You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.
The non-technical handbook for cyber security risk management Solving Cyber Risk distills a decade of research into a practical framework for cyber security. Blending statistical data and cost information with research into the culture, psychology, and business models of the hacker community, this book provides business executives, policy-makers, and individuals with a deeper understanding of existing future threats, and an action plan for safeguarding their organizations. Key Risk Indicators reveal vulnerabilities based on organization type, IT infrastructure and existing security measures, while expert discussion from leading cyber risk specialists details practical, real-world methods of ...
The digital transformation of the public sector has accelerated. States are experimenting with technology, seeking more streamlined and efficient digital government and public services. However, there are significant concerns about the risks and harms to individual and collective rights under new modes of digital public governance. Several jurisdictions are attempting to regulate digital technologies, especially artificial intelligence, however regulatory effort primarily concentrates on technology use by companies, not by governments. The regulatory gap underpinning public sector digitalisation is growing. As it controls the acquisition of digital technologies, public procurement has emerge...
Now that there's software in everything, how can you make anything secure? Understand how to engineer dependable systems with this newly updated classic In Security Engineering: A Guide to Building Dependable Distributed Systems, Third Edition Cambridge University professor Ross Anderson updates his classic textbook and teaches readers how to design, implement, and test systems to withstand both error and attack. This book became a best-seller in 2001 and helped establish the discipline of security engineering. By the second edition in 2008, underground dark markets had let the bad guys specialize and scale up; attacks were increasingly on users rather than on technology. The book repeated i...
Who could be partners to archivists working in digital preservation? This book features chapters from international contributors from diverse backgrounds and professions discussing their challenges with and victories over digital problems that share common issues with those facing digital preservationists. The only certainty about technology is that it will change. The speed of that change, and the ever increasing diversity of digital formats, tools, and platforms, will present stark challenges to the long-term preservation of digital records. Archivists are frequently challenged by the technical expertise, subject matter knowledge, time, and resource requirements needed to solve the broad s...
This book constitutes the refereed post-proceedings of the 15th International Conference on Biomedical Engineering Systems and Technologies, BIOSTEC 2022, held as a Virtual Event, during February 9–11, 2022. The 21 full papers included in this book were carefully reviewed and selected from 262 submissions. The papers selected to be included in this book contribute to the understanding of relevant trends of current research on Biomedical Engineering Systems and Technologies, including: Pattern Recognition and Machine Learning, Application of Health Informatics in Clinical Cases, Evaluation and Use of Healthcare IT, Medical Signal Acquisition, Analysis and Processing, Data Mining and Data Analysis, Decision Support Systems, e-Health, e-Health Applications, Mobile Technologies for Healthcare Applications and Medical Devices design.
This annual report is a call to action to recognize the things that are having an impact on the internet today, and to embrace the notion that we as humans can change how we make money, govern societies, and interact with one another online. We invite you to participate in setting an agenda for how we can work together to create an internet that truly puts people first. This book is neither a country-level index nor a doomsday clock. Our intention is to show that while the worldwide consequences of getting things wrong with the internet could be huge - for peace and security, for political and individual freedoms, for human equality - the problems are never so great that nothing can be done. More people than you imagine are working to make the internet healthier by applying their skills, creativity, and personal bravery to business, technology, activism, policy and regulation, education, and community development.
Top cybersecurity journalist Kim Zetter tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare—one in which a digital attack can have the same destructive capability as a megaton bomb. In January 2010, inspectors with the International Atomic Energy Agency noticed that centrifuges at an Iranian uranium enrichment plant were failing at an unprecedented rate. The cause was a complete mystery—apparently as much to the technicians replacing the centrifuges as to the inspectors observing them. Then, five months later, a seemingly unrelated event occurred: A computer security firm in Belarus was called in to trou...
This book contains the proceedings of a non-profit conference with the objective of providing a platform for academicians, researchers, scholars and students from various institutions, universities and industries in India and abroad, and exchanging their research and innovative ideas in the field of Artificial Intelligence and Information Technologies. It begins with exploring the research and innovation in the field of Artificial Intelligence and Information Technologies including secure transaction, monitoring, real time assistance and security for advanced stage learners, researchers and academicians has been presented. It goes on to cover: Broad knowledge and research trends about artifi...
Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE) introduces a new methodology to help critical infrastructure owners, operators and their security practitioners make demonstrable improvements in securing their most important functions and processes. Current best practice approaches to cyber defense struggle to stop targeted attackers from creating potentially catastrophic results. From a national security perspective, it is not just the damage to the military, the economy, or essential critical infrastructure companies that is a concern. It is the cumulative, downstream effects from potential regional blackouts, military mission kills, transportatio...
This book brings together international experts from a wide variety of disciplines, in order to understand the impact that digital technologies have had on our well-being as well as our understanding of what it means to live a life that is good for us. The multidisciplinary perspective that this collection offers demonstrates the breadth and importance of these discussions, and represents a pivotal and state-of-the-art contribution to the ongoing discussion concerning digital well-being. Furthermore, this is the first book that captures the complex set of issues that are implicated by the ongoing development of digital technologies, impacting our well-being either directly or indirectly. By helping to clarify some of the most pertinent issues, this collection clarifies the risks and opportunities associated with deploying digital technologies in various social domains. Chapter 2 is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.