Browse Results

Showing 3,926 through 3,950 of 17,868 results

Cyber Security: The Lifeline of Information and Communication Technology (Springer Series in Wireless Technology)

by Ramjee Prasad Vandana Rohokale

This book discusses a broad range of cyber security issues, addressing global concerns regarding cyber security in the modern era. The growth of Information and Communication Technology (ICT) and the prevalence of mobile devices make cyber security a highly topical and relevant issue. The transition from 4G to 5G mobile communication, while bringing convenience, also means cyber threats are growing exponentially. This book discusses a variety of problems and solutions including: • Internet of things and Machine to Machine Communication; • Infected networks such as Botnets; • Social media and networking; • Cyber Security for Smart Devices and Smart Grid • Blockchain Technology and • Artificial Intelligence for Cyber Security Given its scope, the book offers a valuable asset for cyber security researchers, as well as industry professionals, academics, and students.

Cyber Security, Privacy and Networking: Proceedings of ICSPN 2021 (Lecture Notes in Networks and Systems #370)

by Dharma P. Agrawal Nadia Nedjah B. B. Gupta Gregorio Martinez Perez

This book covers selected high-quality research papers presented in the International Conference on Cyber Security, Privacy and Networking (ICSPN 2021), organized during 17-19 September 2021 in India in Online mode. The objectives of ICSPN 2021 is to provide a premier international platform for deliberations on strategies, recent trends, innovative approaches, discussions and presentations on the most recent cyber security, privacy and networking challenges and developments from the perspective of providing security awareness and its best practices for the real world. Moreover, the motivation to organize this conference is to promote research by sharing innovative ideas among all levels of the scientific community, and to provide opportunities to develop creative solutions to various security, privacy and networking problems.

Cyber Space and Outer Space Security (River Publishers Series in Digital Security and Forensics)

by Karthikeyan Periyasami Polinpapilinho F. Katina Rajagopal Ramasamy

This book delves into cutting-edge research in cyberspace and outer space security, encompassing both theoretical and experimental aspects. It provides mitigation measures and strategies to address the identified challenges within. It covers a spectrum of topics including techniques and strategies for enhancing cyberspace security, combating ransomware attacks, and securing autonomous vehicles. Additionally, it explores security and surveillance systems involving autonomous vehicles, resilience schemes against security attacks using blockchain for autonomous vehicles, security analysis of autonomous drones (UAVs), the cybersecurity kill chain, the internet of drones (IoD), and cyberspace solutions to counteract attacks. The discussion extends to mitigation strategies against weaponized AI in cyber-attacks, countermeasures for both autonomous vehicles and cyberspace attacks, as well as the limitations and future prospects of artificial intelligence (AI) and data defense in aerospace cybersecurity.A network comprising nodes can establish both cyberspace and outer space platforms for data exchange. Cyberspace finds diverse applications, including commercial endeavors and military defense. The integration of autonomous vehicles, unmanned aircraft systems (UAS), and drones into outer space environments is facilitated through their connection to cyberspace. One illustrative example involves the utilization of blockchain-based secure drone systems for product delivery, leveraging the combined capabilities of cyberspace and outer space security technologies. This book elucidates the intricate dynamics between cyber operations and the expanding realm of autonomous outer cyberspace, presenting new security challenges arising from heightened complexity and emerging vulnerabilities.

Cyber Technologies and Emerging Sciences: ICCTES 2021 (Lecture Notes in Networks and Systems #467)

by Sudhanshu Maurya Sateesh K. Peddoju Badlishah Ahmad Ines Chihi

The book is a collection of best selected research papers presented at International Conference on Cyber-Technologies and Emerging Sciences (ICCTES 2021), organized by Graphic Era Hill University, Bhimtal Campus, Uttarakhand, India, during 17 – 18 December 2021. The book covers state-of-the-art applications, innovative methods, and analyze the unexplored and unsolved challenges to establish the relative solutions to advance the existing applications and theories of Cyber-Technologies and Emerging Sciences.

