|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-319-02390-8 |
003 |
DE-He213 |
005 |
20220117020813.0 |
007 |
cr nn 008mamaa |
008 |
131025s2013 sz | s |||| 0|eng d |
020 |
|
|
|a 9783319023908
|9 978-3-319-02390-8
|
024 |
7 |
|
|a 10.1007/978-3-319-02390-8
|2 doi
|
050 |
|
4 |
|a TK5105.5-5105.9
|
072 |
|
7 |
|a UKN
|2 bicssc
|
072 |
|
7 |
|a COM069000
|2 bisacsh
|
072 |
|
7 |
|a UKN
|2 thema
|
082 |
0 |
4 |
|a 004.6
|2 23
|
100 |
1 |
|
|a Gregory, Mark A.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
245 |
1 |
0 |
|a Security and the Networked Society
|h [electronic resource] /
|c by Mark A. Gregory, David Glance.
|
250 |
|
|
|a 1st ed. 2013.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2013.
|
300 |
|
|
|a XVI, 297 p. 62 illus., 59 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
505 |
0 |
|
|a Introduction -- Hacking -- Cyber Crime, Cyber Security and Cyber Warfare -- Internet -- Smart Phones -- Applications -- Predictions.
|
520 |
|
|
|a This book examines technological and social events during 2011 and 2012, a period that saw the rise of the hacktivist, the move to mobile platforms, and the ubiquity of social networks. It covers key technological issues such as hacking, cyber-crime, cyber-security and cyber-warfare, the internet, smart phones, electronic security, and information privacy. This book traces the rise into prominence of these issues while also exploring the resulting cultural reaction. The authors' analysis forms the basis of a discussion on future technological directions and their potential impact on society. The book includes forewords by Professor Margaret Gardner AO, Vice-Chancellor and President of RMIT University, and by Professor Robyn Owens, Deputy Vice-Chancellor (Research) at the University of Western Australia. Security and the Networked Society provides a reference for professionals and industry analysts studying digital technologies. Advanced-level students in computer science and electrical engineering will also find this book useful as a thought-provoking resource.
|
650 |
|
0 |
|a Computer networks .
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Application software.
|
650 |
1 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Data and Information Security.
|
650 |
2 |
4 |
|a Cryptology.
|
650 |
2 |
4 |
|a Computer and Information Systems Applications.
|
700 |
1 |
|
|a Glance, David.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319023915
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319023892
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319347011
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-3-319-02390-8
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|