Browse Results

Showing 16,551 through 16,575 of 75,762 results

CyberForensics: Understanding Information Security Investigations (Springer’s Forensic Laboratory Science Series)

by Jennifer Bayuk

This fascinating and highly topical subject has a history dating back to the secret world of 1970s Cold War espionage, when the US military and Central intelligence agencies, aided by the latest mainframe systems, were the first to use computer forensics techniques in counterintelligence. In the decades since, cybercrime has emerged from the obscurity of low-level prosecution evidence to become a serious cross-border crime issue, while cyberforensic investigators have moved on from drug, murder, and child pornography crimes that were facilitated by computers, and are now tackling headline-grabbing cyber bank robbery, identity theft, and corporate spying. With little consensus as yet on the qualifications required to become a cyberforensic investigator, Cyberforensics: Understanding Information Security Investigations assembles the varying perspectives of pioneers and key figures in the field. All the authors have more than 10 years' experience in successfully investigating cybercrime, and some more than 20. Through real-life case studies the chapters introduce the reader to the field of cybersecurity, starting with corporate investigation, and progressing to analyze the issues in more detail. Taking us from accounting cyberforensics to unraveling the complexities of malware, the contributors explain the tools and techniques they use in a manner that allows us to map their methodology into a more generic understanding of what a cybersecurity investigation really is. Above all, Cyberforensics shows that there is a cohesive set of concepts that binds cybersecurity investigators to a shared vision. These core ideas are now gaining importance as a body of knowledge that cyberforensics professionals agree should be a prerequisite to the professional practice of information security.

Cybergefahr: Wie wir uns gegen Cyber-Crime und Online-Terror wehren können

by Eddy Willems

Man kann online wählen, Rechnungen bezahlen und Tickets kaufen - aber wie sicher ist das? Überall lauern Viren, Spam, Hackerangriffe und sogar Cyber-Spione. Wie kann man sich schützen und wie sollte man dem Phänomen Cyber-Crime begegnen? Der bekannte Security-Experte Eddy Willems gibt einen Überblick über Online-Gefahren und Möglichkeiten, sich vor ihnen zu schützen. Er erläutert spannend die Vergangenheit, Gegenwart und Zukunft des Cyber-Crime.

Cyberia (Cyberia #1)

by Chris Lynch

Zane lives in a completely wired world where every pet has a microchip that allows it to talk. Zane soon learns that the pets aren't actually saying what the chip is translating. They aren't happy that all animals have been domesticated, and they enlist Zane to help them fight back and ensure their freedom.

Cyberia #3: Prime Evil (Cyberia #3)

by Chris Lynch

From National Book Award nominee Chris Lynch, the third action-and-humor-filled futuristic series about talking pets who are tired of being pets ... and the boy who must help them. Zane and his animal comrades have foiled Dr. Gristle's terrible plots twice--he can't talk to animals, and he can't get at the heart of what makes them wild. Zane can talk to them. He can understand them. He almost is one. Almost. Zane keeps getting in Dr. Gristle's way though - and he's being sent as far out of the way as Gristle can get him. In fact, he's being sent right into the middle of a new plot of the bad doctor's--and in his new, utterly foreign surroundings, he's entirely too human.

CyberKnife NeuroRadiosurgery: A practical Guide

by Alfredo Conti Pantaleo Romanelli Evangelos Pantelis Scott G. Soltys Young Hyun Cho Michael Lim

This book is a practical guide on image-guided robotic (CyberKnife®) radiosurgery of the brain and the spine. The volume introduces the radiosurgical community to the potential of image-guidance in the treatment of neurosurgical diseases including neuro-oncological, vascular and functional disorders. Principles of image-guided radiosurgery, including physics and radiobiology are considered. Each chapter provides a critical review of the literature and analyses of several aspects to offer an assessment of single and hypofractionated treatments. Based on the authors’ experience, tables or summaries presenting the treatment approaches and associated risks are included as well. Providing a practical guide to define the selection of dose, fractionation schemes, isodose line, margins, imaging, constraints to the structures at risk will support safe practice of neuroradiosurgery. This book aims to shed new light on the treatment of neoplastic and non-neoplastic diseases of the central nervous system using the CyberKnife® image-guided robotic radiosurgery system. It will be adopted by neurosurgery residents and neurosurgery consultants as well as residents in radiation oncology and radiation oncologists; medical physicists involved in radiosurgery procedures may also benefit from this book.

