Browse Results

Showing 19,251 through 19,275 of 55,783 results

Ethical and Legal Aspects of Computing: A Professional Perspective from Software Engineering (Undergraduate Topics in Computer Science)

by Gerard O'Regan

This textbook presents an overview of the critically important ethical and legal issues that arise in the computing field and provides a professional perspective from software engineering. The author gained exposure to these aspects of computing while working as a software engineer at Motorola in Ireland, where he coordinated the patent programme and worked with several software suppliers. Topics and features: Presents a broad overview of ethics and the lawIncludes key learning topics, summaries, and review questions in each chapter, together with a useful glossaryDiscusses the professional responsibility of computer professionalsExplores ethics in various civilisations and religious traditionsDiscusses ethical software engineering and ethical outsourcingConsiders what is fair and ethical in data scienceDescribes ethical challenges that arise in social media and the AI fieldReviews intellectual property including patents, copyright and trademarks This practical and easy-to-follow textbook/reference is ideal for computer science students seeking to understand legal and ethical aspects of computing. The text also serves as a concise self-study primer for software engineers and software managers.

Ethical and Philosophical Issues in Medical Imaging, Multimodal Learning and Fusion Across Scales for Clinical Decision Support, and Topological Data Analysis for Biomedical Imaging: 1st International Workshop, EPIMI 2022, 12th International Workshop, ML-CDS 2022, 2nd International Workshop, TDA4BiomedicalImaging, Held in Conjunction with MICCAI 2022, Singapore, September 18–22, 2022, Proceedings (Lecture Notes in Computer Science #13755)

by John S. H. Baxter Islem Rekik Roy Eagleson Luping Zhou Tanveer Syeda-Mahmood Hongzhi Wang Mustafa Hajij

This book constitutes the refereed joint proceedings of the 1st International Workshop on Ethical & Philosophical Issues in Medical Imaging (EPIMI 2022); the 12th International Workshop on Multimodal Learning and Fusion Across Scales for Clinical Decision Support (ML-CDS 2022) and the 2nd International Workshop on Topological Data Analysis for Biomedical Imaging (TDA4BiomedicalImaging 2022), held in conjunction with the 25th International Conference on Medical Imaging and Computer-Assisted Intervention, MICCAI 2022, in Singapore, in September 2022.EPIMI includes five short papers about various humanistic aspects of medical image computing and computer-assisted interventions. The ML-CDS papers discuss machine learning on multimodal data sets for clinical decision support and treatment planning. The TDA papers focus on Topological Data Analysis: a collection of techniques and tools that have matured from an increasing interest in the role topology plays in machine learning and data science.

Ethical and Secure Computing: A Concise Module (Undergraduate Topics in Computer Science)

by Joseph Migga Kizza

This engaging textbook highlights the essential need for a strong ethical framework in our approach to computer, information and engineering science. Through thought-provoking questions and case studies, the reader is challenged to consider the deeper implications arising from the use of today’s rapidly-evolving computing technologies and ever-changing communication ecosystems. This updated second edition features new material on information security, intellectual property rights, the Internet of Things, and 5G technologies. Topics and features: introduces a philosophical framework and tools for understanding and analyzing computer ethics in personal, public, and professional spheres; describes the impact of computer technology on issues of security, privacy, anonymity, and civil liberties; examines intellectual property rights in the context of computing, including the risks and liabilities associated with software; discusses such key social issues in computing as the digital divide, employee monitoring in the workplace, and risks to physical and mental health; reviews the history of computer crime, and the threat of digitally facilitated bullying, harassment, and discrimination; considers the ethical challenges arising from online social networks, mobile telecommunications, virtual reality, the Internet of Things, and 5G technologies; includes learning objectives, discussion questions and exercises throughout the book. This concise and accessible work addresses the critical ethical and moral issues important to all designers and users of computer technologies. The text incorporates the latest curricula requirements for undergraduate courses in computer science, and offers invaluable insights into the social impact and legal challenges posed by the latest generation of computing devices and networks.

