Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
Digital Totalitarianism: Algorithms and Society focuses on important challenges to democratic values posed by our computational regimes: policing the freedom of inquiry, risks to the personal autonomy of thought, NeoLiberal management of human creativity, and the collapse of critical thinking with the social media fueled rise of conspiranoia.Digital networks allow for a granularity and pervasiveness of surveillance by government and corporate entities. This creates power asymmetries where each citizen's daily 'data exhaust' can be used for manipulative and controlling ends by powerful institutional actors. This volume explores key erosions in our fundamental human values associated with free societies by covering government surveillance of library-based activities, cognitive enhancement debates, the increasing business orientation of art schools, and the proliferation of conspiracy theories in network media.Scholars and students from many backgrounds, as well as policy makers, journalists and the general reading public will find a multidisciplinary approach to questions of totalitarian tendencies encompassing research from Communication, Rhetoric, Library Sciences, Art and New Media.
Democratic Frontiers: Algorithms and Society focuses on digital platforms' effects in societies with respect to key areas such as subjectivity and self-reflection, data and measurement for the common good, public health and accessible datasets, activism in social media and the import/export of AI technologies relative to regime type.Digital technologies develop at a much faster pace relative to our systems of governance which are supposed to embody democratic principles that are comparatively timeless, whether rooted in ancient Greek or Enlightenment ideas of freedom, autonomy and citizenship. Algorithms, computing millions of calculations per second, do not pause to reflect on their operations. Developments in the accumulation of vast private datasets that are used to train automated machine learning algorithms pose new challenges for upholding these values. Social media platforms, while the key driver of today's information disorder, also afford new opportunities for organized social activism. The US and China, presumably at opposite ends of an ideological spectrum, are the main exporters of AI technology to both free and totalitarian societies. These are some of the important topics covered by this volume that examines the democratic stakes for societies with the rapid expansion of these technologies.Scholars and students from many backgrounds as well as policy makers, journalists and the general reading public will find a multidisciplinary approach to issues of democratic values and governance encompassing research from Sociology, Digital Humanities, New Media, Psychology, Communication, International Relations and Economics.Chapter 3 of this book is available for free in PDF format as Open Access from the individual product page at www.routledge.com. It has been made available under a Creative Commons Attribution-Non Commercial-No Derivatives 4.0 license
Deep Fakes: Algorithms and Society focuses on the use of artificial intelligence technologies to produce fictitious photorealistic audiovisual clips that are indistinguishable from traditional video media.For over a century, the indexical relationship of the photographic image, and its related media of film and video, to the scene of capture has served as a basis for truth claims. Historically, the iconicity of these images has featured a causal traceback to actual light rays in a particular time and space, which were fixed by chemical reactions or digital sensors to the resultant image. Today, photorealistic audiovisual media can be generated from deep learning networks that sever any connection to an actual event. Should society instantiate new regimes to manage this new challenge to our sense of reality and the traditional evidential capacities of the 'mechanical image'? How do these images generate information disorder while also providing the basis for legitimate tools used in entertainment and creative industries?Scholars and students from many backgrounds, as well as policymakers, journalists and the general reading public, will find a multidisciplinary approach to questions posed by deep fake research from Communication, International Studies, Writing and Rhetoric.
This book explores the intersection of cybersecurity and education technologies, providing practical solutions, detection techniques, and mitigation strategies to ensure a secure and protected learning environment in the face of evolving cyber threats.
This new edition continues to critically examine the evolving importance of our critical infrastructure to our society-recognizing the underpinning value of cyber technology and how physical infrastructures and delivery models impact and affect people and society.
Despite increasing scholarly attention to artificial intelligence (AI), studies at the intersection of AI and communication remain ripe for exploration, including investigations of the social, political, cultural, and ethical aspects of machine intelligence, interactions among agents, and social artifacts. This book tackles these unexplored research areas with special emphasis on conditions, components, and consequences of cognitive, attitudinal, affective, and behavioural dimensions toward communication and AI. In doing so, this book epitomizes communication, journalism and media scholarship on AI and its social, political, cultural, and ethical perspectives.Topics vary widely from interactions between humans and robots through news representation of AI and AI-based news credibility to privacy and value toward AI in the public sphere. Contributors from such countries as Brazil, Netherland, South Korea, Spain, and United States discuss important issues and challenges in AI and communication studies. The collection of chapters in the book considers implications for not only theoretical and methodological approaches, but policymakers and practitioners alike.The chapters in this book were originally published as a special issue of Communication Studies.
Artificial Intelligence for Cyber Defence and Smart Policing will describe the best way of practising artificial intelligence for cyber defence and smart policing.
