Author: Wynn, Martin George
Publisher: IGI Global
ISBN: 1799877140
Category : Business & Economics
Languages : en
Pages : 487
Book Description
Companies from various sectors of the economy are confronted with the new phenomenon of digital transformation and are faced with the challenge of formulating and implementing a company-wide strategy to incorporate what are often viewed as “disruptive” technologies. These technologies are sometimes associated with significant and extremely rapid change, in some cases with even the replacement of established business models. Many of these technologies have been deployed in unison by leading-edge companies acting as the catalyst for significant process change and people skills enhancement. The Handbook of Research on Digital Transformation, Industry Use Cases, and the Impact of Disruptive Technologies examines the phenomenon of digital transformation and the impact of disruptive technologies through the lens of industry case studies where different combinations of these new technologies have been deployed and incorporated into enterprise IT and business strategies. Covering topics including chatbot implementation, multinational companies, cloud computing, internet of things, artificial intelligence, big data and analytics, immersive technologies, and social media, this book is essential for senior management, IT managers, technologists, computer scientists, cybersecurity analysts, academicians, researchers, IT consultancies, professors, and students.
Handbook of Research on Digital Transformation, Industry Use Cases, and the Impact of Disruptive Technologies
Author: Wynn, Martin George
Publisher: IGI Global
ISBN: 1799877140
Category : Business & Economics
Languages : en
Pages : 487
Book Description
Companies from various sectors of the economy are confronted with the new phenomenon of digital transformation and are faced with the challenge of formulating and implementing a company-wide strategy to incorporate what are often viewed as “disruptive” technologies. These technologies are sometimes associated with significant and extremely rapid change, in some cases with even the replacement of established business models. Many of these technologies have been deployed in unison by leading-edge companies acting as the catalyst for significant process change and people skills enhancement. The Handbook of Research on Digital Transformation, Industry Use Cases, and the Impact of Disruptive Technologies examines the phenomenon of digital transformation and the impact of disruptive technologies through the lens of industry case studies where different combinations of these new technologies have been deployed and incorporated into enterprise IT and business strategies. Covering topics including chatbot implementation, multinational companies, cloud computing, internet of things, artificial intelligence, big data and analytics, immersive technologies, and social media, this book is essential for senior management, IT managers, technologists, computer scientists, cybersecurity analysts, academicians, researchers, IT consultancies, professors, and students.
Publisher: IGI Global
ISBN: 1799877140
Category : Business & Economics
Languages : en
Pages : 487
Book Description
Companies from various sectors of the economy are confronted with the new phenomenon of digital transformation and are faced with the challenge of formulating and implementing a company-wide strategy to incorporate what are often viewed as “disruptive” technologies. These technologies are sometimes associated with significant and extremely rapid change, in some cases with even the replacement of established business models. Many of these technologies have been deployed in unison by leading-edge companies acting as the catalyst for significant process change and people skills enhancement. The Handbook of Research on Digital Transformation, Industry Use Cases, and the Impact of Disruptive Technologies examines the phenomenon of digital transformation and the impact of disruptive technologies through the lens of industry case studies where different combinations of these new technologies have been deployed and incorporated into enterprise IT and business strategies. Covering topics including chatbot implementation, multinational companies, cloud computing, internet of things, artificial intelligence, big data and analytics, immersive technologies, and social media, this book is essential for senior management, IT managers, technologists, computer scientists, cybersecurity analysts, academicians, researchers, IT consultancies, professors, and students.