Ethical and Secure Computing: A Concise Module (Undergraduate Topics in Computer Science)

by Joseph Migga Kizza

This textbook highlights the essential need for a strong ethical framework in our approach to teaching of and working in computer, information and engineering sciences.Through thought-provoking questions and case studies, the reader is challenged to consider the deeper implications arising from the use of today’s rapidly evolving computing technologies and ever-changing communication ecosystems.This thoroughly revised and updated third edition features revised chapters with new and updated content and hardened the ethical framework. To cope with the rapidly changing computing and telecommunication ecosystem, a new chapter, Ethics and Social Responsibility in the Metaverse, has been added. The interface between our current universe and the evolving metaverse presents a security quagmire. The discussion throughout the book is candid and intended to ignite students’ and professionals’ interest and active participation in discussions of the issues we are facing now and those likely to emerge in the near future. Topics and features—including fully updated content:Introduces a philosophical framework and tools for understanding and analyzing computer ethics in personal, public, and professional spheresDescribes the impact of computer technology on issues of security, privacy, anonymity, and civil libertiesDiscusses the security and ethical quagmire in the platforms of the developing metaverse (NEW chapter)Examines intellectual property rights in the context of computing, including the risks and liabilities associated with softwareDiscusses such key social issues in computing as the digital divide, employee monitoring in the workplace, and risks to physical and mental healthReviews the history of computer crime, and the threat of digitally facilitated bullying, harassment, and discriminationConsiders the ethical challenges arising from online social networks, mobile telecommunication technologies, virtual reality, the Internet of Things and 5G technologiesIncludes learning objectives, discussion questions and exercises throughoutThis concise and accessible work addresses the critical ethical and moral issues important to all designers and users of computer technologies. The text incorporates the latest curricula requirements for undergraduate courses in computer science, as well as offers invaluable insights into the social impact and legal challenges posed by the latest generation of computing devices and networks.

Ethical and Social Issues in the Information Age

by Joseph Migga Kizza

The frequency of new editions of this book is indicative of the rapid and trem- dous changes in the fields of computer and information sciences. First published in 1995, the book has rapidly gone through three editions already and now we are in the fourth. Over this period, we have become more dependent on computer and telecommunication technology than ever before and computer technology has become ubiquitous. Since I started writing on social computing, I have been ad- cating a time when we, as individuals and as nations, will become totally dependent on computing technology. That time is almost on us. Evidence of this is embodied in the rapid convergence of telecommunication, broadcasting, and computing devices; the miniaturization of these devices; and the ever increasing storage capacity , speed of computation, and ease of use. These qualities have been a big pulling force sucking in millions of new users every day, sometimes even those unwilling. Other appealing features of these devices are the increasing number of applications, apps, as they are increasingly becoming known, and being wireless and easily portable. Whether small or big, these new gizmos have become the c- terpiece of an individual's social and economic activities and the main access point for all information. Individuals aside, computing technology has also become the engine that drives the nations' strategic and security infrastructures that control power grids, gas and oil storage facilities, transportation, and all forms of national communication, including emergency services.

Ethical and Social Issues in the Information Age (Texts in Computer Science)

by Joseph Migga Kizza

This textbook examines the ethical, social, and policy challenges arising from our rapidly and continuously evolving computing technology—ranging from the Internet, over to the cross-platforms consisting of ubiquitous portable and wearable devices to the eagerly anticipated metaverse—and how we can responsibly access and use these spaces. The text emphasizes the need for a strong ethical framework for all applications of computer science and engineering in our professional and personal life.This comprehensive seventh edition features thoroughly revised chapters with new and updated content, hardened by the bedrock ethical and moral values. Because of the rapidly changing computing and telecommunication ecosystem, a new chapter on Ethics and Social Responsibility in the Metaverse has been added. The interface between our current universe and the evolving metaverse presents a security quagmire. The discussion throughout the book is candid and intended to ignite students' interest and participation in class discussions and beyond. Topics and features:Establishes a philosophical framework and analytical tools for discussing moral theories and problems in ethical relativismOffers pertinent discussions on privacy, surveillance, employee monitoring, biometrics, civil liberties, harassment, the digital divide, and discriminationDiscusses the security and ethical quagmire in the platforms of the developing metaverseProvides exercises, objectives, and issues for discussion with every chapterExamines the ethical, cultural and economic realities of mobile telecommunications, computer social network ecosystems, and virtualization technologyReviews issues of property rights, responsibility and accountability relating to information technology and softwareExplores the evolution of electronic crime, network security, and computer forensicsIntroduces the new frontiers of ethics: virtual reality, artificial intelligence, and the InternetThis extensive textbook/reference addresses the latest curricula requirements for understanding the cultural, social, legal, and ethical issues in computer science and related fields, and offers invaluable advice for industry professionals wishing to put such principles into practice.

