Ergebnisse für *

Zeige Ergebnisse 1 bis 25 von 49.

  1. Hacking in the humanities
    cybersecurity, speculative fiction and navigating a digital future
    Autor*in: Mauro, Aaron
    Erschienen: [2022]
    Verlag:  Bloomsbury Academic, London

    "What would it take to hack a human? How exploitable are we? In the cybersecurity industry, professionals know that the weakest component of any system sits between the chair and the keyboard. This book looks to speculative fiction, cyberpunk and the... mehr

    Zugang:
    Resolving-System (lizenzpflichtig)
    Staatsbibliothek zu Berlin - Preußischer Kulturbesitz, Haus Unter den Linden
    uneingeschränkte Fernleihe, Kopie und Ausleihe

     

    "What would it take to hack a human? How exploitable are we? In the cybersecurity industry, professionals know that the weakest component of any system sits between the chair and the keyboard. This book looks to speculative fiction, cyberpunk and the digital humanities to bring a human - and humanistic - perspective to the issue of cybersecurity. It argues that through these stories we are able to predict the future political, cultural, and social realities emerging from technological change. Making the case for a security-minded humanities education, this book examines pressing issues of data security, privacy, social engineering and more, illustrating how the humanities offer the critical, technical, and ethical insights needed to oppose the normalization of surveillance, disinformation, and coercion. Within this counter-cultural approach to technology, this book offers a model of activism to intervene and meaningfully resist government and corporate oversight online. In doing so, it argues for a wider notion of literacy, which includes the ability to write and fight the computer code that shapes our lives."--

     

    Export in Literaturverwaltung   RIS-Format
      BibTeX-Format
    Quelle: Staatsbibliothek zu Berlin
    Sprache: Englisch
    Medientyp: Ebook
    Format: Online
    ISBN: 9781350231016; 9781350230996; 9781350230989
    Weitere Identifier:
    Schriftenreihe: Bloomsbury Studies in Digital Cultures
    Schlagworte: Digital humanities; Computer security; Scholarly electronic publishing; Humanities; Computer security,Digital lifestyle,Media, information & communication industries,Literary studies: from c 1900 -
    Umfang: 1 Online-Ressource (xii, 212 Seiten)
    Bemerkung(en):

    Includes bibliographical references and index

    Preface -- 1. Human Exploits: An Introduction to Hacking and the Humanities -- 2. "Hack the Planet": Pop Hackers and the Demands of a Real World Resistance -- 3. Academic Attack Surfaces: Culture Jamming the Future and XML Bombs -- 4. Supply Chain Attacks and Knowledge Networks: Network Sovereignty and the Interplanetary Internet -- 5.Cryptographic Agility and the Right to Privacy: Secret Writing and the Cypherpunks -- 6. Biohacking and Autonomous Androids: Human Evolution and Biometric Data -- 7. Gray Hat Humanities: Surveillance Capitalism, Object Oriented Ontology, and Design Fiction -- Selected Bibliography -- Index

  2. Stealing the network
    how to own the box
    Erschienen: 2003
    Verlag:  Syngress Pub, Rockland, MA

    "Stealing the Network: How to Own the Box" is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative,... mehr

    Technische Universität Hamburg, Universitätsbibliothek
    keine Fernleihe
    Bibliotheks-und Informationssystem der Carl von Ossietzky Universität Oldenburg (BIS)
    keine Fernleihe
    Bibliotheks-und Informationssystem der Carl von Ossietzky Universität Oldenburg (BIS)
    keine Fernleihe

     

    "Stealing the Network: How to Own the Box" is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the "street fighting" tactics used to attack networks and systems. Not just another "hacker" book, it plays on "edgy" market success of Steal this Computer Book with first hand, eyewitness accounts A highly provocative expose of advanced security exploits Written by some of the most high profile "White Hats", "Black Hats" and "Gray Hats" Gives readers a "first ever" look inside some of the most notorious network intrusions "Stealing the Network: how to open the box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real"--Page xix Stealing the Network: How to Own the Box is NOT intended to be a install, configure, update, troubleshoot, and defend book. It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the street fighting tactics used to attack networks and systems. Not just another hacker book, it plays on edgy market success of Steal this Computer Book with first hand, eyewitness accounts A highly provocative expose of advanced security exploits Written by some of the most high profile White Hats, Black Hats and Gray Hats Gives readers a first ever look inside some of the most notorious network intrusions

     

    Export in Literaturverwaltung   RIS-Format
      BibTeX-Format
    Hinweise zum Inhalt
    Volltext (An electronic book accessible through the World Wide Web; click for information)
    Quelle: Verbundkataloge
    Sprache: Englisch
    Medientyp: Ebook
    Format: Online
    ISBN: 1931836876; 1932266682; 9781931836876; 9781932266689
    Schriftenreihe: Cyber-Fiction Ser
    Schlagworte: Computer hackers; Computer security; Short stories, American; Hackers
    Umfang: Online-Ressource (xxii, 303 p), ill, 24 cm
    Bemerkung(en):

    "Foreword by Jeff Moss, President & CEO, Black Hat, Inc."--Cover

    Electronic reproduction; Mode of access: World Wide Web

    Ido Dubrawsky: Hide and sneak

    Ryan Russell and Tim Mullen: The worm turns

    Joe Grand: Just another day at the office

    FX: h3X's adventures in networkland

    Paul Craig: The thief no one saw

    Joe Grand: Flying the friendly skies

    Mark Burnett: dis-card

    Ken Pfeil: Social (In)Security

    Dan Kaminsky: BabelNet

    Mark Burnett: The art of tracking

    Ryan Russell.: The laws of security

  3. Zero day exploit
    countdown to darkness
    Autor*in: Shein, Rob
    Erschienen: c2004
    Verlag:  Syngress Pub, Rockland, MA

    The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. Although finctional, the numerous accounts of real events and references to... mehr

    Zentrale Hochschulbibliothek Lübeck
    KaufEBook202103
    keine Fernleihe
    Bibliotheks-und Informationssystem der Carl von Ossietzky Universität Oldenburg (BIS)
    keine Fernleihe
    Bibliotheks-und Informationssystem der Carl von Ossietzky Universität Oldenburg (BIS)
    keine Fernleihe

     

    The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community. This book will also satisfy those not on the "inside" of this community, who are fascinated by the real tactics and motives of criminal, malicous hackers and those who defent the Internet from them. * The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. * This book will entertain, educate, and enlighten the security and IT community about the world of elite security professionals who safeguard the Internet from the most dangerous cyber criminals and terrorists. * Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community

     

    Export in Literaturverwaltung   RIS-Format
      BibTeX-Format
    Hinweise zum Inhalt
    Volltext (An electronic book accessible through the World Wide Web; click for information)
    Quelle: Verbundkataloge
    Sprache: Englisch
    Medientyp: Ebook
    Format: Online
    ISBN: 1931836094; 1932266763; 9781931836098; 9781932266764
    Schriftenreihe: Cyber-Fiction
    Schlagworte: Computer hackers; Computer networks; Computer networks; Computer security; Hackers
    Umfang: Online-Ressource (xxii, 339 p), 24 cm
    Bemerkung(en):

    "Foreword by David Litchfield

    "Rob Shein aka Rogue Shoten

    Electronic reproduction; Mode of access: World Wide Web

    Front Cover; Zero Day Exploit; Copyright Page; Contents; Foreword; Chapter 1. Prologue; Chapter 2. DefCon in Las Vegas, 2000; Chapter 3. The DoJ Project, Washington DC, 2001; Chapter 4. The Arrival of MadFast; Chapter 5. ZFon Vulnerability; Chapter 6. Scanning the System, 2003; Chapter 7. Zero Day; Chapter 8. Exploit Impact; Chapter 9. Damage Control; Chapter 10. Recovery; Appendix: The Laws of Security

  4. IT audit, control, and security
    Erschienen: c2010
    Verlag:  Wiley, Hoboken, N.J

    Combines the areas of computer audit, computer control, and computer security in one book.; Offers step-by-step guidance on auditing, control, and security.; Provides numberous control objectives This section discusses IT audit cybersecurity and... mehr

    Bibliotheks-und Informationssystem der Carl von Ossietzky Universität Oldenburg (BIS)
    keine Fernleihe
    Bibliotheks-und Informationssystem der Carl von Ossietzky Universität Oldenburg (BIS)
    keine Fernleihe
    Bibliotheks-und Informationssystem der Carl von Ossietzky Universität Oldenburg (BIS)
    keine Fernleihe

     

