Browse Results

Showing 16,226 through 16,250 of 72,518 results

Cybersecurity Risk of IoT on Smart Cities

by Roberto O. Andrade Luis Tello-Oquendo Iván Ortiz

This book covers the topics on cyber security in IoT systems used in different verticals such as agriculture, health, homes, transportation within the context of smart cities. The authors provide an analysis of the importance of developing smart cities by incorporating technologies such as IoT to achieve the sustainable development goals (SDGs) within the agenda 2030. Furthermore, it includes an analysis of the cyber security challenges generated by IoT systems due to factors such as heterogeneity, lack of security in design and few hardware resources in these systems, and how they should be addressed from a risk analysis approach, evaluating the risk analysis methodologies widely used in traditional IT systems.

Cybersecurity Teaching in Higher Education

by Leslie F. Sikos Paul Haskell-Dowland

This book collects state-of-the-art curriculum development considerations, training methods, techniques, and best practices, as well as cybersecurity lab requirements and aspects to take into account when setting up new labs, all based on hands-on experience in teaching cybersecurity in higher education.In parallel with the increasing number and impact of cyberattacks, there is a growing demand for cybersecurity courses in higher education. More and more educational institutions offer cybersecurity courses, which come with unique and constantly evolving challenges not known in other disciplines. For example, step-by-step guides may not work for some of the students if the configuration of a computing environment is not identical or similar enough to the one the workshop material is based on, which can be a huge problem for blended and online delivery modes. Using nested virtualization in a cloud infrastructure might not be authentic for all kinds of exercises, because some of its characteristics can be vastly different from an enterprise network environment that would be the most important to demonstrate to students. The availability of cybersecurity datasets for training and educational purposes can be limited, and the publicly available datasets might not suit a large share of training materials, because they are often excessively documented, but not only by authoritative websites, which render these inappropriate for assignments and can be misleading for online students following training workshops and looking for online resources about datasets such as the Boss of the SOC (BOTS) datasets. The constant changes of Kali Linux make it necessary to regularly update training materials, because commands might not run the same way they did a couple of months ago. The many challenges of cybersecurity education are further complicated by the continuous evolution of networking and cloud computing, hardware and software, which shapes student expectations: what is acceptable and respected today might be obsolete or even laughable tomorrow.

Cybersecurity Vigilance and Security Engineering of Internet of Everything (Internet of Things)

by Kashif Naseer Qureshi Thomas Newe Gwanggil Jeon Abdellah Chehri

This book first discusses cyber security fundamentals then delves into security threats and vulnerabilities, security vigilance, and security engineering for Internet of Everything (IoE) networks. After an introduction, the first section covers the security threats and vulnerabilities or techniques to expose the networks to security attacks such as repudiation, tampering, spoofing, and elevation of privilege. The second section of the book covers vigilance or prevention techniques like intrusion detection systems, trust evaluation models, crypto, and hashing privacy solutions for IoE networks. This section also covers the security engineering for embedded and cyber-physical systems in IoE networks such as blockchain, artificial intelligence, and machine learning-based solutions to secure the networks. This book provides a clear overview in all relevant areas so readers gain a better understanding of IoE networks in terms of security threats, prevention, and other security mechanisms.

Cyberspace: Risks and Benefits for Society, Security and Development (Advanced Sciences and Technologies for Security Applications)

by Luis A. García-Segura J. Martín Ramírez

This book covers many aspects of cyberspace, emphasizing not only its possible ‘negative’ challenge as a threat to security, but also its positive influence as an efficient tool for defense as well as a welcome new factor for economic and industrial production. Cyberspace is analyzed from quite different and interdisciplinary perspectives, such as: conceptual and legal, military and socio-civil, psychological, commercial, cyber delinquency, cyber intelligence applied to public and private institutions, as well as the nuclear governance.

Cyberspace and Cybersecurity (Second Edition)

by George Kostopoulos

Providing comprehensive coverage of cyberspace and cyber security, this textbook not only focuses on technologies but also explores human factors and organizational perspectives and emphasizes why asset identification should be the cornerstone of any information security strategy. Topics include addressing vulnerabilities, building a secure enterprise, blocking intrusions, ethical and legal issues, and business continuity. Updates include topics such as cyber risks in mobile telephony, steganography, cyber security as an added value, ransomware defense, review of recent cyber laws, new types of cyber crime, plus new chapters on digital currencies and encryption key management.