Cybernetic Modeling for Bioreaction Engineering (Cambridge Series in Chemical Engineering)

by Doraiswami Ramkrishna Hyun-Seob Song

Uniquely focusing on dynamic modeling, this volume incorporates metabolic regulation as a survival mechanism for cells, by driving metabolism through optimal investment of its resources for control of enzyme synthesis and activity. Consequently, the models have a proven record of describing various uptake patterns of mixed carbon substrates that have become significant in modern applications of biomass for the production of bioenergy. The models accurately describe dynamic behavior of microbes in nutrient environments with mixtures of complementary substrates, such as carbon and nitrogen. Modeling of large metabolic networks (including prospects for extension to genome scale) is enabled by lumped hybrid cybernetic models with an unparalleled capacity to predict dynamic behavior of knockout strains. This is an invaluable, must-have reference for bio-researchers and practicing engineers.

Cybernetic Revolution and Global Aging: Humankind on the Way to Cybernetic Society, or the Next Hundred Years (World-Systems Evolution and Global Futures)

by Leonid Grinin Andrey Korotayev Anton Grinin

This book explores the global technological transformations that have shaped development of society for eons, from the emergence of Homo sapiens to the modern day. Looking at a potential future for all of this century and the beginning of the next, the book explores how society is changing as a result of the two most powerful trends: technological advances and global aging. It studies the forthcoming technological wave – the Cybernetic Revolution, which will encompass AI, medical technology and biotechnology, robotics, cognitive, nanotechnology etc. In turn, it shows why and how global aging will become one of the most powerful factors, influencing the evolution of society and the World System as a whole. Lastly, the book demonstrates how technological innovations can change the way people live and the society of the future, assessing both the new opportunities and threats posed by uncontrolled technological progress. Accordingly, it will appeal to social scientists, political scientists, economists and historians who are interested in technological transformations and their social and economic impacts.

A Cybernetic View of Biological Growth

by Tony Stebbing

Maia is the story of an idea, and its development into a working hypothesis, that provides a cybernetic interpretation of how growth is controlled. Growth at the lowest level is controlled by regulating the rate of growth. Access to the output of control mechanisms is provided by perturbing the growing organism, and then filtering out the consequences to growth rate. The output of the growth control mechanism is then accessible for interpretation and modelling. Perturbation experiments have been used to provide interpretations of hormesis, the neutralization of inhibitory load and acquired tolerance to toxic inhibition, and catch-up growth. The account begins with an introduction to cybernetics covering the regulation of growth and population increase in animals and man and describes this new approach to access the control of growth processes. This book is suitable for postgraduate students of biological cybernetics and researchers of biological growth, endocrinology, population ecology and toxicology.

Cybernetics 2.0: A General Theory of Adaptivity and Homeostasis in the Brain and in the Body (Springer Series on Bio- and Neurosystems #14)

by Bernard Widrow

This book takes the notions of adaptivity and learning from the realm of engineering into the realm of biology and natural processes. It introduces a Hebbian-LMS algorithm, an integration of unsupervised Hebbian learning and supervised LMS learning in neural networks, as a mathematical representation of a general theory for synaptic learning in the brain, and adaptation and functional control of homeostasis in living systems. Written in a language that is able to address students and scientists with different backgrounds, this book accompanies readers on a unique journey through various homeostatic processes in living organisms, such as body temperature control and synaptic plasticity, explaining how the Hebbian-LMS algorithm can help understand them, and suggesting some open questions for future research. It also analyses cell signalling pathways from an unusual perspective, where hormones and hormone receptors are shown to be regulated via the principles of the Hebbian-LMS algorithm. It further discusses addiction and pain, and various kinds of mood disorders alike, showing how they can be modelled with the Hebbian-LMS algorithm. For the first time, the Hebbian-LMS algorithm, which has been derived from a combination of Hebbian theory from the neuroscience field and the LMS algorithm from the engineering field of adaptive signal processing, becomes a potent model for understanding how biological regulation works. Thus, this book is breaking new ground in neuroscience by providing scientists with a general theory for how nature does control synaptic learning. It then goes beyond that, showing that the same principles apply to hormone-mediated regulation of physiological processes. In turn, the book tackles in more depth the concept of learning. It covers computer simulations and strategies for training neural networks with the Hebbian-LMS algorithm, demonstrating that the resulting algorithms are able to identify relationships between unknown input patterns. It shows how this can translate in useful ideas to understand human memory and design cognitive structures. All in all, this book offers an absolutely, unique, inspiring reading for biologists, physiologists, and engineers, paving the way for future studies on what we could call the nature’s secret learning algorithm.