    Combines the areas of computer audit, computer control, and computer security in one book.; Offers step-by-step guidance on auditing, control, and security.; Provides numberous control objectives This section discusses IT audit cybersecurity and privacy control activities from two focus areas. First is focus on some of the many cybersecurity and privacy concerns that auditors should consider in their reviews of IT-based systems and processes. Second focus area includes IT Audit internal procedures. IT audit functions sometimes fail to implement appropriate security and privacy protection controls over their own IT audit processes, such as audit evidence materials, IT audit workpapers, auditor laptop computer resources, and many others. Although every audit department is different, this

     

    Export in Literaturverwaltung   RIS-Format
      BibTeX-Format
    Hinweise zum Inhalt
    Quelle: Verbundkataloge
    Sprache: Englisch
    Medientyp: Ebook
    Format: Online
    ISBN: 9780470877685; 0470877413; 0470877685; 9780470877418
    Weitere Identifier:
    RVK Klassifikation: QQ 537 ; SR 860 ; ST 277
    Schriftenreihe: Wiley Global Finance Executive Select ; v.173
    Schlagworte: Information technology; Electronic data processing departments; Computer security; Computer networks
    Umfang: Online Ressource (XXIV, 667 S.)
    Bemerkung(en):

    Includes bibliographical references and index

    Electronic reproduction; Available via World Wide Web

    IT Audit, Control, and Security; Contents; Introduction: Importance of IT Auditing; Part One: Auditing Internal Controls in an IT Environment; Chapter 1: SOx and the COSO Internal Controls Framework; ROLES AND RESPONSIBILITIES OF IT AUDITORS; IMPORTANCE OF EFFECTIVE INTERNAL CONTROLS AND COSO; COSO INTERNAL CONTROL SYSTEMS MONITORING GUIDANCE; SARBANES-OXLEY ACT; WRAPPING IT UP: COSO INTERNAL CONTROLS AND SOx; NOTES; Chapter 2: Using CobiT to Perform IT Audits; INTRODUCTION TO CobiT; CobiT FRAMEWORK; USING CobiT TO ASSESS INTERNAL CONTROLS; USING CobiT IN A SOx ENVIRONMENT

    CobiT ASSURANCE FRAMEWORK GUIDANCECobiT IN PERSPECTIVE; NOTES; Chapter 3: IIA and ISACA Standards for the Professional Practice of Internal Auditing; INTERNAL AUDITING'S INTERNATIONAL PROFESSIONAL PRACTICE STANDARDS; CONTENT OF THE IPPF AND THE IIA INTERNATIONAL STANDARDS; STRONGLY RECOMMENDED IIA STANDARDS GUIDANCE; ISACA IT AUDITING STANDARDS OVERVIEW; CODES OF ETHICS: THE IIA AND ISACA; NOTES; Chapter 4: Understanding Risk Management through COSO ERM; RISK MANAGEMENT FUNDAMENTALS; QUANTITATIVE RISK ANALYSIS TECHNIQUES; IIA AND ISACA RISK MANAGEMENT INTERNAL AUDIT GUIDANCE

    COSO ERM: ENTERPRISE RISK MANAGEMENTIT AUDIT RISK AND COSO ERM; NOTES; Chapter 5: Performing Effective IT Audits; IT AUDIT AND THE ENTERPRISE INTERNAL AUDIT FUNCTION; ORGANIZING AND PLANNING IT AUDITS; DEVELOPING AND PREPARING AUDIT PROGRAMS; GATHERING AUDIT EVIDENCE AND TESTING RESULTS; WORKPAPERS AND REPORTING IT AUDIT RESULTS; PREPARING EFFECTIVE IT AUDITS; NOTES; Part Two: Auditing IT General Controls; Chapter 6: General Controls in Today's IT Environments; IMPORTANCE OF IT GENERAL CONTROLS; IT GOVERNANCE GENERAL CONTROLS; IT MANAGEMENT GENERAL CONTROLS

    IT TECHNICAL ENVIRONMENT GENERAL CONTROLSNOTE; Chapter 7: Infrastructure Controls and ITIL Service Management Best Practices; ITIL SERVICE MANAGEMENT BEST PRACTICES; ITIL'S SERVICE STRATEGIES COMPONENT; ITIL SERVICE DESIGN; ITIL SERVICE TRANSITION MANAGEMENT PROCESSES; ITIL SERVICE OPERATION PROCESSES; SERVICE DELIVERY BEST PRACTICES; AUDITING IT INFRASTRUCTURE MANAGEMENT; NOTE; Chapter 8: Systems Software and IT Operations General Controls; IT OPERATING SYSTEM FUNDAMENTALS; FEATURES OF A COMPUTER OPERATING SYSTEM; OTHER SYSTEMS SOFTWARE TOOLS

    Chapter 9: Evolving Control Issues: Wireless Networks, Cloud Computing, and VirtualizationUNDERSTANDING AND AUDITING IT WIRELESS NETWORKS; UNDERSTANDING CLOUD COMPUTING; STORAGE MANAGEMENT VIRTUALIZATION; Part Three: Auditing and Testing IT Application Controls; Chapter 10: Selecting, Testing, and Auditing IT Applications; IT APPLICATION CONTROL ELEMENTS; SELECTING APPLICATIONS FOR IT AUDIT REVIEWS; PERFORMING AN APPLICATION CONTROLS REVIEW: PRELIMINARY STEPS; COMPLETING THE IT APPLICATION CONTROLS AUDIT; APPLICATION REVIEW CASE STUDY: CLIENT-SERVER BUDGETING SYSTEM

    AUDITING APPLICATIONS UNDER DEVELOPMENT

  5. Information warfare in business
    strategies of control and resistance in the network society
    Autor*in: Munro, Iain
    Erschienen: 2005
    Verlag:  Routledge, London

    This book illustrates the relations between information technology and organization, and in particular, between business organizations and the recent revolution in military affairs that has been called 'information warfare' mehr

    Hochschulbibliothek Friedensau
    Online-Ressource
    keine Fernleihe

     

    This book illustrates the relations between information technology and organization, and in particular, between business organizations and the recent revolution in military affairs that has been called 'information warfare'

     

    Export in Literaturverwaltung   RIS-Format
      BibTeX-Format
    Hinweise zum Inhalt
    Quelle: Verbundkataloge
    Sprache: Englisch
    Medientyp: Ebook
    Format: Online
    ISBN: 0415339685
    Schriftenreihe: Routledge studies in business organizations and networks ; 29
    Schlagworte: Computer security; Business intelligence; Information technology; Information warfare
    Umfang: Online-Ressource (xi, 200 p), ill, 24 cm
    Bemerkung(en):

    Includes bibliographical references (p. [188]-196) and index

    Electronic reproduction; Available via World Wide Web

    Book Cover; Half-Title; Title; Copyright; Dedication; Contents; Acknowledgements; 1 Information warfare in business; Part l Creative organizational forms; Part II The weapon of information; Part III Changing power relations; Notes; Bibliography; Index

  6. Digitale Kompetenz
    Grundlagen der Künstlichen Intelligenz, Blockchain-Technologie, Quanten-Computing und deren Anwendungen für die Digitale Transformation
    Autor*in: Lang, Volker
    Erschienen: 2022
    Verlag:  Springer Vieweg, Wiesbaden

    Wenn Sie neugierig auf die Grundlagen der künstlichen Intelligenz, der Blockchain-Technologie und des Quantencomputings sind, die für die digitale Transformation von entscheidender Bedeutung sind, ist Digital Fluency Ihr praktischer Leitfaden. Die... mehr