This book shares new methodologies, technologies, and practices for resolving issues associated with leveraging AI-centric modeling, data analytics, ML-aided models, IoT-driven applications, and cybersecurity techniques in the era of the Industrial Revolution 4.0.
Exploring the cutting-edge concepts of the manual AITEK 6 platform: auto-ML, custom vector base, autonomous process management and predictive dashboards with innovative knowledge cartridges.
This book constitutes the refereed proceedings of the 18th International Workshop on Security, IWSEC 2023, which took place as a hybrid event in Yokohama, Japan, during August 29¿31, 2023. This event was held in hybrid mode.The 14 full papers presented in this book were carefully reviewed and selected from 47 submissions. They were organized in topical sections as follows: System and Hardware Security; Symmetric Key Cryptography; Public Key Cryptography; Zero Knowledge Proofs; and Card Based Cryptography.
In recent years, wireless networks communication has become the fundamental basis of our work, leisure, and communication life from the early GSM mobile phones to the Internet of Things and Internet of Everything communications. All wireless communications technologies such as Bluetooth, NFC, wireless sensors, wireless LANs, ZigBee, GSM, and others have their own challenges and security threats.This book addresses some of these challenges focusing on the implication, impact, and mitigations of the stated issues. The book provides a comprehensive coverage of not only the technical and ethical issues presented by the use of wireless networks but also the adversarial application of wireless networks and its associated implications. The authors recommend a number of novel approaches to assist in better detecting, thwarting, and addressing wireless challenges and threats. The book also looks ahead and forecasts what attacks can be carried out in the future through the malicioususe of the wireless networks if sufficient defenses are not implemented. The research contained in the book fits well into the larger body of work on various aspects of wireless networks and cyber-security.The book provides a valuable reference for cyber-security experts, practitioners, and network security professionals, particularly those interested in the security of the various wireless networks. It is also aimed at researchers seeking to obtain a more profound knowledge in various types of wireless networks in the context of cyber-security, wireless networks, and cybercrime. Furthermore, the book is an exceptional advanced text for Ph.D. and master¿s degree programs in cyber-security, network security, cyber-terrorism, and computer science who are investigating or evaluating a security of a specific wireless network. Each chapter is written by an internationally-renowned expert who has extensive experience in law enforcement, industry, or academia. Furthermore, this bookblends advanced research findings with practice-based methods to provide the reader with advanced understanding and relevant skills.
The book will give you a good understanding of the fundamentals of cyber security and resilience and provide an excellent starting point for any cyber resilience implementation project.
Explore PowerShell's offensive and defensive capabilities to strengthen your organization's security with this practical guidePurchase of the print or Kindle book includes a free PDF eBookKey Features- Master PowerShell for security by configuring, auditing, monitoring, exploiting, and bypassing defenses- Research and develop methods to bypass security features and use stealthy tradecraft- Explore essential security features in PowerShell and protect your environment against exploits and bypassesBook DescriptionTake your cybersecurity skills to the next level with this comprehensive guide to PowerShell security! Whether you're a red or blue teamer, you'll gain a deep understanding of PowerShell's security capabilities and how to use them.After revisiting PowerShell basics and scripting fundamentals, you'll dive into PowerShell Remoting and remote management technologies. You'll learn how to configure and analyze Windows event logs and understand the most important event logs and IDs to monitor your environment. You'll dig deeper into PowerShell's capabilities to interact with the underlying system, Active Directory and Azure AD. Additionally, you'll explore Windows internals including APIs and WMI, and how to run PowerShell without powershell.exe. You'll uncover authentication protocols, enumeration, credential theft, and exploitation, to help mitigate risks in your environment, along with a red and blue team cookbook for day-to-day security tasks. Finally, you'll delve into mitigations, including Just Enough Administration, AMSI, application control, and code signing, with a focus on configuration, risks, exploitation, bypasses, and best practices.By the end of this book, you'll have a deep understanding of how to employ PowerShell from both a red and blue team perspective.What you will learn- Leverage PowerShell, its mitigation techniques, and detect attacks- Fortify your environment and systems against threats- Get unique insights into event logs and IDs in relation to PowerShell and detect attacks- Configure PSRemoting and learn about risks, bypasses, and best practices- Use PowerShell for system access, exploitation, and hijacking- Red and blue team introduction to Active Directory and Azure AD security- Discover PowerShell security measures for attacks that go deeper than simple commands- Explore JEA to restrict what commands can be executedWho this book is forThis book is for security professionals, penetration testers, system administrators, and red and blue teams looking to learn how to leverage PowerShell for security operations. A basic understanding of PowerShell, cybersecurity fundamentals, and scripting is a must. For some parts a basic understanding of active directory, C++/C#, and assembly can be beneficial.Table of Contents- Getting Started with PowerShell- PowerShell Scripting Fundamentals- Exploring PowerShell Remote Management Technologies and PowerShell Remoting- Detection - Auditing and Monitoring- PowerShell Is Powerful - System and API Access- Active Directory - Attacks and Mitigation- Hacking the Cloud - Exploiting Azure Active Directory/Entra ID- Red Team Tasks and Cookbook- Blue Team Tasks and Cookbook- Language Modes and Just Enough Administration (JEA)- AppLocker, Application Control, and Code Signing- Exploring the Antimalware Scan Interface (AMSI)- What Else? - Further Mitigations and Resources
This book constitutes the refereed proceedings of the 17th International Conference on Network and System Security, NSS 2023, held in Canterbury, UK, August 14¿16, 2023.The 12 full and 9 short papers presented together with 2 invited talks in this book were carefully reviewed and selected from 64 submissions. They focus on Attacks and Malware, Blockchain, Security through Hardware, Machine learning and much more.