National Security in the Digital Age
Author: Sushma Devi
Publisher: Academic Press
ISBN: 9781680534757
Category : Political Science
Languages : en
Pages : 0
Book Description
In this pioneering study, Sushma Devi explores the place of cybersecurity within the larger international debate on security issues. She argues that it is important to begin placing cybersecurity in the context of national security matters since the issues are most often relegated to technology debates. *National Security in the Digital Age *argues that cyber threats can be viewed as national security matters and therefore should be relevant to the security studies field and should be analyzed using security studies theories. It also highlights the policy and institutional responses to cybersecurity challenges undertaken by the government of India. Unexplored security issues frequently identified in the world today, including those in a critical region of international conflict, are thus central to this book. The use of internet is rapidly expanding and has become the core component of everyday society. Yet easy access to data brings along severe security issues. The large number of attacks in recent years have had serious economic and social consequences, resulting in state officials all over the world acknowledging the importance of effective cybersecurity. Nevertheless, implementing effective measures to secure cyberspace remains difficult. A cyber threat has the potential to breach all levels of security very quickly due to the speed with which actions can occur and the extent of our interconnectedness. For a geopolitical realist, states play a central role in addressing cyber threats to national security because they remain the actors with the power and authority to improve defenses against most existential cyber threats. While private sector actors in most countries are critical to security in cyberspace, the threat agents can be criminals, hackers, terrorists, and nation-states. The potential victims at risk from these threats are equally diverse. Threat actors often target personal information to commit fraud, an act that can, in the inter-connected world of cyberspace, make all individuals in a nation potential victims. Herein lies the complexity of analyzing the inflow/outflow of information across borders and the ramification of this analysis for national security.
Publisher: Academic Press
ISBN: 9781680534757
Category : Political Science
Languages : en
Pages : 0
Book Description
In this pioneering study, Sushma Devi explores the place of cybersecurity within the larger international debate on security issues. She argues that it is important to begin placing cybersecurity in the context of national security matters since the issues are most often relegated to technology debates. *National Security in the Digital Age *argues that cyber threats can be viewed as national security matters and therefore should be relevant to the security studies field and should be analyzed using security studies theories. It also highlights the policy and institutional responses to cybersecurity challenges undertaken by the government of India. Unexplored security issues frequently identified in the world today, including those in a critical region of international conflict, are thus central to this book. The use of internet is rapidly expanding and has become the core component of everyday society. Yet easy access to data brings along severe security issues. The large number of attacks in recent years have had serious economic and social consequences, resulting in state officials all over the world acknowledging the importance of effective cybersecurity. Nevertheless, implementing effective measures to secure cyberspace remains difficult. A cyber threat has the potential to breach all levels of security very quickly due to the speed with which actions can occur and the extent of our interconnectedness. For a geopolitical realist, states play a central role in addressing cyber threats to national security because they remain the actors with the power and authority to improve defenses against most existential cyber threats. While private sector actors in most countries are critical to security in cyberspace, the threat agents can be criminals, hackers, terrorists, and nation-states. The potential victims at risk from these threats are equally diverse. Threat actors often target personal information to commit fraud, an act that can, in the inter-connected world of cyberspace, make all individuals in a nation potential victims. Herein lies the complexity of analyzing the inflow/outflow of information across borders and the ramification of this analysis for national security.
Navigating the Digital Age
Author: Matt Aiello
Publisher:
ISBN: 9781732731806
Category :
Languages : en
Pages : 332
Book Description
Welcome to the all-new second edition of Navigating the Digital Age. This edition brings together more than 50 leaders and visionaries from business, science, technology, government, aca¬demia, cybersecurity, and law enforce¬ment. Each has contributed an exclusive chapter designed to make us think in depth about the ramifications of this digi-tal world we are creating. Our purpose is to shed light on the vast possibilities that digital technologies present for us, with an emphasis on solving the existential challenge of cybersecurity. An important focus of the book is centered on doing business in the Digital Age-par¬ticularly around the need to foster a mu¬tual understanding between technical and non-technical executives when it comes to the existential issues surrounding cybersecurity. This book has come together in three parts. In Part 1, we focus on the future of threat and risks. Part 2 emphasizes lessons from today's world, and Part 3 is designed to help you ensure you are covered today. Each part has its own flavor and personal¬ity, reflective of its goals and purpose. Part 1 is a bit more futuristic, Part 2 a bit more experiential, and Part 3 a bit more practical. How we work together, learn from our mistakes, deliver a secure and safe digital future-those are the elements that make up the core thinking behind this book. We cannot afford to be complacent. Whether you are a leader in business, government, or education, you should be knowledgeable, diligent, and action-oriented. It is our sincerest hope that this book provides answers, ideas, and inspiration.If we fail on the cybersecurity front, we put all of our hopes and aspirations at risk. So we start this book with a simple proposition: When it comes to cybersecurity, we must succeed.