    Zugang:
    Resolving-System (lizenzpflichtig)
    Hochschule Aalen, Bibliothek
    E-Book Springer
    keine Fernleihe
    Hochschule Biberach, Bibliothek
    E-Book Springer
    keine Fernleihe
    Universitätsbibliothek Braunschweig
    keine Fernleihe
    Staats- und Universitätsbibliothek Bremen
    keine Fernleihe
    Hochschule 21, Bibliothek
    keine Fernleihe
    Technische Universität Chemnitz, Universitätsbibliothek
    keine Fernleihe
    Universitätsbibliothek Clausthal
    keine Fernleihe
    Hochschule für Technik und Wirtschaft Dresden, Bibliothek
    Springer Technik/Informatik 2022
    keine Fernleihe
    Sächsische Landesbibliothek - Staats- und Universitätsbibliothek Dresden
    keine Fernleihe
    Duale Hochschule Gera-Eisenach, Bibliothek, Campus Eisenach
    keine Fernleihe
    Hochschule Emden/Leer, Hochschulbibliothek
    keine Fernleihe
    Hochschule Esslingen, Bibliothek
    Springer E-Book
    keine Fernleihe
    Zentrale Hochschulbibliothek Flensburg
    keine Fernleihe
    Technische Universität Bergakademie Freiberg, Bibliothek 'Georgius Agricola'
    keine Fernleihe
    Universitätsbibliothek Freiburg
    keine Fernleihe
    Hochschule Furtwangen University. Informatik, Technik, Wirtschaft, Medien. Campus Furtwangen, Bibliothek
    eBook Springer
    keine Ausleihe von Bänden, der Endnutzer erhält eine elektronische Kopie
    Duale Hochschule Gera-Eisenach, Bibliothek, Campus Gera
    keine Fernleihe
    Universitäts- und Landesbibliothek Sachsen-Anhalt / Zentrale
    ebook
    keine Fernleihe
    HafenCity Universität Hamburg, Bibliothek
    keine Fernleihe
    Helmut-Schmidt-Universität, Universität der Bundeswehr Hamburg, Universitätsbibliothek
    keine Fernleihe
    Staats- und Universitätsbibliothek Hamburg Carl von Ossietzky
    keine Fernleihe
    Hochschule für Angewandte Wissenschaften Hamburg, Hochschulinformations- und Bibliotheksservice (HIBS), Fachbibliothek Technik, Wirtschaft, Informatik
    keine Fernleihe
    Technische Universität Hamburg, Universitätsbibliothek
    keine Fernleihe
    Bibliothek der Hochschule Hannover
    keine Fernleihe
    Bibliothek im Kurt-Schwitters-Forum
    keine Fernleihe
    Leibniz-Fachhochschule Hannover, Bibliothek
    keine Fernleihe
    Technische Informationsbibliothek (TIB) / Leibniz-Informationszentrum Technik und Naturwissenschaften und Universitätsbibliothek
    keine Fernleihe
    Fachhochschule Westküste, Hochschule für Wirtschaft und Technik, Hochschulbibliothek
    keine Fernleihe
    Universitätsbibliothek Heidelberg
    keine Ausleihe von Bänden, nur Papierkopien werden versandt
    Duale Hochschule Baden-Württemberg Heidenheim, Bibliothek
    e-Book Springer
    keine Fernleihe
    Bibliothek LIV HN Sontheim
    Springer ebook Technik/Inform
    keine Fernleihe
    HAWK Hochschule für angewandte Wissenschaft und Kunst Hildesheim/Holzminden/Göttingen, Bibliothek, Elektronische Ressourcen
    keine Fernleihe
    Universitätsbibliothek Ilmenau
    Online-Ressource
    keine Fernleihe
    Ernst-Abbe-Hochschule Jena, Wissenschaftliche Bibliothek
    keine Fernleihe
    Thüringer Universitäts- und Landesbibliothek
    keine Fernleihe
    Karlsruher Institut für Technologie, KIT-Bibliothek
    keine Ausleihe von Bänden, nur Papierkopien werden versandt
    Karlsruher Institut für Technologie, KIT-Bibliothek
    keine Ausleihe von Bänden, nur Papierkopien werden versandt
    Karlsruher Institut für Technologie, KIT-Bibliothek
    keine Ausleihe von Bänden, nur Papierkopien werden versandt
    Fachhochschule Kiel, Zentralbibliothek
    keine Fernleihe
    Universitätsbibliothek Kiel, Zentralbibliothek
    keine Fernleihe
    Bibliotheksservice-Zentrum Baden-Württemberg (BSZ)
    keine Fernleihe
    HTWG Hochschule Konstanz Technik, Wirtschaft und Gestaltung, Bibliothek
    eBook Springer
    keine Fernleihe
    Hochschule Anhalt , Hochschulbibliothek
    keine Fernleihe
    Hochschule für Technik, Wirtschaft und Kultur Leipzig, Hochschulbibliothek
    keine Fernleihe
    Universitätsbibliothek Leipzig
    keine Fernleihe
    Duale Hochschule Baden-Württemberg Lörrach, Zentralbibliothek
    eBook Springer
    keine Fernleihe
    Zentrale Hochschulbibliothek Lübeck
    keine Fernleihe
    Leuphana Universität Lüneburg, Medien- und Informationszentrum, Universitätsbibliothek
    keine Fernleihe
    Hochschule Magdeburg-Stendal, Hochschulbibliothek
    keine Fernleihe
    Otto-von-Guericke-Universität, Universitätsbibliothek
    eBook Springer
    keine Fernleihe
    Otto-von-Guericke-Universität, Universitätsbibliothek, Medizinische Zentralbibliothek
    eBook Springer
    keine Fernleihe
    Duale Hochschule Baden-Württemberg Mannheim, Bibliothek
    eBook Springer
    keine Fernleihe
    Hochschule Mannheim, Hochschulbibliothek
    eBook Springer
    keine Fernleihe
    Universitätsbibliothek Mannheim
    keine Fernleihe
    Universitätsbibliothek Mannheim
    keine Fernleihe
    Hochschule Merseburg, Bibliothek
    keine Fernleihe
    Hochschule Mittweida (FH), Hochschulbibliothek
    keine Fernleihe
    Duale Hochschule Baden-Württemberg Mosbach, Bibliothek
    E-Book Springer
    keine Fernleihe
    Hochschule Neubrandenburg, Bibliothek
    keine Fernleihe
    Hochschule für Wirtschaft und Umwelt Nürtingen-Geislingen, Bibliothek Nürtingen
    eBook Springer
    keine Ausleihe von Bänden, nur Papierkopien werden versandt
    Hochschule Offenburg, University of Applied Sciences, Bibliothek Campus Offenburg
    E-Book Springer
    keine Ausleihe von Bänden, der Endnutzer erhält eine elektronische Kopie
    Bibliotheks-und Informationssystem der Carl von Ossietzky Universität Oldenburg (BIS)
    keine Fernleihe
    Jade Hochschule Wilhelmshaven/Oldenburg/Elsfleth, Campus Oldenburg, Bibliothek
    keine Fernleihe
    Jade Hochschule Wilhelmshaven/Oldenburg/Elsfleth, Campus Elsfleth, Bibliothek
    keine Fernleihe
    Hochschule Osnabrück, Bibliothek Campus Westerberg
    keine Fernleihe
    Universitätsbibliothek Osnabrück
    keine Fernleihe
    Hochschulbibliothek Pforzheim, Bereichsbibliothek Technik und Wirtschaft
    eBook Springer
    keine Fernleihe
    Universität Potsdam, Universitätsbibliothek
    keine Fernleihe
    Duale Hochschule Baden-Württemberg Ravensburg, Bibliothek
    E-Book Springer
    keine Fernleihe
    Hochschulbibliothek Reutlingen (Lernzentrum)
    eBook
    keine Fernleihe
    Universitätsbibliothek Rostock
    keine Fernleihe
    Hochschule für Forstwirtschaft Rottenburg, Bibliothek
    keine Ausleihe von Bänden, nur Papierkopien werden versandt
    Hochschule für Technik und Wirtschaft des Saarlandes, Bibliothek / Bereich Goebenstraße
    keine Fernleihe
    Saarländische Universitäts- und Landesbibliothek
    keine Fernleihe
    INM - Leibniz-Institut für Neue Materialien gGmbH, NTNM-Bibliothek
    e-book
    keine Fernleihe
    Hochschule für Gestaltung Schwäbisch Gmünd, Bibliothek
    eBook Springer
    keine Fernleihe
    Hochschule Albstadt-Sigmaringen, Bibliothek Sigmaringen
    eBook Springer
    keine Ausleihe von Bänden, nur Papierkopien werden versandt
    Hochschule Magdeburg-Stendal, Standort Stendal, Bibliothek
    keine Fernleihe
    Hochschule Stralsund, Hochschulbibliothek
    keine Fernleihe
    Duale Hochschule Baden-Württemberg Stuttgart, Bibliothek
    eBook Springer
    keine Fernleihe
    Hochschule der Medien, Bibliothek Standort Nobelstr.
    eBook Springer
    keine Fernleihe
    Hochschule für Technik Stuttgart, Bibliothek
    Springer eBook
    keine Fernleihe
    Universitätsbibliothek Stuttgart
    keine Fernleihe
    Universitätsbibliothek der Eberhard Karls Universität
    keine Ausleihe von Bänden, nur Papierkopien werden versandt
    Technische Hochschule Ulm, Bibliothek
    eBook Springer
    keine Ausleihe von Bänden, nur Papierkopien werden versandt
    Universität Ulm, Kommunikations- und Informationszentrum, Bibliotheksservices
    keine Fernleihe
    Duale Hochschule Baden-Württemberg Villingen-Schwenningen, Bibliothek
    E-Book Springer
    keine Fernleihe
    UB Weimar
    keine Fernleihe
    Hochschulbibliothek Weingarten
    eBook Springer
    keine Fernleihe
    Hochschule Harz, Hauptbibliothek, Standort Wernigerode / Harz
    keine Fernleihe
    Jade Hochschule Wilhelmshaven/Oldenburg/Elsfleth, Campus Wilhelmshaven, Bibliothek
    keine Fernleihe
    Hochschule Wismar, University of Applied Sciences: Technology, Business and Design, Hochschulbibliothek
    keine Fernleihe
    Ostfalia Hochschule für angewandte Wissenschaften, Bibliothek
    keine Fernleihe
    Hochschule Zittau / Görlitz, Hochschulbibliothek
    keine Fernleihe
    Westsächsische Hochschule Zwickau, Bibliothek
    Springer E-Book
    keine Fernleihe

