Cargando…

Evolution of Cyber Technologies and Operations to 2035

This book explores the future of cyber technologies and cyber operations which will influence advances in social media, cyber security, cyber physical systems, ethics, law, media, economics, infrastructure, military operations and other elements of societal interaction in the upcoming decades. It pr...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Blowers, Misty (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Cham : Springer International Publishing : Imprint: Springer, 2015.
Edición:1st ed. 2015.
Colección:Advances in Information Security,
Temas:
Acceso en línea:Texto Completo

MARC

LEADER 00000nam a22000005i 4500
001 978-3-319-23585-1
003 DE-He213
005 20220118101303.0
007 cr nn 008mamaa
008 151228s2015 sz | s |||| 0|eng d
020 |a 9783319235851  |9 978-3-319-23585-1 
024 7 |a 10.1007/978-3-319-23585-1  |2 doi 
050 4 |a QA76.9.A25 
072 7 |a UR  |2 bicssc 
072 7 |a UTN  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a UR  |2 thema 
072 7 |a UTN  |2 thema 
082 0 4 |a 005.8  |2 23 
245 1 0 |a Evolution of Cyber Technologies and Operations to 2035  |h [electronic resource] /  |c edited by Misty Blowers. 
250 |a 1st ed. 2015. 
264 1 |a Cham :  |b Springer International Publishing :  |b Imprint: Springer,  |c 2015. 
300 |a XII, 194 p. 11 illus., 7 illus. in color.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Advances in Information Security,  |x 2512-2193 
505 0 |a Introduction -- Resiliency in Future Cyber Combat -- Internet of Things -- The Invisible War -- Cyber in Space -- Future Trends in Large Data Handling -- The Application of Virtual Reality for Cyber Information Visualization and Investigation -- Quantum Information Science -- Dark Web and the Rise of Underground Networks -- The Bitcoin -- The Rise of Social Media and Its Role in Future Protests and Revolutions -- Is Skynet the Answer? Rules for Autonomous Cyber Response Capabilities -- Ethical Considerations in the Cyber Domain -- Ethical Challenges of 'Disruptive Innovation' -- High School Student Visions of Disruptive Innovation. 
520 |a This book explores the future of cyber technologies and cyber operations which will influence advances in social media, cyber security, cyber physical systems, ethics, law, media, economics, infrastructure, military operations and other elements of societal interaction in the upcoming decades. It provides a review of future disruptive technologies and innovations in cyber security. It also serves as a resource for wargame planning and provides a strategic vision of the future direction of cyber operations. It informs military strategist about the future of cyber warfare. Written by leading experts in the field, chapters explore how future technical innovations vastly increase the interconnectivity of our physical and social systems and the growing need for resiliency in this vast and dynamic cyber infrastructure. The future of social media, autonomy, stateless finance, quantum information systems, the internet of things, the dark web, space satellite operations, and global network connectivity is explored along with the transformation of the legal and ethical considerations which surround them. The international challenges of cyber alliances, capabilities, and interoperability is challenged with the growing need for new laws, international oversight, and regulation which informs cybersecurity studies. The authors have a multi-disciplinary scope arranged in a big-picture framework, allowing both deep exploration of important topics and high level understanding of the topic. Evolution of Cyber Technologies and Operations to 2035 is as an excellent reference for professionals and researchers working in the security field, or as government and military workers, economics, law and more. Students will also find this book useful as a reference guide or secondary text book. 
650 0 |a Data protection. 
650 0 |a Data structures (Computer science). 
650 0 |a Information theory. 
650 0 |a Law and economics. 
650 1 4 |a Data and Information Security. 
650 2 4 |a Data Structures and Information Theory. 
650 2 4 |a Law and Economics. 
700 1 |a Blowers, Misty.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9783319235844 
776 0 8 |i Printed edition:  |z 9783319235868 
776 0 8 |i Printed edition:  |z 9783319795058 
830 0 |a Advances in Information Security,  |x 2512-2193 
856 4 0 |u https://doi.uam.elogim.com/10.1007/978-3-319-23585-1  |z Texto Completo 
912 |a ZDB-2-SCS 
912 |a ZDB-2-SXCS 
950 |a Computer Science (SpringerNature-11645) 
950 |a Computer Science (R0) (SpringerNature-43710)