Publisher:
ISBN: 9781732731806
Category :
Languages : en
Pages : 332
Book Description
Welcome to the all-new second edition of Navigating the Digital Age. This edition brings together more than 50 leaders and visionaries from business, science, technology, government, aca¬demia, cybersecurity, and law enforce¬ment. Each has contributed an exclusive chapter designed to make us think in depth about the ramifications of this digi-tal world we are creating. Our purpose is to shed light on the vast possibilities that digital technologies present for us, with an emphasis on solving the existential challenge of cybersecurity. An important focus of the book is centered on doing business in the Digital Age-par¬ticularly around the need to foster a mu¬tual understanding between technical and non-technical executives when it comes to the existential issues surrounding cybersecurity. This book has come together in three parts. In Part 1, we focus on the future of threat and risks. Part 2 emphasizes lessons from today's world, and Part 3 is designed to help you ensure you are covered today. Each part has its own flavor and personal¬ity, reflective of its goals and purpose. Part 1 is a bit more futuristic, Part 2 a bit more experiential, and Part 3 a bit more practical. How we work together, learn from our mistakes, deliver a secure and safe digital future-those are the elements that make up the core thinking behind this book. We cannot afford to be complacent. Whether you are a leader in business, government, or education, you should be knowledgeable, diligent, and action-oriented. It is our sincerest hope that this book provides answers, ideas, and inspiration.If we fail on the cybersecurity front, we put all of our hopes and aspirations at risk. So we start this book with a simple proposition: When it comes to cybersecurity, we must succeed.
Cybersecurity in the Digital Age
Author: Gregory A. Garrett
Publisher: Aspen Publishers
ISBN: 1543808808
Category : Law
Languages : en
Pages : 554
Book Description
Produced by a team of 14 cybersecurity experts from five countries, Cybersecurity in the Digital Age is ideally structured to help everyone—from the novice to the experienced professional—understand and apply both the strategic concepts as well as the tools, tactics, and techniques of cybersecurity. Among the vital areas covered by this team of highly regarded experts are: Cybersecurity for the C-suite and Board of Directors Cybersecurity risk management framework comparisons Cybersecurity identity and access management – tools & techniques Vulnerability assessment and penetration testing – tools & best practices Monitoring, detection, and response (MDR) – tools & best practices Cybersecurity in the financial services industry Cybersecurity in the healthcare services industry Cybersecurity for public sector and government contractors ISO 27001 certification – lessons learned and best practices With Cybersecurity in the Digital Age, you immediately access the tools and best practices you need to manage: Threat intelligence Cyber vulnerability Penetration testing Risk management Monitoring defense Response strategies And more! Are you prepared to defend against a cyber attack? Based entirely on real-world experience, and intended to empower you with the practical resources you need today, Cybersecurity in the Digital Age delivers: Process diagrams Charts Time-saving tables Relevant figures Lists of key actions and best practices And more! The expert authors of Cybersecurity in the Digital Age have held positions as Chief Information Officer, Chief Information Technology Risk Officer, Chief Information Security Officer, Data Privacy Officer, Chief Compliance Officer, and Chief Operating Officer. Together, they deliver proven practical guidance you can immediately implement at the highest levels.
Publisher: Aspen Publishers
ISBN: 1543808808
Category : Law
Languages : en
Pages : 554
Book Description
Produced by a team of 14 cybersecurity experts from five countries, Cybersecurity in the Digital Age is ideally structured to help everyone—from the novice to the experienced professional—understand and apply both the strategic concepts as well as the tools, tactics, and techniques of cybersecurity. Among the vital areas covered by this team of highly regarded experts are: Cybersecurity for the C-suite and Board of Directors Cybersecurity risk management framework comparisons Cybersecurity identity and access management – tools & techniques Vulnerability assessment and penetration testing – tools & best practices Monitoring, detection, and response (MDR) – tools & best practices Cybersecurity in the financial services industry Cybersecurity in the healthcare services industry Cybersecurity for public sector and government contractors ISO 27001 certification – lessons learned and best practices With Cybersecurity in the Digital Age, you immediately access the tools and best practices you need to manage: Threat intelligence Cyber vulnerability Penetration testing Risk management Monitoring defense Response strategies And more! Are you prepared to defend against a cyber attack? Based entirely on real-world experience, and intended to empower you with the practical resources you need today, Cybersecurity in the Digital Age delivers: Process diagrams Charts Time-saving tables Relevant figures Lists of key actions and best practices And more! The expert authors of Cybersecurity in the Digital Age have held positions as Chief Information Officer, Chief Information Technology Risk Officer, Chief Information Security Officer, Data Privacy Officer, Chief Compliance Officer, and Chief Operating Officer. Together, they deliver proven practical guidance you can immediately implement at the highest levels.