Cybernetics and the Constructed Environment: Design Between Nature and Technology

by Zihao Zhang

Grounded in contemporary landscape architecture theory and practice, Cybernetics and the Constructed Environment blends examples from art, design, and engineering with concepts from cybernetics and posthumanism, offering a transdisciplinary examination of the ramifications of cybernetics on the constructed environment. Cybernetics, or the study of communication and control in animals and machines, has grown increasingly relevant nearly 80 years after its inception. Cyber-physical systems, sensing networks, and spatial computing—algorithms and intelligent machines—create endless feedback loops with human and non-human actors, co-producing a cybernetic environment. Yet, when an ecosystem is meticulously managed by intelligent machines, can we still call it wild nature? Posthumanism ideas, such as new materialism, actor-network theory, and object-oriented ontology, have become increasingly popular among design disciplines, including landscape architecture, and may have provided transformative frameworks to understand this entangled reality. However, design still entails a sense of intentionality and an urge to control. How do we, then, address the tension between the designer’s intentionality and the co-produced reality of more-than-human agents in the cybernetic environment? Is posthumanism enough to develop a framework to think beyond our all-too-human ways of thinking? For researchers, scholars, practitioners, and students in environmental design and engineering disciplines, this book maps out a paradigm of environmentalism and ecological design rooted in non-communication and uncontrollability, and puts a speculative turn on cybernetics.Chapters 8 and 9 of this book are freely available as a downloadable Open Access PDF at http://www.taylorfrancis.com under a Creative Commons Attribution-Non Commercial-No Derivatives (CC-BY-NC-ND) 4.0 license.

The Cybernetics Moment: Or Why We Call Our Age the Information Age (New Studies in American Intellectual and Cultural History)

by Ronald R. Kline

How did cybernetics and information theory arise, and how did they come to dominate fields as diverse as engineering, biology, and the social sciences?Winner of the CHOICE Outstanding Academic Title of the Choice ACRLOutstanding Academic Title, ChoiceCybernetics—the science of communication and control as it applies to machines and to humans—originates from efforts during World War II to build automatic antiaircraft systems. Following the war, this science extended beyond military needs to examine all systems that rely on information and feedback, from the level of the cell to that of society. In The Cybernetics Moment, Ronald R. Kline, a senior historian of technology, examines the intellectual and cultural history of cybernetics and information theory, whose language of "information," "feedback," and "control" transformed the idiom of the sciences, hastened the development of information technologies, and laid the conceptual foundation for what we now call the Information Age. Kline argues that, for about twenty years after 1950, the growth of cybernetics and information theory and ever-more-powerful computers produced a utopian information narrative—an enthusiasm for information science that influenced natural scientists, social scientists, engineers, humanists, policymakers, public intellectuals, and journalists, all of whom struggled to come to grips with new relationships between humans and intelligent machines.Kline traces the relationship between the invention of computers and communication systems and the rise, decline, and transformation of cybernetics by analyzing the lives and work of such notables as Norbert Wiener, Claude Shannon, Warren McCulloch, Margaret Mead, Gregory Bateson, and Herbert Simon. Ultimately, he reveals the crucial role played by the cybernetics moment—when cybernetics and information theory were seen as universal sciences—in setting the stage for our current preoccupation with information technologies.

