000 | 02981nam a22005175i 4500 | ||
---|---|---|---|
001 | 978-3-319-02390-8 | ||
003 | DE-He213 | ||
005 | 20140220082841.0 | ||
007 | cr nn 008mamaa | ||
008 | 131025s2013 gw | s |||| 0|eng d | ||
020 |
_a9783319023908 _9978-3-319-02390-8 |
||
024 | 7 |
_a10.1007/978-3-319-02390-8 _2doi |
|
050 | 4 | _aQA75.5-76.95 | |
072 | 7 |
_aUT _2bicssc |
|
072 | 7 |
_aCOM069000 _2bisacsh |
|
072 | 7 |
_aCOM032000 _2bisacsh |
|
082 | 0 | 4 |
_a005.7 _223 |
100 | 1 |
_aGregory, Mark A. _eauthor. |
|
245 | 1 | 0 |
_aSecurity and the Networked Society _h[electronic resource] / _cby Mark A. Gregory, David Glance. |
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2013. |
|
300 |
_aXVI, 297 p. 62 illus., 59 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
505 | 0 | _aIntroduction -- Hacking -- Cyber Crime, Cyber Security and Cyber Warfare -- Internet -- Smart Phones -- Applications -- Predictions. | |
520 | _aThis book examines technological and social events during 2011 and 2012, a period that saw the rise of the hacktivist, the move to mobile platforms, and the ubiquity of social networks. It covers key technological issues such as hacking, cyber-crime, cyber-security and cyber-warfare, the internet, smart phones, electronic security, and information privacy. This book traces the rise into prominence of these issues while also exploring the resulting cultural reaction. The authors’ analysis forms the basis of a discussion on future technological directions and their potential impact on society. The book includes forewords by Professor Margaret Gardner AO, Vice-Chancellor and President of RMIT University, and by Professor Robyn Owens, Deputy Vice-Chancellor (Research) at the University of Western Australia. Security and the Networked Society provides a reference for professionals and industry analysts studying digital technologies. Advanced-level students in computer science and electrical engineering will also find this book useful as a thought-provoking resource. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aComputer Communication Networks. | |
650 | 0 | _aData protection. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aInformation systems. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aInformation Systems and Communication Service. |
650 | 2 | 4 | _aSystems and Data Security. |
650 | 2 | 4 | _aComputer Communication Networks. |
650 | 2 | 4 | _aData Encryption. |
650 | 2 | 4 | _aInformation Systems Applications (incl. Internet). |
700 | 1 |
_aGlance, David. _eauthor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783319023892 |
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-319-02390-8 |
912 | _aZDB-2-SCS | ||
999 |
_c96589 _d96589 |