Sexual Violence in a Digital Age
Author: Anastasia Powell
Publisher: Springer
ISBN: 113758047X
Category : Social Science
Languages : en
Pages : 323
Book Description
This book examines how digital communications technologies have transformed modern societies, with profound effects both for everyday life, and for everyday crimes. Sexual violence, which is recognized globally as a significant human rights problem, has likewise changed in the digital age. Through an investigation into our increasingly and ever-normalised digital lives, this study analyses the rise of technology-facilitated sexual assault, ‘revenge pornography’, online sexual harassment and gender-based hate speech. Drawing on ground-breaking research into the nature and extent of technology-facilitated forms of sexual violence and harassment, the authors explore the reach of these harms, the experiences of victims, the views of service providers and law enforcement bodies, as well as the implications for law, justice and resistance. Sexual Violence in a Digital Age is compelling reading for scholars, activists, and policymakers who seek to understand how technology is implicated in sexual violence, and what needs to be done to address sexual violence in a digital age.
Publisher: Springer
ISBN: 113758047X
Category : Social Science
Languages : en
Pages : 323
Book Description
This book examines how digital communications technologies have transformed modern societies, with profound effects both for everyday life, and for everyday crimes. Sexual violence, which is recognized globally as a significant human rights problem, has likewise changed in the digital age. Through an investigation into our increasingly and ever-normalised digital lives, this study analyses the rise of technology-facilitated sexual assault, ‘revenge pornography’, online sexual harassment and gender-based hate speech. Drawing on ground-breaking research into the nature and extent of technology-facilitated forms of sexual violence and harassment, the authors explore the reach of these harms, the experiences of victims, the views of service providers and law enforcement bodies, as well as the implications for law, justice and resistance. Sexual Violence in a Digital Age is compelling reading for scholars, activists, and policymakers who seek to understand how technology is implicated in sexual violence, and what needs to be done to address sexual violence in a digital age.
The Digital Big Bang
Author: Phil Quade
Publisher: John Wiley & Sons
ISBN: 1119617367
Category : Computers
Languages : en
Pages : 336
Book Description
Cybersecurity experts from across industries and sectors share insights on how to think like scientists to master cybersecurity challenges Humankind’s efforts to explain the origin of the cosmos birthed disciplines such as physics and chemistry. Scientists conceived of the cosmic ‘Big Bang’ as an explosion of particles—everything in the universe centered around core elements and governed by laws of matter and gravity. In the modern era of digital technology, we are experiencing a similar explosion of ones and zeros, an exponentially expanding universe of bits of data centered around the core elements of speed and connectivity. One of the disciplines to emerge from our efforts to make sense of this new universe is the science of cybersecurity. Cybersecurity is as central to the Digital Age as physics and chemistry were to the Scientific Age. The Digital Big Bang explores current and emerging knowledge in the field of cybersecurity, helping readers think like scientists to master cybersecurity principles and overcome cybersecurity challenges. This innovative text adopts a scientific approach to cybersecurity, identifying the science’s fundamental elements and examining how these elements intersect and interact with each other. Author Phil Quade distills his over three decades of cyber intelligence, defense, and attack experience into an accessible, yet detailed, single-volume resource. Designed for non-specialist business leaders and cybersecurity practitioners alike, this authoritative book is packed with real-world examples, techniques, and strategies no organization should be without. Contributions from many of the world’s leading cybersecurity experts and policymakers enable readers to firmly grasp vital cybersecurity concepts, methods, and practices. This important book: Guides readers on both fundamental tactics and advanced strategies Features observations, hypotheses, and conclusions on a wide range of cybersecurity issues Helps readers work with the central elements of cybersecurity, rather than fight or ignore them Includes content by cybersecurity leaders from organizations such as Microsoft, Target, ADP, Capital One, Verisign, AT&T, Samsung, and many others Offers insights from national-level security experts including former Secretary of Homeland Security Michael Chertoff and former Director of National Intelligence Mike McConnell The Digital Big Bang is an invaluable source of information for anyone faced with the challenges of 21st century cybersecurity in all industries and sectors, including business leaders, policy makers, analysts and researchers as well as IT professionals, educators, and students.