Cyberphysical Smart Cities Infrastructures: Optimal Operation and Intelligent Decision Making

by M. Hadi Amini Miadreza Shafie-Khah

Learn to deploy novel algorithms to improve and secure smart city infrastructure In Cyberphysical Smart Cities Infrastructures: Optimal Operation and Intelligent Decision Making, accomplished researchers Drs. M. Hadi Amini and Miadreza Shafie-Khah deliver a crucial exploration of new directions in the science and engineering of deploying novel and efficient computing algorithms to enhance the efficient operation of the networks and communication systems underlying smart city infrastructure. The book covers special issues on the deployment of these algorithms with an eye to helping readers improve the operation of smart cities. The editors present concise and accessible material from a collection of internationally renowned authors in areas as diverse as computer science, electrical engineering, operation research, civil engineering, and the social sciences. They also include discussions of the use of artificial intelligence to secure the operations of cyberphysical smart city infrastructure and provide several examples of the applications of novel theoretical algorithms. Readers will also enjoy: Thorough introductions to fundamental algorithms for computing and learning, large-scale optimizations, control theory for large-scale systems Explorations of machine learning and intelligent decision making in cyberphysical smart cities, including smart energy systems and intelligent transportation networks In-depth treatments of intelligent decision making in cyberphysical smart city infrastructure and optimization in networked smart cities Perfect for senior undergraduate and graduate students of electrical and computer engineering, computer science, civil engineering, telecommunications, information technology, and business, Cyberphysical Smart Cities Infrastructures is an indispensable reference for anyone seeking to solve real-world problems in smart cities.

Cyberphysical Systems for Epilepsy and Related Brain Disorders: Multi-parametric Monitoring and Analysis for Diagnosis and Optimal Disease Management

by Nikolaos S. Voros Christos P. Antonopoulos

This book introduces a new cyberphysical system that combines clinical and basic neuroscience research with advanced data analysis and medical management tools for developing novel applications for the management of epilepsy. The authors describe the algorithms and architectures needed to provide ambulatory, diagnostic and long-term monitoring services, through multi parametric data collection. Readers will see how to achieve in-hospital quality standards, addressing conventional "routine" clinic-based service purposes, at reduced cost, enhanced capability and increased geographical availability. The cyberphysical system described in this book is flexible, can be optimized for each patient and is demonstrated in several case studies.

Cyberpredators and Their Prey

by Lauren R. Shapiro

The online environment has emerged as a continuous and unfettered source of interpersonal criminal activity beyond physical boundaries. Cyberpredators commit their crimes by employing the Internet and online services—social network platforms, online groups and organizations, smart phone apps, bulletin board systems, online forums, websites, internet relay chat channels—to locate and harm victims of all ages through attacking, exploiting, humiliating, bullying, harassing, threatening, defrauding, and exhorting. Cyberpredators and Their Prey describes non-sexual and sexual interpersonal crimes—online romance scam, swatting, trolling, stalking, bullying, harassment, minor sexting, sexual trafficking, child sexual abuse material, sextortion, and image-based sexual abuse offenses. Each chapter contains: crime definition and relevant issues; typical cyberpredator, motives, and methods; typical victims and behaviors that make them targets; current criminal laws for prosecuting cybercrimes and assessment of their applicability and effectiveness as deterrents; the crime’s impact on individual victims and society in general; and cybersecurity prevention and intervention strategies. Also covered are the unique challenges that the regulation, investigation, and prosecution of these cybercrimes pose to criminal justice and private security agents worldwide; the need for society to hold companies operating online responsible for their role in cybercrime; and how aspects of the online environment (i.e., anonymity, toxic disinhibition, de-individuation, inculpability) contribute to harmful and abusive interpersonal interaction, particularly when enacted by perpetrators as part of a group attack. Key features: Portrays material through multidisciplinary lens of psychology, criminal justice, law, and security Provides consistent, practical information about online criminals and victims Compares online to offline versions of the same crime Discusses adequacy of current laws for prosecuting cybercriminals Considers elements of the online environment that foster criminal activity Describes social engineering techniques Considers the role of intimate partner violence in cybercrimes Reviews 21st century skills needed to educate and protect potential targets Cyberpredators and Their Prey will prove essential reading to those who are studying to become, or are currently, security professionals; law enforcement personnel and investigators; intelligence agents; private investigators; lawyers; compliance officers; social service workers; and other professionals who deal with interpersonal cybercrime through the lens of social science.