Cyber-Threats to Canadian Democracy (McGill-Queen's/Brian Mulroney Institute of Government Studies in Leadership, Public Policy, and Governance)

by Holly Ann Garnett and Michael Pal

From the Cambridge Analytica scandal to overloaded internet voting servers to faulty voting machines, the growing relationship between democracy and technology has brought to light the challenges associated with integrating new digital tools into the electoral system. Canadian politics has also felt the impact of this migration online.This timely book presents the first comprehensive study of the various cyber-threats to election integrity across Canadian jurisdictions. Scrutinizing the events of the 2019 federal election, Cyber-Threats to Canadian Democracy examines how new technologies have affected the practice of electoral politics and what we can do to strengthen future Canadian elections. Through the disciplines of political science, law, computer science, engineering, communications, and others, chapters shed light on some of the most contentious issues around technology and electoral integrity. The contributors address current domestic and foreign threats to Canadian elections, evaluate the behaviour of actors ranging from political parties and interest groups to policymakers and election administrators, and assess emerging legal and regulatory responses while anticipating future challenges to the quality of elections in Canada and around the globe.Cyber-Threats to Canadian Democracy helps seed the study of digital technology’s security risks, providing insight into what reforms are needed and evaluating existing legal and policy frameworks in light of these threats.

Cyberactivism on the Participatory Web (Routledge Studies in New Media and Cyberculture)

by Martha McCaughey

Cyberactivism already has a rich history, but over the past decade the participatory web—with its de-centralized information/media sharing, portability, storage capacity, and user-generated content—has reshaped political and social change. Cyberactivism on the Participatory Web examines the impact of these new technologies on political organizing and protest across the political spectrum, from the Arab Spring to artists to far-right groups. Linking new information and communication technologies to possibilities for solidarity and action—as well as surveillance and control—in a context of global capital flow, war, and environmental crisis, the contributors to this volume provide nuanced analyses of the dramatic transformations in media, citizenship, and social movements taking place today.

Cyberhate in the Context of Migrations (Postdisciplinary Studies in Discourse)

by Angeliki Monnier Axel Boursier Annabelle Seoane

This edited book takes an interdisciplinary approach to shed light on the complex dynamics involved in the incidence of online hate speech against migrants in user-generated contexts. The authors draw on case studies from Finland, France, Germany, Italy, Poland and the UK, bringing together qualitative and quantitative analyses on user-generated online comments. The authors argue that online hate speech against migrants must be understood as a symptom of a representation crisis on migration, which can only be fully perceived through the study of the complex linguistic, interactional and connective processes within which it emerges. They focus on representations and shared meanings, community building and otherness, and delve into the role of network ecosystems in the process of the construction of public problems. This book will be of interest to undergraduate and post-graduate students as well as academics working on hate speech and migration studies in a variety of fields, and can also contribute to improving research protocols for automated analyses and detections of online hate speech.

Cyberlibertarianism: The Right-Wing Politics of Digital Technology

by David Golumbia

An urgent reckoning with digital technology&’s fundamentally right-wing legal and economic underpinnings In a timely challenge to the potent political role of digital technology, Cyberlibertarianism argues that right-wing ideology was built into both the technical and social construction of the digital world from the start. Leveraging more than a decade of research, David Golumbia traces how digital evangelism has driven the worldwide shift toward the political right, concealing inequality, xenophobia, dishonesty, and massive corporate concentrations of wealth and power beneath the utopian presumption of digital technology as an inherent social good. Providing an incisive critique of the push for open access and open-source software and the legal battles over online censorship and net neutrality, Cyberlibertarianism details how the purportedly democratic internet has been employed as an organizing tool for terror and hate groups and political disinformation campaigns. As he unpacks our naively utopian conception of the digital world, Golumbia highlights technology&’s role in the advancement of hyperindividualist and antigovernment agendas, demonstrating how Silicon Valley corporations and right-wing economists; antiestablishment figures such as Julian Assange, Elon Musk, Peter Thiel, Edward Snowden, and Mark Zuckerberg; and seemingly positive voices such as John Perry Barlow, Cory Doctorow, the Electronic Freedom Foundation, and Wikipedia all have worked to hamper regulation and weaken legal safeguards against exploitation. Drawing from a wide range of thought in digital theory, economics, law, and political philosophy as well as detailed research and Golumbia&’s own experience as a software developer, Cyberlibertarianism serves as a clarion call to reevaluate the fraught politics of the internet. In the hope of providing a way of working toward a more genuinely democratic and egalitarian future for digital technology, this magisterial work insists that we must first understand the veiled dogmas from which it has been constructed. Retail e-book files for this title are screen-reader friendly.