Publisher: John Wiley & Sons
ISBN: 1119617367
Category : Computers
Languages : en
Pages : 336
Book Description
Cybersecurity experts from across industries and sectors share insights on how to think like scientists to master cybersecurity challenges Humankind’s efforts to explain the origin of the cosmos birthed disciplines such as physics and chemistry. Scientists conceived of the cosmic ‘Big Bang’ as an explosion of particles—everything in the universe centered around core elements and governed by laws of matter and gravity. In the modern era of digital technology, we are experiencing a similar explosion of ones and zeros, an exponentially expanding universe of bits of data centered around the core elements of speed and connectivity. One of the disciplines to emerge from our efforts to make sense of this new universe is the science of cybersecurity. Cybersecurity is as central to the Digital Age as physics and chemistry were to the Scientific Age. The Digital Big Bang explores current and emerging knowledge in the field of cybersecurity, helping readers think like scientists to master cybersecurity principles and overcome cybersecurity challenges. This innovative text adopts a scientific approach to cybersecurity, identifying the science’s fundamental elements and examining how these elements intersect and interact with each other. Author Phil Quade distills his over three decades of cyber intelligence, defense, and attack experience into an accessible, yet detailed, single-volume resource. Designed for non-specialist business leaders and cybersecurity practitioners alike, this authoritative book is packed with real-world examples, techniques, and strategies no organization should be without. Contributions from many of the world’s leading cybersecurity experts and policymakers enable readers to firmly grasp vital cybersecurity concepts, methods, and practices. This important book: Guides readers on both fundamental tactics and advanced strategies Features observations, hypotheses, and conclusions on a wide range of cybersecurity issues Helps readers work with the central elements of cybersecurity, rather than fight or ignore them Includes content by cybersecurity leaders from organizations such as Microsoft, Target, ADP, Capital One, Verisign, AT&T, Samsung, and many others Offers insights from national-level security experts including former Secretary of Homeland Security Michael Chertoff and former Director of National Intelligence Mike McConnell The Digital Big Bang is an invaluable source of information for anyone faced with the challenges of 21st century cybersecurity in all industries and sectors, including business leaders, policy makers, analysts and researchers as well as IT professionals, educators, and students.
Cybersecurity and Human Rights in the Age of Cyberveillance
Author: Joanna Kulesza
Publisher: Rowman & Littlefield
ISBN: 1442260424
Category : Computers
Languages : en
Pages : 250
Book Description
Cybersecurity and Human Rights in the Age of Cyberveillance isa collection of articles by distinguished authors from the US and Europe and presents a contemporary perspectives on the limits online of human rights. By considering the latest political events and case law, including the NSA PRISM surveillance program controversy, the planned EU data protection amendments, and the latest European Court of Human Rights jurisprudence, it provides an analysis of the ongoing legal discourse on global cyberveillance. Using examples from contemporary state practice, including content filtering and Internet shutdowns during the Arab Spring as well as the PRISM controversy, the authors identify limits of state and third party interference with individual human rights of Internet users. Analysis is based on existing human rights standards, as enshrined within international law including the Universal Declaration of Human Rights, International Covenant on Civil and Political Rights, European Convention on Human Rights and recommendations from the Human Rights Council. The definition of human rights, perceived as freedoms and liberties guaranteed to every human being by international legal consensus will be presented based on the rich body on international law. The book is designed to serve as a reference source for early 21st century information policies and on the future of Internet governance and will be useful to scholars in the information studies fields, including computer, information and library science. It is also aimed at scholars in the fields of international law, international relations, diplomacy studies and political science.
