Results by Title   
46 books about Security
Sort by     
 

Authentication Technologies for Cloud Computing, IoT and Big Data
Yasser M. Alginahi
The Institution of Engineering and Technology, 2019

Critical systems and infrastructure rely heavily on ICT systems and networks where security issues are a major concern. Authentication methods verify that messages come from trusted sources and guarantee the smooth flow of information and data. In this edited reference, the authors present state-of-art research and development in authentication technologies including challenges and applications for Cloud Technologies, IoT and Big Data. Topics covered include authentication; cryptographic algorithms; digital watermarking; biometric authentication; block ciphers with applications in IoT; identification schemes for Cloud and IoT; authentication issues for Cloud applications; cryptography engines for Cloud based on FPGA; and data protection laws.
Expand Description

Blockchain and the Law: The Rule of Code
Primavera De Filippi De Filippi
Harvard University Press, 2018
Library of Congress QA76.9.D32D44 2018 | Dewey Decimal 005.824

Since Bitcoin appeared in 2009, the digital currency has been hailed as an Internet marvel and decried as the preferred transaction vehicle for all manner of criminals. It has left nearly everyone without a computer science degree confused: Just how do you “mine” money from ones and zeros? The answer lies in a technology called blockchain, which can be used for much more than Bitcoin. A general-purpose tool for creating secure, decentralized, peer-to-peer applications, blockchain technology has been compared to the Internet itself in both form and impact. Some have said this tool may change society as we know it. Blockchains are being used to create autonomous computer programs known as “smart contracts,” to expedite payments, to create financial instruments, to organize the exchange of data and information, and to facilitate interactions between humans and machines. The technology could affect governance itself, by supporting new organizational structures that promote more democratic and participatory decision making. Primavera De Filippi and Aaron Wright acknowledge this potential and urge the law to catch up. That is because disintermediation—a blockchain’s greatest asset—subverts critical regulation. By cutting out middlemen, such as large online operators and multinational corporations, blockchains run the risk of undermining the capacity of governmental authorities to supervise activities in banking, commerce, law, and other vital areas. De Filippi and Wright welcome the new possibilities inherent in blockchains. But as Blockchain and the Law makes clear, the technology cannot be harnessed productively without new rules and new approaches to legal thinking.
Expand Description

Blockchain for 5G Healthcare Applications: Security and privacy solutions
Sudeep Tanwar
The Institution of Engineering and Technology, 2021

A secured system for Healthcare 4 is vital to all stakeholders, including patients and caregivers. The answer could be found by use of the new Blockchain system of trusted ledgers, this would help to guarantee authenticity in the multi-access system that is Healthcare 4.0. This book aims to be the first comprehensive book about how this could be achieved. It emphasizes the privacy and security aspects as these have been the areas of biggest challenge.
Expand Description

Blockchains for Network Security: Principles, technologies and applications
Haojun Huang
The Institution of Engineering and Technology, 2021

Blockchain technology is a powerful, cost-effective method for network security. Essentially, it is a decentralized ledger for storing all committed transactions in trustless environments by integrating several core technologies such as cryptographic hash, digital signature and distributed consensus mechanisms.
Expand Description

Bodies as Evidence: Security, Knowledge, and Power
Mark Maguire, Ursula Rao, and Nils Zurawski, editors
Duke University Press, 2018
Library of Congress HM636.B543 2018

From biometrics to predictive policing, contemporary security relies on sophisticated scientific evidence-gathering and knowledge-making focused on the human body. Bringing together new anthropological perspectives on the complexities of security in the present moment, the contributors to Bodies as Evidence reveal how bodies have become critical sources of evidence that is organized and deployed to classify, recognize, and manage human life. Through global case studies that explore biometric identification, border control, forensics, predictive policing, and counterterrorism, the contributors show how security discourses and practices that target the body contribute to new configurations of knowledge and power. At the same time, margins of error, unreliable technologies, and a growing suspicion of scientific evidence in a “post-truth” era contribute to growing insecurity, especially among marginalized populations.

Contributors. Carolina Alonso-Bejarano, Gregory Feldman, Francisco J. Ferrándiz, Daniel M. Goldstein, Ieva Jusionyte, Amade M’charek, Mark Maguire, Joseph P. Masco, Ursula Rao, Antonius C. G. M. Robben, Joseba Zulaika, Nils Zurawski
Expand Description

Code of Peace: Ethics and Security in the World of the Warlord States
Dorothy V. Jones
University of Chicago Press, 1991
Library of Congress JX1255.J66 1991 | Dewey Decimal 172.4

Is it possible, in our world of differing beliefs and diverse cultures, to find an ethical framework that can guide actual international relations? In Code of Peace, Dorothy V. Jones sets forth her surprising answer to this perplexing question: Not only is a consensus on ethical principles possible, but it has already been achieved.

Jones focuses on the progressive development of international law to disclose an underlying code of ethics that enjoys broad support in the world community. Unlike studies that concentrate on what others think that states ought to do, Code of Peace analyzes what states themselves consider proper behavior. Using history as both narrative and argument, Jones shows how the existing ethical code has evolved cumulatively since World War I from a complex interplay between theory and practice. More than an abstract treatise or a merely technical analysis, Jones's study is grounded in the circumstances of war and peace in this century. Treaties and agreements, she argues, are forging a consensus on such principles as human rights, self-determination, and cooperation between states. Jones shows how leaders and representatives of nations, drawing on a rich heritage of philosophical thoughts as well as on their own experiences in a violent world of self-interested conflict, have shaped their thought to the taming of that world in the cause of peace. That is the striking thing about this code: states whose relations are marked by so frequent a recourse to war that they can fairly be called "warlords" have created and pledged themselves to a code of peace.

The implications of Code of Peace for establishing a normative foundation for peace are profound. Historically sound and timely, impeccably researched and elegantly written, the book will be of immediate and lasting value to anyone concerned with the stability of the modern world.
Expand Description

Consumer Attitudes Toward Data Breach Notifications and Loss of Personal Information
Lillian Ablon
RAND Corporation, 2016
Library of Congress HV6773.2.A25 2016

Although spending on cybersecurity continues to grow, companies, government agencies, and nonprofit organizations are still being breached, and sensitive personal, financial, and health information is still being compromised. This report sets out the results of a study of consumer attitudes toward data breaches, notifications that a breach has occurred, and company responses to such events.
Expand Description

Cyberwar and Revolution: Digital Subterfuge in Global Capitalism
Nick Dyer-Witheford
University of Minnesota Press, 2019
Library of Congress HV6773.15.C97 | Dewey Decimal 363.325

Uncovering the class conflicts, geopolitical dynamics, and aggressive capitalism propelling the militarization of the internet


Global surveillance, computational propaganda, online espionage, virtual recruiting, massive data breaches, hacked nuclear centrifuges and power grids—concerns about cyberwar have been mounting, rising to a fever pitch after the alleged Russian hacking of the U.S. presidential election and the Cambridge Analytica scandal. Although cyberwar is widely discussed, few accounts undertake a deep, critical view of its roots and consequences. 

Analyzing the new militarization of the internet, Cyberwar and Revolution argues that digital warfare is not a bug in the logic of global capitalism but rather a feature of its chaotic, disorderly unconscious. Urgently confronting the concept of cyberwar through the lens of both Marxist critical theory and psychoanalysis, Nick Dyer-Witheford and Svitlana Matviyenko provide a wide-ranging examination of the class conflicts and geopolitical dynamics propelling war across digital networks.

Investigating the subjectivities that cyberwar mobilizes, exploits, and bewilders, and revealing how it permeates the fabric of everyday life and implicates us all in its design, this book also highlights the critical importance of the emergent resistance to this digital militarism—hacktivism, digital worker dissent, and off-the-grid activism—for effecting different, better futures.

Expand Description

Data Security in Cloud Computing
Vimal Kumar
The Institution of Engineering and Technology, 2017

Cloud Computing has already been embraced by many organizations and individuals due to its benefits of economy, reliability, scalability and guaranteed quality of service among others. But since the data is not stored, analysed or computed on site, this can open security, privacy, trust and compliance issues. This one-stop reference covers a wide range of issues on data security in Cloud Computing ranging from accountability, to data provenance, identity and risk management.
Expand Description

The Defender’s Dilemma: Charting a Course Toward Cybersecurity
Martin C. Libicki
RAND Corporation, 2015
Library of Congress TK5105.59.L534 2015 | Dewey Decimal 005.8

Cybersecurity is a constant, and, by all accounts growing, challenge. This report, the second in a multiphase study on the future of cybersecurity, reveals perspectives and perceptions from chief information security officers; examines the development of network defense measures—and the countermeasures that attackers create to subvert those measures; and explores the role of software vulnerabilities and inherent weaknesses.
Expand Description

Demanding Justice and Security: Indigenous Women and Legal Pluralities in Latin America
Sieder, Rachel
Rutgers University Press, 2017
Library of Congress KG483.W66D46 2017 | Dewey Decimal 342.80878

Across Latin America, indigenous women are organizing to challenge racial, gender, and class discrimination through the courts. Collectively, by engaging with various forms of law, they are forging new definitions of what justice and security mean within their own contexts and struggles. They have challenged racism and the exclusion of indigenous people in national reforms, but also have challenged ‘bad customs’ and gender ideologies that exclude women within their own communities.
 
Featuring chapters on Bolivia, Colombia, Ecuador, Guatemala, and Mexico, the contributors to Demanding Justice and Security include both leading researchers and community activists. From Kichwa women in Ecuador lobbying for the inclusion of specific clauses in the national constitution that guarantee their rights to equality and protection within indigenous community law, to Me’phaa women from Guerrero, Mexico, battling to secure justice within the Inter-American Court of Human Rights for violations committed in the context of militarizing their home state, this book is a must-have for anyone who wants to understand the struggle of indigenous women in Latin America.
 