Ethical and Social Issues in the Information Age (Texts in Computer Science)

by Joseph Migga Kizza

This new edition examines the ethical, social, and policy challenges stemming from computing and telecommunication technology, and mobile information-enabling devices. Features: establishes a philosophical framework and analytical tools for discussing moral theories and problems in ethical relativism; offers pertinent discussions on privacy, surveillance, employee monitoring, biometrics, civil liberties, harassment, the digital divide, and discrimination; examines the new ethical, cultural and economic realities of computer social networks; reviews issues of property rights, responsibility and accountability relating to IT and software; discusses how virtualization technology informs ethical behavior; introduces the frontiers of ethics in VR, AI, and the Internet; surveys the social, moral and ethical value systems in mobile telecommunications; explores the evolution of electronic crime, network security, and computer forensics; provides exercises, objectives, and issues for discussion in every chapter.

Ethical and Social Issues in the Information Age, 4th Edition

by Joseph Migga Kizza

The frequency of new editions of this book is indicative of the rapid and tremendous changes in the fields of computer and information sciences. First published in 1995, the book has rapidly gone through three editions already and now we are in the fourth. Over this period, we have become more dependent on computer and telecommunication technology than ever before and computer technology has become ubiquitous. Since I started writing on social computing, I have been advocating a time when we, as individuals and as nations, will become totally dependent on computing technology. That time is almost on us. Evidence of this is embodied in the rapid convergence of telecommunication, broadcasting, and computing devices; the miniaturization of these devices; and the ever increasing storage capacity , speed of computation, and ease of use. These qualities have been a big pulling force sucking in millions of new users every day, sometimes even those unwilling. Other appealing features of these devices are the increasing number of applications, apps, as they are increasingly becoming known, and being wireless and easily portable. Whether small or big, these new gizmos have become the centerpiece of an individual’s social and economic activities and the main access point for all information. Individuals aside, computing technology has also become the engine that drives the nations’ strategic and security infrastructures that control power grids, gas and oil storage facilities, transportation, and all forms of national communication, including emergency services.

Ethical and Social Issues in the Information Age, 5th Edition

by Joseph Migga Kizza

This new edition examines the ethical, social, and policy challenges stemming from computing and telecommunication technology, and mobile information-enabling devices. Features: establishes a philosophical framework and analytical tools for discussing moral theories and problems in ethical relativism; offers pertinent discussions on privacy, surveillance, employee monitoring, biometrics, civil liberties, harassment, the digital divide, and discrimination; examines the new ethical, cultural and economic realities of computer social networks; reviews issues of property rights, responsibility and accountability relating to IT and software; discusses how virtualization technology informs ethical behavior; introduces the frontiers of ethics in VR, AI, and the Internet; surveys the social, moral and ethical value systems in mobile telecommunications; explores the evolution of electronic crime, network security, and computer forensics; provides exercises, objectives, and issues for discussion in every chapter.

Ethical Artificial Intelligence from Popular to Cognitive Science: Trust in the Age of Entanglement

by Jordan Richard Schoenherr

This book offers a unique interdisciplinary perspective on the ethics of 'artificial intelligence' – autonomous, intelligent, (and connected) systems, or AISs, applying principles of social cognition to understand the social and ethical issues associated with the creation, adoption, and implementation of AISs. As humans become entangled in sociotechnical systems defined by human and artificial agents, there is a pressing need to understand how trust is created, used, and abused. Compounding the difficulty in answering these questions, stakeholders directly or indirectly affected by these systems differ in their motivations, understanding, and values. This volume provides a comprehensive resource to help stakeholders understand ethical issues of designing and implementing AISs using an ethical sensemaking approach. Starting with the general technical affordances of AIS, Dr. Jordan Richard Schoenherr considers the features of system design relating data integrity, selection and interpretation of algorithms, and the evolution processes that drive AISs innovation as a sociotechnological system. The poles of technophobia (algorithmic aversion) and technophilia (algorithmic preference) in the public perception of AISs are then described and considered against existing evidence, including issues ranging from the displacement and re-education needs of the human workforce, the impact of use of technology on interpersonal accord, and surveillance and cybersecurity. Ethical frameworks that provide tools for evaluating the values and outcomes of AISs are then reviewed, and how they can be aligned with ethical sensemaking processes identified by psychological science is explored. Finally, these disparate threads are brought together in a design framework. Also including sections on policies and guideline, gaming and social media, and Eastern philosophical frameworks, this is fascinating reading for students and academics in psychology, computer science, philosophy, and related areas, as well as professionals such as policy makers and those working with AI systems.