     

    Wenn Sie neugierig auf die Grundlagen der künstlichen Intelligenz, der Blockchain-Technologie und des Quantencomputings sind, die für die digitale Transformation von entscheidender Bedeutung sind, ist Digital Fluency Ihr praktischer Leitfaden. Die realen Anwendungen dieser Spitzentechnologien nehmen rasant zu, und Ihr tägliches Leben wird weiterhin von jeder dieser Technologien beeinflusst werden. Es gibt keinen besseren Zeitpunkt als jetzt, um anzufangen und sich digital fit zu machen. Sie brauchen keine Vorkenntnisse über diese Technologien zu haben, denn der Autor Volker Lang führt Sie fachkundig durch das digitale Zeitalter. Er veranschaulicht die wichtigsten Konzepte und Anwendungen in zahlreichen Beispielen und Abbildungen in Digital Fluency, und am Ende jedes Kapitels finden Sie eine hilfreiche Checkliste mit den wichtigsten Lektionen für die Umsetzung, bevor Sie zum nächsten Kapitel übergehen. Dieses Buch geht den digitalen Schlagwörtern und Konzepten auf den Grund und sagt Ihnen, was sie wirklich bedeuten. Internationale Bewertungen der englischen Ausgabe: Digital Fluency offers valuable insights for practitioners and strategists through a unique combination of historic perspective, compelling technology insights and frameworks as well as a rich list of very insightful company use cases. It is a must read for decision-makers and employees within any public and private organization who hope to navigate the challenges posed by digital transformation by leveraging digital technologies with clarity, structure and vision. — Marcell Vollmer, Partner and Director at Boston Consulting Group (BCG) Digital Fluency provides readers with the strategic frameworks and practical advice they need to fully comprehend, manage, and shape the digital future ahead of us. — Marco Iansiti, David Sarnoff Professor of Business Administration, Harvard Business School (HBS) Digital technologies are transforming our world with breath-taking speed. In a clearly written book that combines basic knowledge with practical applications, Volker Lang provides fascinating insights and valuable advice to guide corporations and individuals through the digital age. A compelling read for those of us who like to become fluent in digital innovation, strategy, and technology. — Joachim Kraege, Head of Audi Consulting, Organization and Leadership, Audi AG Dieses Buch stellt die Übersetzung einer englischsprachigen Originalausgabe dar. Die Übersetzung wurde mit Hilfe von künstlicher Intelligenz erstellt (maschinelle Übersetzung mit DeepL.com). Eine anschließende manuelle Überarbeitung erfolgte vor allem nach inhaltlichen Gesichtspunkten, so dass das Buch stilistisch von einer herkömmlichen Übersetzung abweichen kann.

     

    Export in Literaturverwaltung   RIS-Format
      BibTeX-Format
  7. Hacking in the humanities
    cybersecurity, speculative fiction and navigating a digital future
    Autor*in: Mauro, Aaron
    Erschienen: [2022]
    Verlag:  Bloomsbury Academic, London

    "What would it take to hack a human? How exploitable are we? In the cybersecurity industry, professionals know that the weakest component of any system sits between the chair and the keyboard. This book looks to speculative fiction, cyberpunk and the... mehr

    Zugang:
    Resolving-System (lizenzpflichtig)
    Staatsbibliothek zu Berlin - Preußischer Kulturbesitz, Haus Potsdamer Straße
    keine Fernleihe
    Universitäts- und Landesbibliothek Sachsen-Anhalt / Zentrale
    keine Fernleihe
    Technische Informationsbibliothek (TIB) / Leibniz-Informationszentrum Technik und Naturwissenschaften und Universitätsbibliothek
    keine Fernleihe
    Universitätsbibliothek Leipzig
    keine Fernleihe
    Universität Potsdam, Universitätsbibliothek
    keine Fernleihe

     

    "What would it take to hack a human? How exploitable are we? In the cybersecurity industry, professionals know that the weakest component of any system sits between the chair and the keyboard. This book looks to speculative fiction, cyberpunk and the digital humanities to bring a human - and humanistic - perspective to the issue of cybersecurity. It argues that through these stories we are able to predict the future political, cultural, and social realities emerging from technological change. Making the case for a security-minded humanities education, this book examines pressing issues of data security, privacy, social engineering and more, illustrating how the humanities offer the critical, technical, and ethical insights needed to oppose the normalization of surveillance, disinformation, and coercion. Within this counter-cultural approach to technology, this book offers a model of activism to intervene and meaningfully resist government and corporate oversight online. In doing so, it argues for a wider notion of literacy, which includes the ability to write and fight the computer code that shapes our lives."--

     

    Export in Literaturverwaltung   RIS-Format
      BibTeX-Format
    Hinweise zum Inhalt
    Quelle: Staatsbibliothek zu Berlin
    Sprache: Englisch
    Medientyp: Ebook
    Format: Online
    ISBN: 9781350231016; 9781350230996; 9781350230989
    Weitere Identifier:
    Schriftenreihe: Bloomsbury Studies in Digital Cultures
    Schlagworte: Digital humanities; Computer security; Scholarly electronic publishing; Humanities; Computer security,Digital lifestyle,Media, information & communication industries,Literary studies: from c 1900 -
    Umfang: 1 Online-Ressource (xii, 212 Seiten)
    Bemerkung(en):

    Includes bibliographical references and index

    Preface -- 1. Human Exploits: An Introduction to Hacking and the Humanities -- 2. "Hack the Planet": Pop Hackers and the Demands of a Real World Resistance -- 3. Academic Attack Surfaces: Culture Jamming the Future and XML Bombs -- 4. Supply Chain Attacks and Knowledge Networks: Network Sovereignty and the Interplanetary Internet -- 5.Cryptographic Agility and the Right to Privacy: Secret Writing and the Cypherpunks -- 6. Biohacking and Autonomous Androids: Human Evolution and Biometric Data -- 7. Gray Hat Humanities: Surveillance Capitalism, Object Oriented Ontology, and Design Fiction -- Selected Bibliography -- Index

  8. Cybersicherheit und Cyber-Resilienz in den Finanzmärkten
    Erschienen: [2022]; © 2022
    Verlag:  EIZ Publishing, Zürich

    Zugang:
    Verlag (kostenfrei)
    Resolving-System (kostenfrei)
    Verlag (kostenfrei)
    Resolving-System (kostenfrei)
    Universitäts- und Landesbibliothek Sachsen-Anhalt / Zentrale
    keine Fernleihe
    Bundesverfassungsgericht, Bibliothek
    Online-Ressource
    keine Fernleihe
    ZBW - Leibniz-Informationszentrum Wirtschaft, Standort Kiel
    keine Fernleihe
    Deutsche Universität für Verwaltungswissenschaften Speyer, Universitätsbibliothek
    Open Access - Ohne Regalstandort
    keine Fernleihe
    Export in Literaturverwaltung   RIS-Format
      BibTeX-Format
    Quelle: Verbundkataloge
    Sprache: Deutsch
    Medientyp: Ebook
    Format: Online
    ISBN: 9783038054740
    Weitere Identifier:
    9783038054733
    Schriftenreihe: Center for Information Technology Society and Law - ITSL ; Volume 9
    Schlagworte: Finanzmarkt; Finanzsektor; IT-Sicherheit; Compliance-Management; Risikomanagement; IT-Recht; Finanzmarktregulierung; Schweiz; Computer networks; Computer crimes; Computer security; Banks and banking
    Umfang: 1 Online-Ressource (XXXVI, 151 Seiten)
  9. Hacking in the Humanities
    Cybersecurity, Speculative Fiction, and Navigating a Digital Future
    Autor*in: Mauro, Aaron
    Erschienen: 2022; ©2022
    Verlag:  Bloomsbury Publishing Plc, London

    Cover -- Contents -- Acknowledgments -- Preface -- Human Exploits: An Introduction to Hacking and the Humanities -- The Darkest Timeline -- Don't Be Evil -- Claiming the Future -- A Mischievous Spirit -- 1 "Hack the Planet": Pop Hackers and the... mehr

