- Table View
- List View
Cybersecurity: Ambient Technologies, IoT, and Industry 4.0 Implications (Artificial Intelligence (AI): Elementary to Advanced Practices)
by Om Prakash Singh Gautam Kumar Hemraj SainiIt is becoming increasingly important to design and develop adaptive, robust, scalable, reliable, security and privacy mechanisms for IoT applications and for Industry 4.0 related concerns. This book serves as a useful guide for researchers and industry professionals and will help beginners to learn the basics to the more advanced topics. Along with exploring security and privacy issues through the IoT ecosystem and examining its implications to the real-world, this book addresses cryptographic tools and techniques and presents the basic and high-level concepts that can serve as guidance for those in the industry as well as help beginners get a handle on both the basic and advanced aspects of security related issues. The book goes on to cover major challenges, issues, and advances in IoT and discusses data processing as well as applications for solutions, and assists in developing self-adaptive cyberphysical security systems that will help with issues brought about by new technologies within IoT and Industry 4.0. This edited book discusses the evolution of IoT and Industry 4.0 and brings security and privacy related technological tools and techniques onto a single platform so that researchers, industry professionals, graduate, postgraduate students, and academicians can easily understand the security, privacy, challenges and opportunity concepts and make then ready to use for applications in IoT and Industry 4.0.
Cybersecurity: Technology and Governance
by Audun JøsangThis book gives a complete introduction to cybersecurity and its many subdomains. It’s unique by covering both technical and governance aspects of cybersecurity and is easy to read with 150 full color figures. There are also exercises and study cases at the end of each chapter, with additional material on the book's website. The numerous high-profile cyberattacks being reported in the press clearly show that cyberthreats cause serious business risks. For this reason, cybersecurity has become a critical concern for global politics, national security, organizations as well for individual citizens. While cybersecurity has traditionally been a technological discipline, the field has grown so large and complex that proper governance of cybersecurity is needed. The primary audience for this book is advanced level students in computer science focusing on cybersecurity and cyber risk governance. The digital transformation of society also makes cybersecurity relevant in many other disciplines, hence this book is a useful resource for other disciplines, such as law, business management and political science. Additionally, this book is for anyone in the private or public sector, who wants to acquire or update their knowledge about cybersecurity both from a technological and governance perspective.
Cyberspace Law: Censorship and Regulation of the Internet (Routledge Research in Information Technology and E-Commerce Law)
by Hannibal TravisThis book explores what the American Civil Liberties Union calls the "third era" in cyberspace, in which filters "fundamentally alter the architectural structure of the Internet, with significant implications for free speech." Although courts and nongovernmental organizations increasingly insist upon constitutional and other legal guarantees of a freewheeling Internet, multi-national corporations compete to produce tools and strategies for making it more predictable. When Google attempted to improve our access to information containing in books and the World Wide Web, copyright litigation began to tie up the process of making content searchable, and resulted in the wrongful removal of access to thousands if not millions of works. Just as the courts were insisting that using trademarks online to criticize their owners is First Amendment-protected, corporations and trade associations accelerated their development of ways to make Internet companies liable for their users’ infringing words and actions, potentially circumventing free speech rights. And as social networking and content-sharing sites have proliferated, so have the terms of service and content-detecting tools for detecting, flagging, and deleting content that makes one or another corporation or trade association fear for its image or profits. The book provides a legal history of Internet regulation since the mid-1990s, with a particular focus on efforts by patent, trademark, and copyright owners to compel Internet firms to monitor their online offerings and remove or pay for any violations of the rights of others. This book will be of interest to students of law, communications, political science, government and policy, business, and economics, as well as anyone interested in free speech and commerce on the internet.
Cyberspace Safety and Security: 10th International Symposium, CSS 2018, Amalfi, Italy, October 29–31, 2018, Proceedings (Lecture Notes in Computer Science #11161)
by Florin Pop Arcangelo Castiglione Francesco Palmieri Massimo FiccoThis book constitutes the proceedings of the 10th International Symposium on Cyberspace Safety and Security, CSS 2018, held in Amalfi, Italy, in October 2018. The 25 full papers presented in this volume were carefully reviewed and selected from 79 submissions.The papers focus on cybersecurity; cryptography, data security, and biometric techniques; and social security, ontologies, and smart applications.
