of any performance-oriented Python programmer's arsenal.Use Cython's static typing to speed up Python codeGain hands-on experience using Cython features to boost your numeric-heavy PythonCreate new types with Cython--and see how fast object-oriented programming in Python can beEffectively organize Cython code into separate modules and packages without sacrificing performanceUse Cython to give Pythonic interfaces to C and C++ librariesOptimize code with Cython's runtime and compile-time profiling toolsUse Cython's prange function to parallelize loops transparently with OpenMP

D3.js By Example

by Michael Heydt

Create attractive web-based data visualizations using the amazing JavaScript library D3.js About This Book * Learn to use the facilities provided by D3.js to create data-driven visualizations * Explore the concepts of D3.js through examples that enable you to quickly create visualizations including charts, network diagrams, and maps * Get practical examples of visualizations using real-world data sets that show you how to use D3.js to visualize and interact with information to glean its underlying meaning Who This Book Is For Whether you are new to data and data visualization, a seasoned data scientist, or a computer graphics specialist, this book will provide you with the skills you need to create web-based and interactive data visualizations. This book assumes some knowledge of coding and in particular, experience coding in JavaScript. What You Will Learn * Install and use D3.js to create HTML elements within the document * Use development tools such as JSBIN and Chrome Developer Tools to create D3.js applications * Retrieve JSON data and use D3.js selections and data binding to create visual elements from data * Create and style graphical elements such as circles, ellipses, rectangles, lines, paths, and text using SVG * Turn your data into bar and scatter charts, and add margins, axes, labels, and legends * Use D3.js generators to perform the magic of creating complex visualizations from data * Add interactivity to your visualizations, including tool-tips, sorting, hover-to-highlight, and grouping and dragging of visuals In Detail This book will take you through all the concepts of D3.js starting with the most basic ones and progressively building on them in each chapter to expand your knowledge of D3.js. Starting with obtaining D3.js and creating simple data bindings to non-graphical HTML elements, you will then master the creation of graphical elements from data. You'll discover how to combine those elements into simple visualizations such as bar, line, and scatter charts, as well as more elaborate visualizations such as network diagrams, Sankey diagrams, maps, and choreopleths. Using practical examples provided, you will quickly get to grips with the features of D3.js and use this learning to create your own spectacular data visualizations with D3.js. Style and approach This book uses a practical, step-by-step approach that builds iteratively, starting with the basic concepts right through to mastery of the technology. Each concept is demonstrated using code examples that are interactively available online (and can also be run locally), and each chapter builds upon the concepts covered in the previous chapter,with succinct explanations of what the code does and how it fits into the bigger picture.

The Dark Net

by Jamie Bartlett

An Independent and New Statesman Book of the YearBeyond the familiar online world that most of us inhabit--a world of Google, Facebook, and Twitter--lies a vast and often hidden network of sites, communities, and cultures where freedom is pushed to its limits, and where people can be anyone, or do anything, they want. This is the world of Bitcoin and Silk Road, of radicalism and pornography. This is the Dark Net.In this important and revealing book, Jamie Bartlett takes us deep into the digital underworld and presents an extraordinary look at the internet we don't know. Beginning with the rise of the internet and the conflicts and battles that defined its early years, Bartlett reports on trolls, pornographers, drug dealers, hackers, political extremists, Bitcoin programmers, and vigilantes--and puts a human face on those who have many reasons to stay anonymous.Rich with historical research and revelatory reporting, The Dark Net is an unprecedented, eye-opening look at a world that doesn't want to be known.m the Hardcover edition.

The Dark Side of Game Play: Controversial Issues in Playful Environments (Routledge Advances in Game Studies)

by Torill Elvira Mortensen Jonas Linderoth Ashley Ml Brown

Games allow players to experiment and play with subject positions, values and moral choice. In game worlds players can take on the role of antagonists; they allow us to play with behaviour that would be offensive, illegal or immoral if it happened outside of the game sphere. While contemporary games have always handled certain problematic topics, such as war, disasters, human decay, post-apocalyptic futures, cruelty and betrayal, lately even the most playful of genres are introducing situations in which players are presented with difficult ethical and moral dilemmas. This volume is an investigation of "dark play" in video games, or game play with controversial themes as well as controversial play behaviour. It covers such questions as: Why do some games stir up political controversies? How do games invite, or even push players towards dark play through their design? Where are the boundaries for what can be presented in a games? Are these boundaries different from other media such as film and books, and if so why? What is the allure of dark play and why do players engage in these practices?

Dart By Example

by Davy Mitchell

Design and develop modern web applications with Google's bold and productive language through engaging example projects About This Book * Full of engaging and varied example projects to equip you to build your own web applications * Learn the Dart language and key libraries * Productively create fast and reliable web applications Who This Book Is For If you are a front- or back-end web developer who is looking to build complex full-featured web applications without the quagmire of disconnected JavaScript frameworks, this book is a practical walkthrough of substantial applications that will have you and your team coding Dart in a productive manner. This book will give you a compiled, optional typed, scalable environment to rapidly develop applications. As Dart was designed to be familiar, any developer with even a small amount of knowledge of JavaScript or another programming language will be at home with the language immediately and will be coding quickly. What You Will Learn * Master the core Dart language, type system, and key development tools * Connect to existing web services, process JSON, and create your own framework for the data display * Run and debug the Dart server and web applications and compile them in JavaScript * Handle form data and encryption * Build and deploy server applications on the major OSes and implement the REST API * Work with PostgreSQL--an industry standard relational database system * Create robust applications with unit tests, documentation, and diagnostic logging * Develop command-line applications, and explore the key data structures and libraries In Detail Designed to create next generation apps, Google's Dart offers a much more robust framework and also supersedes JavaScript in several aspects. Familiar yet innovative, compact yet scalable, it blows away the accumulated JavaScript legacy limitations. Dart was designed for great tool-ability and developer productivity, allowing you to create better application faster than before. Google chose it for their billion dollar advertising business and you have its power for your projects too. This book will introduce you the Dart language starting from its conception to its current form, and where it headed is through engaging substantial practical projects. You will be taken through building typical applications and exploring the exciting new technologies of HTML5. With example code projects such as a live data monitoring and viewing system, a blogging system, a slides presentation application, and more, then this book will walk you through step by step through building data-driven web applications with ease and speed. Style and approach A varied collection of compelling practical Dart projects that are developed progressively with full explanations of concepts and implementation. Each project introduces features of the language and environment, demonstrating how Dart can be used in rich structured web applications.

Dart Essentials

by Martin Sikora

This book is targeted at expert programmers in JavaScript who want to learn Dart quickly. Some previous experience with OOP programming in other languages and a good knowledge of JavaScript are assumed.

Refine Search

Showing 17,326 through 17,350 of 54,258 results