Cyberspace, Cyberterrorism and the International Security in the Fourth Industrial Revolution: Threats, Assessment and Responses (Advanced Sciences and Technologies for Security Applications)

by Reza Montasari

This book represents an interdisciplinary academic endeavour intended to provide readers with a comprehensive, balanced, and nuanced examination of critical issues at the intersection of cyberspace, cyberterrorism, and national and international security. It draws insights from a range of diverse fields, including Computer Science, Social Science, Political Science, International Relations, Criminology, and Law. Furthermore, the book investigates the field of Artificial Intelligence (AI) and related technologies, exploring their dual role in this dynamic landscape of contemporary cyberthreats, with both constructive and malicious implications.The book comprises four distinct themes, with each theme represented by a dedicated Part. Within this organisational framework, each overarching theme is systematically explored through a series of chapters, providing readers with a clear and thematic roadmap for their journey through the content.Part I, Understanding Terrorism and Counter-Terrorism Strategies, of the book explores complexities surrounding contemporary global security challenges. It serves as the foundational segment of the book, consisting of three chapters that critically analyse various dimensions of terrorism and the strategies implemented to combat it.Part II, Cyberterrorism Landscape, of the book offers an in-depth assessment of the current cyberterrorism landscape. This section comprises two critical chapters, each contributing to a comprehensive understanding of the contemporary threats posed by cyberterrorism and their implications for national security.Part III, Countering Cyberterrorism with Technology, of the book forms the core of the book’s exploration into leveraging technology to mitigate the threats of cyberterrorism. This section includes four critical chapters, collectively providing an in-depth understanding of the intersection between technology and counterterrorism strategies.Part IV, Artificial Intelligence and National and International Security, of the book delves into the complex relationship between AI technology and the broader security landscape. Comprising three pivotal chapters, this section provides a detailed understanding of AI’s transformative role in shaping the future of national and international security.This comprehensive resource serves as a valuable reference for law enforcement, policymakers, cybersecurity experts, researchers, academics, and technology enthusiasts interested in counter-terrorism efforts. By exploring the intricate landscape of cyberspace, this book equips readers with knowledge essential to addressing the evolving challenges posed by cyber terrorism.This comprehensive resource serves as a valuable reference for law enforcement, policymakers, cybersecurity experts, researchers, academics, and technology enthusiasts interested in counter-terrorism efforts. By exploring the intricate landscape of cyberspace, this book equips readers with knowledge essential to addressing the evolving challenges posed by cyber terrorism.This comprehensive resource serves as a valuable reference for law enforcement, policymakers, cybersecurity experts, researchers, academics, and technology enthusiasts interested in counter-terrorism efforts. By exploring the intricate landscape of cyberspace, this book equips readers with knowledge essential to addressing the evolving challenges posed by cyber terrorism.This comprehensive resource serves as a valuable reference for law enforcement, policymakers, cybersecurity experts, researchers, academics, and technology enthusiasts interested in counter-terrorism efforts. By exploring the intricate landscape of cyberspace, this book equips readers with knowledge essential to addressing the evolving challenges posed by cyber terrorism.This comprehensive resource serves as a valuable reference for law enforcement, policymakers, cybersecurity experts, researchers, academics, and technology enthusiasts interested in counter-terrorism efforts. By exploring the in

