Home | Amazing | Today | Tags | Publishers | Years | Search 
Virtual Realism
Virtual Realism
From the simple VR games found in upscale video arcades, to the ultimate "immersion"--the CAVE, a surround screen, surround sound system that projects 3 D computer graphics into a ten-foot high cube--virtual reality has introduced what is literally a new dimension of reality to daily life. But it is not without controversy. Indeed, some...
Cyberpower: The Culture and Politics of Cyberspace and the Internet
Cyberpower: The Culture and Politics of Cyberspace and the Internet
Cyberspace now touches all lives. For some it has become as essential as the telephone or the letter. For others it is still a fearful whisper of technological promise. Sometimes we look on bemused, uncertain why all those little addresses that begin ‘http://’ appear in advertisements, and sometimes we are shocked by the possibilities,...
Webster's New World Hacker Dictionary
Webster's New World Hacker Dictionary
The comprehensive hacker dictionary for security professionals, businesses, governments, legal professionals, and others dealing with cyberspace.

Hackers. Crackers. Phreakers. Black hats. White hats. Cybercrime. Logfiles. Anonymous Digital Cash. ARP Redirect.

Cyberspace has a language all its own. Understanding it is vital
...
Tangled Web: Tales of Digital Crime from the Shadows of Cyberspace (Queconsumerother)
Tangled Web: Tales of Digital Crime from the Shadows of Cyberspace (Queconsumerother)
With the intense growth of e-business, we hear about an increase in hacking and technology-based criminal incidents. Institutions such as Citibank and Ebay have faced intrusions that have cost them millions of dollars in damages. With the onset of these criminal attacks, there is an increase in demand for products and services that provide more...
Fighting Terror in Cyberspace (Series in Machine Perception & Artifical Intelligence)
Fighting Terror in Cyberspace (Series in Machine Perception & Artifical Intelligence)
The Internet, or the ARPANET in its original name, was a remarkable idea. The Net was designed in the late 60's by US ARPA (Advanced Research Projects Agency) to connect distant computers to each other. This was a critical need at a time when each computer was a precious resource of computing power, which, if connected, could be shared among...
Cyber Crime Investigator's Field Guide
Cyber Crime Investigator's Field Guide
Long gone are the days when a computer took up an entire room. Now we have computers at home, laptops that travel just about anywhere, and data networks that allow us to transmit information from virtually any location in a timely and efficient manner. What have these advancements brought us? Another arena for criminal activity. If someone wants to...
Global Geographies of the Internet (SpringerBriefs in Geography)
Global Geographies of the Internet (SpringerBriefs in Geography)

Today, roughly 2 billion people use the internet, and its applications have flourished in number and importance. This volume will examine the growth and geography of the internet from a political economy perspective. Its central motivation is to illustrate that cyberspace does not exist in some aspatial void, but is deeply rooted in national...

Cyberdeterrence and Cyberwar
Cyberdeterrence and Cyberwar

This monograph presents the results of a fiscal year 2008 study, “Defining and Implementing Cyber Command and Cyber Warfare.” It discusses the use and limits of power in cyberspace, which has been likened to a medium of potential conflict, much as the air and space domains are. The study was conducted to help clarify and focus...

Ethical and Social Issues in the Information Age (Texts in Computer Science)
Ethical and Social Issues in the Information Age (Texts in Computer Science)
As I wrote in my second edition preface, since the publication of the second edition in 2003, there have been tremendous changes in the fields of computer science and information sciences. During this period, we have become more dependent on computer and telecommunication technology than ever before. As we, individually and as nations, become more...
Cyberpolitics in International Relations (MIT Press)
Cyberpolitics in International Relations (MIT Press)

Cyberspace is widely acknowledged as a fundamental fact of daily life in today's world. Until recently, its political impact was thought to be a matter of low politics -- background conditions and routine processes and decisions. Now, however, experts have begun to recognize its effect on high politics -- national security, core...

Cyberspace Security and Defense: Research Issues: Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense
Cyberspace Security and Defense: Research Issues: Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense
Cyberspace security is a critical subject of our times.

On the one hand the development of Internet, mobile communications, distributed computing, computer software and databases storing essential enterprise information has helped to conduct business and personal communication between individual people. On the other hand it has created many...

Conquest in Cyberspace: National Security and Information Warfare
Conquest in Cyberspace: National Security and Information Warfare
With billions of computers in existence, cyberspace, 'the virtual world created when they are connected,' is said to be the new medium of power. Computer hackers operating from anywhere can enter cyberspace and take control of other people's computers, stealing their information, corrupting their workings, and shutting them down. Modern societies...
Result Page: 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy