Narrow Search
Last searches

Results for *

Displaying results 76 to 100 of 130.

  1. Hacking in the humanities
    cybersecurity, speculative fiction and navigating a digital future
    Author: Mauro, Aaron
    Published: [2022]
    Publisher:  Bloomsbury Academic, London

    "What would it take to hack a human? How exploitable are we? In the cybersecurity industry, professionals know that the weakest component of any system sits between the chair and the keyboard. This book looks to speculative fiction, cyberpunk and the... more

    Access:
    Resolving-System (lizenzpflichtig)
    Staatsbibliothek zu Berlin - Preußischer Kulturbesitz, Haus Potsdamer Straße
    No inter-library loan
    Universitäts- und Landesbibliothek Sachsen-Anhalt / Zentrale
    No inter-library loan
    Technische Informationsbibliothek (TIB) / Leibniz-Informationszentrum Technik und Naturwissenschaften und Universitätsbibliothek
    No inter-library loan
    Universitätsbibliothek Leipzig
    No inter-library loan
    Universität Potsdam, Universitätsbibliothek
    No inter-library loan

     

    "What would it take to hack a human? How exploitable are we? In the cybersecurity industry, professionals know that the weakest component of any system sits between the chair and the keyboard. This book looks to speculative fiction, cyberpunk and the digital humanities to bring a human - and humanistic - perspective to the issue of cybersecurity. It argues that through these stories we are able to predict the future political, cultural, and social realities emerging from technological change. Making the case for a security-minded humanities education, this book examines pressing issues of data security, privacy, social engineering and more, illustrating how the humanities offer the critical, technical, and ethical insights needed to oppose the normalization of surveillance, disinformation, and coercion. Within this counter-cultural approach to technology, this book offers a model of activism to intervene and meaningfully resist government and corporate oversight online. In doing so, it argues for a wider notion of literacy, which includes the ability to write and fight the computer code that shapes our lives."--

     

    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Staatsbibliothek zu Berlin
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 9781350231016; 9781350230996; 9781350230989
    Other identifier:
    Series: Bloomsbury Studies in Digital Cultures
    Subjects: Digital humanities; Computer security; Scholarly electronic publishing; Humanities; Computer security,Digital lifestyle,Media, information & communication industries,Literary studies: from c 1900 -
    Scope: 1 Online-Ressource (xii, 212 Seiten)
    Notes:

    Includes bibliographical references and index

    Preface -- 1. Human Exploits: An Introduction to Hacking and the Humanities -- 2. "Hack the Planet": Pop Hackers and the Demands of a Real World Resistance -- 3. Academic Attack Surfaces: Culture Jamming the Future and XML Bombs -- 4. Supply Chain Attacks and Knowledge Networks: Network Sovereignty and the Interplanetary Internet -- 5.Cryptographic Agility and the Right to Privacy: Secret Writing and the Cypherpunks -- 6. Biohacking and Autonomous Androids: Human Evolution and Biometric Data -- 7. Gray Hat Humanities: Surveillance Capitalism, Object Oriented Ontology, and Design Fiction -- Selected Bibliography -- Index

  2. Powering the digital economy
    opportunities and risks of artificial intelligence in finance
    Published: 2021 OCTOBER
    Publisher:  International Monetary Fund, Publication Services, Washington, DC, U.S.A.

    This paper discusses the impact of the rapid adoption of artificial intelligence (AI) and machine learning (ML) in the financial sector. It highlights the benefits these technologies bring in terms of financial deepening and efficiency, while raising... more