Cyberspace Law: Censorship and Regulation of the Internet (Routledge Research in Information Technology and E-Commerce Law)

by Hannibal Travis

This book explores what the American Civil Liberties Union calls the "third era" in cyberspace, in which filters "fundamentally alter the architectural structure of the Internet, with significant implications for free speech." Although courts and nongovernmental organizations increasingly insist upon constitutional and other legal guarantees of a freewheeling Internet, multi-national corporations compete to produce tools and strategies for making it more predictable. When Google attempted to improve our access to information containing in books and the World Wide Web, copyright litigation began to tie up the process of making content searchable, and resulted in the wrongful removal of access to thousands if not millions of works. Just as the courts were insisting that using trademarks online to criticize their owners is First Amendment-protected, corporations and trade associations accelerated their development of ways to make Internet companies liable for their users’ infringing words and actions, potentially circumventing free speech rights. And as social networking and content-sharing sites have proliferated, so have the terms of service and content-detecting tools for detecting, flagging, and deleting content that makes one or another corporation or trade association fear for its image or profits. The book provides a legal history of Internet regulation since the mid-1990s, with a particular focus on efforts by patent, trademark, and copyright owners to compel Internet firms to monitor their online offerings and remove or pay for any violations of the rights of others. This book will be of interest to students of law, communications, political science, government and policy, business, and economics, as well as anyone interested in free speech and commerce on the internet.

Cyberspace Safety and Security: 10th International Symposium, CSS 2018, Amalfi, Italy, October 29–31, 2018, Proceedings (Lecture Notes in Computer Science #11161)

by Arcangelo Castiglione Florin Pop Massimo Ficco Francesco Palmieri

This book constitutes the proceedings of the 10th International Symposium on Cyberspace Safety and Security, CSS 2018, held in Amalfi, Italy, in October 2018. The 25 full papers presented in this volume were carefully reviewed and selected from 79 submissions.The papers focus on cybersecurity; cryptography, data security, and biometric techniques; and social security, ontologies, and smart applications.

Cyberspies: The Secret History of Surveillance, Hacking, and Digital Espionage

by Gordon Corera

The previously untold--and previously highly classified--story of the conflux of espionage and technology, with a compelling narrative rich with astonishing revelations taking readers from World War II to the internet age. As the digital era become increasingly pervasive, the intertwining forces of computers and espionage are reshaping the entire world; what was once the preserve of a few intelligence agencies now affects us all. Corera's compelling narrative takes us from the Second World War through the Cold War and the birth of the internet to the present era of hackers and surveillance. The book is rich with historical detail and characters, as well as astonishing revelations about espionage carried out in recent times by the UK, US, and China. Using unique access to the National Security Agency, GCHQ, Chinese officials, and senior executives from some of the most powerful global technology companies, Gordon Corera has gathered compelling stories from heads of state, hackers and spies of all stripes. Cyberspies is a ground-breaking exploration of the new space in which the worlds of espionage, diplomacy, international business, science, and technology collide.

Cyberstrike: DC (The Ben Morgan Thrillers)

by James Barrington Prof. Richard Benham

Ben Morgan is back, and the stakes have never been higher.In Iraq, a surprise attack decimates the IS leadership. Revenge is sworn. A terrorist mastermind conceives a double-strike against America and Britain.Ten years later, cyberattacks hit both sides of the Atlantic. SAS soldiers are stricken by a silent chemical killer as London faces a devastating bombing attack.But the bigger and most dangerous threat is to Washington D.C., an attack that could cripple the West. In Washington, with the terrorist deadline looming, Ben Morgan puts the pieces together and finally glimpses the full extent of the plot. But stopping it will take everything he’s got. And more.A scintillating technothriller from a bestselling author and a cybersecurity expert, Cyberstrike DC is perfect for fans of Tom Clancy and James Swallow.

Cyberthreats and the Decline of the Nation-State: Cyberthreats And The Decline Of The Nation-state (Routledge Research in Information Technology and E-Commerce Law)

by Susan W. Brenner

This book explores the extraordinary difficulties a nation-state’s law enforcement and military face in attempting to prevent cyber-attacks. In the wake of recent assaults including the denial of service attack on Estonia in 2007 and the widespread use of the Zeus Trojan Horse software, Susan W. Brenner explores how traditional categories and procedures inherent in law enforcement and military agencies can obstruct efforts to respond to cyberthreats. Brenner argues that the use of a territorially-based system of sovereignty to combat cyberthreats is ineffective, as cyberspace erodes the import of territory. This problem is compounded by the nature of cybercrime as a continually evolving phenomenon driven by rapid and complex technological change. Following an evaluation of the efficacy of the nation-state, the book goes on to explore how individuals and corporations could be integrated into a more decentralized, distributed system of cyberthreat control. Looking at initiatives in Estonia and Sweden which have attempted to incorporate civilians into their cyber-response efforts, Brenner suggests that civilian involvement may mediate the rigid hierarchies that exist among formal agencies and increase the flexibility of any response. This book will be of great interest to students and researchers of information technological law and security studies.