Cybersecurity Awareness Among Students and Faculty

by Abbas Moallem

In modern times, all individuals need to be knowledgeable about cybersecurity. They must have practical skills and abilities to protect themselves in cyberspace. What is the level of awareness among college students and faculty, who represent the most technologically active portion of the population in any society? According to the Federal Trade Commission’s 2016 Consumer Sentinel Network report, 19 percent of identity theft complaints came from people under the age of 29. About 74,400 young adults fell victim to identity theft in 2016. This book reports the results of several studies that investigate student and faculty awareness and attitudes toward cybersecurity and the resulting risks. It proposes a plan of action that can help 26,000 higher education institutions worldwide with over 207 million college students, create security policies and educational programs that improve security awareness and protection. Features Offers an understanding of the state of privacy awareness Includes the state of identity theft awareness Covers mobile phone protection Discusses ransomware protection Discloses a plan of action to improve security awareness

Cybersecurity for Executives: A Practical Guide

by C. Joseph Touhill Gregory J. Touhill

Practical guide that can be used by executives to make well-informed decisions on cybersecurity issues to better protect their business Emphasizes, in a direct and uncomplicated way, how executives can identify, understand, assess, and mitigate risks associated with cybersecurity issues Covers 'What to Do When You Get Hacked?' including Business Continuity and Disaster Recovery planning, Public Relations, Legal and Regulatory issues, and Notifications and Disclosures Provides steps for integrating cybersecurity into Strategy; Policy and Guidelines; Change Management and Personnel Management Identifies cybersecurity best practices that executives can and should use both in the office and at home to protect their vital information

Cybersecurity for Industry 4.0: Analysis for Design and Manufacturing (Springer Series in Advanced Manufacturing)

by Dirk Schaefer Lane Thames

This book introduces readers to cybersecurity and its impact on the realization of the Industry 4. 0 vision. It covers the technological foundations of cybersecurity within the scope of the Industry 4. 0 landscape and details the existing cybersecurity threats faced by Industry 4. 0, as well as state-of-the-art solutions with regard to both academic research and practical implementations. Industry 4. 0 and its associated technologies, such as the Industrial Internet of Things and cloud-based design and manufacturing systems are examined, along with their disruptive innovations. Further, the book analyzes how these phenomena capitalize on the economies of scale provided by the Internet. The book offers a valuable resource for practicing engineers and decision makers in industry, as well as researchers in the design and manufacturing communities and all those interested in Industry 4. 0 and cybersecurity.

Cybersecurity in France (SpringerBriefs in Cybersecurity)

by Philippe Baumard

This Brief presents the overarching framework in which each nation is developing its own cyber-security policy, and the unique position adopted by France. Modern informational crises have penetrated most societal arenas, from healthcare, politics, economics to the conduct of business and welfare. Witnessing a convergence between information warfare and the use of "fake news", info-destabilization, cognitive warfare and cyberwar, this book brings a unique perspective on modern cyberwarfare campaigns, escalation and de-escalation of cyber-conflicts. As organizations are more and more dependent on information for the continuity and stability of their operations, they also become more vulnerable to cyber-destabilization, either genuine, or deliberate for the purpose of gaining geopolitical advantage, waging wars, conducting intellectual theft and a wide range of crimes. Subsequently, the regulation of cyberspace has grown into an international effort where public, private and sovereign interests often collide. By analyzing the particular case of France national strategy and capabilities, the authors investigate the difficulty of obtaining a global agreement on the regulation of cyber-warfare. A review of the motives for disagreement between parties suggests that the current regulation framework is not adapted to the current technological change in the cybersecurity domain. This book suggests a paradigm shift in handling and anchoring cyber-regulation into a new realm of behavioral and cognitive sciences, and their application to machine learning and cyber-defense.