    Access:
    Resolving-System (kostenfrei)
    Verlag (kostenfrei)
    Orient-Institut Beirut
    Online
    No inter-library loan
    Staatsbibliothek zu Berlin - Preußischer Kulturbesitz, Haus Potsdamer Straße
    No inter-library loan
    Universitätsbibliothek Braunschweig
    No inter-library loan
    Staats- und Universitätsbibliothek Bremen
    No inter-library loan
    Universitätsbibliothek Erfurt / Forschungsbibliothek Gotha, Universitätsbibliothek Erfurt
    No inter-library loan
    Bibliothek der Pädagogischen Hochschule Freiburg/Breisgau
    No inter-library loan
    Niedersächsische Staats- und Universitätsbibliothek Göttingen
    No inter-library loan
    Universitäts- und Landesbibliothek Sachsen-Anhalt / Zentrale
    No inter-library loan
    Helmut-Schmidt-Universität, Universität der Bundeswehr Hamburg, Universitätsbibliothek
    No inter-library loan
    Technische Universität Hamburg, Universitätsbibliothek
    No inter-library loan
    Technische Informationsbibliothek (TIB) / Leibniz-Informationszentrum Technik und Naturwissenschaften und Universitätsbibliothek
    No inter-library loan
    Duale Hochschule Baden-Württemberg Heidenheim, Bibliothek
    e-Book Nationallizenz
    No inter-library loan
    Thüringer Universitäts- und Landesbibliothek
    No inter-library loan
    Fachhochschule Kiel, Zentralbibliothek
    No inter-library loan
    ZBW - Leibniz-Informationszentrum Wirtschaft, Standort Kiel
    VS 297
    No inter-library loan
    Universitätsbibliothek Leipzig
    No inter-library loan
    Leuphana Universität Lüneburg, Medien- und Informationszentrum, Universitätsbibliothek
    No inter-library loan
    Duale Hochschule Baden-Württemberg Mosbach, Bibliothek
    E-Book Nationallizenz IMF
    No inter-library loan
    Hochschule Offenburg, University of Applied Sciences, Bibliothek Campus Offenburg
    E-Book International Monetary Fund
    No inter-library loan
    Hochschulbibliothek Pforzheim, Bereichsbibliothek Technik und Wirtschaft
    e-Book International Monetary Fund eLibrary
    No loan of volumes, only paper copies will be sent
    Hochschule Albstadt-Sigmaringen, Bibliothek Sigmaringen
    No loan of volumes, only paper copies will be sent
    Duale Hochschule Baden-Württemberg Villingen-Schwenningen, Bibliothek
    E_Book IMF
    No inter-library loan

     

    This paper discusses the impact of the rapid adoption of artificial intelligence (AI) and machine learning (ML) in the financial sector. It highlights the benefits these technologies bring in terms of financial deepening and efficiency, while raising concerns about its potential in widening the digital divide between advanced and developing economies. The paper advances the discussion on the impact of this technology by distilling and categorizing the unique risks that it could pose to the integrity and stability of the financial system, policy challenges, and potential regulatory approaches. The evolving nature of this technology and its application in finance means that the full extent of its strengths and weaknesses is yet to be fully understood. Given the risk of unexpected pitfalls, countries will need to strengthen prudential oversight

     

    Export to reference management software   RIS file
      BibTeX file
    Source: Staatsbibliothek zu Berlin
    Language: English
    Media type: Book
    Format: Online
    Other identifier:
    Series: Departmental paper / International Monetary Fund ; DP/2021, 024
    Subjects: Financial Stability; Embedded Bias; Financial Regulation; Cybersecurity; RiskManagement; Data Privacy; Artificial Intelligence; Machine Learning; Intelligence (AI) & Semantics; Online Safety & Privacy; Finance: General; Econometric and Statistical Methods: Special Topics: General; Model Construction and Estimation; Large Data Sets: Modeling and Analysis; General Aggregative Models: Forecasting and Simulation; Banks; Depository Institutions; Micro Finance Institutions; Mortgages; Pension Funds; Non-bank Financial Institutions; Financial Instruments; Institutional Investors; Financial Institutions and Services: Government Policy and Regulation; Technological Change: Choices and Consequences; Diffusion Processes; Innovation; Research and Development; Technological Change; Intellectual Property Rights: General; Financial Institutions and Services: General; Financing Policy; Financial Risk and Risk Management; Capital and Ownership Structure; Value of Firms; Goodwill; General Financial Markets: Government Policy and Regulation; Information technology industries; Finance; Industries: Financial Services; Industries: Information Technololgy; Computer security; Financial services; Financial sector; Economic sectors; Cyber risk; Financial sector stability; Financial sector policy and analysis; Information technology; Financial services industry; Technological innovations; Artificial intelligence; Financial services industry; Machine learning; Information technology; Security measures; Technology
    Scope: 1 Online-Ressource (circa 35 Seiten), Illustrationen
  3. Switzerland
    financial sector assessment program : technical note : supervision and oversight of financial market infrastructures
    Published: 2019
    Publisher:  International Monetary Fund, Washington, D.C.