Cybernetics of Art: Reason and the Rainbow (Routledge Revivals)

by M. J. Rosenberg

First published in 1983, Cybernetics of Art uses the methodology and concepts of cybernetics to explore art and the creative process. Part I surveys the domain that includes both science and the arts, attempting to understand their differing viewpoints- and the basis of conflicts between them. Art is approached as a method of knowledge aimed at knowledge of experience per se (as distinct from knowledge derived through experience).Part II poses the problem of notionally constructing an authorship machine and develops the technical argument by exploring the question of the kind of machine it would need to be. Part III examines the products of such a machine with a view to finding criteria for distinguishing those that might be called art. An extended, non-technical commentary accompanies the text throughout, with the dual aim of comparing the book’s technical conclusions with ideas expressed by critiques and practicing artists and assisting readers unfamiliar with the information sciences in following the argument. In a world dominated by artificial intelligence, this interdisciplinary book will be useful for scholars and researchers of cybernetics, art, and humanities and social sciences in general.

Cybersecurity and Identity Access Management

by Bharat S. Rawal Gunasekaran Manogaran Alexender Peter

This textbook provides a comprehensive, thorough and up-to-date treatment of topics in cyber security, cyber-attacks, ethical hacking, and cyber crimes prevention. It discusses the different third-party attacks and hacking processes which a poses a big issue in terms of data damage or theft. The book then highlights the cyber security protection techniques and overall risk assessments to detect and resolve these issues at the beginning stage to minimize data loss or damage. This book is written in a way that it presents the topics in a simplified holistic and pedagogical manner with end-of chapter exercises and examples to cater to undergraduate students, engineers and scientists who will benefit from this approach.

Cybersecurity Discourse in the United States: Cyber-Doom Rhetoric and Beyond (Routledge Studies in Conflict, Security and Technology)

by Sean T. Lawson

This book examines the role of cyber-doom rhetoric in the U.S. cybersecurity debate.For more than two decades, fear of "cyber-doom" scenarios—i.e. cyberattacks against critical infrastructure resulting in catastrophic physical, social, and economic impacts—has been a persistent feature of the U.S. cybersecurity debate. This is despite the fact that no cyberattack has come close to realizing such impacts. This book argues that such scenarios are part of a broader rhetoric of cyber-doom within the U.S. cybersecurity debate, and takes a multidisciplinary approach that draws on research in history, sociology, communication, psychology, and political science. It identifies a number of variations of cyber-doom rhetoric, then places them into a larger historical context, assesses how realistic the fears expressed in such rhetoric are, and finally draws out the policy implications of relying on these fears to structure our response to cybersecurity challenges. The United States faces very real cybersecurity challenges that are, nonetheless, much less dramatic than what is implied in the rhetoric. This book argues that relying on cyber-doom rhetoric to frame our thinking about such threats is counterproductive, and encourages us to develop ways of thinking and speaking about cybersecurity beyond cyber-doom.This book will be of much interest to students of cybersecurity, foreign policy, public administration, national security, and international relations in general.

Cybersecurity for Industry 4.0: Analysis for Design and Manufacturing (Springer Series in Advanced Manufacturing)

by Dirk Schaefer Lane Thames

This book introduces readers to cybersecurity and its impact on the realization of the Industry 4. 0 vision. It covers the technological foundations of cybersecurity within the scope of the Industry 4. 0 landscape and details the existing cybersecurity threats faced by Industry 4. 0, as well as state-of-the-art solutions with regard to both academic research and practical implementations. Industry 4. 0 and its associated technologies, such as the Industrial Internet of Things and cloud-based design and manufacturing systems are examined, along with their disruptive innovations. Further, the book analyzes how these phenomena capitalize on the economies of scale provided by the Internet. The book offers a valuable resource for practicing engineers and decision makers in industry, as well as researchers in the design and manufacturing communities and all those interested in Industry 4. 0 and cybersecurity.