Cybersecurity in Nigeria: A Case Study of Surveillance and Prevention of Digital Crime (SpringerBriefs in Cybersecurity)

by Aamo Iorliam

This book reviews the use of digital surveillance for detecting, investigating and interpreting fraud associated with critical cyberinfrastructures in Nigeria, as it is well known that the country’s cyberspace and cyberinfrastructures are very porous, leaving too much room for cyber-attackers to freely operate. In 2017, there were 3,500 successful cyber-attacks on Nigerian cyberspace, which led to the country losing an estimated 450 million dollars. These cybercrimes are hampering Nigeria’s digital economy, and also help to explain why many Nigerians remain skeptical about Internet marketing and online transactions. If sensitive conversations using digital devices are not well monitored, Nigeria will be vulnerable to cyber-warfare, and its digital economy, military intelligence, and related sensitive industries will also suffer. The Nigerian Army Cyber Warfare Command was established in 2018 in order to combat terrorism, banditry, and other attacks by criminal groups in Nigeria. However, there remains an urgent need to produce digital surveillance software to help law enforcement agencies in Nigeria to detect and prevent these digitally facilitated crimes. The monitoring of Nigeria’s cyberspace and cyberinfrastructure has become imperative, given that the rate of criminal activities using technology has increased tremendously. In this regard, digital surveillance includes both passive forensic investigations (where an attack has already occurred) and active forensic investigations (real-time investigations that track attackers). In addition to reviewing the latest mobile device forensics, this book covers natural laws (Benford’s Law and Zipf’s Law) for network traffic analysis, mobile forensic tools, and digital surveillance software (e.g., A-BOT). It offers valuable insights into how digital surveillance software can be used to detect and prevent digitally facilitated crimes in Nigeria, and highlights the benefits of adopting digital surveillance software in Nigeria and other countries facing the same issues.

Cybersecurity Management: An Organizational and Strategic Approach

by Nir Kshetri

Cyberthreats are among the most critical issues facing the world today. Cybersecurity Management draws on case studies to analyze cybercrime at the macro level, and evaluates the strategic and organizational issues connected to cybersecurity. Cross-disciplinary in its focus, orientation, and scope, this book looks at emerging communication technologies that are currently under development to tackle emerging threats to data privacy. Cybersecurity Management provides insights into the nature and extent of cyberthreats to organizations and consumers, and how such threats evolve with new technological advances and are affected by cultural, organizational, and macro‐environmental factors. Cybersecurity Management articulates the effects of new and evolving information, communication technologies, and systems on cybersecurity and privacy issues. As the COVID-19 pandemic has revealed, we are all dependent on the Internet as a source for not only information but also person-to-person connection, thus our chances of encountering cyberthreats is higher than ever. Cybersecurity Management aims to increase the awareness of and preparedness to handle such threats among policy-makers, planners, and the public.

Cybersecurity of Digital Service Chains: Challenges, Methodologies, and Tools (Lecture Notes in Computer Science #13300)

by Joanna Kołodziej Matteo Repetto Armend Duzha

This open access book presents the main scientific results from the H2020 GUARD project. The GUARD project aims at filling the current technological gap between software management paradigms and cybersecurity models, the latter still lacking orchestration and agility to effectively address the dynamicity of the former. This book provides a comprehensive review of the main concepts, architectures, algorithms, and non-technical aspects developed during three years of investigation; the description of the Smart Mobility use case developed at the end of the project gives a practical example of how the GUARD platform and related technologies can be deployed in practical scenarios. We expect the book to be interesting for the broad group of researchers, engineers, and professionals daily experiencing the inadequacy of outdated cybersecurity models for modern computing environments and cyber-physical systems.