    Financial Sector Assessment Program; Technical Note-Supervision and Oversight of Financial Market Infrastructures more

    Access:
    Verlag (kostenfrei)
    Resolving-System (kostenfrei)
    Verlag (kostenfrei)
    Verlag (kostenfrei)
    Orient-Institut Beirut
    Online
    No inter-library loan
    Staatsbibliothek zu Berlin - Preußischer Kulturbesitz, Haus Potsdamer Straße
    No inter-library loan
    Universitätsbibliothek Braunschweig
    No inter-library loan
    Staats- und Universitätsbibliothek Bremen
    No inter-library loan
    Universitätsbibliothek Erfurt / Forschungsbibliothek Gotha, Universitätsbibliothek Erfurt
    No inter-library loan
    Bibliothek der Pädagogischen Hochschule Freiburg/Breisgau
    No inter-library loan
    Niedersächsische Staats- und Universitätsbibliothek Göttingen
    No inter-library loan
    Universitäts- und Landesbibliothek Sachsen-Anhalt / Zentrale
    No inter-library loan
    Helmut-Schmidt-Universität, Universität der Bundeswehr Hamburg, Universitätsbibliothek
    No inter-library loan
    Technische Universität Hamburg, Universitätsbibliothek
    No inter-library loan
    Technische Informationsbibliothek (TIB) / Leibniz-Informationszentrum Technik und Naturwissenschaften und Universitätsbibliothek
    No inter-library loan
    Duale Hochschule Baden-Württemberg Heidenheim, Bibliothek
    e-Book Nationallizenz
    No inter-library loan
    Thüringer Universitäts- und Landesbibliothek
    No inter-library loan
    Fachhochschule Kiel, Zentralbibliothek
    No inter-library loan
    ZBW - Leibniz-Informationszentrum Wirtschaft, Standort Kiel
    LZ 143
    No inter-library loan
    Universitätsbibliothek Leipzig
    No inter-library loan
    Leuphana Universität Lüneburg, Medien- und Informationszentrum, Universitätsbibliothek
    No inter-library loan
    Duale Hochschule Baden-Württemberg Mosbach, Bibliothek
    E-Book Nationallizenz IMF
    No inter-library loan
    Hochschule Offenburg, University of Applied Sciences, Bibliothek Campus Offenburg
    E-Book International Monetary Fund
    No inter-library loan
    Hochschulbibliothek Pforzheim, Bereichsbibliothek Technik und Wirtschaft
    e-Book International Monetary Fund eLibrary
    No loan of volumes, only paper copies will be sent
    Hochschule Albstadt-Sigmaringen, Bibliothek Sigmaringen
    No loan of volumes, only paper copies will be sent
    Duale Hochschule Baden-Württemberg Villingen-Schwenningen, Bibliothek
    E_Book IMF
    No inter-library loan

     

    Financial Sector Assessment Program; Technical Note-Supervision and Oversight of Financial Market Infrastructures

     

    Export to reference management software   RIS file
      BibTeX file
  4. Singapore
    financial sector assessment program
    Published: 2019
    Publisher:  International Monetary Fund, Washington, D.C.

    This Financial System Stability Assessment paper on Singapore highlights the attractiveness of Singapore as a financial center is underpinned by strong economic fundamentals, sound economic policies, and a sophisticated financial oversight framework.... more

    Access:
    Verlag (kostenfrei)
    Resolving-System (kostenfrei)
    Verlag (kostenfrei)
    Verlag (kostenfrei)
    Orient-Institut Beirut
    Online
    No inter-library loan
    Staatsbibliothek zu Berlin - Preußischer Kulturbesitz, Haus Potsdamer Straße
    No inter-library loan
    Universitätsbibliothek Braunschweig
    No inter-library loan
    Staats- und Universitätsbibliothek Bremen
    No inter-library loan
    Universitätsbibliothek Erfurt / Forschungsbibliothek Gotha, Universitätsbibliothek Erfurt
    No inter-library loan
    Bibliothek der Pädagogischen Hochschule Freiburg/Breisgau
    No inter-library loan
    Niedersächsische Staats- und Universitätsbibliothek Göttingen
    No inter-library loan
    Universitäts- und Landesbibliothek Sachsen-Anhalt / Zentrale
    No inter-library loan
    Helmut-Schmidt-Universität, Universität der Bundeswehr Hamburg, Universitätsbibliothek
    No inter-library loan
    Technische Universität Hamburg, Universitätsbibliothek
    No inter-library loan
    Technische Informationsbibliothek (TIB) / Leibniz-Informationszentrum Technik und Naturwissenschaften und Universitätsbibliothek
    No inter-library loan
    Duale Hochschule Baden-Württemberg Heidenheim, Bibliothek
    e-Book Nationallizenz
    No inter-library loan
    Thüringer Universitäts- und Landesbibliothek
    No inter-library loan
    Fachhochschule Kiel, Zentralbibliothek
    No inter-library loan
    ZBW - Leibniz-Informationszentrum Wirtschaft, Standort Kiel
    LZ 143
    No inter-library loan
    Universitätsbibliothek Leipzig
    No inter-library loan
    Leuphana Universität Lüneburg, Medien- und Informationszentrum, Universitätsbibliothek
    No inter-library loan
    Duale Hochschule Baden-Württemberg Mosbach, Bibliothek
    E-Book Nationallizenz IMF
    No inter-library loan
    Hochschule Offenburg, University of Applied Sciences, Bibliothek Campus Offenburg
    E-Book International Monetary Fund
    No inter-library loan
    Hochschulbibliothek Pforzheim, Bereichsbibliothek Technik und Wirtschaft
    e-Book International Monetary Fund eLibrary
    No loan of volumes, only paper copies will be sent
    Hochschule Albstadt-Sigmaringen, Bibliothek Sigmaringen
    No loan of volumes, only paper copies will be sent
    Duale Hochschule Baden-Württemberg Villingen-Schwenningen, Bibliothek
    E_Book IMF
    No inter-library loan