    Zugang:
    Aggregator (lizenzpflichtig)
    Technische Universität Chemnitz, Universitätsbibliothek
    keine Fernleihe
    Universitätsbibliothek Clausthal
    keine Fernleihe
    Universitätsbibliothek Kiel, Zentralbibliothek
    keine Fernleihe
    Hochschulbibliothek Friedensau
    Online-Ressource
    keine Fernleihe
    Hochschule für Wirtschaft und Umwelt Nürtingen-Geislingen, Bibliothek Nürtingen
    eBook ProQuest
    keine Fernleihe
    Universität Ulm, Kommunikations- und Informationszentrum, Bibliotheksservices
    keine Fernleihe

     

    Cover -- Contents -- Acknowledgments -- Preface -- Human Exploits: An Introduction to Hacking and the Humanities -- The Darkest Timeline -- Don't Be Evil -- Claiming the Future -- A Mischievous Spirit -- 1 "Hack the Planet": Pop Hackers and the Demands of a Real World Resistance -- Parler Tricks -- Anthological Freedom -- Street-Level Anarchy -- Polymorphic Protest Culture -- 2 Academic Attack Surfaces: Culture Jamming the Future and XML Bombs -- Prescient Pessimism -- A Jussive Mood -- sudo rm -rf / -- A Billion Laughs -- 3 Supply Chain Attacks and Knowledge Networks: Network Sovereignty and the Interplanetary Internet -- A Consensual Hallucination -- El Paquete -- Sovereign Networks -- Don't Worry, We're from the Internet -- 4 Cryptographic Agility and the Right to Privacy: Secret Writing and the Cypherpunks -- Tales from the Crypt -- The Enemy Knows the System -- Happy Birthday -- Ignoti et quasi occulti -- 5 Biohacking and the Autonomous Androids: Human Evolution and Biometric Data -- Vital Machines -- The Selfish Ledger -- Virtual Influencers -- Cindy Mayweather-ArchAndroid -- 6 Gray Hat Humanities: Surveillance Capitalism, Object-Oriented Ontology, and Design Fiction -- Selected Bibliography -- Index.

     

    Export in Literaturverwaltung   RIS-Format
      BibTeX-Format
    Quelle: Verbundkataloge
    Sprache: Englisch
    Medientyp: Ebook
    Format: Online
    ISBN: 9781350231009
    Schriftenreihe: Bloomsbury Studies in Digital Cultures Ser.
    Schlagworte: Computer security; Digital humanities; Scholarly electronic publishing; Electronic books
    Umfang: 1 online resource (225 pages)
    Bemerkung(en):

    Description based on publisher supplied metadata and other sources

  10. Futureproof
    security aesthetics and the management of life
    Beteiligt: Ghertner, D. Asher (HerausgeberIn); McFann, Hudson (HerausgeberIn); Goldstein, Daniel M. (HerausgeberIn)
    Erschienen: 2020
    Verlag:  Duke University Press, Durham

    Security Aesthetics of and Beyond the Biopolitical / D. Asher Ghertner, Hudson McFann, and Daniel M. Goldstein -- The Aesthetics of Cyber Insecurity: Displaying the Digital in Three American Museum Exhibits / Victoria Bernal -- Danger Signs: The... mehr

    Zugang:
    Verlag (kostenfrei)
    Staatsbibliothek zu Berlin - Preußischer Kulturbesitz, Haus Potsdamer Straße
    keine Fernleihe
    Universitätsbibliothek Clausthal
    keine Fernleihe
    Niedersächsische Staats- und Universitätsbibliothek Göttingen
    keine Fernleihe
    Max-Planck-Institut für ethnologische Forschung, Bibliothek
    keine Fernleihe
    Universitäts- und Landesbibliothek Sachsen-Anhalt / Zentrale
    keine Fernleihe
    Staats- und Universitätsbibliothek Hamburg Carl von Ossietzky
    keine Fernleihe
    Gottfried Wilhelm Leibniz Bibliothek - Niedersächsische Landesbibliothek
    keine Fernleihe
    Universitätsbibliothek Kiel, Zentralbibliothek
    keine Fernleihe
    Hochschule für Grafik und Buchkunst, Bibliothek
    keine Fernleihe
    Bibliotheks-und Informationssystem der Carl von Ossietzky Universität Oldenburg (BIS)
    keine Fernleihe

     

    Security Aesthetics of and Beyond the Biopolitical / D. Asher Ghertner, Hudson McFann, and Daniel M. Goldstein -- The Aesthetics of Cyber Insecurity: Displaying the Digital in Three American Museum Exhibits / Victoria Bernal -- Danger Signs: The Aesthetics of Insecurity in Bogota / Austin Zeiderman -- We All Have the Same Red Blood?: Security Aesthetics and Rescue Ethics on the Arizona's Sonora Border / Ieva Jusionyte -- Fugitive Horizons and the Arts of Security in Honduras / Jon Carter -- Security Aesthetics and Political Community Formation in Kingston, Jamaica / Rivke Jaffe -- Staging Safety in Brooklyn's Real Estate / Zaire Dinzey-Flores and Alexandra Demshock -- Expecting the Worst: Active-Shooter Scenario Play in American Schools / Rachel Hall -- H5N1 and the Aesthetics of Biosecurity: From Danger to Risk / Limor Samimian-Darash -- Securing Stand-by and Urban Space Making in Jakarta: Intensities in Search of Forms / -- AbdouMaliq Simone -- Securing the Street: Urban Renewal and the Fight Against 'Informality' in Mexico City / -- Alejandra Leal Martinez -- The Age of Security / Didier Fassin "From terrorism and public health to museums, schools, and homes, FUTUREPROOF asks us to expand our purview of security, turning our attention to how security is lived, felt, and perceived through the violences of everyday life. Editors Asher Ghertner, Daniel Goldstein, and Hudson Fann propose the modality of "security aesthetics" as a way to understand how sensory and affective experiences help regulate bodies, spaces, and states in the service of "futureproofing" society against anticipated risks and perils. Taken broadly as the domain of sense perception, aesthetics provides a framework for considering the body's interactions with the material world and the processes by which these interactions translate into subjective judgments of taste. The contributions to this volume show us how security aesthetics work to fashion differently imagined futures, illuminating the interplay of sense perception and articulated reason in the operations of security apparatuses"--

     

    Export in Literaturverwaltung   RIS-Format
      BibTeX-Format
    Hinweise zum Inhalt
    Quelle: Staatsbibliothek zu Berlin
    Beteiligt: Ghertner, D. Asher (HerausgeberIn); McFann, Hudson (HerausgeberIn); Goldstein, Daniel M. (HerausgeberIn)
    Sprache: Englisch
    Medientyp: Ebook
    Format: Online
    ISBN: 9781478093398
    RVK Klassifikation: MS 1190 ; LH 61360
    Schriftenreihe: Global insecurities
    Schlagworte: Human security; Emergency management; Risk management; Biosecurity; Computer security
    Umfang: 1 Online-Ressource (xii, 298 Seiten), Illustrationen, Karten
    Bemerkung(en):

    Includes bibliographical references and index

  11. Vulnerability management
    Autor*in: Foreman, Park
    Erschienen: 2019
    Verlag:  CRC Press, impring of Taylor & Francis Group, Boca Raton, FL ; Taylor & Francis Group, London

    Zugang:
    TU Darmstadt, Universitäts- und Landesbibliothek - Stadtmitte
    keine Fernleihe
    Export in Literaturverwaltung   RIS-Format
      BibTeX-Format
    Quelle: Verbundkataloge
    Sprache: Englisch
    Medientyp: Ebook
    Format: Online
    ISBN: 9780415015189; 0415015189; 9780429289651; 0429289650; 9780367235147; 0367235145; 9781000005097; 1000005097
    RVK Klassifikation: EC 5250
    Auflage/Ausgabe: Second edition
    Schlagworte: Literaturkritik; Feminismus; Computer security; Information technology; Risk management
    Umfang: 1 Online-Ressource
    Bemerkung(en):

    Includes index

  12. Futureproof
    security aesthetics and the management of life
    Beteiligt: Ghertner, D. Asher (HerausgeberIn); McFann, Hudson (HerausgeberIn); Goldstein, Daniel M. (HerausgeberIn)
    Erschienen: 2020
    Verlag:  Duke University Press, Durham

    Security Aesthetics of and Beyond the Biopolitical / D. Asher Ghertner, Hudson McFann, and Daniel M. Goldstein -- The Aesthetics of Cyber Insecurity: Displaying the Digital in Three American Museum Exhibits / Victoria Bernal -- Danger Signs: The... mehr

    Zugang:
    Verlag (kostenfrei)
    Staatsbibliothek zu Berlin - Preußischer Kulturbesitz, Haus Unter den Linden
    uneingeschränkte Fernleihe, Kopie und Ausleihe

     