Cyberwar and Revolution: Digital Subterfuge in Global Capitalism

by Nick Dyer-Witheford Svitlana Matviyenko

Uncovering the class conflicts, geopolitical dynamics, and aggressive capitalism propelling the militarization of the internet Global surveillance, computational propaganda, online espionage, virtual recruiting, massive data breaches, hacked nuclear centrifuges and power grids—concerns about cyberwar have been mounting, rising to a fever pitch after the alleged Russian hacking of the U.S. presidential election and the Cambridge Analytica scandal. Although cyberwar is widely discussed, few accounts undertake a deep, critical view of its roots and consequences. Analyzing the new militarization of the internet, Cyberwar and Revolution argues that digital warfare is not a bug in the logic of global capitalism but rather a feature of its chaotic, disorderly unconscious. Urgently confronting the concept of cyberwar through the lens of both Marxist critical theory and psychoanalysis, Nick Dyer-Witheford and Svitlana Matviyenko provide a wide-ranging examination of the class conflicts and geopolitical dynamics propelling war across digital networks.Investigating the subjectivities that cyberwar mobilizes, exploits, and bewilders, and revealing how it permeates the fabric of everyday life and implicates us all in its design, this book also highlights the critical importance of the emergent resistance to this digital militarism—hacktivism, digital worker dissent, and off-the-grid activism—for effecting different, better futures.

Cyborg (The MIT Press Essential Knowledge series)

by Laura Forlano Danya Glabau

A concise introduction to cyborg theory that examines the way in which technology is situated, political, and embodied.This introduction to cyborg theory provides a critical vantage point for analyzing the claims around emerging technologies like automation, robots, and AI. Cyborg analyzes and reframes popular and scholarly conversations about cyborgs from the perspective of feminist cyborg theory. Drawing on their combined decades of training, teaching, and research in the social sciences, design, and engineering education, Laura Forlano and Danya Glabau introduce an approach called critical cyborg literacy. Critical cyborg literacy foregrounds power dynamics and pays attention to the ways that social and cultural factors such as gender, race, and disability shape how technology is imagined, developed, used, and resisted.Forlano and Glabau offer critical cyborg literacy as a way of thinking through questions about the relationship between humanity and technology in areas such as engineering and computing, art and design, and health care and medicine, as well as the social sciences and humanities. Cyborg examines whether modern technologies make us all cyborgs—if we consider, for instance, the fact that we use daily technologies at work, have technologies embedded into our bodies in health care applications, or use technology to critically explore possibilities as artists, designers, activists, and creators. Lastly, Cyborg offers perspectives from critical race, feminist, and disability thinkers to help chart a path forward for cyborg theory in the twenty-first century.

Cyborg Futures: Cross-disciplinary Perspectives on Artificial Intelligence and Robotics (Social and Cultural Studies of Robots and AI)

by Teresa Heffernan

This volume brings together academics from evolutionary biology, literary theory, robotics, digital culture, anthropology, sociology, and environmental studies to consider the impact of robotics and AI on society. By bringing these perspectives together in one book, readers gain a sense of the complex scientific, social, and ideological contexts within which AI and robotics research is unfolding, as well as the illusory suppositions and distorted claims being mobilized by the industry in the name of bettering humanity’s future. Discussions about AI and robotics have been shaped by computer science and engineering, steered by corporate and military interests, forged by transhumanist philosophy and libertarian politics, animated by fiction, and hyped by the media. From fiction passing as science to the illusion of AI autonomy to the business of ethics to the automation of war, this collection recognizes the inevitable entanglement of humanity and technology, while exposing the problematic assumptions and myths driving the field in order to better assess its risks and potential.