     

    This Financial System Stability Assessment paper on Singapore highlights the attractiveness of Singapore as a financial center is underpinned by strong economic fundamentals, sound economic policies, and a sophisticated financial oversight framework. The financial system is exposed to global and regional macrofinancial shocks through significant trade and financial channels but appears resilient even under adverse scenarios. However, banks' US dollar liquidity is vulnerable to stress conditions. Fintech developments so far have focused on partnerships with existing financial institutions and do not appear to contribute significantly to systemic risk. Singapore authorities should continue to enhance its strong oversight of the financial system. Strengthening the framework for resolution and safety nets, namely by devoting more resources to the Monetary Authority of Singapore (MAS)' Resolution Unit; and enhancing the oversight of MAS Electronic Payments System by ensuring more staffing resources are two other important areas for action

     

    Export to reference management software   RIS file
      BibTeX file
  5. Cyber risk surveillance
    a case study of Singapore
    Published: 2020
    Publisher:  International Monetary Fund, [Washington, DC]

    Cyber risk is an emerging source of systemic risk in the financial sector, and possibly a macro-critical risk too. It is therefore important to integrate it into financial sector surveillance. This paper offers a range of analytical approaches to... more

    Access:
    Verlag (kostenfrei)
    Verlag (kostenfrei)
    Resolving-System (kostenfrei)
    Verlag (kostenfrei)
    Orient-Institut Beirut
    Online
    No inter-library loan
    Staatsbibliothek zu Berlin - Preußischer Kulturbesitz, Haus Potsdamer Straße
    No inter-library loan
    Universitätsbibliothek Braunschweig
    No inter-library loan
    Staats- und Universitätsbibliothek Bremen
    No inter-library loan
    Universitätsbibliothek Erfurt / Forschungsbibliothek Gotha, Universitätsbibliothek Erfurt
    No inter-library loan
    Bibliothek der Pädagogischen Hochschule Freiburg/Breisgau
    No inter-library loan
    Niedersächsische Staats- und Universitätsbibliothek Göttingen
    No inter-library loan
    Universitäts- und Landesbibliothek Sachsen-Anhalt / Zentrale
    No inter-library loan
    Helmut-Schmidt-Universität, Universität der Bundeswehr Hamburg, Universitätsbibliothek
    No inter-library loan
    Technische Universität Hamburg, Universitätsbibliothek
    No inter-library loan
    Technische Informationsbibliothek (TIB) / Leibniz-Informationszentrum Technik und Naturwissenschaften und Universitätsbibliothek
    No inter-library loan
    Duale Hochschule Baden-Württemberg Heidenheim, Bibliothek
    e-Book Nationallizenz
    No inter-library loan
    Thüringer Universitäts- und Landesbibliothek
    No inter-library loan
    Fachhochschule Kiel, Zentralbibliothek
    No inter-library loan
    ZBW - Leibniz-Informationszentrum Wirtschaft, Standort Kiel
    VS 301
    No inter-library loan
    Universitätsbibliothek Leipzig
    No inter-library loan
    Leuphana Universität Lüneburg, Medien- und Informationszentrum, Universitätsbibliothek
    No inter-library loan
    Duale Hochschule Baden-Württemberg Mosbach, Bibliothek
    E-Book Nationallizenz IMF
    No inter-library loan
    Hochschule Offenburg, University of Applied Sciences, Bibliothek Campus Offenburg
    E-Book International Monetary Fund
    No inter-library loan
    Hochschulbibliothek Pforzheim, Bereichsbibliothek Technik und Wirtschaft
    e-Book International Monetary Fund eLibrary
    No loan of volumes, only paper copies will be sent
    Hochschule Albstadt-Sigmaringen, Bibliothek Sigmaringen
    No loan of volumes, only paper copies will be sent
    Duale Hochschule Baden-Württemberg Villingen-Schwenningen, Bibliothek
    E_Book IMF
    No inter-library loan