Cybersecurity of Industrial Systems

by Jean-Marie Flaus

How to manage the cybersecurity of industrial systems is a crucial question. To implement relevant solutions, the industrial manager must have a clear understanding of IT systems, of communication networks and of control-command systems. They must also have some knowledge of the methods used by attackers, of the standards and regulations involved and of the available security solutions. Cybersecurity of Industrial Systems presents these different subjects in order to give an in-depth overview and to help the reader manage the cybersecurity of their installation. The book addresses these issues for both classic SCADA architecture systems and Industrial Internet of Things (IIoT) systems.

Cybersecurity Vigilance and Security Engineering of Internet of Everything (Internet of Things)

by Kashif Naseer Qureshi Thomas Newe Gwanggil Jeon Abdellah Chehri

This book first discusses cyber security fundamentals then delves into security threats and vulnerabilities, security vigilance, and security engineering for Internet of Everything (IoE) networks. After an introduction, the first section covers the security threats and vulnerabilities or techniques to expose the networks to security attacks such as repudiation, tampering, spoofing, and elevation of privilege. The second section of the book covers vigilance or prevention techniques like intrusion detection systems, trust evaluation models, crypto, and hashing privacy solutions for IoE networks. This section also covers the security engineering for embedded and cyber-physical systems in IoE networks such as blockchain, artificial intelligence, and machine learning-based solutions to secure the networks. This book provides a clear overview in all relevant areas so readers gain a better understanding of IoE networks in terms of security threats, prevention, and other security mechanisms.

The Cyberspace Handbook

by Jason Whittaker

The Cyberspace Handbook is a comprehensive guide to all aspects of new media, information technologies and the internet. It gives an overview of the economic, political, social and cultural contexts of cyberspace, and provides practical advice on using new technologies for research, communication and publication. The Cyberspace Handbook includes: *a glossary of over eighty key terms*a list of over ninety web resources for news and entertainment, new media and web development, education and reference, and internet and web information* specialist chapters on web design and journalism and writing on the web*Over thirty illustrations of internet material and software applications.Jason Whittaker explores how cyberspace has been constructed, how it is used and extends into areas as different as providing us immediate news or immersive games and virtual technologies for areas such as copyright and cybercrime, as well as key skills in employing the internet for research or writing and designing for the Web.

Cybertheology: Thinking Christianity in the Era of the Internet

by Antonio Spadaro S.J.

Because the Internet has changed and is changing the ways in which we think and act, it must also be changing the ways in which we think Christianity and its theology. Cybertheology is the first book to explore this process from a Catholic point of view. Drawing on the theoretical work of authors such as Marshall McLuhan, Peter Levy, and Teilhard de Chardin, it questions how technologies redefine not only the ways in which we do things but also our being and therefore the way we perceive reality, the world, others, and God. “Does the digital revolution affect faith in any sense?” Spadaro asks. His answer is an emphatic Yes. But how, then, are we to live well in the age of the Internet?Spadaro delves deeply into various dimensions of the impact of the Net on the Church and its organization, on our understanding of revelation, grace, liturgy, the sacraments, and other classical theological themes. He rightly points out that the digital environment is not merely an external instrument that facilitates human communication or a purely virtual world, but part of the daily experience of many people, a new “anthropological space” that is reshaping the way we think, know, and express ourselves. Naturally, this calls for a new understanding of faith so that it makes sense to people who live and work in the digital media environment. In developing the notion of cybertheology, Spadaro seeks to propose an intelligence of faith (intellectus fidei) in the era of the Internet.The book’s chapters include reflections on man the decoder and the search engines of God, networked existence and the mystical body, hacker ethics and Christian vision, sacraments and “virtual presence,” and the theological challenges of collective intelligence.