Cyberspace and Cybersecurity (Second Edition)
by George KostopoulosProviding comprehensive coverage of cyberspace and cyber security, this textbook not only focuses on technologies but also explores human factors and organizational perspectives and emphasizes why asset identification should be the cornerstone of any information security strategy. Topics include addressing vulnerabilities, building a secure enterprise, blocking intrusions, ethical and legal issues, and business continuity. Updates include topics such as cyber risks in mobile telephony, steganography, cyber security as an added value, ransomware defense, review of recent cyber laws, new types of cyber crime, plus new chapters on digital currencies and encryption key management.
Cyberspace, Cyberterrorism and the International Security in the Fourth Industrial Revolution: Threats, Assessment and Responses (Advanced Sciences and Technologies for Security Applications)
by Reza MontasariThis book represents an interdisciplinary academic endeavour intended to provide readers with a comprehensive, balanced, and nuanced examination of critical issues at the intersection of cyberspace, cyberterrorism, and national and international security. It draws insights from a range of diverse fields, including Computer Science, Social Science, Political Science, International Relations, Criminology, and Law. Furthermore, the book investigates the field of Artificial Intelligence (AI) and related technologies, exploring their dual role in this dynamic landscape of contemporary cyberthreats, with both constructive and malicious implications.The book comprises four distinct themes, with each theme represented by a dedicated Part. Within this organisational framework, each overarching theme is systematically explored through a series of chapters, providing readers with a clear and thematic roadmap for their journey through the content.Part I, Understanding Terrorism and Counter-Terrorism Strategies, of the book explores complexities surrounding contemporary global security challenges. It serves as the foundational segment of the book, consisting of three chapters that critically analyse various dimensions of terrorism and the strategies implemented to combat it.Part II, Cyberterrorism Landscape, of the book offers an in-depth assessment of the current cyberterrorism landscape. This section comprises two critical chapters, each contributing to a comprehensive understanding of the contemporary threats posed by cyberterrorism and their implications for national security.Part III, Countering Cyberterrorism with Technology, of the book forms the core of the book’s exploration into leveraging technology to mitigate the threats of cyberterrorism. This section includes four critical chapters, collectively providing an in-depth understanding of the intersection between technology and counterterrorism strategies.Part IV, Artificial Intelligence and National and International Security, of the book delves into the complex relationship between AI technology and the broader security landscape. Comprising three pivotal chapters, this section provides a detailed understanding of AI’s transformative role in shaping the future of national and international security.This comprehensive resource serves as a valuable reference for law enforcement, policymakers, cybersecurity experts, researchers, academics, and technology enthusiasts interested in counter-terrorism efforts. By exploring the intricate landscape of cyberspace, this book equips readers with knowledge essential to addressing the evolving challenges posed by cyber terrorism.This comprehensive resource serves as a valuable reference for law enforcement, policymakers, cybersecurity experts, researchers, academics, and technology enthusiasts interested in counter-terrorism efforts. By exploring the intricate landscape of cyberspace, this book equips readers with knowledge essential to addressing the evolving challenges posed by cyber terrorism.This comprehensive resource serves as a valuable reference for law enforcement, policymakers, cybersecurity experts, researchers, academics, and technology enthusiasts interested in counter-terrorism efforts. By exploring the intricate landscape of cyberspace, this book equips readers with knowledge essential to addressing the evolving challenges posed by cyber terrorism.This comprehensive resource serves as a valuable reference for law enforcement, policymakers, cybersecurity experts, researchers, academics, and technology enthusiasts interested in counter-terrorism efforts. By exploring the intricate landscape of cyberspace, this book equips readers with knowledge essential to addressing the evolving challenges posed by cyber terrorism.This comprehensive resource serves as a valuable reference for law enforcement, policymakers, cybersecurity experts, researchers, academics, and technology enthusiasts interested in counter-terrorism efforts. By exploring the in
Cyberspace: Risks and Benefits for Society, Security and Development (Advanced Sciences and Technologies for Security Applications)
by J. Martín Ramírez Luis A. García-SeguraThis book covers many aspects of cyberspace, emphasizing not only its possible ‘negative’ challenge as a threat to security, but also its positive influence as an efficient tool for defense as well as a welcome new factor for economic and industrial production. Cyberspace is analyzed from quite different and interdisciplinary perspectives, such as: conceptual and legal, military and socio-civil, psychological, commercial, cyber delinquency, cyber intelligence applied to public and private institutions, as well as the nuclear governance.