    Security Aesthetics of and Beyond the Biopolitical / D. Asher Ghertner, Hudson McFann, and Daniel M. Goldstein -- The Aesthetics of Cyber Insecurity: Displaying the Digital in Three American Museum Exhibits / Victoria Bernal -- Danger Signs: The Aesthetics of Insecurity in Bogota / Austin Zeiderman -- We All Have the Same Red Blood?: Security Aesthetics and Rescue Ethics on the Arizona's Sonora Border / Ieva Jusionyte -- Fugitive Horizons and the Arts of Security in Honduras / Jon Carter -- Security Aesthetics and Political Community Formation in Kingston, Jamaica / Rivke Jaffe -- Staging Safety in Brooklyn's Real Estate / Zaire Dinzey-Flores and Alexandra Demshock -- Expecting the Worst: Active-Shooter Scenario Play in American Schools / Rachel Hall -- H5N1 and the Aesthetics of Biosecurity: From Danger to Risk / Limor Samimian-Darash -- Securing Stand-by and Urban Space Making in Jakarta: Intensities in Search of Forms / -- AbdouMaliq Simone -- Securing the Street: Urban Renewal and the Fight Against 'Informality' in Mexico City / -- Alejandra Leal Martinez -- The Age of Security / Didier Fassin "From terrorism and public health to museums, schools, and homes, FUTUREPROOF asks us to expand our purview of security, turning our attention to how security is lived, felt, and perceived through the violences of everyday life. Editors Asher Ghertner, Daniel Goldstein, and Hudson Fann propose the modality of "security aesthetics" as a way to understand how sensory and affective experiences help regulate bodies, spaces, and states in the service of "futureproofing" society against anticipated risks and perils. Taken broadly as the domain of sense perception, aesthetics provides a framework for considering the body's interactions with the material world and the processes by which these interactions translate into subjective judgments of taste. The contributions to this volume show us how security aesthetics work to fashion differently imagined futures, illuminating the interplay of sense perception and articulated reason in the operations of security apparatuses"--

     

    Export in Literaturverwaltung   RIS-Format
      BibTeX-Format
    Hinweise zum Inhalt
    Quelle: Staatsbibliothek zu Berlin
    Beteiligt: Ghertner, D. Asher (HerausgeberIn); McFann, Hudson (HerausgeberIn); Goldstein, Daniel M. (HerausgeberIn)
    Sprache: Englisch
    Medientyp: Ebook
    Format: Online
    ISBN: 9781478093398
    RVK Klassifikation: MS 1190 ; LH 61360
    Schriftenreihe: Global insecurities
    Schlagworte: Human security; Emergency management; Risk management; Biosecurity; Computer security
    Umfang: 1 Online-Ressource (xii, 298 Seiten), Illustrationen, Karten
    Bemerkung(en):

    Includes bibliographical references and index

  13. Women in security
    changing the face of technology and innovation
    Beteiligt: Christofferson, Debra A. (Hrsg.)
    Erschienen: [2018]; © 2018
    Verlag:  Springer, Cham

    Freie Universität Berlin, Universitätsbibliothek
    uneingeschränkte Fernleihe, Kopie und Ausleihe
    Hochschule für Technik und Wirtschaft Berlin, Hochschulbibliothek
    uneingeschränkte Fernleihe, Kopie und Ausleihe
    Brandenburgische Technische Universität Cottbus - Senftenberg, Universitätsbibliothek
    uneingeschränkte Fernleihe, Kopie und Ausleihe
    Export in Literaturverwaltung   RIS-Format
      BibTeX-Format
    Hinweise zum Inhalt
    Volltext (URL des Erstveröffentlichers)
    Quelle: Philologische Bibliothek, FU Berlin
    Beteiligt: Christofferson, Debra A. (Hrsg.)
    Sprache: Englisch
    Medientyp: Ebook
    Format: Online
    ISBN: 9783319577951
    Weitere Identifier:
    Schriftenreihe: Women in engineering and science
    Schlagworte: Engineering; Computer security; System safety; Engineering / Vocational guidance; Sociology; Sex (Psychology); Gender expression; Gender identity; Engineering; Job Careers in Science and Engineering; Gender Studies; Systems and Data Security; Security Science and Technology; Geschlechterforschung; Datensicherung; Ingenieurwissenschaften; Computersicherheit
    Umfang: 1 Online-Ressource (XIX, 136 Seiten), Illustrationen
  14. Stealing the network
    how to own a continent
    Erschienen: c2004
    Verlag:  Syngress, Rockland, MA

    This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this... mehr

    Technische Universität Hamburg, Universitätsbibliothek
    keine Fernleihe
    Bibliotheks-und Informationssystem der Carl von Ossietzky Universität Oldenburg (BIS)
    keine Fernleihe
    Bibliotheks-und Informationssystem der Carl von Ossietzky Universität Oldenburg (BIS)
    keine Fernleihe

     

    This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this knowledge is already in the hands of our enemies. This book is truly designed to inform while entertaining (and scaring) the reader, and it will instantly be in demand by readers of "Stealing the Network: How to Own the Box" * A meticulously detailed and technically accurate work of fiction that exposes the very real possibilities of such an event occurring * An informative and scary insight into the boundries of hacking and cyber-terrorism * Written by a team of the most accomplished cyber-security specialists in the world Written by today's leading security and counter-terriorism experts, this sequel to "Stealing the Network: How to Own the Box" operates on a truly global stage when the network infrastructure of an entire continent is compromised

     

    Export in Literaturverwaltung   RIS-Format
      BibTeX-Format
    Hinweise zum Inhalt
    Quelle: Verbundkataloge
    Sprache: Englisch
    Medientyp: Ebook
    Format: Online
    ISBN: 193226678X; 1931836051; 9781932266788; 9781931836050
    Schlagworte: Computer hackers; Computer security; Cyberterrorism; Hackers
    Umfang: Online-Ressource
    Bemerkung(en):

    "Foreword by Jeff Moss, President & CEO, Black Hat, Inc

    Title from e-book title screen (viewed June 10, 2004)

    Ryan Russell: Control yourself

    131ah: The lagos creeper

    Russ Rogers: Product of fate: the evolution of a hacker

    Jay Beale: A real gullible genius

    Joe Grand: For whom Ma Bell tolls

    Fyodor: Return on investment

    FX: h3X and the big picture

    Paul Craig: The story of Dex

    Tim Mullen: Automatic terror machine

    Ryan Russell.: Get out quick

  15. Terminal compromise
    Erschienen: 199X
    Verlag:  Project Gutenberg, Champaign, Ill

    Hochschule für Gesundheit, Hochschulbibliothek
    eBook EBSCO
    keine Fernleihe
    Export in Literaturverwaltung   RIS-Format
      BibTeX-Format
    Hinweise zum Inhalt
    Quelle: Verbundkataloge
    Sprache: Englisch
    Medientyp: Ebook
    Format: Online
    ISBN: 0585151865; 9780585151861
    Schlagworte: Computer security; Records; Records; Computer security
    Umfang: Online Ressource
  16. Zero day exploit
    countdown to darkness
    Erschienen: c2004
    Verlag:  Syngress, Rockland, MA

    The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. Although finctional, the numerous accounts of real events and references to... mehr

    Zugang:
    Aggregator (lizenzpflichtig)
    Hochschule Aalen, Bibliothek
    E-Book EBSCO
    keine Fernleihe
    Hochschule Esslingen, Bibliothek
    E-Book Ebsco
    keine Fernleihe
    Saarländische Universitäts- und Landesbibliothek
    keine Fernleihe
    Universitätsbibliothek der Eberhard Karls Universität
    keine Fernleihe

     

    The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community. This book will also satisfy those not on the "inside" of this community, who are fascinated by the real tactics and motives of criminal, malicous hackers and those who defent the Internet from them. * The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. * This book will entertain, educate, and enlighten the security and IT community about the world of elite security professionals who safeguard the Internet from the most dangerous cyber criminals and terrorists. * Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community

     

    Export in Literaturverwaltung   RIS-Format
      BibTeX-Format
    Hinweise zum Inhalt
    Quelle: Verbundkataloge
    Sprache: Englisch
    Medientyp: Ebook
    Format: Online
    ISBN: 1932266763; 9781932266764; 1931836094; 9781931836098
    Schriftenreihe: Cyber-Fiction Ser
    Schlagworte: Computer security; Hackers; Computer networks; Computer security; Hackers; Computer networks; Hackers; Computer networks ; Security measures; Computer security; FICTION ; General; Fiction
    Umfang: Online Ressource
    Bemerkung(en):

    "Rob Shein aka Rogue Shoten. - Title from e-book title screen (viewed Sept. 1, 2004). - "Foreword by David Litchfield."--E-book 'cover' p

  17. Stealing the network
    how to own a continent
    Erschienen: c2004
    Verlag:  Syngress, Rockland, MA

    Ostbayerische Technische Hochschule Amberg-Weiden / Hochschulbibliothek Amberg
    uneingeschränkte Fernleihe, Kopie und Ausleihe
    Ostbayerische Technische Hochschule Amberg-Weiden, Hochschulbibliothek, Standort Weiden
    uneingeschränkte Fernleihe, Kopie und Ausleihe
    Export in Literaturverwaltung   RIS-Format
      BibTeX-Format
    Hinweise zum Inhalt
    Quelle: Verbundkataloge
    Sprache: Englisch
    Medientyp: Ebook
    Format: Online
    ISBN: 1931836051; 193226678X; 9781931836050; 9781932266788
    Schlagworte: Computer hackers; Computer security; Cyberterrorism; Computer security; Hackers; Cyberterrorism
    Umfang: 1 Online-Ressource
    Bemerkung(en):

    Title from e-book title screen (viewed June 10, 2004). - "Foreword by Jeff Moss, President & CEO, Black Hat, Inc."