Cyborg Mind: What Brain-Computer and Mind-Cyberspace Interfaces Mean for Cyberneuroethics

by Calum MacKellar

With the development of new direct interfaces between the human brain and computer systems, the time has come for an in-depth ethical examination of the way these neuronal interfaces may support an interaction between the mind and cyberspace. <P><P> In so doing, this book does not hesitate to blend disciplines including neurobiology, philosophy, anthropology and politics. It also invites society, as a whole, to seek a path in the use of these interfaces enabling humanity to prosper while avoiding the relevant risks. As such, the volume is the first extensive study in cyberneuroethics, a subject matter which is certain to have a significant impact in the 21st century and beyond.

Cyborgs: Pushing Nature's Boundaries (Fountas & Pinnell Classroom, Guided Reading)

by Amanda Yskamp

NIMAC-sourced textbook. Man or Machine—or Both. Scientists and engineers are working together to invent sophisticated cyborgs—modified life forms made by combining natural organisms with hi-tech machines. These special plants, animals, and humans have enhanced abilities that may benefit society. But they also challenge our ideas about nature. Only time will tell how we interact with cyborgs and how they change the way we live.

Cycle of Rice, Cycle of Life: A Story of Sustainable Farming

by Jan Reynolds

A photographic exploration of the cycles of traditional Balinese rice farming, a dynamic model of earth-friendly agriculture that connects a unique culture with the natural world.On the island of Bali in Southeast Asia, rice farming is a way of life. The people live in tune with the natural rhythms and cycles of the water and the soil. Ingrained in their community and culture, rice farming connects them to the land and one another. Balinese farmers have planted rice using an intricate system of water sharing and crop rotation for more than a thousand years. Intertwined with their spiritual, social, and day-to-day lives, this system has made Bali a leading producer of one of the world's most important crops. And because Balinese rice farming respects the balances of nature, it serves as a remarkable example of sustainable agriculture in an increasingly industrialized world. With lush photographs and captivating text, Jan Reynolds explores the traditional world of rice farming on the beautiful island of Bali. Readers of all ages will come away with an enhanced awareness of how we farm, eat, and live today, and the effects these practices have on the world of tomorrow.

Cycles of Invention and Discovery

by Venkatesh Narayanamurti

Using Nobel Prize-winning examples like the transistor, laser, and magnetic resonance imaging, Venky Narayanamurti and Tolu Odumosu explore the daily micro-practices of research and show that distinctions between the search for knowledge and creative problem solving break down when one pays attention to how pathbreaking research actually happens.

Cyclic β-Glucans from Microorganisms: Production, Properties and Applications (SpringerBriefs in Microbiology #0)

by Sathyanarayana Gummadi Mukesh Doble Geetha Venkatachalam

to Cyclic glucans are polysaccharides that are predominantly produced by Agrobacterium, Bradyrhizobium and Rhizobium sp. and widely used in the pharmaceutical and food industries. In this book, the applications, properties, analytical tools, production and genes of four main cyclic β-glucans from microorganisms are highlighted and critically evaluated. As biocompatible and biodegradable renewable resources, they have an immense potential for future applications, which has not yet been fully exploited. This concise review will help to bridge this gap.

Cyclic Deformation in Oxides, Carbides and Nitrides: Alumina, Magnesia, Yttria, SiC, B4C and Si3N4 (Structural Integrity #22)

by Joshua Pelleg

This book presents the fatigue properties of structural materials used for the production of ceramics. It explains the cyclic deformation and how failures occur by fatigue. Dislocations related to fatigue are examined. The way that fatigue induces structural changes in material undergoing cyclic deformation is explained as well. A special chapter considers the importance of environmental effects on fatigue. Surface treatment such as shot pinning, sand blasting and laser treatment are described. The book explains how design should be carried out considering all the major factors leading to reduced fatigue resistance.

Cyclic Oxidation of High Temperature Materials EFC 27: Mechanisms, Testing Methods, Characterisation and Life Time Estimation - Proceedings of an EFC Workshop (European Federation of Corrosion Publications)

by Michael Schutze

Proceedings of a workshop organised by the European Federation of Corrosion, Frankfurt/Main, 1999, the papers review the current understanding of materials behaviour under cyclic oxidation.