Expand Description

Edge Computing: Models, technologies and applications
Javid Taheri
The Institution of Engineering and Technology, 2020

Cloud computing has evolved as a cost-effective, easy-to-use, elastic and scalable computing paradigm to transform today's business models. 5G, Industrial IoT, Industry 4.0 and China-2050 frameworks and technologies are introducing new challenges that cannot be solved efficiently using current cloud architectures. To handle the collected information from such a vast number of devices and actuators, and address these issues, novel concepts have been proposed to bring cloud-like resources closer to end users at the edge of the network, a technology called edge computing.
Expand Description

Endangered City: The Politics of Security and Risk in Bogotá
Austin Zeiderman
Duke University Press, 2016
Library of Congress HV551.5.C7Z453 2016

Security and risk have become central to how cities are planned, built, governed, and inhabited in the twenty-first century. In Endangered City, Austin Zeiderman focuses on this new political imperative to govern the present in anticipation of future harm. Through ethnographic fieldwork and archival research in Bogotá, Colombia, he examines how state actors work to protect the lives of poor and vulnerable citizens from a range of threats, including environmental hazards and urban violence. By following both the governmental agencies charged with this mandate and the subjects governed by it, Endangered City reveals what happens when logics of endangerment shape the terrain of political engagement between citizens and the state. The self-built settlements of Bogotá’s urban periphery prove a critical site from which to examine the rising effect of security and risk on contemporary cities and urban life.
 
Expand Description

Getting to Yes with China in Cyberspace
Scott Warren Harold
RAND Corporation, 2016
Library of Congress TK5105.8854.H37 2016 | Dewey Decimal 384.330951

This study explores U.S. policy options for managing cyberspace relations with China via agreements and norms of behavior. It considers two questions: Can negotiations lead to meaningful agreement on norms? If so, what does each side need to be prepared to exchange in order to achieve an acceptable outcome? This analysis should interest those concerned with U.S.-China relations and with developing norms of conduct in cyberspace.
Expand Description

Handbook of Cybersecurity for e-Health
Bill Buchanan
The Institution of Engineering and Technology, 2021

In this title, a team of top experts address cyber security for e-Health technologies and systems. It examines the need for better security and privacy infrastructure, outlining methods and policies for working with sensitive data. The authors focus on the latest methods and visionary work within health and social care for cyber security, making it vital reading for professionals and researchers in healthcare technologies and security, professionals in public health and law, healthcare policy developers and government decision makers.
Expand Description

Human Trafficking, Human Security, and the Balkans
H. Richard Friman
University of Pittsburgh Press, 2007
Library of Congress HQ281.H84 2007 | Dewey Decimal 364.15

In the aftermath of four Yugoslav wars, ongoing efforts at reconstruction in South Eastern Europe have devoted relatively limited attention to dimensions of human security that enhance protections for the region's most vulnerable populations in their daily lives. It is in this context that South Eastern Europe, and especially the Western Balkan region, has emerged as a nexus point in human trafficking.

Human Trafficking, Human Security, and the Balkans brings together leading scholars, NGO representatives, and government officials to analyze and offer solutions to this challenge. The contributors explore the economic dynamics of human trafficking in an era of globalization, which has greatly facilitated not only the flow of goods and services but also the trade in human beings. They also examine the effectiveness of international and transnational policies and practice, the impact of peacekeeping forces, and the emergence of national and regional action plans in the Western Balkans and, more broadly, in South Eastern Europe. Finally, they consider the nature and ramifications of the gap between human security rhetoric and institutional policy steps against human trafficking.
Expand Description

Immigration, Integration, and Security: America and Europe in Comparative Perspective
Ariane Chebel d'Appollonia
University of Pittsburgh Press, 2008
Library of Congress JV7590.I4866 2008 | Dewey Decimal 325.4

Recent acts of terrorism in Britain and Europe and the events of 9/11 in the United States have greatly influenced immigration, security, and integration policies in these countries. Yet many of the current practices surrounding these issues were developed decades ago, and are ill-suited to the dynamics of today's global economies and immigration patterns. 

At the core of much policy debate is the inherent paradox whereby immigrant populations are frequently perceived as posing a potential security threat yet bolster economies by providing an inexpensive workforce. Strict attention to border controls and immigration quotas has diverted focus away from perhaps the most significant dilemma: the integration of existing immigrant groups. Often restricted in their civil and political rights and targets of xenophobia, racial profiling, and discrimination, immigrants are unable or unwilling to integrate into the population. These factors breed distrust, disenfranchisement, and hatred-factors that potentially engender radicalization and can even threaten internal security.

The contributors compare policies on these issues at three relational levels: between individual EU nations and the U.S., between the EU and U.S., and among EU nations. What emerges is a timely and critical examination of the variations and contradictions in policy at each level of interaction and how different agencies and different nations often work in opposition to each other with self-defeating results. While the contributors differ on courses of action, they offer fresh perspectives, some examining significant case studies and laying the groundwork for future debate on these crucial issues.
Expand Description

India China: Rethinking Borders and Security
L.H.M. Ling, Adriana Erthal Abdenur, Payal Banerjee, Nimmi Kurian, Mahendra P. Lama, and Li Bo
University of Michigan Press, 2016
Library of Congress DS450.C6L55 2016 | Dewey Decimal 327.54051

Challenging the Westphalian view of international relations, which focuses on the sovereignty of states and the inevitable potential for conflict, the authors from the Borderlands Study Group reconceive borders as capillaries enabling the flow of material, cultural, and social benefits through local communities, nation-states, and entire regions. By emphasizing local agency and regional interdependencies, this metaphor reconfigures current narratives about the China India border and opens a new perspective on the long history of the Silk Roads, the modern BCIM Initiative, and dam construction along the Nu River in China and the Teesta River in India.

Together, the authors show that positive interaction among people on both sides of a border generates larger, cross-border communities, which can pressure for cooperation and development. India China offers the hope that people divided by arbitrary geo-political boundaries can circumvent race, gender, class, religion, and other social barriers, to form more inclusive institutions and forms of governance.
 

Expand Description

Industry of Anonymity: Inside the Business of Cybercrime
Jonathan Lusthaus
Harvard University Press, 2018
Library of Congress HV6773.L87 2018 | Dewey Decimal 364.168

Jonathan Lusthaus lifts the veil on cybercriminals in the most extensive account yet of the lives they lead and the vast international industry they have created. Having traveled to hotspots around the world to meet with hundreds of law enforcement agents, security gurus, hackers, and criminals, he charts how this industry based on anonymity works.
Expand Description

Insurance Era: Risk, Governance, and the Privatization of Security in Postwar America
Caley Horan
University of Chicago Press, 2021

Actuarial thinking is everywhere in contemporary America, an often unnoticed byproduct of the postwar insurance industry’s political and economic influence. Calculations of risk permeate our institutions, influencing how we understand and manage crime, education, medicine, finance, and other social issues. Caley Horan’s remarkable book charts the social and economic power of private insurers since 1945, arguing that these institutions’ actuarial practices played a crucial and unexplored role in insinuating the social, political, and economic frameworks of neoliberalism into everyday life.

Analyzing insurance marketing, consumption, investment, and regulation, Horan asserts that postwar America’s obsession with safety and security fueled the exponential expansion of the insurance industry and the growing importance of risk management in other fields. Horan shows that the rise and dissemination of neoliberal values did not happen on its own: they were the result of a project to unsocialize risk, shrinking the state’s commitment to providing support, and heaping burdens upon the people often least capable of bearing them. Insurance Era is a sharply researched and fiercely written account of how and why private insurance and its actuarial market logic came to be so deeply lodged in American visions of social welfare.
Expand Description

Insurgent Aesthetics: Security and the Queer Life of the Forever War
Ronak K. Kapadia
Duke University Press, 2019
Library of Congress NX650.M5352K373 2019

In Insurgent Aesthetics Ronak K. Kapadia theorizes the world-making power of contemporary art responses to US militarism in the Greater Middle East. He traces how new forms of remote killing, torture, confinement, and surveillance have created a distinctive post-9/11 infrastructure of racialized state violence. Linking these new forms of violence to the history of American imperialism and conquest, Kapadia shows how Arab, Muslim, and South Asian diasporic multimedia artists force a reckoning with the US war on terror's violent destruction and its impacts on immigrant and refugee communities. Drawing on an eclectic range of visual, installation, and performance works, Kapadia reveals queer feminist decolonial critiques of the US security state that visualize subjugated histories of US militarism and make palpable what he terms “the sensorial life of empire.” In this way, these artists forge new aesthetic and social alliances that sustain critical opposition to the global war machine and create alternative ways of knowing and feeling beyond the forever war.
Expand Description

Internet and Wireless Security
Robert Temple
The Institution of Engineering and Technology, 2002
Library of Congress TK5105.59.I544 2002 | Dewey Decimal 005.8

Many organisations are transforming their businesses through the development of information and communications technologies. The security of this e-commerce is now a key enabler for businesses, and this book presents an overview of current and future infrastructures for e-business security.
Expand Description

Internet Freedom Software and Illicit Activity: Supporting Human Rights Without Enabling Criminals
Sasha Romanosky
RAND Corporation, 2015
Library of Congress TK5105.8855.R66 2015 | Dewey Decimal 323.445

This report examines the portfolio of tools funded by the State Department’s Bureau of Democracy, Human Rights, and Labor that help support Internet freedom and assesses the impact of these tools in promoting U.S. interests (such as freedom of expression, freedom of the press, and the free flow of information) without enabling criminal activity.
Expand Description

Liberalism and the Culture of Security: The Nineteenth-Century Rhetoric of Reform
Katherine Henry
University of Alabama Press, 2011
Library of Congress PS217.P64H46 2011 | Dewey Decimal 810.93581

Normal0falsefalsefalseMicrosoftInternetExplorer4

Figures of protection and security are everywhere in American public discourse, from the protection of privacy or civil liberties to the protection of marriage or the unborn, and from social security to homeland security. Liberalism and the Culture of Security traces a crucial paradox in historical and contemporary notions of citizenship: in a liberal democratic culture that imagines its citizens as self-reliant, autonomous, and inviolable, the truth is that claims for citizenship—particularly for marginalized groups such as women and slaves—have just as often been made in the name of vulnerability and helplessness.
 