Master the art of web exploitation with real-world techniques on SAML, WordPress, IoT, ElectronJS, and Ethereum smart contractsPurchase of the print or Kindle book includes a free PDF eBookKey Features- Learn how to detect vulnerabilities using source code, dynamic analysis, and decompiling binaries- Find and exploit vulnerabilities such as SQL Injection, XSS, Command Injection, RCE, and Reentrancy- Analyze real-world security incidents based on MITRE ATT&CK to understand the risk at the CISO levelBook DescriptionWeb attacks and exploits pose an ongoing threat to the interconnected world. This comprehensive book explores the latest challenges in web application security, providing you with an in-depth understanding of hackers' methods and the practical knowledge and skills needed to effectively understand web attacks.The book starts by emphasizing the importance of mindset and toolset in conducting successful web attacks. You'll then explore the methodologies and frameworks used in these attacks, and learn how to configure the environment using interception proxies, automate tasks with Bash and Python, and set up a research lab. As you advance through the book, you'll discover how to attack the SAML authentication layer; attack front-facing web applications by learning WordPress and SQL injection, and exploit vulnerabilities in IoT devices, such as command injection, by going through three CTFs and learning about the discovery of seven CVEs. Each chapter analyzes confirmed cases of exploitation mapped with MITRE ATT&CK. You'll also analyze attacks on Electron JavaScript-based applications, such as XSS and RCE, and the security challenges of auditing and exploiting Ethereum smart contracts written in Solidity. Finally, you'll find out how to disclose vulnerabilities.By the end of this book, you'll have enhanced your ability to find and exploit web vulnerabilities.What you will learn- Understand the mindset, methodologies, and toolset needed to carry out web attacks- Discover how SAML and SSO work and study their vulnerabilities- Get to grips with WordPress and learn how to exploit SQL injection- Find out how IoT devices work and exploit command injection- Familiarize yourself with ElectronJS applications and transform an XSS to an RCE- Discover how to audit Solidity's Ethereum smart contracts- Get the hang of decompiling, debugging, and instrumenting web applicationsWho this book is forThis book is for anyone whose job role involves ensuring their organization's security - penetration testers and red teamers who want to deepen their knowledge of the current security challenges for web applications, developers and DevOps professionals who want to get into the mindset of an attacker; and security managers and CISOs looking to truly understand the impact and risk of web, IoT, and smart contracts. Basic knowledge of web technologies, as well as related protocols is a must.Table of Contents- Mindset and Methodologies- Toolset for Web Attacks and Exploitation- Attacking the Authentication Layer - a SAML Use Case- Attacking Internet-Facing Web Applications - SQL Injection and Cross-Site Scripting (XSS) on WordPress- Attacking IoT Devices - Command Injection and Path Traversal- Attacking Electron JavaScript Applications - from Cross-Site Scripting (XSS) to Remote Command Execution (RCE)- Attacking Ethereum Smart Contracts - Reentrancy, Weak Sources of Randomness, and Business Logic- Continuing the Journey of Vulnerability Discovery
This book constitutes the refereed proceedings of the 14th International Workshop on Post-Quantum Cryptography, PQCrypto 2022, held in College Park, MD, USA, in August 14¿18, 2023.The 25 full papers presented in this book were carefully reviewed and selected from 51 submissions. They are categorized in the following topical sections: code-based cryptography; group-action-based cryptography; isogenye-based cryptography; lattice-based cryptography; multivariate cryptography; quantum algorithms, cryptanalysis and models; post-quantum protocols; side channel cryptanalysis and countermeasures.