Cyberspies: The Secret History of Surveillance, Hacking, and Digital Espionage
by Gordon CoreraThe previously untold--and previously highly classified--story of the conflux of espionage and technology, with a compelling narrative rich with astonishing revelations taking readers from World War II to the internet age. As the digital era become increasingly pervasive, the intertwining forces of computers and espionage are reshaping the entire world; what was once the preserve of a few intelligence agencies now affects us all. Corera's compelling narrative takes us from the Second World War through the Cold War and the birth of the internet to the present era of hackers and surveillance. The book is rich with historical detail and characters, as well as astonishing revelations about espionage carried out in recent times by the UK, US, and China. Using unique access to the National Security Agency, GCHQ, Chinese officials, and senior executives from some of the most powerful global technology companies, Gordon Corera has gathered compelling stories from heads of state, hackers and spies of all stripes. Cyberspies is a ground-breaking exploration of the new space in which the worlds of espionage, diplomacy, international business, science, and technology collide.
Cyberstrike: DC (The Ben Morgan Thrillers)
by James Barrington Prof. Richard BenhamBen Morgan is back, and the stakes have never been higher.In Iraq, a surprise attack decimates the IS leadership. Revenge is sworn. A terrorist mastermind conceives a double-strike against America and Britain.Ten years later, cyberattacks hit both sides of the Atlantic. SAS soldiers are stricken by a silent chemical killer as London faces a devastating bombing attack.But the bigger and most dangerous threat is to Washington D.C., an attack that could cripple the West. In Washington, with the terrorist deadline looming, Ben Morgan puts the pieces together and finally glimpses the full extent of the plot. But stopping it will take everything he’s got. And more.A scintillating technothriller from a bestselling author and a cybersecurity expert, Cyberstrike DC is perfect for fans of Tom Clancy and James Swallow.
Cyberterror
by R. J. PineiroComputers increase the flow of natural gas to the San Antonio, Texas, distribution center increasing the pressure, triggering multiple leaks which result in massive explosions. The death toll is in the thousands, ten times the number of injured and homeless.Tom Graham has spent twenty years as America's top counterterrorist operative. But this attack was something neither Graham nor America were prepared for. An attack via computer, and suddenly a new word enters the American mainstream, cyberterror. Enlisting the aid of the FBI's Karen Frost, a special agent who has never played by the rules, and Michael Patrick Ryan, Stanford computer whiz, Graham tracks one of the hackers to an address in Florida. The new government Agency, the Counter Cyberterrorism Team, kicks in the door, only to find the booby-trapped corpse of a computer science professor. The explosion takes out two CCT agents.Meanwhile, a mysterious terrorist, Kulzak, is on to his next target in America. But the apparently random strikes are just a cover to divert attention from his true mission. Suddenly, Graham, Frost, and Ryan find themselves at the center of a war for the survival of our nation. A war that will force them to draw on their combined experiences to fight and stop an enemy that is as formidable as he is ruthless, as deadly as he is brilliant-an enemy determined to unleash a wave of destruction on America.At the Publisher's request, this title is being sold without Digital Rights Management Software (DRM) applied.