Ethical Artificial Intelligence from Popular to Cognitive Science: Trust in the Age of Entanglement

by Jordan Richard Schoenherr

This book offers a unique interdisciplinary perspective on the ethics of 'artificial intelligence' – autonomous, intelligent, (and connected) systems, or AISs, applying principles of social cognition to understand the social and ethical issues associated with the creation, adoption, and implementation of AISs.As humans become entangled in sociotechnical systems defined by human and artificial agents, there is a pressing need to understand how trust is created, used, and abused. Compounding the difficulty in answering these questions, stakeholders directly or indirectly affected by these systems differ in their motivations, understanding, and values. This volume provides a comprehensive resource to help stakeholders understand ethical issues of designing and implementing AISs using an ethical sensemaking approach. Starting with the general technical affordances of AIS, Dr. Jordan Richard Schoenherr considers the features of system design relating data integrity, selection and interpretation of algorithms, and the evolution processes that drive AISs innovation as a sociotechnological system. The poles of technophobia (algorithmic aversion) and technophilia (algorithmic preference) in the public perception of AISs are then described and considered against existing evidence, including issues ranging from the displacement and re-education needs of the human workforce, the impact of use of technology on interpersonal accord, and surveillance and cybersecurity. Ethical frameworks that provide tools for evaluating the values and outcomes of AISs are then reviewed, and how they can be aligned with ethical sensemaking processes identified by psychological science is explored. Finally, these disparate threads are brought together in a design framework.Also including sections on policies and guideline, gaming and social media, and Eastern philosophical frameworks, this is fascinating reading for students and academics in psychology, computer science, philosophy, and related areas, as well as professionals such as policy makers and those working with AI systems.

Ethical Artificial Intelligence in Power Electronics

by Keshav Kaushik Mariya Ouaissa Inam Ullah Khan Salma El Hajjami Tarandeep Kaur Bhatia Gayo Diallo

This book focuses on the techniques of artificial intelligence that are mainly used in the power electronics field for the optimization of lost vehicle power. With the intention of optimizing the powerful energy of the vehicles and producing reliable energy, the most efficient methods, algorithms, and strategies of ethical artificial intelligence (AI) are being applied. By employing machine learning methods, the optimization of power energy in vehicles can be quickly recovered and managed efficiently. In today’s bustling world, power energy is indispensable for progress, yet in congested Vehicular Ad-hoc Networks (VANETs), vehicles often face power depletion and decreased efficiency. This book explores these challenges, encompassing not only power but also other critical power electronics within vehicles. We aim to introduce innovative approaches, leveraging ethical AI methods, to optimize energy performance in the face of these difficulties. Through this exploration, we seek to provide practical insights into navigating congested VANET environments while upholding ethical principles in technological advancements. Our book will discuss the current power energy concerns faced by vehicles and also contribute a novel strategy to overcome those concerns. The employment of ethical AI in vehicular power energy will undoubtedly improve the effectiveness and production of vehicles.

Ethical Considerations of Virtual Reality in the College Classroom: Cross-Disciplinary Case Studies of Immersive Technology Implementation

by Melody Bowdon Kevin Yee William Dorner

Ethical Considerations of Virtual Reality in the College Classroom collects case studies that address both pedagogical and ethical foundations of extended reality tools in postsecondary learning environments across disciplines. With today’s institutional programs and faculty leveraging cutting-edge virtual, augmented, and mixed reality opportunities to teach and promote achievement goals, it is imperative that new research into these technologies speaks directly to their challenges and affordances within broad academic settings. This book showcases real-world examples of faculty members who chronicle and develop their use of VR tools across learning contexts and student populations by creating their own digital experiences, adapting open-source tools, integrating commercial products, amplifying crucial course content, analyzing outcomes data, and more. Nontechnical readers will come away with a new understanding of key terms and concepts associated with virtual reality and essential heuristics for evaluating the ethical implications of immersive approaches.