Publisher: Rowman & Littlefield
ISBN: 1442260424
Category : Computers
Languages : en
Pages : 250
Book Description
Cybersecurity and Human Rights in the Age of Cyberveillance isa collection of articles by distinguished authors from the US and Europe and presents a contemporary perspectives on the limits online of human rights. By considering the latest political events and case law, including the NSA PRISM surveillance program controversy, the planned EU data protection amendments, and the latest European Court of Human Rights jurisprudence, it provides an analysis of the ongoing legal discourse on global cyberveillance. Using examples from contemporary state practice, including content filtering and Internet shutdowns during the Arab Spring as well as the PRISM controversy, the authors identify limits of state and third party interference with individual human rights of Internet users. Analysis is based on existing human rights standards, as enshrined within international law including the Universal Declaration of Human Rights, International Covenant on Civil and Political Rights, European Convention on Human Rights and recommendations from the Human Rights Council. The definition of human rights, perceived as freedoms and liberties guaranteed to every human being by international legal consensus will be presented based on the rich body on international law. The book is designed to serve as a reference source for early 21st century information policies and on the future of Internet governance and will be useful to scholars in the information studies fields, including computer, information and library science. It is also aimed at scholars in the fields of international law, international relations, diplomacy studies and political science.
Listening in
Author: Susan Eva Landau
Publisher: Yale University Press
ISBN: 0300227442
Category : Computers
Languages : en
Pages : 238
Book Description
A cybersecurity expert and former Google privacy analyst's urgent call to protect devices and networks against malicious hackers New technologies have provided both incredible convenience and new threats. The same kinds of digital networks that allow you to hail a ride using your smartphone let power grid operators control a country's electricity--and these personal, corporate, and government systems are all vulnerable. In Ukraine, unknown hackers shut off electricity to nearly 230,000 people for six hours. North Korean hackers destroyed networks at Sony Pictures in retaliation for a film that mocked Kim Jong-un. And Russian cyberattackers leaked Democratic National Committee emails in an attempt to sway a U.S. presidential election. And yet despite such documented risks, government agencies, whose investigations and surveillance are stymied by encryption, push for a weakening of protections. In this accessible and riveting read, Susan Landau makes a compelling case for the need to secure our data, explaining how we must maintain cybersecurity in an insecure age.
Publisher: Yale University Press
ISBN: 0300227442
Category : Computers
Languages : en
Pages : 238
Book Description
A cybersecurity expert and former Google privacy analyst's urgent call to protect devices and networks against malicious hackers New technologies have provided both incredible convenience and new threats. The same kinds of digital networks that allow you to hail a ride using your smartphone let power grid operators control a country's electricity--and these personal, corporate, and government systems are all vulnerable. In Ukraine, unknown hackers shut off electricity to nearly 230,000 people for six hours. North Korean hackers destroyed networks at Sony Pictures in retaliation for a film that mocked Kim Jong-un. And Russian cyberattackers leaked Democratic National Committee emails in an attempt to sway a U.S. presidential election. And yet despite such documented risks, government agencies, whose investigations and surveillance are stymied by encryption, push for a weakening of protections. In this accessible and riveting read, Susan Landau makes a compelling case for the need to secure our data, explaining how we must maintain cybersecurity in an insecure age.