Cyberthreats and the Decline of the Nation-State: Cyberthreats And The Decline Of The Nation-state (Routledge Research in Information Technology and E-Commerce Law)
by Susan W. BrennerThis book explores the extraordinary difficulties a nation-state’s law enforcement and military face in attempting to prevent cyber-attacks. In the wake of recent assaults including the denial of service attack on Estonia in 2007 and the widespread use of the Zeus Trojan Horse software, Susan W. Brenner explores how traditional categories and procedures inherent in law enforcement and military agencies can obstruct efforts to respond to cyberthreats. Brenner argues that the use of a territorially-based system of sovereignty to combat cyberthreats is ineffective, as cyberspace erodes the import of territory. This problem is compounded by the nature of cybercrime as a continually evolving phenomenon driven by rapid and complex technological change. Following an evaluation of the efficacy of the nation-state, the book goes on to explore how individuals and corporations could be integrated into a more decentralized, distributed system of cyberthreat control. Looking at initiatives in Estonia and Sweden which have attempted to incorporate civilians into their cyber-response efforts, Brenner suggests that civilian involvement may mediate the rigid hierarchies that exist among formal agencies and increase the flexibility of any response. This book will be of great interest to students and researchers of information technological law and security studies.
Cyberwar and Revolution: Digital Subterfuge in Global Capitalism
by Svitlana Matviyenko Nick Dyer-WithefordUncovering the class conflicts, geopolitical dynamics, and aggressive capitalism propelling the militarization of the internet Global surveillance, computational propaganda, online espionage, virtual recruiting, massive data breaches, hacked nuclear centrifuges and power grids—concerns about cyberwar have been mounting, rising to a fever pitch after the alleged Russian hacking of the U.S. presidential election and the Cambridge Analytica scandal. Although cyberwar is widely discussed, few accounts undertake a deep, critical view of its roots and consequences. Analyzing the new militarization of the internet, Cyberwar and Revolution argues that digital warfare is not a bug in the logic of global capitalism but rather a feature of its chaotic, disorderly unconscious. Urgently confronting the concept of cyberwar through the lens of both Marxist critical theory and psychoanalysis, Nick Dyer-Witheford and Svitlana Matviyenko provide a wide-ranging examination of the class conflicts and geopolitical dynamics propelling war across digital networks.Investigating the subjectivities that cyberwar mobilizes, exploits, and bewilders, and revealing how it permeates the fabric of everyday life and implicates us all in its design, this book also highlights the critical importance of the emergent resistance to this digital militarism—hacktivism, digital worker dissent, and off-the-grid activism—for effecting different, better futures.
Cyborg (The MIT Press Essential Knowledge series)
by Laura Forlano Danya GlabauA concise introduction to cyborg theory that examines the way in which technology is situated, political, and embodied.This introduction to cyborg theory provides a critical vantage point for analyzing the claims around emerging technologies like automation, robots, and AI. Cyborg analyzes and reframes popular and scholarly conversations about cyborgs from the perspective of feminist cyborg theory. Drawing on their combined decades of training, teaching, and research in the social sciences, design, and engineering education, Laura Forlano and Danya Glabau introduce an approach called critical cyborg literacy. Critical cyborg literacy foregrounds power dynamics and pays attention to the ways that social and cultural factors such as gender, race, and disability shape how technology is imagined, developed, used, and resisted.Forlano and Glabau offer critical cyborg literacy as a way of thinking through questions about the relationship between humanity and technology in areas such as engineering and computing, art and design, and health care and medicine, as well as the social sciences and humanities. Cyborg examines whether modern technologies make us all cyborgs—if we consider, for instance, the fact that we use daily technologies at work, have technologies embedded into our bodies in health care applications, or use technology to critically explore possibilities as artists, designers, activists, and creators. Lastly, Cyborg offers perspectives from critical race, feminist, and disability thinkers to help chart a path forward for cyborg theory in the twenty-first century.
Cyborg Futures: Cross-disciplinary Perspectives on Artificial Intelligence and Robotics (Social and Cultural Studies of Robots and AI)
by Teresa HeffernanThis volume brings together academics from evolutionary biology, literary theory, robotics, digital culture, anthropology, sociology, and environmental studies to consider the impact of robotics and AI on society. By bringing these perspectives together in one book, readers gain a sense of the complex scientific, social, and ideological contexts within which AI and robotics research is unfolding, as well as the illusory suppositions and distorted claims being mobilized by the industry in the name of bettering humanity’s future. Discussions about AI and robotics have been shaped by computer science and engineering, steered by corporate and military interests, forged by transhumanist philosophy and libertarian politics, animated by fiction, and hyped by the media. From fiction passing as science to the illusion of AI autonomy to the business of ethics to the automation of war, this collection recognizes the inevitable entanglement of humanity and technology, while exposing the problematic assumptions and myths driving the field in order to better assess its risks and potential.