Cyberwar: How Russia Helped Elect Trump

by Kathleen Hall Jamieson

The question of how Donald Trump won the 2016 election looms over his presidency. In particular, were the 78,000 voters who gave him an Electoral College victory affected by the Russian trolls and hackers? Trump has denied it. So has Vladimir Putin. Others cast the answer as unknowable. In Cyberwar, Kathleen Hall Jamieson marshals the troll posts, unique polling data, analyses of how the press used hacked content, and a synthesis of half a century of media effects literature to argue that, although not certain, it is probable that the Russians helped elect the 45th president of the United States. In the process, she asks: How extensive was the troll messaging? What characteristics of social media did the Russians exploit? Why did the mainstream press rush the hacked content into the citizenry's newsfeeds? Was Clinton telling the truth when she alleged that the debate moderators distorted what she said in the leaked speeches? Did the Russian influence extend beyond social media and news to alter the behavior of FBI director James Comey? After detailing the ways in which Russian efforts were abetted by the press, social media, candidates, party leaders, and a polarized public, Cyberwar closes with a warning: the country is ill-prepared to prevent a sequel. In this updated paperback edition, Jamieson covers the many new developments that have come to light since the original publication.

The Cyborg Subject

by Garfield Benjamin

This book outlines a new conception of the cyborg in terms of consciousness as the parallax gap between physical and digital worlds. The contemporary subject constructs its own internal reality in the interplay of the Virtual and the Real. Reinterpreting the work of Slavoj Žižek and Gilles Deleuze in terms of the psychological and ontological construction of the digital, alongside the philosophy of quantum physics, this book offers a challenge to materialist perspectives in the fluid cyberspace that is ever permeating our lives. The inclusion of the subject in its own epistemological framework establishes a model for an engaged spectatorship of reality. Through the analysis of online media, digital art, avatars, computer games and science fiction, a new model of cyborg culture reveals the opportunities for critical and creative interventions in the contemporary subjective experience, promoting an awareness of the parallax position we all occupy between physical and digital worlds.

Cycles of Spin: Strategic Communication in the U. S Congress

by Patrick Sellers

How do politicians try to shape their news coverage? Sellers examines strategic communication campaigns in the U.S. Congress. He argues that these campaigns create cycles of spin: leaders create messages, rank-and-file legislators decide whether to promote those messages, journalists decide whether to cover the messages, and any coverage feeds back to influence the policy process. These four stages are closely related; decisions at one stage influence those at another. Sellers uses diverse evidence, from participant observation and press secretary interviews, to computerized content analysis and vector auto regression. The result is a comprehensive and unprecedented examination of politicians' promotional campaigns and journalists' coverage of those campaigns. Countering numerous critics of spin, Sellers offers the provocative argument that the promotional messages have their origins in the actual policy preferences of members of Congress. The campaigns to promote these messages thus can help the public learn about policy debates in Congress.

Cyprus and its Conflicts: Representations, Materialities, and Cultures

by Vaia Doudaki Nico Carpentier

The Mediterranean island of Cyprus is the site of enduring political, military, and economic conflict. This interdisciplinary collection takes Cyprus as a geographical, cultural and political point of reference for understanding how conflict is mediated, represented, reconstructed, experienced, and transformed. Through methodologically diverse case studies of a wide range of topics—including public art, urban spaces, and print, broadcast and digital media—it assembles an impressively multifaceted perspective, one that provides broad insights into the complex interplay of culture, conflict, and identity.

Czech: An Essential Grammar (Routledge Essential Grammars)

by James Naughton

Czech: An Essential Grammar is a practical reference guide to the core structures and features of modern Czech. Presenting a fresh and accessible description of the language, this engaging grammar uses clear, jargon-free explanations and sets out the complexities of Czech in short, readable sections. Suitable for either independent study or for students in schools, colleges, universities and adult classes of all types, key features include: * focus on the morphology and syntax of the language* clear explanations of grammatical terms * full use of authentic examples* detailed contents list and index for easy access to information. With an emphasis on the Czech that native speakers use today, Czech: An Essential Grammar will help students to read, speak and write the language with greater confidence.

