Narrow your search
Listing 1 - 10 of 29 << page
of 3
>>
Sort by

Book
Data and Goliath : the hidden battles to collect your data and control your world
Author:
ISBN: 9780393244816 Year: 2015 Publisher: New York, N.Y. : W.W. Norton & Company,

Applied cryptography : protocols, algorithms, and source code in C.
Author:
ISBN: 0471117099 0471128457 9780471117094 Year: 1996 Publisher: New York (N.Y.) Wiley

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Programming --- cryptografie --- Computer security --- Cryptography --- Telecommunication --- Sécurité informatique --- Cryptographie --- Télécommunications --- Security measures --- Sécurité --- Mesures --- 621.391.7 --- 681.3*E --- -Cryptography --- 384.0 --- 653 --- AA / International- internationaal --- 004.056.55 --- coderen --- computernetwerken --- computerveiligheid --- encryptie --- software --- 005.82 --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Electronic digital computers --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting --- Secret systems of electrical communication --- Data --- Telecommunicatie: algemeenheden. --- Handelscorrespondentie : briefwisseling, fax en e-mailverkeer. Telefoon- en telegraafcodes. --- data-encryptie --- Computer security. --- Cryptography. --- Security measures. --- 681.3*E Data --- 621.391.7 Secret systems of electrical communication --- Cyber security --- Cybersecurity --- Sécurité informatique --- Télécommunications --- Sécurité --- Protection of computer systems --- Protection --- Telecommunicatie: algemeenheden --- Handelscorrespondentie : briefwisseling, fax en e-mailverkeer. Telefoon- en telegraafcodes --- Telecommunication - Security measures --- Telecommunication. Security measures


Book
Cryptographie appliquée : protocoles, algorithmes et codes source en C
Author:
ISBN: 2841800369 9782841800360 Year: 1997 Publisher: Paris : International Thomson Publishing France,

Secrets and lies : digital security in a networked world
Author:
ISBN: 0471253111 9780471253112 Year: 2000 Publisher: New York (N.Y.) : Wiley,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Secrets et mensonges : sécurité numérique dans un monde en réseau
Author:
ISBN: 2711786846 9782711786848 Year: 2001 Publisher: Paris : Vuibert Informatique,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Bienvenu dans un univers numérique où l'information est immédiatement disponible et les acteurs irrémédiablement connectés. Notre monde est de plus en plus, sinon totalement, dépendant des télécommunications. L'Internet explose, l'usage du courrier électronique se banalise, la téléphonie mobile séduit le plus grand nombre. Mais cette passion dévorante pour la technique a un prix : vivre dans un environnement de plus en plus exposé aux menaces de sécurité. Ainsi, les entreprises du monde entier doivent prendre la mesure des risques liés au commerce électronique ; les individus la mesure de leur vulnérabilité aux atteintes à leur vie privée. Bruce Schneier, expert renommé en sécurité informatique, explique dans cet ouvrage ce que les entreprises et les personnes doivent absolument savoir, de manière à survivre ou rester libres à l'heure d'Internet. Car " Si vous pensez que la technologie peut résoudre vos problèmes de sécurité, alors vous n'avez rien compris ni aux problèmes ni à la technologie ". Il n'existe pas de panacée en matière de sécurité informatique, Les failles au sein des systèmes, les attaques et pirateries s'accroissant, il devient vital de bien gérer cet état de fait et de protéger ses données. Comprendre qui sont les agresseurs, ce qu'ils veulent, comment contrer les dangers qu'ils représentent, connaître les technologies de sécurité, leurs possibilités mais aussi leurs limitations, assurer une veille technologique, définir une gestion des risques, mettre en œuvre une politique de sécurité, voilà entre autres les thèmes abordés par cet ouvrage informé, pragmatique et plein d'humour.


Book
Liars and outliers : enabling the trust that society needs to thrive
Author:
ISBN: 9781118143308 1118143302 Year: 2012 Publisher: Indianapolis. : Wiley,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Argues society requires trust in order to function, describes how society creates and maintains that trust through societal pressures, and discusses what happens when those pressures fail.