Cyborg Mind: What Brain-Computer and Mind-Cyberspace Interfaces Mean for Cyberneuroethics
by Calum MacKellarWith the development of new direct interfaces between the human brain and computer systems, the time has come for an in-depth ethical examination of the way these neuronal interfaces may support an interaction between the mind and cyberspace. <P><P> In so doing, this book does not hesitate to blend disciplines including neurobiology, philosophy, anthropology and politics. It also invites society, as a whole, to seek a path in the use of these interfaces enabling humanity to prosper while avoiding the relevant risks. As such, the volume is the first extensive study in cyberneuroethics, a subject matter which is certain to have a significant impact in the 21st century and beyond.
Cyborgs: Pushing Nature's Boundaries (Fountas & Pinnell Classroom, Guided Reading)
by Amanda YskampNIMAC-sourced textbook. Man or Machine—or Both. Scientists and engineers are working together to invent sophisticated cyborgs—modified life forms made by combining natural organisms with hi-tech machines. These special plants, animals, and humans have enhanced abilities that may benefit society. But they also challenge our ideas about nature. Only time will tell how we interact with cyborgs and how they change the way we live.
Cycle of Rice, Cycle of Life: A Story of Sustainable Farming
by Jan ReynoldsA photographic exploration of the cycles of traditional Balinese rice farming, a dynamic model of earth-friendly agriculture that connects a unique culture with the natural world.On the island of Bali in Southeast Asia, rice farming is a way of life. The people live in tune with the natural rhythms and cycles of the water and the soil. Ingrained in their community and culture, rice farming connects them to the land and one another. Balinese farmers have planted rice using an intricate system of water sharing and crop rotation for more than a thousand years. Intertwined with their spiritual, social, and day-to-day lives, this system has made Bali a leading producer of one of the world's most important crops. And because Balinese rice farming respects the balances of nature, it serves as a remarkable example of sustainable agriculture in an increasingly industrialized world. With lush photographs and captivating text, Jan Reynolds explores the traditional world of rice farming on the beautiful island of Bali. Readers of all ages will come away with an enhanced awareness of how we farm, eat, and live today, and the effects these practices have on the world of tomorrow.
Cycles of Invention and Discovery
by Venkatesh NarayanamurtiUsing Nobel Prize-winning examples like the transistor, laser, and magnetic resonance imaging, Venky Narayanamurti and Tolu Odumosu explore the daily micro-practices of research and show that distinctions between the search for knowledge and creative problem solving break down when one pays attention to how pathbreaking research actually happens.
Cyclic Deformation in Oxides, Carbides and Nitrides: Alumina, Magnesia, Yttria, SiC, B4C and Si3N4 (Structural Integrity #22)
by Joshua PellegThis book presents the fatigue properties of structural materials used for the production of ceramics. It explains the cyclic deformation and how failures occur by fatigue. Dislocations related to fatigue are examined. The way that fatigue induces structural changes in material undergoing cyclic deformation is explained as well. A special chapter considers the importance of environmental effects on fatigue. Surface treatment such as shot pinning, sand blasting and laser treatment are described. The book explains how design should be carried out considering all the major factors leading to reduced fatigue resistance.
Cyclic Oxidation of High Temperature Materials EFC 27: Mechanisms, Testing Methods, Characterisation and Life Time Estimation - Proceedings of an EFC Workshop (European Federation of Corrosion Publications)
by Michael SchutzeProceedings of a workshop organised by the European Federation of Corrosion, Frankfurt/Main, 1999, the papers review the current understanding of materials behaviour under cyclic oxidation.
