|
|
Books > Computing & IT > Applications of computing > Databases > Data security & data encryption
Defending the Digital Frontier
Second Edition
"The book recognizes, and correctly characterizes, digital
security according to one of the fundamental tenets of IT
governance: security, like IT governance, is a management issue,
not a technical one. This book takes a very practical approach to a
critical issue, and provides executive management with sound,
cost-effective techniques grounded in business realities.
Management and the C-suite will do well to keep these techniques in
mind when formulating IT strategies that are aligned with and
support business goals."
--Marios Damianides
CISA, CISM, CPA, CA, International President, Information Systems
Audit and Control Association and IT Governance Institute
"Ernst & Young has done a superb job in demonstrating why
the integrity of Digital Information Systems is fundamental to
success. The authors show that protecting computers from attack is
only a small part of this task. This book focuses on handling
systemic risk and complexity--the inevitable problems that arise
when you integrate computerized information systems with human
activity systems: namely the company itself, customers, suppliers,
competitors, as well as the broader political and regulatory
environment. I can recommend it as essential reading to all senior
executives."
--Ian Angell
Professor of Information Systems, London School of Economics
"The CBI considers security of information to be a major issue
for individuals and businesses in the growing digital world. This
book makes clear, that the key to success in this new environment
is in using technology effectively--technology cannot make a badly
organised business good, but it can make agood business better.
Ernst & Young has identified critical organisational and
management processes that global companies need to implement to
ensure that technology effectively secures information assets that
are at the heart of today's economy."
--Digby Jones
Director General, CBI
Ausgehend von der Theorie und den Protokollen der
Quantenkryptografie werden in dem Band die Servicequalitaten
vorgestellt, die angesichts der aktuellen technischen
Moeglichkeiten erreichbar sind. Unter Berucksichtigung wenig
beachteter Gesichtspunkte der Kryptoanalyse diskutiert der Autor
die erreichbare Sicherheit und untersucht die Moeglichkeiten des
Quantencomputing. Anhand praxisnaher Aufgaben koennen Leser ihr
Wissen vertiefen und lernen, die Techniken kritisch zu bewerten.
Mit Programmieranleitung fur Simulationsversuche auf dem eigenen
Rechner.
Industrial cyber-physical systems operate simultaneously in the
physical and digital worlds of business and are now a cornerstone
of the fourth industrial revolution. Increasingly, these systems
are becoming the way forward for academics and industrialists
alike. The very essence of these systems, however, is often
misunderstood or misinterpreted. This book thus sheds light on the
problem areas surrounding cyber-physical systems and provides the
reader with the key principles for understanding and illustrating
them. Presented using a pedagogical approach, with numerous
examples of applications, this book is the culmination of more than
ten years of study by the Intelligent Manufacturing and Services
Systems (IMS2) French research group, part of the MACS (Modeling,
Analysis and Control of Dynamic Systems) research group at the
CNRS. It is intended both for engineers who are interested in
emerging industrial developments and for master's level students
wishing to learn about the industrial systems of the future.
In The United States of Anonymous, Jeff Kosseff explores how the
right to anonymity has shaped American values, politics, business,
security, and discourse, particularly as technology has enabled
people to separate their identities from their communications.
Legal and political debates surrounding online privacy often focus
on the Fourth Amendment's protection against unreasonable searches
and seizures, overlooking the history and future of an equally
powerful privacy right: the First Amendment's protection of
anonymity. The United States of Anonymous features extensive and
engaging interviews with people involved in the highest profile
anonymity cases, as well as with those who have benefited from, and
been harmed by, anonymous communications. Through these interviews,
Kosseff explores how courts have protected anonymity for decades
and, likewise, how law and technology have allowed individuals to
control how much, if any, identifying information is associated
with their communications. From blocking laws that prevent Ku Klux
Klan members from wearing masks to restraining Alabama officials
from forcing the NAACP to disclose its membership lists, and to
refusing companies' requests to unmask online critics, courts have
recognized that anonymity is a vital part of our free speech
protections. The United States of Anonymous weighs the tradeoffs
between the right to hide identity and the harms of anonymity,
concluding that we must maintain a strong, if not absolute, right
to anonymous speech.
|
You may like...
Code Happy
Dayle Rees
Paperback
R817
Discovery Miles 8 170
|