    Includes bibliographical references

    Control yourself - Ryan Russell -- - The lagos creeper - 131ah -- - Product of fate: the evolution of a hacker - Russ Rogers -- - A real gullible genius - Jay Beale -- - For whom Ma Bell tolls - Joe Grand -- - Return on investment - Fyodor -- - h3X and the big picture - FX -- - The story of Dex - Paul Craig -- - Automatic terror machine - Tim Mullen -- - Get out quick - Ryan Russell

    This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this knowledge is already in the hands of our enemies. This book is truly designed to inform while entertaining (and scaring) the reader, and it will instantly be in demand by readers of "Stealing the Network: How to Own the Box" * A meticulously detailed and technically accurate work of fiction that exposes the very real possibilities of such an event occurring * An informative and scary insight into the boundries of hacking and cyber-terrorism * Written by a team of the most accomplished cyber-security specialists in the world

    Written by today's leading security and counter-terriorism experts, this sequel to "Stealing the Network: How to Own the Box" operates on a truly global stage when the network infrastructure of an entire continent is compromised

  18. Stealing the network
    how to own the box
    Autor*in: Russell, Ryan
    Erschienen: ©2003
    Verlag:  Syngress, Rockland, MA

    Ostbayerische Technische Hochschule Amberg-Weiden / Hochschulbibliothek Amberg
    uneingeschränkte Fernleihe, Kopie und Ausleihe
    Ostbayerische Technische Hochschule Amberg-Weiden, Hochschulbibliothek, Standort Weiden
    uneingeschränkte Fernleihe, Kopie und Ausleihe
    Export in Literaturverwaltung   RIS-Format
      BibTeX-Format
    Hinweise zum Inhalt
    Quelle: Verbundkataloge
    Sprache: Englisch
    Medientyp: Ebook
    Format: Online
    ISBN: 1931836876; 1932266682; 9781931836876; 9781932266689
    Schriftenreihe: Cyber-Fiction Ser
    Schlagworte: Hackers; Computer security; Short stories, American; Electronic books
    Umfang: 1 Online-Ressource (xxii, 303 pages)
    Bemerkung(en):

    "Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional with technology that is real. While none of these specific events have happened, there is no reason why they could not. You could argue it provides a roadmap for criminal hackers, but I say it does something else: it provides a glimpse into the creative minds of some of today's best hackers, and even the best hackers will tell you that the game is a mental one."--Foreword

    Hide and sneak - Ido Dubrawsky -- - The worm turns - Ryan Russell and Tim Mullen -- - Just another day at the office - Joe Grand -- - h3X's adventures in networkland - FX -- - The thief no one saw - Paul Craig -- - Flying the friendly skies - Joe Grand -- - dis-card - Mark Burnett -- - Social (In)Security - Ken Pfeil -- - BabelNet - Dan Kaminsky -- - The art of tracking - Mark Burnett -- - The laws of security - Ryan Russell

    "Stealing the Network: How to Own the Box" is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the "street fighting" tactics used to attack networks and systems. Not just another "hacker" book, it plays on "edgy" market success of Steal this Computer Book with first hand, eyewitness accounts A highly provocative expose of advanced security exploits Written by some of the most high profile "White Hats", "Black Hats" and "Gray Hats" Gives readers a "first ever" look inside some of the most notorious network intrusions

    "Stealing the Network: how to open the box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real"--Page xix

  19. Zero day exploit
    countdown to darkness
    Autor*in: Shein, Rob
    Erschienen: ©2004
    Verlag:  Syngress, Rockland, MA

    Ostbayerische Technische Hochschule Amberg-Weiden / Hochschulbibliothek Amberg
    uneingeschränkte Fernleihe, Kopie und Ausleihe
    Ostbayerische Technische Hochschule Amberg-Weiden, Hochschulbibliothek, Standort Weiden
    uneingeschränkte Fernleihe, Kopie und Ausleihe
    Export in Literaturverwaltung   RIS-Format
      BibTeX-Format
    Hinweise zum Inhalt
    Quelle: Verbundkataloge
    Sprache: Englisch
    Medientyp: Ebook
    Format: Online
    ISBN: 1931836094; 1932266763; 9781931836098; 9781932266764
    Schriftenreihe: Cyber-Fiction Ser
    Schlagworte: Hackers; Computer networks / Security measures; Computer security; Computer security; Hackers; Computer networks
    Umfang: 1 Online-Ressource
    Bemerkung(en):

    "Rob Shein aka Rogue Shoten.". - Title from e-book title screen (viewed Sept. 1, 2004). - "Foreword by David Litchfield."--E-book 'cover' page

    The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community. This book will also satisfy those not on the "inside" of this community, who are fascinated by the real tactics and motives of criminal, malicous hackers and those who defent the Internet from them. * The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. * This book will entertain, educate, and enlighten the security and IT community about the world of elite security professionals who safeguard the Internet from the most dangerous cyber criminals and terrorists. * Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community

  20. Stealing the network
    how to own a continent
    Erschienen: © 2004
    Verlag:  Syngress, Rockland, MA

    This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this... mehr

     

    This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this knowledge is already in the hands of our enemies. This book is truly designed to inform while entertaining (and scaring) the reader, and it will instantly be in demand by readers of "Stealing the Network: How to Own the Box" * A meticulously detailed and technically accurate work of fiction that exposes the very real possibilities of such an event occurring * An informative and scary insight into the boundries of hacking and cyber-terrorism * Written by a team of the most accomplished cyber-security specialists in the world Written by today's leading security and counter-terriorism experts, this sequel to "Stealing the Network: How to Own the Box" operates on a truly global stage when the network infrastructure of an entire continent is compromised

     

    Export in Literaturverwaltung   RIS-Format
      BibTeX-Format
    Hinweise zum Inhalt
    Volltext (URL des Erstveröffentlichers)
    Quelle: Verbundkataloge
    Sprache: Englisch
    Medientyp: Ebook
    Format: Online
    ISBN: 193226678X; 9781932266788; 9781931836050; 1931836051
    Schlagworte: FICTION / General; Computer security; Cyberterrorism; Hackers; Computer security; Hackers; Cyberterrorism
    Umfang: 1 online resource
    Bemerkung(en):

    Title from e-book title screen (viewed June 10, 2004). - "Foreword by Jeff Moss, President & CEO, Black Hat, Inc."

    Includes bibliographical references

  21. Stealing the network
    how to own the box
    Autor*in: Russell, Ryan
    Erschienen: © 2003
    Verlag:  Syngress, Rockland, MA

    "Stealing the Network: How to Own the Box" is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative,... mehr

     

    "Stealing the Network: How to Own the Box" is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the "street fighting" tactics used to attack networks and systems. Not just another "hacker" book, it plays on "edgy" market success of Steal this Computer Book with first hand, eyewitness accounts A highly provocative expose of advanced security exploits Written by some of the most high profile "White Hats", "Black Hats" and "Gray Hats" Gives readers a "first ever" look inside some of the most notorious network intrusions "Stealing the Network: how to open the box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real"--Page xix

     

    Export in Literaturverwaltung   RIS-Format
      BibTeX-Format
    Hinweise zum Inhalt
    Volltext (URL des Erstveröffentlichers)
    Quelle: Verbundkataloge
    Sprache: Englisch
    Medientyp: Ebook
    Format: Online
    ISBN: 1932266682; 9781932266689; 9781931836876; 1931836876
    Schriftenreihe: Cyber-Fiction Ser
    Schlagworte: FICTION / General; Hackers; Computer security; Short stories, American; Electronic books; Electronic book collection; Hackers; Computer security; Short stories, American
    Umfang: 1 online resource (xxii, 303 pages), illustrations
    Bemerkung(en):