Cyclic Plasticity of Engineering Materials: Experiments and Models

by Guozheng Kang Qianhua Kan

New contributions to the cyclic plasticity of engineering materials Written by leading experts in the field, this book provides an authoritative and comprehensive introduction to cyclic plasticity of metals, polymers, composites and shape memory alloys. Each chapter is devoted to fundamentals of cyclic plasticity or to one of the major classes of materials, thereby providing a wide coverage of the field. The book deals with experimental observations on metals, composites, polymers and shape memory alloys, and the corresponding cyclic plasticity models for metals, polymers, particle reinforced metal matrix composites and shape memory alloys. Also, the thermo-mechanical coupled cyclic plasticity models are discussed for metals and shape memory alloys. Key features: Provides a comprehensive introduction to cyclic plasticity Presents Macroscopic and microscopic observations on the ratchetting of different materials Establishes cyclic plasticity constitutive models for different materials. Analysis of cyclic plasticity in engineering structures. This book is an important reference for students, practicing engineers and researchers who study cyclic plasticity in the areas of mechanical, civil, nuclear, and aerospace engineering as well as materials science.

Cycling for Sustainable Cities (Urban and Industrial Environments)

by Ralph Buehler and John Pucher

How to make city cycling--the most sustainable form of urban transportation--safe, practical, and convenient for all cyclists.Cycling is the most sustainable mode of urban transportation, practical for most short- and medium-distance trips--commuting to and from work or school, shopping, visiting friends, going to the doctor's office. It's good for your health, spares the environment a trip's worth of auto emissions, and is economical for both public and personal budgets. Cycling, with all its benefits, should not be reserved for the fit, the spandex-clad, and the daring. Cycling for Sustainable Cities shows how to make city cycling safe, practical, and convenient for all cyclists.

Cycling to Work: An Analysis of the Practice of Utility Cycling (SpringerBriefs in Applied Sciences and Technology)

by Patrick Rérat

This book presents a thorough discussion of utility cycling, cycling in the urban environment, and everyday mobility. It is based on large survey answered by 14,000 participants in the bike to work action in Switzerland, and quantifies the various dimensions of utility cycling.It proposes an innovative theoretical framework to analyse and understand the various dimensions of the uses of bikes and their diversity. It addresses the factors that motivate commuters to get on their bike, and highlights the barriers to this practice between deficient infrastructures and lack of legitimacy. This research makes a diagnosis and discusses the way to develop this sustainable mode of transportation. By combining quantitative results in the form of tables, figures, and maps, and including qualitative results in the form of quotations from survey participants, this book provides a thorough and enjoyable read. It will be of interest to researchers, policy makers, advanced students in the field of urban planning, social sciences, and transportation.

Cyclodextrin Applications in Medicine, Food, Environment and Liquid Crystals (Environmental Chemistry for a Sustainable World #17)

by Sophie Fourmentin Grégorio Crini Eric Lichtfouse

This book is the second volume of two volumes on cyclodextrins published in the series Environmental Chemistry for a Sustainable World. This volume focuses on cyclodextrin applications. The first chapter by Divya Arora and Sundeep Jaglan presents cyclodextrin-based carriers for delivery of dietary phytochemicals. The second chapter by Éva Fenyvesi et al. describes the interactions of steroids with cyclodextrins and their applications to pharmaceuticals, food, biotechnology and environment. Nazli Erdoğar and Erem Bilensoy discuss cyclodextrin-based nanosystems in targeted cancer therapy. Miriana Kfoury et al. review the use of cyclodextrins for essential oils applications in chapter 4. Hiroshi Ikeda demonstrates in chapter 5 that chromophore-appended cyclodextrins are effective for chemosensors to detect organic molecules by fluorescence or absorbance changes. Then Grégorio Crini et al. describe silica materials-containing cyclodextrin for pollutant removal. The final chapter by Chang-Chun Ling et al. summarizes the synthesis and characterization of supramolecular liquid crystals based on cyclodextrins and their applications.

Refine Search

Showing 16,226 through 16,250 of 72,518 results