Katherine Henry traces this turn back to the eighteenth-century opposition of liberty and tyranny, which imagined our liberties as being in danger of violation by the forces of tyranny and thus in need of protection. She examines four particular instances of this rhetorical pattern. The first chapters show how women’s rights and antislavery activists in the antebellum era exploited the contradictions that arose from the liberal promise of a protected citizenry: first by focusing primarily on arguments over slavery in the 1850s that invoke the Declaration of Independence, including Harriet Beecher Stowe’s fiction and Frederick Douglass’s “Fourth of July” speech; and next by examining Angelina Grimké’s brief but intense antislavery speaking career in the 1830s.
 
New conditions after the Civil War and Emancipation changed the way arguments about civic inclusion and exclusion could be advanced. Henry considers the issue of African American citizenship in the 1880s and 1890s, focusing on the mainstream white Southern debate over segregation and the specter of a tyrannical federal government, and then turning to Frances E. W. Harper’s fictional account of African American citizenship in Iola Leroy. Finally, Henry examines Henry James’s 1886 novel The Bostonians, in which arguments over the appropriate role of women and the proper place of the South in post–Civil War America are played out as a contest between Olive Chancellor and Basil ransom for control over the voice of the eloquent girl Verena Tarrant.
Expand Description

Managing Ethnic Diversity after 9/11: Integration, Security, and Civil Liberties in Transatlantic Perspective
Chebel d'Appollonia, Ariane
Rutgers University Press, 2010
Library of Congress JV6342.M355 2010 | Dewey Decimal 325.4

America's approach to terrorism has focused on traditional national security methods, under the assumption that terrorism's roots are foreign and the solution to greater security lies in conventional practices. Europe offers a different model, with its response to internal terrorism relying on police procedures.

Managing Ethnic Diversity after 9/11 compares these two strategies and considers that both may have engendered greater radicalization--and a greater chance of home-grown terrorism. Essays address how transatlantic countries, including the United Kingdom, the United States, France, Germany, Spain, Italy, and the Netherlands have integrated ethnic minorities, especially Arabs and Muslims, since 9/11. Discussing the "securitization of integration," contributors argue that the neglect of civil integration has challenged the rights of these minorities and has made greater security more remote.
Expand Description

Managing Internet of Things Applications across Edge and Cloud Data Centres
Rajiv Ranjan
The Institution of Engineering and Technology, 2021

This book covers state of the art interdisciplinary research on key disruptive and interrelated technologies such as Big Data, Edge computing, IoT and Cloud computing. The authors address the challenges from a distributed system perspective, with clear contributions in theory and applications. Real-world case studies look at the integration of these technologies in healthcare, disaster management, smart grids, and other areas. The book covers vital topics including devices and sensing; cloud and edge Infrastructure; big data processing; application resource management; and privacy and security.
Expand Description

Markets for Cybercrime Tools and Stolen Data: Hackers' Bazaar
Lillian Ablon
RAND Corporation, 2014

Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets. This report characterizes these markets and how they have grown into their current state to provide insight into how their existence can harm the information security environment. Understanding these markets lays the groundwork for exploring options to minimize their potentially harmful influence.
Expand Description

Nature-Inspired Cyber Security and Resiliency: Fundamentals, techniques and applications
El-Sayed M. El-Alfy
The Institution of Engineering and Technology, 2019

With the rapid evolution of cyberspace, computing, communications and sensing technologies, organizations and individuals rely more and more on new applications such as fog and cloud computing, smart cities, Internet of Things (IoT), collaborative computing, and virtual and mixed reality environments. Maintaining their security, trustworthiness and resilience to cyber-attacks has become crucial which requires innovative and creative cyber security and resiliency solutions. Computing algorithms have been developed to mimic the operation of natural processes, phenomena and organisms such as artificial neural networks, swarm intelligence, deep learning systems, biomimicry, and more. The amazing characteristics of these systems offer a plethora of novel methodologies and opportunities to cope with emerging cyber challenges.
Expand Description

Olympic-Caliber Cybersecurity: Lessons for Safeguarding the 2020 Games and Other Major Events
Cynthia Dion-Schwarz
RAND Corporation, 2018

Understanding the cybersecurity threat landscape is critical to mitigating threats, apportioning limited resources, and hosting a resilient, safe, and secure Olympic Games. To support the security goals of Tokyo 2020, this report characterizes the cybersecurity threats that are likely to pose a risk to the games, visualizes a threat actor typology, and presents a series of policy options to guide cybersecurity planning.
Expand Description

The Other Quiet Professionals: Lessons for Future Cyber Forces from the Evolution of Special Forces
Christopher Paul
RAND Corporation, 2014
Library of Congress U163.P38 2014 | Dewey Decimal 355.343

With the establishment of U.S. Cyber Command, the cyber force is gaining visibility and authority, but challenges remain, particularly in the areas of acquisition and personnel recruitment and career progression. A review of commonalities, similarities, and differences between the still-nascent U.S. cyber force and early U.S. special operations forces, conducted in 2010, offers salient lessons for the future direction of U.S. cyber forces.
Expand Description

Owners of the Sidewalk: Security and Survival in the Informal City
Daniel M. Goldstein
Duke University Press, 2016
Library of Congress HF5459.B5G65 2016

Many of Bolivia's poorest and most vulnerable citizens work as vendors in the Cancha mega-market in the city of Cochabamba, where they must navigate systems of informality and illegality in order to survive. In Owners of the Sidewalk Daniel M. Goldstein examines the ways these systems correlate in the marginal spaces of the Latin American city. Collaborating with the Cancha's legal and permanent stall vendors (fijos) and its illegal and itinerant street and sidewalk vendors (ambulantes), Goldstein shows how the state's deliberate neglect and criminalization of the Cancha's poor—a practice common to neoliberal modern cities—makes the poor exploitable, governable, and consigns them to an insecure existence. Goldstein's collaborative and engaged approach to ethnographic field research also opens up critical questions about what ethical scholarship entails.
 
 
Expand Description

Passwords: Philology, Security, Authentication
Brian Lennon
Harvard University Press, 2018
Library of Congress QA76.9.A25L485 2018 | Dewey Decimal 005.824

Cryptology, the mathematical and technical science of ciphers and codes, and philology, the humanistic study of natural or human languages, are typically understood as separate domains of activity. But Brian Lennon contends that these two domains, both concerned with authentication of text, should be viewed as contiguous. He argues that computing’s humanistic applications are as historically important as its mathematical and technical ones. What is more, these humanistic uses, no less than cryptological ones, are marked and constrained by the priorities of security and military institutions devoted to fighting wars and decoding intelligence. Lennon’s history encompasses the first documented techniques for the statistical analysis of text, early experiments in mechanized literary analysis, electromechanical and electronic code-breaking and machine translation, early literary data processing, the computational philology of late twentieth-century humanities computing, and early twenty-first-century digital humanities. Throughout, Passwords makes clear the continuity between cryptology and philology, showing how the same practices flourish in literary study and in conditions of war. Lennon emphasizes the convergence of cryptology and philology in the modern digital password. Like philologists, hackers use computational methods to break open the secrets coded in text. One of their preferred tools is the dictionary, that preeminent product of the philologist’s scholarly labor, which supplies the raw material for computational processing of natural language. Thus does the historic overlap of cryptology and philology persist in an artifact of computing—passwords—that many of us use every day.
Expand Description

People on the Move: The Security, Social, and Economic Implications of Mass Migration, Volume 15
Nikolas A. Stavrou, ed.
Duke University Press

On an annual basis, approximately 100 million people either attempt to or actually do leave their place of birth, often not knowing their final destination. The flow of immigrants who arrive in neighboring countries in search of refuge and work raises social, political, and security concerns. This special issue of Mediterranean Quarterly takes a closer look at a pattern of history that is at the core of current global instability—the mass migration of peoples.

This collection gathers a unique group of contributors, including representatives from Congress, the United Nations, and Israel’s Ministry of Justice, as well as senior diplomats from Canada, Bulgaria, Portugal, Spain, and Turkey. Presenting their diverse perspectives, the contributors address regional and policy issues related to the mass migration of people, as well as questions concerning citizenship and national security, human trafficking in the form of prostitution, and cultural discrimination. The result is a multifaceted exploration of issues underlying many of the world’s economic, security, and social challenges. Other topics include the impact of state failure on migration, immigration in California, security measures and “preferred” immigrants in Canada after September 11, 2001, and Albanian migration into Greece.