Ethical Data and Information Management: Concepts, Tools and Methods

by Katherine O'Keefe Daragh O Brien

Information and how we manage, process and govern it is becoming increasingly important as organizations ride the wave of the big data revolution. Ethical Data and Information Management offers a practical guide for people in organizations who are tasked with implementing information management projects. It sets out, in a clear and structured way, the fundamentals of ethics, and provides practical and pragmatic methods for organizations to embed ethical principles and practices into their management and governance of information. Written by global experts in the field, Ethical Data and Information Management is an important book addressing a topic high on the information management agenda. Key coverage includes how to build ethical checks and balances into data governance decision making; using quality management methods to assess and evaluate the ethical nature of processing during design; change methods to communicate ethical values; how to avoid common problems that affect ethical action; and how to make the business case for ethical behaviours.

Ethical Digital Technology in Practice

by Simon Rogerson

This is an important book. Ethics is not an easy topic, and arguably the ethics of IT is less so—not leastdue to its potential for developing and evolving in ways that are either unforeseen or unimaginable . . . . Use this book as a practical resource, an informative and educational source of material in developing expertise, but also as an invaluable toolkit to support practical application of ethical thinking. —Declan Brady, President of the Irish Computer Society and a member of the Board of Directors of the Council of European Professional Informatics Societies Digital technology is about people. It is about those who plan, develop and implement applications which other people use and are affected by. It is about the impact on all these people as well as on the world at large. Ethical Digital Technology in Practice takes a real-world perspective to explore these impacts over time and discover ways in which to promote ethical digital technology through good practice. It draws upon the author’s published articles in trade magazines, professional journals and online blogs. These are synthesised into a blueprint which addresses, in a practical manner, the societal issues surrounding the increasing use and abuse of digital technology. It is a follow-up book to the author’s book The Evolving Landscape of Ethical Digital Technology, which has a researcher’s perspective. This book is a hands-on account of the computer revolution from 1995 to the current day when the world is increasingly dependent on digital technology. It explores some of the social and ethical issues that are part of this revolution. This is not a book about deep philosophical and technical concepts. Nor does it claim to be comprehensive. It is the author’s personal account of technological change and its effects on people. It is written by a boy who was smitten by computer technology at the age of 15, became a computer professional and subsequently spent many years showing young people how to develop and use digital technology in a good way. It is a book based upon the author’s engagement with practitioners, academics and students during the period as well as his continued fascination with this fantastic technology. Ethical Digital Technology in Practice is a book about the real world, of what has happened and what might happen as digital technology continues to pervade.

An Ethical Guide to Cyber Anonymity: Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers, and governments

by Kushantha Gunawardana

Dive into privacy, security, and online anonymity to safeguard your identityKey FeaturesLeverage anonymity to completely disappear from the public viewBe a ghost on the web, use the web without leaving a trace, and master the art of invisibilityBecome proactive to safeguard your privacy while using the webBook DescriptionAs the world becomes more connected through the web, new data collection innovations have opened up more ways to compromise privacy. Your actions on the web are being tracked, information is being stored, and your identity could be stolen. However, there are ways to use the web without risking your privacy. This book will take you on a journey to become invisible and anonymous while using the web.You will start the book by understanding what anonymity is and why it is important. After understanding the objective of cyber anonymity, you will learn to maintain anonymity and perform tasks without disclosing your information. Then, you'll learn how to configure tools and understand the architectural components of cybereconomy. Finally, you will learn to be safe during intentional and unintentional internet access by taking relevant precautions.By the end of this book, you will be able to work with the internet and internet-connected devices safely by maintaining cyber anonymity.What you will learnUnderstand privacy concerns in cyberspaceDiscover how attackers compromise privacyLearn methods used by attackers to trace individuals and companiesGrasp the benefits of being anonymous over the webDiscover ways to maintain cyber anonymityLearn artifacts that attackers and competitors are interested inWho this book is forThis book is targeted at journalists, security researchers, ethical hackers, and anyone who wishes to stay anonymous while using the web. This book is also for parents who wish to keep their kid's identities anonymous on the web.