Beyond fear : thinking sensibly about security in an uncertain world
Author:
ISBN: 0387026207 9786610188369 1280188367 0387217126 9780387026206 Year: 2003 Publisher: New York, New York State : Copernicus Books,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Many of us, especially since 9/11, have become personally concerned about issues of security, and this is no surprise. Security is near the top of government and corporate agendas around the globe. Security-related stories appear on the front page everyday. How well though, do any of us truly understand what achieving real security involves? In Beyond Fear, Bruce Schneier invites us to take a critical look at not just the threats to our security, but the ways in which we're encouraged to think about security by law enforcement agencies, businesses of all shapes and sizes, and our national governments and militaries. Schneier believes we all can and should be better security consumers, and that the trade-offs we make in the name of security - in terms of cash outlays, taxes, inconvenience, and diminished freedoms - should be part of an ongoing negotiation in our personal, professional, and civic lives, and the subject of an open and informed national discussion. With a well-deserved reputation for original and sometimes iconoclastic thought, Schneier has a lot to say that is provocative, counter-intuitive, and just plain good sense. He explains in detail, for example, why we need to design security systems that don't just work well, but fail well, and why secrecy on the part of government often undermines security. He also believes, for instance, that national ID cards are an exceptionally bad idea: technically unsound, and even destructive of security. And, contrary to a lot of current nay-sayers, he thinks online shopping is fundamentally safe, and that many of the new airline security measure (though by no means all) are actually quite effective. A skeptic of much that's promised by highly touted technologies like biometrics, Schneier is also a refreshingly positive, problem-solving force in the often self-dramatizing and fear-mongering world of security pundits. Schneier helps the reader to understand the issues at stake, and how to best come to one's own conclusions, including the vast infrastructure we already have in place, and the vaster systems--some useful, others useless or worse--that we're being asked to submit to and pay for. Bruce Schneier is the author of seven books, including Applied Cryptography (which Wired called "the one book the National Security Agency wanted never to be published") and Secrets and Lies (described in Fortune as "startlingly lively...[a] jewel box of little surprises you can actually use."). He is also Founder and Chief Technology Officer of Counterpane Internet Security, Inc., and publishes Crypto-Gram, one of the most widely read newsletters in the field of online security.

Keywords

Terrorism --- War on Terrorism --- -War on Terrorism, 2001 --- -363.32 --- Acts of terrorism --- Attacks, Terrorist --- Global terrorism --- International terrorism --- Political terrorism --- Terror attacks --- Terrorist acts --- Terrorist attacks --- World terrorism --- Direct action --- Insurgency --- Political crimes and offenses --- Subversive activities --- Political violence --- Terror --- Prevention --- Terrorism -- United States -- Prevention. --- Veiligheid. --- Physics. --- Data encryption (Computer science). --- Coding theory. --- System safety. --- Popular works. --- Medicine. --- Health. --- Social work. --- Security Science and Technology. --- Social Work. --- Popular Science in Medicine and Health. --- Popular Science, general. --- Data Encryption. --- Coding and Information Theory. --- War on Terrorism, 2001-2009. --- Prevention. --- War on Terrorism, 2001-. --- Beveiliging: computernetwerken. --- Science (General). --- Cryptology. --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Clinical sciences --- Medical profession --- Human biology --- Life sciences --- Medical sciences --- Pathology --- Physicians --- Benevolent institutions --- Philanthropy --- Relief stations (for the poor) --- Social service agencies --- Social welfare --- Social work --- Human services --- Medicine . --- Information theory. --- Communication theory --- Communication --- Cybernetics --- Personal health --- Wellness --- Medicine --- Physiology --- Diseases --- Holistic medicine --- Hygiene --- Well-being --- Health Workforce --- Safety, System --- Safety of systems --- Systems safety --- Accidents --- Industrial safety --- Systems engineering --- Global Struggle Against Violent Extremism, 2001-2009 --- Global War on Terror, 2001-2009 --- GWOT, 2001-2009 (War on Terrorism) --- Terror War, 2001-2009 --- Terrorism War, 2001-2009 --- War against Terrorism, 2001-2009 --- War on Terror, 2001-2009 --- Military history, Modern --- World politics --- Afghan War, 2001 --- -Iraq War, 2003-2011 --- Operation Enduring Freedom, 2001 --- -Prevention. --- Afghan War, 2001-2021 --- Iraq War, 2003-2011


Book
Data and Goliath : the hidden battles to collect your data and control your world
Author:
ISBN: 9780393352177 9780393244816 039335217X 0393244814 Year: 2016 Publisher: New York (N. Y.) Norton & Company