Contributors. Alexandre Afonso, David Binder, Andrew C. Danopoulos, Constantine P. Danopoulos, Francis M. Deng, Mohamed A. El-Khawas, Omar G. Encarnación, Rochelle Gershuni, Larry L. Gerston, Ahmet Içduygu, Benjamin Kline, Bojan Korenic, Erin Kruger, Robert S. Leiken, Marlene Mulder, Elena Poptodorova, Tom Tancredo

Expand Description

The Power to Coerce: Countering Adversaries Without Going to War
David C. Gompert
RAND Corporation, 2016

Mounting costs, risks, and public misgivings of waging war are raising the importance of U.S. power to coerce (P2C). The best P2C options are financial sanctions, support for nonviolent political opposition to hostile regimes, and offensive cyber operations. The state against which coercion is most difficult and risky is China, which also happens to pose the strongest challenge to U.S. military options in a vital region.
Expand Description

Privacy’s Blueprint: The Battle to Control the Design of New Technologies
Woodrow Hartzog
Harvard University Press, 2018
Library of Congress KF1262.H37 2018 | Dewey Decimal 342.730858

Every day, Internet users interact with technologies designed to undermine their privacy. Social media apps, surveillance technologies, and the Internet of Things are all built in ways that make it hard to guard personal information. And the law says this is okay because it is up to users to protect themselves—even when the odds are deliberately stacked against them. In Privacy’s Blueprint, Woodrow Hartzog pushes back against this state of affairs, arguing that the law should require software and hardware makers to respect privacy in the design of their products. Current legal doctrine treats technology as though it were value-neutral: only the user decides whether it functions for good or ill. But this is not so. As Hartzog explains, popular digital tools are designed to expose people and manipulate users into disclosing personal information. Against the often self-serving optimism of Silicon Valley and the inertia of tech evangelism, Hartzog contends that privacy gains will come from better rules for products, not users. The current model of regulating use fosters exploitation. Privacy’s Blueprint aims to correct this by developing the theoretical underpinnings of a new kind of privacy law responsive to the way people actually perceive and use digital technologies. The law can demand encryption. It can prohibit malicious interfaces that deceive users and leave them vulnerable. It can require safeguards against abuses of biometric surveillance. It can, in short, make the technology itself worthy of our trust.
Expand Description

Provisional Authority: Police, Order, and Security in India
Beatrice Jauregui
University of Chicago Press, 2016
Library of Congress HV8250.L8J38 2016 | Dewey Decimal 363.209542

Policing as a global form is often fraught with excessive violence, corruption, and even criminalization. These sorts of problems are especially omnipresent in postcolonial nations such as India, where Beatrice Jauregui has spent several years studying the day-to-day lives of police officers in its most populous state, Uttar Pradesh. In this book, she offers an empirically rich and theoretically innovative look at the great puzzle of police authority in contemporary India and its relationship to social order, democratic governance, and security.
 
Jauregui explores the paradoxical demands placed on Indian police, who are at once routinely charged with abuses of authority at the same time that they are asked to extend that authority into any number of both official and unofficial tasks. Her ethnography of their everyday life and work demonstrates that police authority is provisional in several senses: shifting across time and space, subject to the availability and movement of resources, and dependent upon shared moral codes and relentless instrumental demands. In the end, she shows that police authority in India is not simply a vulgar manifestation of raw power or the violence of law but, rather, a contingent and volatile social resource relied upon in different ways to help realize human needs and desires in a pluralistic, postcolonial democracy.
 
Provocative and compelling, Provisional Authority provides a rare and disquieting look inside the world of police in India, and shines critical light on an institution fraught with moral, legal and political contradictions.
 
Expand Description

Security and Development in Global Politics: A Critical Comparison
Joanna Spear and Paul D. Williams, Editors
Georgetown University Press, 2012
Library of Congress JZ5588.S42845 2012 | Dewey Decimal 338.9

Security and development matter: they often involve issues of life and death and they determine the allocation of truly staggering amounts of the world’s resources. Particularly since the start of the wars in Afghanistan and Iraq, there has been momentum in policy circles to merge the issues of security and development to attempt to end conflicts, create durable peace, strengthen failing states, and promote the conditions necessary for people to lead healthier and more prosperous lives.

In many ways this blending of security and development agendas seems admirable and designed to produce positive outcomes all around. However, it is often the case that the two concepts in combination do not receive equal weight, with security issues getting priority over development concerns. This is not desirable and actually undermines security in the longer term. Moreover, there are major challenges in practice when security practitioners and development practitioners are asked to agree on priorities and work together.

Security and Development in Global Politics illuminates the common points of interest but also the significant differences between security and development agendas and approaches to problem solving. With insightful chapter pairings—each written by a development expert and a security analyst—the book explores seven core international issues: aid, humanitarian assistance, governance, health, poverty, trade and resources, and demography. Using this comparative structure, the book effectively assesses the extent to which there really is a nexus between security and development and, most importantly, whether the link should be encouraged or resisted.

Expand Description

Security and Privacy for Big Data, Cloud Computing and Applications
Wei Ren
The Institution of Engineering and Technology, 2019

As big data becomes increasingly pervasive and cloud computing utilization becomes the norm, the security and privacy of our systems and data becomes more critical with emerging security and privacy threats and challenges. This book presents a comprehensive view on how to advance security and privacy in big data, cloud computing, and their applications. Topics include cryptographic tools, SDN security, big data security in IoT, privacy preserving in big data, security architecture based on cyber kill chain, privacy-aware digital forensics, trustworthy computing, privacy verification based on machine learning, and chaos-based communication systems. This book is an essential reading for networking, computing, and communications professionals, researchers, students and engineers, working with big data and cloud computing.
Expand Description

Security and Privacy of Electronic Healthcare Records: Concepts, paradigms and solutions
Sudeep Tanwar
The Institution of Engineering and Technology, 2020

Hospitals, medical practices and healthcare organizations are implementing new technologies at breakneck speed. Yet privacy and security considerations are often an afterthought, putting healthcare organizations at risk of data security and privacy issues, fines, damage to their reputations, with serious potential consequences for the patients. Electronic Health Record systems (EHRs) consist of clinical notes, patient listings, lab results, imaging results and screening tests. EHRs are growing in complexity over time and requiring increasing amounts of data storage.
Expand Description

Strategic Choices for a Turbulent World: In Pursuit of Security and Opportunity
Andrew R. Hoehn
RAND Corporation, 2017
Library of Congress U21.2.H62155 2017 | Dewey Decimal 355.033573

This report is the last of a six-volume series in which RAND explores the elements of a national strategy for the conduct of U.S. foreign policy. It analyzes U.S. strengths and weaknesses, and suggests adaptations for this new era of turbulence and uncertainty. The report offers three alternative strategic concepts and evaluates their underlying assumptions, costs, risks, and constraints.
Expand Description

Technological Turf Wars: A Case Study of the Computer Antivirus Industry
Jessica Johnston
Temple University Press, 2008
Library of Congress QA76.9.A25J57 2009 | Dewey Decimal 005.8

In Technological Turf Wars, Jessica Johnston analyzes the tensions and political dilemmas that coexist in the interrelationship among science, technology and society. Illustrating how computer security is as concerned with social relationships as it is with technology, Johnston provides an illuminating ethnography that considers corporate culture and the workplace environment of the antivirus industry.

Using a qualitative, interdisciplinary approach, which combines organizational and security studies with critical and social analysis of science and technology, Johnston questions the motivations, contradictions and negotiations of antivirus professionals. She examines the tensions between the service ethics and profit motives—does the industry release viruses to generate demand for antivirus software?—and considers the dynamics within companies by looking at facets such as gender bias and power politics. Technological Turf Wars is an informed, enlightened and entertaining view of how the production of computer security technology is fraught with social issues.

Expand Description

Terrorist Use of Cryptocurrencies: Technical and Organizational Barriers and Future Threats
Cynthia Dion-Schwarz
RAND Corporation, 2019
Library of Congress HG1710.D56 2019 | Dewey Decimal 332.17

The success of counterterrorism finance strategies in reducing terrorist access to official currencies has raised concerns that terrorist organizations might increase their use of such digital cryptocurrencies as Bitcoin to support their activities. RAND researchers thus consider the needs of terrorist groups and the advantages and disadvantages of the cryptocurrency technologies available to them.
Expand Description

Trusted Computing
Chris Mitchell
The Institution of Engineering and Technology, 2005
Library of Congress QA76.9.A25T746 2005 | Dewey Decimal 005.8

As computers are increasingly embedded, ubiquitous and wirelessly connected, security becomes imperative. This has led to the development of the notion of a 'trusted platform', the chief characteristic of which is the possession of a trusted hardware element which is able to check all or part of the software running on this platform. This enables parties to verify the software environment running on a remote trusted platform, and hence to have some trust that the data sent to that machine will be processed in accordance with agreed rules.
Expand Description

Trusted Platform Modules: Why, when and how to use them
Ariel Segall
The Institution of Engineering and Technology, 2017
Library of Congress QA76.9.A25S4535 2016 | Dewey Decimal 005.8

Trusted Platform Modules (TPMs) are small, inexpensive chips which provide a limited set of security functions. They are most commonly found as a motherboard component on laptops and desktops aimed at the corporate or government markets, but can also be found on many consumer-grade machines and servers, or purchased as independent components. Their role is to serve as a Root of Trust - a highly trusted component from which we can bootstrap trust in other parts of a system. TPMs are most useful for three kinds of tasks: remotely identifying a machine, or machine authentication; providing hardware protection of secrets, or data protection; and providing verifiable evidence about a machine's state, or attestation.
Expand Description

User-Centric Privacy and Security in Biometrics
Claus Vielhauer
The Institution of Engineering and Technology, 2018
Library of Congress TK7882.B56U84 2017 | Dewey Decimal 342.0858

The interplay of privacy, security and user-determination is an important consideration in the roll-out of biometric technologies. It brings into play requirements such as privacy of biometric data in systems, communication and databases, soft biometric profiling, biometric recognition of persons across distributed systems and in nomadic scenarios, and the convergence between user convenience, usability and authentication reliability.
Expand Description

Zero Days, Thousands of Nights: The Life and Times of Zero-Day Vulnerabilities and Their Exploits
Lillian Ablon
RAND Corporation, 2017

Zero-day vulnerabilities—software vulnerabilities for which no patch or fix has been publicly released—and their exploits are useful in cyber operations, as well as in defensive and academic settings. This report provides findings from real-world zero-day vulnerability and exploit data that can inform ongoing policy debates regarding stockpiling (i.e., keeping zero-day vulnerabilities private) versus disclosing them to the public.
Expand Description

READERS
Browse our collection.