Secrets and Lies
Author: Bruce Schneier
Publisher: John Wiley & Sons
ISBN: 1119092434
Category : Computers
Languages : en
Pages : 453
Book Description
This anniversary edition which has stood the test of time as a runaway best-seller provides a practical, straight-forward guide to achieving security throughout computer networks. No theory, no math, no fiction of what should be working but isn't, just the facts. Known as the master of cryptography, Schneier uses his extensive field experience with his own clients to dispel the myths that often mislead IT managers as they try to build secure systems. A much-touted section: Schneier's tutorial on just what cryptography (a subset of computer security) can and cannot do for them, has received far-reaching praise from both the technical and business community. Praise for Secrets and Lies "This is a business issue, not a technical one, and executives can no longer leave such decisions to techies. That's why Secrets and Lies belongs in every manager's library."-Business Week "Startlingly lively....a jewel box of little surprises you can actually use."-Fortune "Secrets is a comprehensive, well-written work on a topic few business leaders can afford to neglect."-Business 2.0 "Instead of talking algorithms to geeky programmers, [Schneier] offers a primer in practical computer security aimed at those shopping, communicating or doing business online-almost everyone, in other words."-The Economist "Schneier...peppers the book with lively anecdotes and aphorisms, making it unusually accessible."-Los Angeles Times With a new and compelling Introduction by the author, this premium edition will become a keepsake for security enthusiasts of every stripe.
Publisher: John Wiley & Sons
ISBN: 1119092434
Category : Computers
Languages : en
Pages : 453
Book Description
This anniversary edition which has stood the test of time as a runaway best-seller provides a practical, straight-forward guide to achieving security throughout computer networks. No theory, no math, no fiction of what should be working but isn't, just the facts. Known as the master of cryptography, Schneier uses his extensive field experience with his own clients to dispel the myths that often mislead IT managers as they try to build secure systems. A much-touted section: Schneier's tutorial on just what cryptography (a subset of computer security) can and cannot do for them, has received far-reaching praise from both the technical and business community. Praise for Secrets and Lies "This is a business issue, not a technical one, and executives can no longer leave such decisions to techies. That's why Secrets and Lies belongs in every manager's library."-Business Week "Startlingly lively....a jewel box of little surprises you can actually use."-Fortune "Secrets is a comprehensive, well-written work on a topic few business leaders can afford to neglect."-Business 2.0 "Instead of talking algorithms to geeky programmers, [Schneier] offers a primer in practical computer security aimed at those shopping, communicating or doing business online-almost everyone, in other words."-The Economist "Schneier...peppers the book with lively anecdotes and aphorisms, making it unusually accessible."-Los Angeles Times With a new and compelling Introduction by the author, this premium edition will become a keepsake for security enthusiasts of every stripe.
The Cybersecurity Dilemma
Author: Ben Buchanan
Publisher: Oxford University Press
ISBN: 0190694807
Category : Political Science
Languages : en
Pages : 300
Book Description
Why do nations break into one another's most important computer networks? There is an obvious answer: to steal valuable information or to attack. But this isn't the full story. This book draws on often-overlooked documents leaked by Edward Snowden, real-world case studies of cyber operations, and policymaker perspectives to show that intruding into other countries' networks has enormous defensive value as well. Two nations, neither of which seeks to harm the other but neither of which trusts the other, will often find it prudent to launch intrusions. This general problem, in which a nation's means of securing itself threatens the security of others and risks escalating tension, is a bedrock concept in international relations and is called the 'security dilemma'. This book shows not only that the security dilemma applies to cyber operations, but also that the particular characteristics of the digital domain mean that the effects are deeply pronounced. The cybersecurity dilemma is both a vital concern of modern statecraft and a means of accessibly understanding the essential components of cyber operations.
Publisher: Oxford University Press
ISBN: 0190694807
Category : Political Science
Languages : en
Pages : 300
Book Description
Why do nations break into one another's most important computer networks? There is an obvious answer: to steal valuable information or to attack. But this isn't the full story. This book draws on often-overlooked documents leaked by Edward Snowden, real-world case studies of cyber operations, and policymaker perspectives to show that intruding into other countries' networks has enormous defensive value as well. Two nations, neither of which seeks to harm the other but neither of which trusts the other, will often find it prudent to launch intrusions. This general problem, in which a nation's means of securing itself threatens the security of others and risks escalating tension, is a bedrock concept in international relations and is called the 'security dilemma'. This book shows not only that the security dilemma applies to cyber operations, but also that the particular characteristics of the digital domain mean that the effects are deeply pronounced. The cybersecurity dilemma is both a vital concern of modern statecraft and a means of accessibly understanding the essential components of cyber operations.