The Ethical Hack: A Framework for Business Value Penetration Testing

by James S. Tiller

This book explains the methodologies, framework, and "unwritten conventions" that ethical hacks should employ to provide the maximum value to organizations that want to harden their security. It goes beyond the technical aspects of penetration testing to address the processes and rules of engagement for successful tests. The text examines testing from a strategic perspective to show how testing ramifications affect an entire organization. Security practitioners can use this book to reduce their exposure and deliver better service, while organizations will learn how to align the information about tools, techniques, and vulnerabilities that they gather from testing with their business objectives.

Ethical Hacking: A Hands-on Introduction to Breaking In

by Daniel Graham

A hands-on guide to hacking computer systems from the ground up, from capturing traffic to crafting sneaky, successful trojans.A crash course in modern hacking techniques, Ethical Hacking is already being used to prepare the next generation of offensive security experts. In its many hands-on labs, you&’ll explore crucial skills for any aspiring penetration tester, security researcher, or malware analyst. You&’ll begin with the basics: capturing a victim&’s network traffic with an ARP spoofing attack and then viewing it in Wireshark. From there, you&’ll deploy reverse shells that let you remotely run commands on a victim&’s computer, encrypt files by writing your own ransomware in Python, and fake emails like the ones used in phishing attacks. In advanced chapters, you&’ll learn how to fuzz for new vulnerabilities, craft trojans and rootkits, exploit websites with SQL injection, and escalate your privileges to extract credentials, which you&’ll use to traverse a private network. You&’ll work with a wide range of professional penetration testing tools—and learn to write your own tools in Python—as you practice tasks like: • Deploying the Metasploit framework&’s reverse shells and embedding them in innocent-seeming files • Capturing passwords in a corporate Windows network using Mimikatz • Scanning (almost) every device on the internet to find potential victims • Installing Linux rootkits that modify a victim&’s operating system • Performing advanced Cross-Site Scripting (XSS) attacks that execute sophisticated JavaScript payloads Along the way, you&’ll gain a foundation in the relevant computing technologies. Discover how advanced fuzzers work behind the scenes, learn how internet traffic gets encrypted, explore the inner mechanisms of nation-state malware like Drovorub, and much more. Developed with feedback from cybersecurity students, Ethical Hacking addresses contemporary issues in the field not often covered in other books and will prepare you for a career in penetration testing. Most importantly, you&’ll be able to think like an ethical hacker⁠: someone who can carefully analyze systems and creatively gain access to them.

Ethical Hacking And Countermeasures: Secure Network Operating Systems and Infrastructures (Second Edition)

by EC-Council

The EC-Council|Press Ethical Hacking and Countermeasures series is comprised of four books covering a broad base of topics in offensive network security, ethical hacking, and network defense and countermeasures. The content of this series is designed to immerse the reader into an interactive environment where they will be shown how to scan, test, hack, and secure information systems. A wide variety of tools, viruses, and malware is presented in these books, providing a complete understanding of the tactics and tools used by hackers. The full series of books helps prepare readers to take and succeed on the C|EH certification exam from EC-Council.

Ethical Hacking and Countermeasures: Web Applications and Data Servers (Book #3)

by EC-Council Staff

The EC-Council - Press Ethical Hacking and Countermeasures series is intended for those studying to become security officers, auditors, security professionals, site administrators, and anyone who is concerned about or responsible for the integrity of the network infrastructure. The series includes a broad base of topics in offensive network security, ethical hacking, as well as network defense and countermeasures. Web Applications and Data Servers provides an overview of session hijacking, how to hack Web servers and database servers, as well as password-cracking techniques and Web application vulnerabilities.