PUBLISHERS
See BiblioVault's publisher services.

STUDENT SERVICES
Files for college accessibility offices.


SEARCH

ADVANCED SEARCH

BROWSE

by TOPIC
  • by BISAC SUBJECT
  • by LOC SUBJECT
by TITLE
by AUTHOR
by PUBLISHER
WANDER
RANDOM TOPIC
ABOUT BIBLIOVAULT
EBOOK FULFILLMENT
CONTACT US

More to explore...
Recently published by academic presses

                   


home | accessibility | search | about | contact us

BiblioVault ® 2001 - 2021
The University of Chicago Press

BiblioVault A SCHOLARLY BOOK REPOSITORY
Results
  • PUBLISHER LOGIN
  • ADVANCED SEARCH
  • BROWSE BY TOPIC
  • BROWSE BY TITLE
  • BROWSE BY AUTHOR
  • BROWSE BY PUBLISHER
  • ABOUT BIBLIOVAULT
  • EBOOK FULFILLMENT
  • CONTACT US
46 books about Security
Authentication Technologies for Cloud Computing, IoT and Big Data
Yasser M. Alginahi
The Institution of Engineering and Technology, 2019
Critical systems and infrastructure rely heavily on ICT systems and networks where security issues are a major concern. Authentication methods verify that messages come from trusted sources and guarantee the smooth flow of information and data. In this edited reference, the authors present state-of-art research and development in authentication technologies including challenges and applications for Cloud Technologies, IoT and Big Data. Topics covered include authentication; cryptographic algorithms; digital watermarking; biometric authentication; block ciphers with applications in IoT; identification schemes for Cloud and IoT; authentication issues for Cloud applications; cryptography engines for Cloud based on FPGA; and data protection laws.
[more]

Blockchain and the Law
The Rule of Code
Primavera De Filippi De Filippi
Harvard University Press, 2018
Since Bitcoin appeared in 2009, the digital currency has been hailed as an Internet marvel and decried as the preferred transaction vehicle for all manner of criminals. It has left nearly everyone without a computer science degree confused: Just how do you “mine” money from ones and zeros? The answer lies in a technology called blockchain, which can be used for much more than Bitcoin. A general-purpose tool for creating secure, decentralized, peer-to-peer applications, blockchain technology has been compared to the Internet itself in both form and impact. Some have said this tool may change society as we know it. Blockchains are being used to create autonomous computer programs known as “smart contracts,” to expedite payments, to create financial instruments, to organize the exchange of data and information, and to facilitate interactions between humans and machines. The technology could affect governance itself, by supporting new organizational structures that promote more democratic and participatory decision making. Primavera De Filippi and Aaron Wright acknowledge this potential and urge the law to catch up. That is because disintermediation—a blockchain’s greatest asset—subverts critical regulation. By cutting out middlemen, such as large online operators and multinational corporations, blockchains run the risk of undermining the capacity of governmental authorities to supervise activities in banking, commerce, law, and other vital areas. De Filippi and Wright welcome the new possibilities inherent in blockchains. But as Blockchain and the Law makes clear, the technology cannot be harnessed productively without new rules and new approaches to legal thinking.
[more]

Blockchain for 5G Healthcare Applications
Security and privacy solutions
Sudeep Tanwar
The Institution of Engineering and Technology, 2021
A secured system for Healthcare 4 is vital to all stakeholders, including patients and caregivers. The answer could be found by use of the new Blockchain system of trusted ledgers, this would help to guarantee authenticity in the multi-access system that is Healthcare 4.0. This book aims to be the first comprehensive book about how this could be achieved. It emphasizes the privacy and security aspects as these have been the areas of biggest challenge.
[more]

Blockchains for Network Security
Principles, technologies and applications
Haojun Huang
The Institution of Engineering and Technology, 2021
Blockchain technology is a powerful, cost-effective method for network security. Essentially, it is a decentralized ledger for storing all committed transactions in trustless environments by integrating several core technologies such as cryptographic hash, digital signature and distributed consensus mechanisms.
[more]

Bodies as Evidence
Security, Knowledge, and Power
Mark Maguire, Ursula Rao, and Nils Zurawski, editors
Duke University Press, 2018
From biometrics to predictive policing, contemporary security relies on sophisticated scientific evidence-gathering and knowledge-making focused on the human body. Bringing together new anthropological perspectives on the complexities of security in the present moment, the contributors to Bodies as Evidence reveal how bodies have become critical sources of evidence that is organized and deployed to classify, recognize, and manage human life. Through global case studies that explore biometric identification, border control, forensics, predictive policing, and counterterrorism, the contributors show how security discourses and practices that target the body contribute to new configurations of knowledge and power. At the same time, margins of error, unreliable technologies, and a growing suspicion of scientific evidence in a “post-truth” era contribute to growing insecurity, especially among marginalized populations.

Contributors. Carolina Alonso-Bejarano, Gregory Feldman, Francisco J. Ferrándiz, Daniel M. Goldstein, Ieva Jusionyte, Amade M’charek, Mark Maguire, Joseph P. Masco, Ursula Rao, Antonius C. G. M. Robben, Joseba Zulaika, Nils Zurawski
[more]

Code of Peace
Ethics and Security in the World of the Warlord States
Dorothy V. Jones
University of Chicago Press, 1991
Is it possible, in our world of differing beliefs and diverse cultures, to find an ethical framework that can guide actual international relations? In Code of Peace, Dorothy V. Jones sets forth her surprising answer to this perplexing question: Not only is a consensus on ethical principles possible, but it has already been achieved.

Jones focuses on the progressive development of international law to disclose an underlying code of ethics that enjoys broad support in the world community. Unlike studies that concentrate on what others think that states ought to do, Code of Peace analyzes what states themselves consider proper behavior. Using history as both narrative and argument, Jones shows how the existing ethical code has evolved cumulatively since World War I from a complex interplay between theory and practice. More than an abstract treatise or a merely technical analysis, Jones's study is grounded in the circumstances of war and peace in this century. Treaties and agreements, she argues, are forging a consensus on such principles as human rights, self-determination, and cooperation between states. Jones shows how leaders and representatives of nations, drawing on a rich heritage of philosophical thoughts as well as on their own experiences in a violent world of self-interested conflict, have shaped their thought to the taming of that world in the cause of peace. That is the striking thing about this code: states whose relations are marked by so frequent a recourse to war that they can fairly be called "warlords" have created and pledged themselves to a code of peace.

The implications of Code of Peace for establishing a normative foundation for peace are profound. Historically sound and timely, impeccably researched and elegantly written, the book will be of immediate and lasting value to anyone concerned with the stability of the modern world.
[more]

Consumer Attitudes Toward Data Breach Notifications and Loss of Personal Information
Lillian Ablon
RAND Corporation, 2016
Although spending on cybersecurity continues to grow, companies, government agencies, and nonprofit organizations are still being breached, and sensitive personal, financial, and health information is still being compromised. This report sets out the results of a study of consumer attitudes toward data breaches, notifications that a breach has occurred, and company responses to such events.
[more]

Cyberwar and Revolution
Digital Subterfuge in Global Capitalism
Nick Dyer-Witheford
University of Minnesota Press, 2019

Uncovering the class conflicts, geopolitical dynamics, and aggressive capitalism propelling the militarization of the internet


Global surveillance, computational propaganda, online espionage, virtual recruiting, massive data breaches, hacked nuclear centrifuges and power grids—concerns about cyberwar have been mounting, rising to a fever pitch after the alleged Russian hacking of the U.S. presidential election and the Cambridge Analytica scandal. Although cyberwar is widely discussed, few accounts undertake a deep, critical view of its roots and consequences. 

Analyzing the new militarization of the internet, Cyberwar and Revolution argues that digital warfare is not a bug in the logic of global capitalism but rather a feature of its chaotic, disorderly unconscious. Urgently confronting the concept of cyberwar through the lens of both Marxist critical theory and psychoanalysis, Nick Dyer-Witheford and Svitlana Matviyenko provide a wide-ranging examination of the class conflicts and geopolitical dynamics propelling war across digital networks.

Investigating the subjectivities that cyberwar mobilizes, exploits, and bewilders, and revealing how it permeates the fabric of everyday life and implicates us all in its design, this book also highlights the critical importance of the emergent resistance to this digital militarism—hacktivism, digital worker dissent, and off-the-grid activism—for effecting different, better futures.