Nicht nur im privaten Umfeld, auch im beruflichen sind Computer, Smartphones und das Internet Begleiter unseres täglichen Lebens. Dabei spielt der Schutz von Informationen eine wichtige Rolle. Über 70% aller Cyber-Angriffe zielen auf den Nutzer ab, lediglich ein kleiner Teil auf die tatsächlichen Systeme. Daher sind geschulte und aufmerksame Mitarbeiter ein unabdingbarer Bestandteil der allgemeinen Sicherheitsstrategie zum Schutz der Informationen. Das Ziel ist dabei der Aufbau einer Kultur der Cyber-Sicherheit, einer sogenannten human firewall.
Explore expert tips and techniques to effectively manage the security, compliance, and identity features within your Microsoft 365 applicationsPurchase of the print or Kindle book includes a free PDF eBookKey Features:Discover techniques to reap the full potential of Microsoft security and compliance suiteExplore a range of strategies for effective security and complianceGain practical knowledge to resolve real-world challengesBook Description:The Microsoft 365 Security, Compliance, and Identity Administration is designed to help you manage, implement, and monitor security and compliance solutions for Microsoft 365 environments.With this book, you'll first configure, administer identity and access within Microsoft 365. You'll learn about hybrid identity, authentication methods, and conditional access policies with Microsoft Intune. Next, you'll discover how RBAC and Azure AD Identity Protection can be used to detect risks and secure information in your organization. You'll also explore concepts such as Microsoft Defender for endpoint and identity, along with threat intelligence. As you progress, you'll uncover additional tools and techniques to configure and manage Microsoft 365, including Azure Information Protection, Data Loss Prevention (DLP), and Microsoft Defender for Cloud Apps.By the end of this book, you'll be well-equipped to manage and implement security measures within your Microsoft 365 suite successfully.What You Will Learn:Get up to speed with implementing and managing identity and accessUnderstand how to employ and manage threat protectionManage Microsoft 365's governance and compliance featuresImplement and manage information protection techniquesExplore best practices for effective configuration and deploymentEnsure security and compliance at all levels of Microsoft 365Who this book is for:This book is for IT professionals, administrators, or anyone looking to pursue a career in security administration and wants to enhance their skills in utilizing Microsoft 365 Security Administration. A basic understanding of administration principles of Microsoft 365 and Azure Active Directory is a must. A good grip of on-premises Active Directory will be beneficial.
This is the story of one middle-aged woman in a cardigan determined to understand this growing phenomenon. No other woman has had so many online romances -- from Keanu Reeves to Brad Pitt to Prince William -- and Becky Holmes is a favourite among peacekeeping soldiers and oil rig workers who desperately need iTunes vouchers. By winding up scammers and investigating the truth behind their profiles, Becky shines a revealing, revolting and hilarious light on a very shady corner of the internet. Featuring first-hand accounts of victims, examples of scripts used by fraudsters, a look into the psychology of fraud and of course plenty of Becky's hysterical interactions with scammers, this is a must-read for anyone who needs a reminder that Keanu Reeves is NOT in love with them.
Learn how to deploy information assurance risk management strategies that align with the National Institute of Standards and Technology¿s recommendations. This book will show you how to implement information assurance risk management strategies within your organization. Aimed at system administrators and cybersecurity practitioners, author Bradley Fowler first walks you through how to assess known risks in your organization, understand why using a risk mitigation security strategy control profile is essential, and how to create one for your organization. You will then learn how to develop a risk factor table, outlining descriptions for each risk factor within your organization and which software applications yoüll need to rely on for daily business communication and operations. You will also see how to assess and categorize the level of risk within each technology tool, as well as the impact of an information security breach on the organization. As you progress through the book, you'll review privacy issues relating to your organization, develop and manage a privacy compliance risk profile, and develop and manage a privacy compliance control profile. Additionally, you will gain insight into creating a privacy compliance risk mitigation strategy that helps protect your organization even as security threats evolve. Take the first step to safeguarding your company¿s highly valuable information assets today! What You'll LearnUnderstand what information assurance is and how it relates to risk management strategiesAssess, develop, implement, and manage risk management strategies for corporate information systems, technology, and cloud environmentsDevelop and utilize information usage profiles and risk factor tablesUnderstand the value of data encryption and usage of private and public key exchange for information assurance and security Who This Book Is ForInformation system and cloud architects responsible for developing, implementing, and managing corporate information systems and cloud environments.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.