    "Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional with technology that is real. While none of these specific events have happened, there is no reason why they could not. You could argue it provides a roadmap for criminal hackers, but I say it does something else: it provides a glimpse into the creative minds of some of today's best hackers, and even the best hackers will tell you that the game is a mental one."--Foreword

  22. Zero day exploit
    countdown to darkness
    Autor*in: Shein, Rob
    Erschienen: © 2004
    Verlag:  Syngress, Rockland, MA

    The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. Although finctional, the numerous accounts of real events and references to... mehr

     

    The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community. This book will also satisfy those not on the "inside" of this community, who are fascinated by the real tactics and motives of criminal, malicous hackers and those who defent the Internet from them. * The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. * This book will entertain, educate, and enlighten the security and IT community about the world of elite security professionals who safeguard the Internet from the most dangerous cyber criminals and terrorists. * Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community

     

    Export in Literaturverwaltung   RIS-Format
      BibTeX-Format
    Hinweise zum Inhalt
    Volltext (URL des Erstveröffentlichers)
    Quelle: Verbundkataloge
    Sprache: Englisch
    Medientyp: Ebook
    Format: Online
    ISBN: 1932266763; 9781932266764; 1931836094; 9781931836098; 9780080543925; 0080543928
    Schriftenreihe: Cyber-Fiction Ser
    Schlagworte: FICTION / General; Hackers; Computer networks / Security measures; Computer security; Computer security; Hackers; Computer networks
    Umfang: 1 online resource
    Bemerkung(en):

    "Rob Shein aka Rogue Shoten.". - Title from e-book title screen (viewed Sept. 1, 2004). - "Foreword by David Litchfield."--E-book 'cover' page

  23. Futureproof
    Security Aesthetics and the Management of Life
    Beteiligt: Ghertner, D. Asher (Hrsg.); Goldstein, Daniel M. (Hrsg.); McFann, Hudson (Hrsg.)
    Erschienen: [2020]; © 2020
    Verlag:  Duke University Press, Durham

    Security is a defining characteristic of our age and the driving force behind the management of collective political, economic, and social life. Directed at safeguarding society against future peril, security is often thought of as the hard... mehr

    Ostbayerische Technische Hochschule Amberg-Weiden / Hochschulbibliothek Amberg
    uneingeschränkte Fernleihe, Kopie und Ausleihe
    TH-AB - Technische Hochschule Aschaffenburg, Hochschulbibliothek
    uneingeschränkte Fernleihe, Kopie und Ausleihe
    Technische Hochschule Augsburg
    uneingeschränkte Fernleihe, Kopie und Ausleihe
    Universitätsbibliothek Bamberg
    uneingeschränkte Fernleihe, Kopie und Ausleihe
    Universitätsbibliothek Bayreuth
    uneingeschränkte Fernleihe, Kopie und Ausleihe
    Hochschule Coburg, Zentralbibliothek
    uneingeschränkte Fernleihe, Kopie und Ausleihe
    Hochschule Kempten, Hochschulbibliothek
    uneingeschränkte Fernleihe, Kopie und Ausleihe
    Hochschule Landshut, Hochschule für Angewandte Wissenschaften, Bibliothek
    uneingeschränkte Fernleihe, Kopie und Ausleihe
    Bayerische Staatsbibliothek
    uneingeschränkte Fernleihe, Kopie und Ausleihe
    Universitätsbibliothek Passau
    uneingeschränkte Fernleihe, Kopie und Ausleihe

     

    Security is a defining characteristic of our age and the driving force behind the management of collective political, economic, and social life. Directed at safeguarding society against future peril, security is often thought of as the hard infrastructures and invisible technologies assumed to deliver it: walls, turnstiles, CCTV cameras, digital encryption, and the like. The contributors to Futureproof redirect this focus, showing how security is a sensory domain shaped by affect and image as much as rules and rationalities. They examine security as it is lived and felt in domains as varied as real estate listings, active-shooter drills, border crossings, landslide maps, gang graffiti, and museum exhibits to theorize how security regimes are expressed through aesthetic forms. Taking a global perspective with studies ranging from Jamaica to Jakarta and Colombia to the U.S.-Mexico border, Futureproof expands our understanding of the security practices, infrastructures, and technologies that pervade everyday life.Contributors. Victoria Bernal, Jon Horne Carter, Alexandra Demshock, Zaire Z. Dinzey-Flores, Didier Fassin, D. Asher Ghertner, Daniel M. Goldstein, Rachel Hall, Rivke Jaffe, Ieva Jusionyte, Catherine Lutz, Alejandra Leal Martínez, Hudson McFann, Limor Samimian-Darash, AbdouMaliq Simone, Austin Zeiderman

     

    Export in Literaturverwaltung   RIS-Format
      BibTeX-Format
    Hinweise zum Inhalt
    Volltext (URL des Erstveröffentlichers)
    Quelle: Verbundkataloge
    Beteiligt: Ghertner, D. Asher (Hrsg.); Goldstein, Daniel M. (Hrsg.); McFann, Hudson (Hrsg.)
    Sprache: Englisch
    Medientyp: Ebook
    Format: Online
    ISBN: 9781478007517
    Weitere Identifier:
    Schriftenreihe: Global Insecurities
    Schlagworte: SOCIAL SCIENCE / Anthropology / Cultural & Social; Biosecurity; Computer security; Emergency management; Human security; Risk management; Risikomanagement; Menschliche Sicherheit; Katastrophenmanagement; Zukunft; Ästhetik
    Umfang: 1 Online-Ressource (xii, 298 Seiten)
  24. Stealing the network
    how to own the box
    Autor*in: Russell, Ryan
    Erschienen: ©2003
    Verlag:  Syngress, Rockland, MA

    Ostbayerische Technische Hochschule Amberg-Weiden / Hochschulbibliothek Amberg
    uneingeschränkte Fernleihe, Kopie und Ausleihe
    Export in Literaturverwaltung   RIS-Format
      BibTeX-Format
    Hinweise zum Inhalt
    Quelle: Verbundkataloge
    Sprache: Englisch
    Medientyp: Ebook
    Format: Online
    ISBN: 1931836876; 1932266682; 9781931836876; 9781932266689
    Schriftenreihe: Cyber-Fiction Ser
    Schlagworte: Hackers; Computer security; Short stories, American
    Weitere Schlagworte: Short stories
    Umfang: 1 Online-Ressource (xxii, 303 pages)
    Bemerkung(en):

    "Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional with technology that is real. While none of these specific events have happened, there is no reason why they could not. You could argue it provides a roadmap for criminal hackers, but I say it does something else: it provides a glimpse into the creative minds of some of today's best hackers, and even the best hackers will tell you that the game is a mental one."--Foreword

    "Stealing the Network: How to Own the Box" is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the "street fighting" tactics used to attack networks and systems. Not just another "hacker" book, it plays on "edgy" market success of Steal this Computer Book with first hand, eyewitness accounts A highly provocative expose of advanced security exploits Written by some of the most high profile "White Hats", "Black Hats" and "Gray Hats" Gives readers a "first ever" look inside some of the most notorious network intrusions

    "Stealing the Network: how to open the box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real"--Page xix

  25. Stealing the network
    how to own a continent
    Erschienen: c2004
    Verlag:  Syngress, Rockland, MA

    Ostbayerische Technische Hochschule Amberg-Weiden / Hochschulbibliothek Amberg
    uneingeschränkte Fernleihe, Kopie und Ausleihe
    Export in Literaturverwaltung   RIS-Format
      BibTeX-Format
    Hinweise zum Inhalt
    Quelle: Verbundkataloge
    Sprache: Englisch
    Medientyp: Ebook
    Format: Online
    ISBN: 1931836051; 193226678X; 9781931836050; 9781932266788
    Schlagworte: Fiction; Suspense fiction; Computer hackers; Computer security; Cyberterrorism; Computer security; Hackers; Cyberterrorism
    Weitere Schlagworte: Short stories
    Umfang: 1 Online-Ressource (1 online resource)
    Bemerkung(en):

    Title from e-book title screen (viewed June 10, 2004). - "Foreword by Jeff Moss, President & CEO, Black Hat, Inc."

    Includes bibliographical references

    This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this knowledge is already in the hands of our enemies. This book is truly designed to inform while entertaining (and scaring) the reader, and it will instantly be in demand by readers of "Stealing the Network: How to Own the Box" * A meticulously detailed and technically accurate work of fiction that exposes the very real possibilities of such an event occurring * An informative and scary insight into the boundries of hacking and cyber-terrorism * Written by a team of the most accomplished cyber-security specialists in the world

    Written by today's leading security and counter-terriorism experts, this sequel to "Stealing the Network: How to Own the Box" operates on a truly global stage when the network infrastructure of an entire continent is compromised