[more]

Data Security in Cloud Computing
Vimal Kumar
The Institution of Engineering and Technology, 2017
Cloud Computing has already been embraced by many organizations and individuals due to its benefits of economy, reliability, scalability and guaranteed quality of service among others. But since the data is not stored, analysed or computed on site, this can open security, privacy, trust and compliance issues. This one-stop reference covers a wide range of issues on data security in Cloud Computing ranging from accountability, to data provenance, identity and risk management.
[more]

The Defender’s Dilemma
Charting a Course Toward Cybersecurity
Martin C. Libicki
RAND Corporation, 2015
Cybersecurity is a constant, and, by all accounts growing, challenge. This report, the second in a multiphase study on the future of cybersecurity, reveals perspectives and perceptions from chief information security officers; examines the development of network defense measures—and the countermeasures that attackers create to subvert those measures; and explores the role of software vulnerabilities and inherent weaknesses.
[more]

Demanding Justice and Security
Indigenous Women and Legal Pluralities in Latin America
Sieder, Rachel
Rutgers University Press, 2017
Across Latin America, indigenous women are organizing to challenge racial, gender, and class discrimination through the courts. Collectively, by engaging with various forms of law, they are forging new definitions of what justice and security mean within their own contexts and struggles. They have challenged racism and the exclusion of indigenous people in national reforms, but also have challenged ‘bad customs’ and gender ideologies that exclude women within their own communities.
 
Featuring chapters on Bolivia, Colombia, Ecuador, Guatemala, and Mexico, the contributors to Demanding Justice and Security include both leading researchers and community activists. From Kichwa women in Ecuador lobbying for the inclusion of specific clauses in the national constitution that guarantee their rights to equality and protection within indigenous community law, to Me’phaa women from Guerrero, Mexico, battling to secure justice within the Inter-American Court of Human Rights for violations committed in the context of militarizing their home state, this book is a must-have for anyone who wants to understand the struggle of indigenous women in Latin America.
 
[more]

Edge Computing
Models, technologies and applications
Javid Taheri
The Institution of Engineering and Technology, 2020
Cloud computing has evolved as a cost-effective, easy-to-use, elastic and scalable computing paradigm to transform today's business models. 5G, Industrial IoT, Industry 4.0 and China-2050 frameworks and technologies are introducing new challenges that cannot be solved efficiently using current cloud architectures. To handle the collected information from such a vast number of devices and actuators, and address these issues, novel concepts have been proposed to bring cloud-like resources closer to end users at the edge of the network, a technology called edge computing.
[more]

Endangered City
The Politics of Security and Risk in Bogotá
Austin Zeiderman
Duke University Press, 2016
Security and risk have become central to how cities are planned, built, governed, and inhabited in the twenty-first century. In Endangered City, Austin Zeiderman focuses on this new political imperative to govern the present in anticipation of future harm. Through ethnographic fieldwork and archival research in Bogotá, Colombia, he examines how state actors work to protect the lives of poor and vulnerable citizens from a range of threats, including environmental hazards and urban violence. By following both the governmental agencies charged with this mandate and the subjects governed by it, Endangered City reveals what happens when logics of endangerment shape the terrain of political engagement between citizens and the state. The self-built settlements of Bogotá’s urban periphery prove a critical site from which to examine the rising effect of security and risk on contemporary cities and urban life.
 
[more]

Getting to Yes with China in Cyberspace
Scott Warren Harold
RAND Corporation, 2016
This study explores U.S. policy options for managing cyberspace relations with China via agreements and norms of behavior. It considers two questions: Can negotiations lead to meaningful agreement on norms? If so, what does each side need to be prepared to exchange in order to achieve an acceptable outcome? This analysis should interest those concerned with U.S.-China relations and with developing norms of conduct in cyberspace.
[more]

Handbook of Cybersecurity for e-Health
Bill Buchanan
The Institution of Engineering and Technology, 2021
In this title, a team of top experts address cyber security for e-Health technologies and systems. It examines the need for better security and privacy infrastructure, outlining methods and policies for working with sensitive data. The authors focus on the latest methods and visionary work within health and social care for cyber security, making it vital reading for professionals and researchers in healthcare technologies and security, professionals in public health and law, healthcare policy developers and government decision makers.
[more]

Human Trafficking, Human Security, and the Balkans
H. Richard Friman
University of Pittsburgh Press, 2007
In the aftermath of four Yugoslav wars, ongoing efforts at reconstruction in South Eastern Europe have devoted relatively limited attention to dimensions of human security that enhance protections for the region's most vulnerable populations in their daily lives. It is in this context that South Eastern Europe, and especially the Western Balkan region, has emerged as a nexus point in human trafficking.

Human Trafficking, Human Security, and the Balkans brings together leading scholars, NGO representatives, and government officials to analyze and offer solutions to this challenge. The contributors explore the economic dynamics of human trafficking in an era of globalization, which has greatly facilitated not only the flow of goods and services but also the trade in human beings. They also examine the effectiveness of international and transnational policies and practice, the impact of peacekeeping forces, and the emergence of national and regional action plans in the Western Balkans and, more broadly, in South Eastern Europe. Finally, they consider the nature and ramifications of the gap between human security rhetoric and institutional policy steps against human trafficking.
[more]

Immigration, Integration, and Security
America and Europe in Comparative Perspective
Ariane Chebel d'Appollonia
University of Pittsburgh Press, 2008
Recent acts of terrorism in Britain and Europe and the events of 9/11 in the United States have greatly influenced immigration, security, and integration policies in these countries. Yet many of the current practices surrounding these issues were developed decades ago, and are ill-suited to the dynamics of today's global economies and immigration patterns. 

At the core of much policy debate is the inherent paradox whereby immigrant populations are frequently perceived as posing a potential security threat yet bolster economies by providing an inexpensive workforce. Strict attention to border controls and immigration quotas has diverted focus away from perhaps the most significant dilemma: the integration of existing immigrant groups. Often restricted in their civil and political rights and targets of xenophobia, racial profiling, and discrimination, immigrants are unable or unwilling to integrate into the population. These factors breed distrust, disenfranchisement, and hatred-factors that potentially engender radicalization and can even threaten internal security.

The contributors compare policies on these issues at three relational levels: between individual EU nations and the U.S., between the EU and U.S., and among EU nations. What emerges is a timely and critical examination of the variations and contradictions in policy at each level of interaction and how different agencies and different nations often work in opposition to each other with self-defeating results. While the contributors differ on courses of action, they offer fresh perspectives, some examining significant case studies and laying the groundwork for future debate on these crucial issues.
[more]

India China
Rethinking Borders and Security
L.H.M. Ling, Adriana Erthal Abdenur, Payal Banerjee, Nimmi Kurian, Mahendra P. Lama, and Li Bo
University of Michigan Press, 2016

Challenging the Westphalian view of international relations, which focuses on the sovereignty of states and the inevitable potential for conflict, the authors from the Borderlands Study Group reconceive borders as capillaries enabling the flow of material, cultural, and social benefits through local communities, nation-states, and entire regions. By emphasizing local agency and regional interdependencies, this metaphor reconfigures current narratives about the China India border and opens a new perspective on the long history of the Silk Roads, the modern BCIM Initiative, and dam construction along the Nu River in China and the Teesta River in India.

Together, the authors show that positive interaction among people on both sides of a border generates larger, cross-border communities, which can pressure for cooperation and development. India China offers the hope that people divided by arbitrary geo-political boundaries can circumvent race, gender, class, religion, and other social barriers, to form more inclusive institutions and forms of governance.
 

[more]

Industry of Anonymity
Inside the Business of Cybercrime
Jonathan Lusthaus
Harvard University Press, 2018
Jonathan Lusthaus lifts the veil on cybercriminals in the most extensive account yet of the lives they lead and the vast international industry they have created. Having traveled to hotspots around the world to meet with hundreds of law enforcement agents, security gurus, hackers, and criminals, he charts how this industry based on anonymity works.
[more]

Insurance Era
Risk, Governance, and the Privatization of Security in Postwar America
Caley Horan
University of Chicago Press, 2021
Actuarial thinking is everywhere in contemporary America, an often unnoticed byproduct of the postwar insurance industry’s political and economic influence. Calculations of risk permeate our institutions, influencing how we understand and manage crime, education, medicine, finance, and other social issues. Caley Horan’s remarkable book charts the social and economic power of private insurers since 1945, arguing that these institutions’ actuarial practices played a crucial and unexplored role in insinuating the social, political, and economic frameworks of neoliberalism into everyday life.

Analyzing insurance marketing, consumption, investment, and regulation, Horan asserts that postwar America’s obsession with safety and security fueled the exponential expansion of the insurance industry and the growing importance of risk management in other fields. Horan shows that the rise and dissemination of neoliberal values did not happen on its own: they were the result of a project to unsocialize risk, shrinking the state’s commitment to providing support, and heaping burdens upon the people often least capable of bearing them. Insurance Era is a sharply researched and fiercely written account of how and why private insurance and its actuarial market logic came to be so deeply lodged in American visions of social welfare.
[more]

Insurgent Aesthetics
Security and the Queer Life of the Forever War
Ronak K. Kapadia
Duke University Press, 2019
In Insurgent Aesthetics Ronak K. Kapadia theorizes the world-making power of contemporary art responses to US militarism in the Greater Middle East. He traces how new forms of remote killing, torture, confinement, and surveillance have created a distinctive post-9/11 infrastructure of racialized state violence. Linking these new forms of violence to the history of American imperialism and conquest, Kapadia shows how Arab, Muslim, and South Asian diasporic multimedia artists force a reckoning with the US war on terror's violent destruction and its impacts on immigrant and refugee communities. Drawing on an eclectic range of visual, installation, and performance works, Kapadia reveals queer feminist decolonial critiques of the US security state that visualize subjugated histories of US militarism and make palpable what he terms “the sensorial life of empire.” In this way, these artists forge new aesthetic and social alliances that sustain critical opposition to the global war machine and create alternative ways of knowing and feeling beyond the forever war.
[more]

Internet and Wireless Security
Robert Temple
The Institution of Engineering and Technology, 2002
Many organisations are transforming their businesses through the development of information and communications technologies. The security of this e-commerce is now a key enabler for businesses, and this book presents an overview of current and future infrastructures for e-business security.
[more]

Internet Freedom Software and Illicit Activity
Supporting Human Rights Without Enabling Criminals
Sasha Romanosky
RAND Corporation, 2015
This report examines the portfolio of tools funded by the State Department’s Bureau of Democracy, Human Rights, and Labor that help support Internet freedom and assesses the impact of these tools in promoting U.S. interests (such as freedom of expression, freedom of the press, and the free flow of information) without enabling criminal activity.
[more]

Liberalism and the Culture of Security
The Nineteenth-Century Rhetoric of Reform
Katherine Henry
University of Alabama Press, 2011

Normal0falsefalsefalseMicrosoftInternetExplorer4

Figures of protection and security are everywhere in American public discourse, from the protection of privacy or civil liberties to the protection of marriage or the unborn, and from social security to homeland security. Liberalism and the Culture of Security traces a crucial paradox in historical and contemporary notions of citizenship: in a liberal democratic culture that imagines its citizens as self-reliant, autonomous, and inviolable, the truth is that claims for citizenship—particularly for marginalized groups such as women and slaves—have just as often been made in the name of vulnerability and helplessness.
 
