Cyberterrorism and cybercrime are on the rise. One new webpage was infected every 4.5 seconds by malicious email attachments in 2008, five times more than the previous year. The normal computer user also has to fight against new 'scareware' or fake antivirus software websites (five new ones identified every day) and the ubiquitous spam. It seems clear that the more technology advances, the greater the increase in the number of threats. According to expert reports there were more than 237 million...
Cyberwar and Revolution
by Nick Dyer-Witheford and Svitlana Matviyenko
Uncovering the class conflicts, geopolitical dynamics, and aggressive capitalism propelling the militarization of the internet Global surveillance, computational propaganda, online espionage, virtual recruiting, massive data breaches, hacked nuclear centrifuges and power grids—concerns about cyberwar have been mounting, rising to a fever pitch after the alleged Russian hacking of the U.S. presidential election and the Cambridge Analytica scandal. Although cyberwar is widely discussed, few acco...
Advances in Digital Forensics XVI (IFIP Advances in Information and Communication Technology, #589)
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Computer networks, cloud computing, smartphones, embedded devices and the Internet of Things have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence in legal proceedings. Digital forensic...
Der spielerische Umgang mit auch komplexeren Themen der Zahlentheorie soll dem mit Programmiertechniken vertrauten Leser zu eigenen Experimenten animieren und ein Verständnis für Sicherheitstechniken fördern, das nicht mehr von Versprechungen anderer abhängt.
Collaborative Approaches for Cyber Security in Cyber-Physical Systems
"As cyber-attacks dominate front-page news, as hackers displace terrorists on the list of global threats, and as top generals warn of a coming cyber war, few books are more timely and enlightening than Dark Territory: The Secret History of Cyber War, by Slate columnist and Pulitzer Prize-winning journalist Fred Kaplan. Kaplan probes the inner corridors of the National Security Agency, the beyond-top-secret cyber units in the Pentagon, the "information warfare" squads of the military services, an...
Eccws 2016 - Proceedings of the 15th European Conference on Cyber Warfare and Security
Multimedia Encryption and Authentication Techniques and Applications (Internet and Communications)
by Borko Furht and Darko Kirovski
Intellectual property owners must continually exploit new ways of reproducing, distributing, and marketing their products. However, the threat of piracy looms as a major problem with digital distribution and storage technologies. Multimedia Encryption and Authentication Techniques and Applications covers current and future trends in the design of modern systems that use encryption and authentication to protect multimedia content. Containing the works of contributing authors who are worldwide exp...
5G for the Connected World
Comprehensive Handbook Demystifies 5G for Technical and Business Professionals in Mobile Telecommunication Fields Much is being said regarding the possibilities and capabilities of the emerging 5G technology, as the evolution towards 5G promises to transform entire industries and many aspects of our society. 5G for the Connected World offers a comprehensive technical overview that telecommunication professionals need to understand and take advantage of these developments. The book offers a wide...
Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection
Advances in Cryptology - Asiacrypt '91 (Lecture Notes in Computer Science, #739)
Deploying Biometrics for Customers, Employees and Citizens
by Samir Nanavati