Cyberspace Law: Censorship and Regulation of the Internet (Routledge Research in Information Technology and E-Commerce Law)

by Hannibal Travis

This book explores what the American Civil Liberties Union calls the "third era" in cyberspace, in which filters "fundamentally alter the architectural structure of the Internet, with significant implications for free speech." Although courts and nongovernmental organizations increasingly insist upon constitutional and other legal guarantees of a freewheeling Internet, multi-national corporations compete to produce tools and strategies for making it more predictable. When Google attempted to improve our access to information containing in books and the World Wide Web, copyright litigation began to tie up the process of making content searchable, and resulted in the wrongful removal of access to thousands if not millions of works. Just as the courts were insisting that using trademarks online to criticize their owners is First Amendment-protected, corporations and trade associations accelerated their development of ways to make Internet companies liable for their users’ infringing words and actions, potentially circumventing free speech rights. And as social networking and content-sharing sites have proliferated, so have the terms of service and content-detecting tools for detecting, flagging, and deleting content that makes one or another corporation or trade association fear for its image or profits. The book provides a legal history of Internet regulation since the mid-1990s, with a particular focus on efforts by patent, trademark, and copyright owners to compel Internet firms to monitor their online offerings and remove or pay for any violations of the rights of others. This book will be of interest to students of law, communications, political science, government and policy, business, and economics, as well as anyone interested in free speech and commerce on the internet.

Cyberspace Safety and Security: 10th International Symposium, CSS 2018, Amalfi, Italy, October 29–31, 2018, Proceedings (Lecture Notes in Computer Science #11161)

by Arcangelo Castiglione Florin Pop Massimo Ficco Francesco Palmieri

This book constitutes the proceedings of the 10th International Symposium on Cyberspace Safety and Security, CSS 2018, held in Amalfi, Italy, in October 2018. The 25 full papers presented in this volume were carefully reviewed and selected from 79 submissions.The papers focus on cybersecurity; cryptography, data security, and biometric techniques; and social security, ontologies, and smart applications.

Cyberthreats and the Decline of the Nation-State: Cyberthreats And The Decline Of The Nation-state (Routledge Research in Information Technology and E-Commerce Law)

by Susan W. Brenner

This book explores the extraordinary difficulties a nation-state’s law enforcement and military face in attempting to prevent cyber-attacks. In the wake of recent assaults including the denial of service attack on Estonia in 2007 and the widespread use of the Zeus Trojan Horse software, Susan W. Brenner explores how traditional categories and procedures inherent in law enforcement and military agencies can obstruct efforts to respond to cyberthreats. Brenner argues that the use of a territorially-based system of sovereignty to combat cyberthreats is ineffective, as cyberspace erodes the import of territory. This problem is compounded by the nature of cybercrime as a continually evolving phenomenon driven by rapid and complex technological change. Following an evaluation of the efficacy of the nation-state, the book goes on to explore how individuals and corporations could be integrated into a more decentralized, distributed system of cyberthreat control. Looking at initiatives in Estonia and Sweden which have attempted to incorporate civilians into their cyber-response efforts, Brenner suggests that civilian involvement may mediate the rigid hierarchies that exist among formal agencies and increase the flexibility of any response. This book will be of great interest to students and researchers of information technological law and security studies.

Cyberwar and Revolution: Digital Subterfuge in Global Capitalism

by Nick Dyer-Witheford Svitlana Matviyenko

Uncovering the class conflicts, geopolitical dynamics, and aggressive capitalism propelling the militarization of the internet Global surveillance, computational propaganda, online espionage, virtual recruiting, massive data breaches, hacked nuclear centrifuges and power grids—concerns about cyberwar have been mounting, rising to a fever pitch after the alleged Russian hacking of the U.S. presidential election and the Cambridge Analytica scandal. Although cyberwar is widely discussed, few accounts undertake a deep, critical view of its roots and consequences. Analyzing the new militarization of the internet, Cyberwar and Revolution argues that digital warfare is not a bug in the logic of global capitalism but rather a feature of its chaotic, disorderly unconscious. Urgently confronting the concept of cyberwar through the lens of both Marxist critical theory and psychoanalysis, Nick Dyer-Witheford and Svitlana Matviyenko provide a wide-ranging examination of the class conflicts and geopolitical dynamics propelling war across digital networks.Investigating the subjectivities that cyberwar mobilizes, exploits, and bewilders, and revealing how it permeates the fabric of everyday life and implicates us all in its design, this book also highlights the critical importance of the emergent resistance to this digital militarism—hacktivism, digital worker dissent, and off-the-grid activism—for effecting different, better futures.

Refine Search

Showing 16,551 through 16,575 of 75,762 results