Katherine Henry traces this turn back to the eighteenth-century opposition of liberty and tyranny, which imagined our liberties as being in danger of violation by the forces of tyranny and thus in need of protection. She examines four particular instances of this rhetorical pattern. The first chapters show how women’s rights and antislavery activists in the antebellum era exploited the contradictions that arose from the liberal promise of a protected citizenry: first by focusing primarily on arguments over slavery in the 1850s that invoke the Declaration of Independence, including Harriet Beecher Stowe’s fiction and Frederick Douglass’s “Fourth of July” speech; and next by examining Angelina Grimké’s brief but intense antislavery speaking career in the 1830s.
 
New conditions after the Civil War and Emancipation changed the way arguments about civic inclusion and exclusion could be advanced. Henry considers the issue of African American citizenship in the 1880s and 1890s, focusing on the mainstream white Southern debate over segregation and the specter of a tyrannical federal government, and then turning to Frances E. W. Harper’s fictional account of African American citizenship in Iola Leroy. Finally, Henry examines Henry James’s 1886 novel The Bostonians, in which arguments over the appropriate role of women and the proper place of the South in post–Civil War America are played out as a contest between Olive Chancellor and Basil ransom for control over the voice of the eloquent girl Verena Tarrant.
[more]

Managing Ethnic Diversity after 9/11
Integration, Security, and Civil Liberties in Transatlantic Perspective
Chebel d'Appollonia, Ariane
Rutgers University Press, 2010
America's approach to terrorism has focused on traditional national security methods, under the assumption that terrorism's roots are foreign and the solution to greater security lies in conventional practices. Europe offers a different model, with its response to internal terrorism relying on police procedures.

Managing Ethnic Diversity after 9/11 compares these two strategies and considers that both may have engendered greater radicalization--and a greater chance of home-grown terrorism. Essays address how transatlantic countries, including the United Kingdom, the United States, France, Germany, Spain, Italy, and the Netherlands have integrated ethnic minorities, especially Arabs and Muslims, since 9/11. Discussing the "securitization of integration," contributors argue that the neglect of civil integration has challenged the rights of these minorities and has made greater security more remote.
[more]

Managing Internet of Things Applications across Edge and Cloud Data Centres
Rajiv Ranjan
The Institution of Engineering and Technology, 2021
This book covers state of the art interdisciplinary research on key disruptive and interrelated technologies such as Big Data, Edge computing, IoT and Cloud computing. The authors address the challenges from a distributed system perspective, with clear contributions in theory and applications. Real-world case studies look at the integration of these technologies in healthcare, disaster management, smart grids, and other areas. The book covers vital topics including devices and sensing; cloud and edge Infrastructure; big data processing; application resource management; and privacy and security.
[more]

Markets for Cybercrime Tools and Stolen Data
Hackers' Bazaar
Lillian Ablon
RAND Corporation, 2014
Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets. This report characterizes these markets and how they have grown into their current state to provide insight into how their existence can harm the information security environment. Understanding these markets lays the groundwork for exploring options to minimize their potentially harmful influence.
[more]

Nature-Inspired Cyber Security and Resiliency
Fundamentals, techniques and applications
El-Sayed M. El-Alfy
The Institution of Engineering and Technology, 2019
With the rapid evolution of cyberspace, computing, communications and sensing technologies, organizations and individuals rely more and more on new applications such as fog and cloud computing, smart cities, Internet of Things (IoT), collaborative computing, and virtual and mixed reality environments. Maintaining their security, trustworthiness and resilience to cyber-attacks has become crucial which requires innovative and creative cyber security and resiliency solutions. Computing algorithms have been developed to mimic the operation of natural processes, phenomena and organisms such as artificial neural networks, swarm intelligence, deep learning systems, biomimicry, and more. The amazing characteristics of these systems offer a plethora of novel methodologies and opportunities to cope with emerging cyber challenges.
[more]

Olympic-Caliber Cybersecurity
Lessons for Safeguarding the 2020 Games and Other Major Events
Cynthia Dion-Schwarz
RAND Corporation, 2018
Understanding the cybersecurity threat landscape is critical to mitigating threats, apportioning limited resources, and hosting a resilient, safe, and secure Olympic Games. To support the security goals of Tokyo 2020, this report characterizes the cybersecurity threats that are likely to pose a risk to the games, visualizes a threat actor typology, and presents a series of policy options to guide cybersecurity planning.
[more]

The Other Quiet Professionals
Lessons for Future Cyber Forces from the Evolution of Special Forces
Christopher Paul
RAND Corporation, 2014
With the establishment of U.S. Cyber Command, the cyber force is gaining visibility and authority, but challenges remain, particularly in the areas of acquisition and personnel recruitment and career progression. A review of commonalities, similarities, and differences between the still-nascent U.S. cyber force and early U.S. special operations forces, conducted in 2010, offers salient lessons for the future direction of U.S. cyber forces.
[more]

Owners of the Sidewalk
Security and Survival in the Informal City
Daniel M. Goldstein
Duke University Press, 2016
Many of Bolivia's poorest and most vulnerable citizens work as vendors in the Cancha mega-market in the city of Cochabamba, where they must navigate systems of informality and illegality in order to survive. In Owners of the Sidewalk Daniel M. Goldstein examines the ways these systems correlate in the marginal spaces of the Latin American city. Collaborating with the Cancha's legal and permanent stall vendors (fijos) and its illegal and itinerant street and sidewalk vendors (ambulantes), Goldstein shows how the state's deliberate neglect and criminalization of the Cancha's poor—a practice common to neoliberal modern cities—makes the poor exploitable, governable, and consigns them to an insecure existence. Goldstein's collaborative and engaged approach to ethnographic field research also opens up critical questions about what ethical scholarship entails.
 
 
[more]

Passwords
Philology, Security, Authentication
Brian Lennon
Harvard University Press, 2018
Cryptology, the mathematical and technical science of ciphers and codes, and philology, the humanistic study of natural or human languages, are typically understood as separate domains of activity. But Brian Lennon contends that these two domains, both concerned with authentication of text, should be viewed as contiguous. He argues that computing’s humanistic applications are as historically important as its mathematical and technical ones. What is more, these humanistic uses, no less than cryptological ones, are marked and constrained by the priorities of security and military institutions devoted to fighting wars and decoding intelligence. Lennon’s history encompasses the first documented techniques for the statistical analysis of text, early experiments in mechanized literary analysis, electromechanical and electronic code-breaking and machine translation, early literary data processing, the computational philology of late twentieth-century humanities computing, and early twenty-first-century digital humanities. Throughout, Passwords makes clear the continuity between cryptology and philology, showing how the same practices flourish in literary study and in conditions of war. Lennon emphasizes the convergence of cryptology and philology in the modern digital password. Like philologists, hackers use computational methods to break open the secrets coded in text. One of their preferred tools is the dictionary, that preeminent product of the philologist’s scholarly labor, which supplies the raw material for computational processing of natural language. Thus does the historic overlap of cryptology and philology persist in an artifact of computing—passwords—that many of us use every day.
[more]

People on the Move
The Security, Social, and Economic Implications of Mass Migration, Volume 15
Nikolas A. Stavrou, ed.
Duke University Press
On an annual basis, approximately 100 million people either attempt to or actually do leave their place of birth, often not knowing their final destination. The flow of immigrants who arrive in neighboring countries in search of refuge and work raises social, political, and security concerns. This special issue of Mediterranean Quarterly takes a closer look at a pattern of history that is at the core of current global instability—the mass migration of peoples.

This collection gathers a unique group of contributors, including representatives from Congress, the United Nations, and Israel’s Ministry of Justice, as well as senior diplomats from Canada, Bulgaria, Portugal, Spain, and Turkey. Presenting their diverse perspectives, the contributors address regional and policy issues related to the mass migration of people, as well as questions concerning citizenship and national security, human trafficking in the form of prostitution, and cultural discrimination. The result is a multifaceted exploration of issues underlying many of the world’s economic, security, and social challenges. Other topics include the impact of state failure on migration, immigration in California, security measures and “preferred” immigrants in Canada after September 11, 2001, and Albanian migration into Greece.