Loading...
Export citation

Choose an application

Bookmark

Abstract

"You are under surveillance right now. Your cell phone provider tracks your location and knows who’s with you. Your online and in-store purchasing patterns are recorded, and reveal if you’re unemployed, sick, or pregnant. Your e-mails and texts expose your intimate and casual friends. Google knows what you’re thinking because it saves your private searches. Facebook can determine your sexual orientation without you ever mentioning it. The powers that surveil us do more than simply store this information. Corporations use surveillance to manipulate not only the news articles and advertisements we each see, but also the prices we’re offered. Governments use surveillance to discriminate, censor, chill free speech, and put people in danger worldwide. And both sides share this information with each other or, even worse, lose it to cybercriminals in huge data breaches. Much of this is voluntary: we cooperate with corporate surveillance because it promises us convenience, and we submit to government surveillance because it promises us protection. The result is a mass surveillance society of our own making. But have we given up more than we’ve gained? In Data and Goliath, security expert Bruce Schneier offers another path, one that values both security and privacy. He shows us exactly what we can do to reform our government surveillance programs and shake up surveillance-based business models, while also providing tips for you to protect your privacy every day. You’ll never look at your phone, your computer, your credit cards, or even your car in the same way again." [Publisher's website]

Keywords

BPB1611 --- Surveillance électronique --- Protection de la vie privée --- Elektronisch toezicht --- Eerbiediging van het privé-leven --- Computer crimes. --- Cyberterrorism. --- Data protection. --- Privacy, Right of. --- Electronic surveillance --- Information technology --- Computer security --- Privacy, Right of --- Social control --- Social aspects --- privatumo apsauga --- beskyttelse af privatlivet --- varstvo zasebnosti --- eraelu puutumatuse kaitse --- Schutz der Privatsphäre --- заштита на приватноста --- protezione della vita privata --- заштита приватности --- ochrana soukromí --- proteção da vida privada --- protection of privacy --- privatlivets helgd --- privātās dzīves aizsardzība --- protección de la vida privada --- προστασία της ιδιωτικής ζωής --- a magánélet védelme --- ochrana súkromia --- prawo do prywatności --- неприкосновеност на частен живот --- yksityisyyden suoja --- mbrojtja e jetës private --- zaštita privatnosti --- eerbiediging van het privé-leven --- protezzjoni tal-privatezza --- protecția vieții private --- Recht auf Respektierung der Privatsphäre --- тајност на писмата --- teisė į privatumą --- diritto della vita privata --- derecho a la intimidad --- tutela della vita privata --- a magán- és családi élet tiszteletben tartásához való jog --- právo na súkromie --- ochrana soukromého a rodinného života --- recht op privacy --- δικαίωμα σεβασμού της ιδιωτικής ζωής --- dreptul la respectatrea viații private --- õigus eraelu puutumatusele --- ret til privatliv --- right to privacy --- rätt till privatliv --- direito ao respeito da vida privada --- tiesības uz privāto dzīvi --- pravo na privatnost --- oikeus yksityisyyteen --- e drejtë për jetë private --- интегритет на личноста --- право на приватност --- právo na soukromí --- protecção da vida privada --- recht op privé-leven --- droit au respect de la vie privée --- derecho al honor --- rispetto della vita privata --- cosaint príobháideachais --- Electronic surveillance - Social aspects --- Information technology - Social aspects --- Electronic data processing departments --- Systèmes informatiques --- Security measures. --- Mesures de sûreté. --- Protection de la vie privée


Book
Click here to kill everybody. : Security and survival in a hyper-connected world.
Author:
ISBN: 9780393608885 9780393357448 Year: 2018 Publisher: New York W. W. Norton & Company

Loading...
Export citation

Choose an application

Bookmark

Abstract

We have created the ultimate hive-mind robot: an Internet of interconnected devices that senses, thinks and acts. Bruce Schneier calls it the “World-Sized Web”. It includes everything from driverless cars to smart thermostats, from billboards that respond to specific people to drones equipped with their own behavioural algorithms. While the World-Sized Web carries enormous potential, Schneier argues that we are unprepared for the vulnerabilities it brings. Cutting-edge digital attackers can now crash your car, pacemaker and home security system and everyone else’s. Click Here to Kill Everybody explores the risks and security implications of the World-Sized Web and lays out common-sense policies that will allow us to enjoy the benefits of this new omnipotent age without surrendering ourselves entirely to our creation.

Listing 1 - 10 of 29 << page
of 3
>>
Sort by