Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectCountry Of PublicationPublisherSourceTarget AudienceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
35,398
result(s) for
"Internet Security measures."
Sort by:
The future of the Internet : and how to stop it
by
Zittrain, Jonathan
in
Communication and technology
,
Information and communication technologies
,
Innovation
2008
This extraordinary book explains the engine that has catapulted the Internet from backwater to ubiquity-and reveals that it is sputtering precisely because of its runaway success. With the unwitting help of its users, the generative Internet is on a path.
Applied approach to privacy and security for the internet of things
\"This book examines the conceptual aspects of security and privacy in IoT. It also explores the application of IoT systems in smart transports, smart cities, and smart healthcare\"-- Provided by publisher.
Net privacy : how we can be free in an age of surveillance
by
Molitorisz, Sacha
in
Consumer protection. fast (OCoLC)fst00876358
,
Data protection
,
Data protection. fast (OCoLC)fst00887958
2020
In our digital world, we are confused by privacy - what is public, what is private? We are also challenged by it, the conditions of privacy so uncertain we become unsure about our rights to it. We may choose to share personal information, but often do so on the assumption that it won't be re-shared, sold, or passed on to other parties without our knowing. This important and lively book draws on a Kantian philosophy of ethics and legal frameworks to examine where we are and to suggest steps - conceptual and practical - to ensure the future is not dystopian.
Cyber Security and Resiliency Policy Framework
2014
Cyberspace is a ubiquitous realm interconnecting every aspect of modern society, enabled by broadband networks and wireless signals around us, existing within local area networks in our schools, hospitals and businesses, and within the massive grids that power most countries.
Plugged in : cybersecurity in the modern age
\"In Plugged In, we meet the men and women at the Florida Institute for Cybersecurity Research who have devoted their careers to studying and staying one step ahead of the bad guys. The stories chronicled in Gatorbytes span all colleges and units across the UF campus. They detail the far-reaching impact of UF's research, technologies, and innovations--and the UF faculty members dedicated to them. Gatorbytes describe how UF is continuing to build on its strengths and extend the reach of its efforts so that it can help even more people in even more places.\"--Publisher description.
Towards the Future Internet
by
Tselentis, G
,
Gavras, A
,
Galis, A
in
Internet
,
Internet-Security measures
,
Internet-Social aspects
2010
This book contains papers describing the major scientific achievements supported by European funding in the area of Future Internet. It is published in the context of FIA, the Future Internet Assembly\"1\", which is structured to permit interactions across technical domains from researchers and other stakeholders active in Future Internet research. FIA holds two meetings per year and calls on those involved in relevant funded research projects to participate actively and to steer its work. On 31 March, 2008 the Bled declaration \"Towards a European approach to the Future Internet\"\"2\" was officially presented at the FIA Conference in Bled, Slovenia: \"In the future, even more users, objects, services and critical information infrastructures will be networked through the Future Internet which will underpin an ever larger share of our modern and global economies. It istherefore time to strengthen and focus European activities on the Future Internet to maintain Europe's competitiveness in the global marketplace. A significant change is required and the European Internet scientific and economic actors, researchers, industrialists, SMEs, users, service and content providers, now assert the urgent necessity to redesign the Internet, taking a broad multidisciplinary approach, to meet Europe'ssocietal and commercial ambitions.\" \"1\" For more information see http://www.future-internet.eu \"2\" For more information see http://www.future-internet.eu/publications/bled-declaration.html.
We have root : even more advice from Schneier on security
\"We Have Root is the latest collection of essays by security and privacy expert Bruce Schneier. He explores a wide range of cybersecurity, privacy, and real-world security issues that are as current as today's headlines. Written in clear and understandable terms, his essays explore the ever-expanding role of technology in national security, war, transportation, the Internet of Things, elections, and more. Rather than addressing technology experts. Schneier directs his writings to leaders, voters, and consumers. He challenges non-technical readers to question the status quo to make better security decisions and investments. As the internet and other technologies have become commonplace and fundamental to society, it is necessary to understand how these work and how they affect our everyday world. Today, social media is essential to public discourse. The web is vital for commerce. Even more critically, the Internet now affects the world in a direct and physical manner. In the near future, the Internet will enable pervasive surveillance at unprecedented levels. The book's essays originally appeared in numerous publications, including the Atlantic, the Wall Street Journal, CNN, the New York Times, the Washington Post, Wired, and others.\"-- Back cover.
Distributed Systems Security
by
Varadarajan, Niranjan
,
Chakrabarti, Anirban
,
Ponnapalli, Harigopal
in
Computer security
,
Computing and Processing
,
Distributed processing
2009
How to solve security issues and problems arising in distributed systems. Security is one of the leading concerns in developing dependable distributed systems of today, since the integration of different components in a distributed manner creates new security problems and issues. Service oriented architectures, the Web, grid computing and virtualization – form the backbone of today’s distributed systems. A lens to security issues in distributed systems is best provided via deeper exploration of security concerns and solutions in these technologies. Distributed Systems Security provides a holistic insight into current security issues, processes, and solutions, and maps out future directions in the context of today’s distributed systems. This insight is elucidated by modeling of modern day distributed systems using a four-tier logical model –host layer, infrastructure layer, application layer, and service layer (bottom to top). The authors provide an in-depth coverage of security threats and issues across these tiers. Additionally the authors describe the approaches required for efficient security engineering, alongside exploring how existing solutions can be leveraged or enhanced to proactively meet the dynamic needs of security for the next-generation distributed systems. The practical issues thereof are reinforced via practical case studies. Distributed Systems Security: •Presents an overview of distributed systems security issues, including threats, trends, standards and solutions. •Discusses threats and vulnerabilities in different layers namely the host, infrastructure, application, and service layer to provide a holistic and practical, contemporary view of enterprise architectures. •Provides practical insights into developing current-day distributed systems security using realistic case studies. This book will be of invaluable interest to software engineers, developers, network professionals and technical/enterprise architects working in the field of distributed systems security. Managers and CIOs, researchers and advanced students will also find this book insightful.