Contributors. Alexandre Afonso, David Binder, Andrew C. Danopoulos, Constantine P. Danopoulos, Francis M. Deng, Mohamed A. El-Khawas, Omar G. Encarnación, Rochelle Gershuni, Larry L. Gerston, Ahmet Içduygu, Benjamin Kline, Bojan Korenic, Erin Kruger, Robert S. Leiken, Marlene Mulder, Elena Poptodorova, Tom Tancredo

[more]

The Power to Coerce
Countering Adversaries Without Going to War
David C. Gompert
RAND Corporation, 2016
Mounting costs, risks, and public misgivings of waging war are raising the importance of U.S. power to coerce (P2C). The best P2C options are financial sanctions, support for nonviolent political opposition to hostile regimes, and offensive cyber operations. The state against which coercion is most difficult and risky is China, which also happens to pose the strongest challenge to U.S. military options in a vital region.
[more]

Privacy’s Blueprint
The Battle to Control the Design of New Technologies
Woodrow Hartzog
Harvard University Press, 2018
Every day, Internet users interact with technologies designed to undermine their privacy. Social media apps, surveillance technologies, and the Internet of Things are all built in ways that make it hard to guard personal information. And the law says this is okay because it is up to users to protect themselves—even when the odds are deliberately stacked against them. In Privacy’s Blueprint, Woodrow Hartzog pushes back against this state of affairs, arguing that the law should require software and hardware makers to respect privacy in the design of their products. Current legal doctrine treats technology as though it were value-neutral: only the user decides whether it functions for good or ill. But this is not so. As Hartzog explains, popular digital tools are designed to expose people and manipulate users into disclosing personal information. Against the often self-serving optimism of Silicon Valley and the inertia of tech evangelism, Hartzog contends that privacy gains will come from better rules for products, not users. The current model of regulating use fosters exploitation. Privacy’s Blueprint aims to correct this by developing the theoretical underpinnings of a new kind of privacy law responsive to the way people actually perceive and use digital technologies. The law can demand encryption. It can prohibit malicious interfaces that deceive users and leave them vulnerable. It can require safeguards against abuses of biometric surveillance. It can, in short, make the technology itself worthy of our trust.
[more]

Provisional Authority
Police, Order, and Security in India
Beatrice Jauregui
University of Chicago Press, 2016
Policing as a global form is often fraught with excessive violence, corruption, and even criminalization. These sorts of problems are especially omnipresent in postcolonial nations such as India, where Beatrice Jauregui has spent several years studying the day-to-day lives of police officers in its most populous state, Uttar Pradesh. In this book, she offers an empirically rich and theoretically innovative look at the great puzzle of police authority in contemporary India and its relationship to social order, democratic governance, and security.
 
Jauregui explores the paradoxical demands placed on Indian police, who are at once routinely charged with abuses of authority at the same time that they are asked to extend that authority into any number of both official and unofficial tasks. Her ethnography of their everyday life and work demonstrates that police authority is provisional in several senses: shifting across time and space, subject to the availability and movement of resources, and dependent upon shared moral codes and relentless instrumental demands. In the end, she shows that police authority in India is not simply a vulgar manifestation of raw power or the violence of law but, rather, a contingent and volatile social resource relied upon in different ways to help realize human needs and desires in a pluralistic, postcolonial democracy.
 
Provocative and compelling, Provisional Authority provides a rare and disquieting look inside the world of police in India, and shines critical light on an institution fraught with moral, legal and political contradictions.
 
[more]

Security and Development in Global Politics
A Critical Comparison
Joanna Spear and Paul D. Williams, Editors
Georgetown University Press, 2012

Security and development matter: they often involve issues of life and death and they determine the allocation of truly staggering amounts of the world’s resources. Particularly since the start of the wars in Afghanistan and Iraq, there has been momentum in policy circles to merge the issues of security and development to attempt to end conflicts, create durable peace, strengthen failing states, and promote the conditions necessary for people to lead healthier and more prosperous lives.

In many ways this blending of security and development agendas seems admirable and designed to produce positive outcomes all around. However, it is often the case that the two concepts in combination do not receive equal weight, with security issues getting priority over development concerns. This is not desirable and actually undermines security in the longer term. Moreover, there are major challenges in practice when security practitioners and development practitioners are asked to agree on priorities and work together.

Security and Development in Global Politics illuminates the common points of interest but also the significant differences between security and development agendas and approaches to problem solving. With insightful chapter pairings—each written by a development expert and a security analyst—the book explores seven core international issues: aid, humanitarian assistance, governance, health, poverty, trade and resources, and demography. Using this comparative structure, the book effectively assesses the extent to which there really is a nexus between security and development and, most importantly, whether the link should be encouraged or resisted.

[more]

Security and Privacy for Big Data, Cloud Computing and Applications
Wei Ren
The Institution of Engineering and Technology, 2019
As big data becomes increasingly pervasive and cloud computing utilization becomes the norm, the security and privacy of our systems and data becomes more critical with emerging security and privacy threats and challenges. This book presents a comprehensive view on how to advance security and privacy in big data, cloud computing, and their applications. Topics include cryptographic tools, SDN security, big data security in IoT, privacy preserving in big data, security architecture based on cyber kill chain, privacy-aware digital forensics, trustworthy computing, privacy verification based on machine learning, and chaos-based communication systems. This book is an essential reading for networking, computing, and communications professionals, researchers, students and engineers, working with big data and cloud computing.
[more]

Security and Privacy of Electronic Healthcare Records
Concepts, paradigms and solutions
Sudeep Tanwar
The Institution of Engineering and Technology, 2020
Hospitals, medical practices and healthcare organizations are implementing new technologies at breakneck speed. Yet privacy and security considerations are often an afterthought, putting healthcare organizations at risk of data security and privacy issues, fines, damage to their reputations, with serious potential consequences for the patients. Electronic Health Record systems (EHRs) consist of clinical notes, patient listings, lab results, imaging results and screening tests. EHRs are growing in complexity over time and requiring increasing amounts of data storage.
[more]

Strategic Choices for a Turbulent World
In Pursuit of Security and Opportunity
Andrew R. Hoehn
RAND Corporation, 2017
This report is the last of a six-volume series in which RAND explores the elements of a national strategy for the conduct of U.S. foreign policy. It analyzes U.S. strengths and weaknesses, and suggests adaptations for this new era of turbulence and uncertainty. The report offers three alternative strategic concepts and evaluates their underlying assumptions, costs, risks, and constraints.
[more]

Technological Turf Wars
A Case Study of the Computer Antivirus Industry
Jessica Johnston
Temple University Press, 2008

In Technological Turf Wars, Jessica Johnston analyzes the tensions and political dilemmas that coexist in the interrelationship among science, technology and society. Illustrating how computer security is as concerned with social relationships as it is with technology, Johnston provides an illuminating ethnography that considers corporate culture and the workplace environment of the antivirus industry.

Using a qualitative, interdisciplinary approach, which combines organizational and security studies with critical and social analysis of science and technology, Johnston questions the motivations, contradictions and negotiations of antivirus professionals. She examines the tensions between the service ethics and profit motives—does the industry release viruses to generate demand for antivirus software?—and considers the dynamics within companies by looking at facets such as gender bias and power politics. Technological Turf Wars is an informed, enlightened and entertaining view of how the production of computer security technology is fraught with social issues.

[more]

Terrorist Use of Cryptocurrencies
Technical and Organizational Barriers and Future Threats
Cynthia Dion-Schwarz
RAND Corporation, 2019
The success of counterterrorism finance strategies in reducing terrorist access to official currencies has raised concerns that terrorist organizations might increase their use of such digital cryptocurrencies as Bitcoin to support their activities. RAND researchers thus consider the needs of terrorist groups and the advantages and disadvantages of the cryptocurrency technologies available to them.
[more]

Trusted Computing
Chris Mitchell
The Institution of Engineering and Technology, 2005
As computers are increasingly embedded, ubiquitous and wirelessly connected, security becomes imperative. This has led to the development of the notion of a 'trusted platform', the chief characteristic of which is the possession of a trusted hardware element which is able to check all or part of the software running on this platform. This enables parties to verify the software environment running on a remote trusted platform, and hence to have some trust that the data sent to that machine will be processed in accordance with agreed rules.
[more]

Trusted Platform Modules
Why, when and how to use them
Ariel Segall
The Institution of Engineering and Technology, 2017
Trusted Platform Modules (TPMs) are small, inexpensive chips which provide a limited set of security functions. They are most commonly found as a motherboard component on laptops and desktops aimed at the corporate or government markets, but can also be found on many consumer-grade machines and servers, or purchased as independent components. Their role is to serve as a Root of Trust - a highly trusted component from which we can bootstrap trust in other parts of a system. TPMs are most useful for three kinds of tasks: remotely identifying a machine, or machine authentication; providing hardware protection of secrets, or data protection; and providing verifiable evidence about a machine's state, or attestation.
[more]

User-Centric Privacy and Security in Biometrics
Claus Vielhauer
The Institution of Engineering and Technology, 2018
The interplay of privacy, security and user-determination is an important consideration in the roll-out of biometric technologies. It brings into play requirements such as privacy of biometric data in systems, communication and databases, soft biometric profiling, biometric recognition of persons across distributed systems and in nomadic scenarios, and the convergence between user convenience, usability and authentication reliability.
[more]

Zero Days, Thousands of Nights
The Life and Times of Zero-Day Vulnerabilities and Their Exploits
Lillian Ablon
RAND Corporation, 2017
Zero-day vulnerabilities—software vulnerabilities for which no patch or fix has been publicly released—and their exploits are useful in cyber operations, as well as in defensive and academic settings. This report provides findings from real-world zero-day vulnerability and exploit data that can inform ongoing policy debates regarding stockpiling (i.e., keeping zero-day vulnerabilities private) versus disclosing them to the public.
[more]




home | accessibility | search | about | contact us

BiblioVault ® 2001 - 2021
The University of Chicago Press