Daddy-Long-Legs

by Jean Webster

Daddy-Long-Legs is a 1912 epistolary novel by the American writer Jean Webster. It follows the protagonist, a young girl named Jerusha "Judy" Abbott, through her college years. She writes the letters to her benefactor, a rich man whom she has never seen. Stories in Easy English by Madhubun Reading Club.

Dads for Daughters: How Fathers Can Give their Daughters a Better, Brighter, Fairer Future

by Michelle Travis

Build a More Equitable World for Your Daughter“If you’re a dad who wants to create a fairer and more equal world for your daughters to thrive in, this book is a must-read!” —Jerry Yang, cofounder & former CEO of Yahoo! Inc.Winner 2020 Living Now Gold Award, Family & ParentingA world where your daughter can thrive. Today’s generation of feminist dads are raising confident, empowered daughters who believe they can achieve anything. But the world is still profoundly unequal for women and girls, with workplaces built by men for men, massive gender pay gaps, and deeply-ingrained gender stereotypes. Dads for Daughters: How Fathers Can Support Girls and Women for a Successful Feminist Future offers fathers guidance for building a world where their daughters can thrive.Lean In for dads. The most successful leaders of all companies, from family businesses to lean startups, understand that leaders eat last. Your workplace can be a stage for the fight for equality and true leadership that empowers women. The guidance in this book will help you move from TED talks to daily action.Invest in the next generation. Men who were raised with the second-wave feminism of The Feminine Mystique know that the personal is political. The confidence code for girls that you instill at home can lead to a better world for all women.Dads for Daughters is a feminist book for fathers invested in the gender equality fight. With this book, you’ll find:Steps you can take today in your workplace and community to create a better tomorrowInspiring stories from successful and empathetic fathersResources to help you take action in the women’s movementDad’s for Daughters is perfect for fathers who enjoyed Lean In: Women, Work, and the Will to Lead, The Moment of Lift: How Empowering Women Changes the World, or We Should All Be Feminists. This book is great for men who love nasty women.

Daemon Voices: On Stories and Storytelling

by Philip Pullman

From the internationally best-selling author of the His Dark Materials trilogy, a spellbinding journey into the secrets of his art--the narratives that have shaped his vision, his experience of writing, and the keys to mastering the art of storytelling.One of the most highly acclaimed and best-selling authors of our time now gives us a book that charts the history of his own enchantment with story--from his own books to those of Blake, Milton, Dickens, and the Brothers Grimm, among others--and delves into the role of story in education, religion, and science. At once personal and wide-ranging, Daemon Voices is both a revelation of the writing mind and the methods of a great contemporary master, and a fascinating exploration of storytelling itself.

The Daily Carrot Principle: 365 Ways to Enhance Your Career and Life

by Adrian Gostick Chester Elton

From the authors of the smash bestseller The Carrot Principle comes an inspiring and lively page-a-day guide to harnessing the remarkable power of the carrot--taking yourself and your team to new heights of success in work and life.Based on their twenty years of experience teaching leaders at Fortune 100 companies, as well as one of the largest research studies ever conducted on workplace satisfaction, Gostick and Elton share a wealth of wisdom about simple but amazingly effective ways to boost your productivity and work satisfaction by setting clear goals, communicating effectively, building trust, and offering recognition in ways that make others feel appreciated and motivated.Each engaging page of The Daily Carrot Principle features a core kernel of wisdom, enlivened by thoughtful and witty quotes from the likes of Thomas Edison, Rosabeth Moss Kanter, Jim Collins, and Oprah Winfrey, plus a bonanza of insights from standout managers and employees the authors have studied. An easy-to-implement "carrot action" ends each page, providing the simple steps to begin applying this wealth of wisdom immediately.Whether you are a business leader, team member, student, mom or dad, or anyone hoping to achieve more in your life, this book will be an inspiring and practical guide to unleashing your hidden potential and leading a richer life.

Refine Search

Showing 3,926 through 3,950 of 17,868 results