Ethical Hacking and Penetration Testing Guide

by Rafay Baloch

Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and interpret the results of modern-day hacking tools, which are required to complete a penetration test. The book covers a wide range of tools, including Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. Supplying a simple and clean explanation of how to effectively utilize these tools, it details a four-step methodology for conducting an effective penetration test or hack.Providing an accessible introduction to penetration testing and hacking, the book supplies you with a fundamental understanding of offensive security. After completing the book you will be prepared to take on in-depth and advanced topics in hacking and penetration testing. The book walks you through each of the steps and tools in a structured, orderly manner allowing you to understand how the output from each tool can be fully utilized in the subsequent phases of the penetration test. This process will allow you to clearly see how the various tools and phases relate to each other. An ideal resource for those who want to learn about ethical hacking but don‘t know where to start, this book will help take your hacking skills to the next level. The topics described in this book comply with international standards and with what is being taught in international certifications.

Ethical Hacking: Techniques, Tools, and Countermeasures

by Michael G. Solomon Sean-Philip Oriyano

Ethical Hacking: Techniques, Tools, and Countermeasures, Fourth Edition, covers the basic strategies and tools that prepare students to engage in proactive and aggressive cyber security activities, with an increased focus on Pen testing and Red Teams. Written by subject matter experts, with numerous real-world examples, the Fourth Edition provides readers with a clear, comprehensive introduction to the many threats on the security of our cyber environments and what can be done to combat them. The text begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. Part II provides a technical overview of hacking: how attackers target cyber resources and the methodologies they follow. Part III studies those methods that are most effective when dealing with hacking attacks, especially in an age of increased reliance on distributed devices.

Ethical IT Innovation: A Value-Based System Design Approach

by Sarah Spiekermann

Explaining how ubiquitous computing is rapidly changing our private and professional lives, Ethical IT Innovation: A Value-Based System Design Approach stands at the intersection of computer science, philosophy, and management and integrates theories and frameworks from all three domains.The book explores the latest thinking on computer ethics, inc

Ethical Programs: Hospitality And The Rhetorics Of Software

by James J. Brown

Living in a networked world means never really getting to decide in any thoroughgoing way who or what enters your "space" (your laptop, your iPhone, your thermostat . . . your home). With this as a basic frame-of-reference, James J. Brown's Ethical Programs examines and explores the rhetorical potential and problems of a hospitality ethos suited to a new era of hosts and guests. Brown reads a range of computational strategies and actors, from the general principles underwriting the Transmission Control Protocol (TCP), which determines how packets of information can travel through the internet, to the Obama election campaign's use of the power of protocols to reach voters, harvest their data, incentivize and, ultimately, shape their participation in the campaign. In demonstrating the kind of rhetorical spaces networked software establishes and the access it permits, prevents, and molds, Brown makes a significant contribution to the emergent discourse of software studies as a major component of efforts in broad fields including media studies, rhetorical studies, and cultural studies.

Ethical Reasoning in Big Data

by Jeff Collmann Sorin Adam Matei

This book springs from a multidisciplinary, multi-organizational, and multi-sector conversation about the privacy and ethical implications of research in human affairs using big data. The need to cultivate and enlist the public's trust in the abilities of particular scientists and scientific institutions constitutes one of this book's major themes. The advent of the Internet, the mass digitization of research information, and social media brought about, among many other things, the ability to harvest - sometimes implicitly - a wealth of human genomic, biological, behavioral, economic, political, and social data for the purposes of scientific research as well as commerce, government affairs, and social interaction. What type of ethical dilemmas did such changes generate? How should scientists collect, manipulate, and disseminate this information? The effects of this revolution and its ethical implications are wide-ranging. This book includes the opinions of myriad investigators, practitioners, and stakeholders in big data on human beings who also routinely reflect on the privacy and ethical issues of this phenomenon. Dedicated to the practice of ethical reasoning and reflection in action, the book offers a range of observations, lessons learned, reasoning tools, and suggestions for institutional practice to promote responsible big data research on human affairs. It caters to a broad audience of educators, researchers, and practitioners. Educators can use the volume in courses related to big data handling and processing. Researchers can use it for designing new methods of collecting, processing, and disseminating big data, whether in raw form or as analysis results. Lastly, practitioners can use it to steer future tools or procedures for handling big data. As this topic represents an area of great interest that still remains largely undeveloped, this book is sure to attract significant interest by filling an obvious gap in currently available literature.

Refine Search

Showing 19,251 through 19,275 of 55,783 results