Cyclic Plasticity of Engineering Materials: Experiments and Models
by Guozheng Kang Qianhua KanNew contributions to the cyclic plasticity of engineering materials Written by leading experts in the field, this book provides an authoritative and comprehensive introduction to cyclic plasticity of metals, polymers, composites and shape memory alloys. Each chapter is devoted to fundamentals of cyclic plasticity or to one of the major classes of materials, thereby providing a wide coverage of the field. The book deals with experimental observations on metals, composites, polymers and shape memory alloys, and the corresponding cyclic plasticity models for metals, polymers, particle reinforced metal matrix composites and shape memory alloys. Also, the thermo-mechanical coupled cyclic plasticity models are discussed for metals and shape memory alloys. Key features: Provides a comprehensive introduction to cyclic plasticity Presents Macroscopic and microscopic observations on the ratchetting of different materials Establishes cyclic plasticity constitutive models for different materials. Analysis of cyclic plasticity in engineering structures. This book is an important reference for students, practicing engineers and researchers who study cyclic plasticity in the areas of mechanical, civil, nuclear, and aerospace engineering as well as materials science.
Cyclic β-Glucans from Microorganisms: Production, Properties and Applications (SpringerBriefs in Microbiology #0)
by Sathyanarayana Gummadi Mukesh Doble Geetha Venkatachalamto Cyclic glucans are polysaccharides that are predominantly produced by Agrobacterium, Bradyrhizobium and Rhizobium sp. and widely used in the pharmaceutical and food industries. In this book, the applications, properties, analytical tools, production and genes of four main cyclic β-glucans from microorganisms are highlighted and critically evaluated. As biocompatible and biodegradable renewable resources, they have an immense potential for future applications, which has not yet been fully exploited. This concise review will help to bridge this gap.
Cycling for Sustainable Cities (Urban and Industrial Environments)
by Ralph Buehler and John PucherHow to make city cycling--the most sustainable form of urban transportation--safe, practical, and convenient for all cyclists.Cycling is the most sustainable mode of urban transportation, practical for most short- and medium-distance trips--commuting to and from work or school, shopping, visiting friends, going to the doctor's office. It's good for your health, spares the environment a trip's worth of auto emissions, and is economical for both public and personal budgets. Cycling, with all its benefits, should not be reserved for the fit, the spandex-clad, and the daring. Cycling for Sustainable Cities shows how to make city cycling safe, practical, and convenient for all cyclists.
Cycling to Work: An Analysis of the Practice of Utility Cycling (SpringerBriefs in Applied Sciences and Technology)
by Patrick RératThis book presents a thorough discussion of utility cycling, cycling in the urban environment, and everyday mobility. It is based on large survey answered by 14,000 participants in the bike to work action in Switzerland, and quantifies the various dimensions of utility cycling.It proposes an innovative theoretical framework to analyse and understand the various dimensions of the uses of bikes and their diversity. It addresses the factors that motivate commuters to get on their bike, and highlights the barriers to this practice between deficient infrastructures and lack of legitimacy. This research makes a diagnosis and discusses the way to develop this sustainable mode of transportation. By combining quantitative results in the form of tables, figures, and maps, and including qualitative results in the form of quotations from survey participants, this book provides a thorough and enjoyable read. It will be of interest to researchers, policy makers, advanced students in the field of urban planning, social sciences, and transportation.
Cyclodextrin Applications in Medicine, Food, Environment and Liquid Crystals (Environmental Chemistry for a Sustainable World #17)
by Eric Lichtfouse Sophie Fourmentin Grégorio CriniThis book is the second volume of two volumes on cyclodextrins published in the series Environmental Chemistry for a Sustainable World. This volume focuses on cyclodextrin applications. The first chapter by Divya Arora and Sundeep Jaglan presents cyclodextrin-based carriers for delivery of dietary phytochemicals. The second chapter by Éva Fenyvesi et al. describes the interactions of steroids with cyclodextrins and their applications to pharmaceuticals, food, biotechnology and environment. Nazli Erdoğar and Erem Bilensoy discuss cyclodextrin-based nanosystems in targeted cancer therapy. Miriana Kfoury et al. review the use of cyclodextrins for essential oils applications in chapter 4. Hiroshi Ikeda demonstrates in chapter 5 that chromophore-appended cyclodextrins are effective for chemosensors to detect organic molecules by fluorescence or absorbance changes. Then Grégorio Crini et al. describe silica materials-containing cyclodextrin for pollutant removal. The final chapter by Chang-Chun Ling et al. summarizes the synthesis and characterization of supramolecular liquid crystals based on cyclodextrins and their applications.