     

    Cyber risk is an emerging source of systemic risk in the financial sector, and possibly a macro-critical risk too. It is therefore important to integrate it into financial sector surveillance. This paper offers a range of analytical approaches to assess and monitor cyber risk to the financial sector, including various approaches to stress testing. The paper illustrates these techniques by applying them to Singapore. As an advanced economy with a complex financial system and rapid adoption of fintech, Singapore serves as a good case study. We place our results in the context of recent cybersecurity developments in the public and private sectors, which can be a reference for surveillance work

     

    Export to reference management software   RIS file
      BibTeX file
  6. Futureproof
    security aesthetics and the management of life
    Contributor: Ghertner, D. Asher (HerausgeberIn); McFann, Hudson (HerausgeberIn); Goldstein, Daniel M. (HerausgeberIn)
    Published: 2020
    Publisher:  Duke University Press, Durham

    Security Aesthetics of and Beyond the Biopolitical / D. Asher Ghertner, Hudson McFann, and Daniel M. Goldstein -- The Aesthetics of Cyber Insecurity: Displaying the Digital in Three American Museum Exhibits / Victoria Bernal -- Danger Signs: The... more

    Sächsische Landesbibliothek - Staats- und Universitätsbibliothek Dresden
    Unlimited inter-library loan, copies and loan
    Niedersächsische Staats- und Universitätsbibliothek Göttingen
    K/LXV, 2495
    No inter-library loan
    Max-Planck-Institut für ethnologische Forschung, Bibliothek
    JC571 Gher2020
    No loan of volumes, only paper copies will be sent
    Universitätsbibliothek Heidelberg
    2020 A 8108
    Unlimited inter-library loan, copies and loan

     

    Security Aesthetics of and Beyond the Biopolitical / D. Asher Ghertner, Hudson McFann, and Daniel M. Goldstein -- The Aesthetics of Cyber Insecurity: Displaying the Digital in Three American Museum Exhibits / Victoria Bernal -- Danger Signs: The Aesthetics of Insecurity in Bogota / Austin Zeiderman -- We All Have the Same Red Blood?: Security Aesthetics and Rescue Ethics on the Arizona's Sonora Border / Ieva Jusionyte -- Fugitive Horizons and the Arts of Security in Honduras / Jon Carter -- Security Aesthetics and Political Community Formation in Kingston, Jamaica / Rivke Jaffe -- Staging Safety in Brooklyn's Real Estate / Zaire Dinzey-Flores and Alexandra Demshock -- Expecting the Worst: Active-Shooter Scenario Play in American Schools / Rachel Hall -- H5N1 and the Aesthetics of Biosecurity: From Danger to Risk / Limor Samimian-Darash -- Securing Stand-by and Urban Space Making in Jakarta: Intensities in Search of Forms / -- AbdouMaliq Simone -- Securing the Street: Urban Renewal and the Fight Against 'Informality' in Mexico City / -- Alejandra Leal Martinez -- The Age of Security / Didier Fassin "From terrorism and public health to museums, schools, and homes, FUTUREPROOF asks us to expand our purview of security, turning our attention to how security is lived, felt, and perceived through the violences of everyday life. Editors Asher Ghertner, Daniel Goldstein, and Hudson Fann propose the modality of "security aesthetics" as a way to understand how sensory and affective experiences help regulate bodies, spaces, and states in the service of "futureproofing" society against anticipated risks and perils. Taken broadly as the domain of sense perception, aesthetics provides a framework for considering the body's interactions with the material world and the processes by which these interactions translate into subjective judgments of taste. The contributions to this volume show us how security aesthetics work to fashion differently imagined futures, illuminating the interplay of sense perception and articulated reason in the operations of security apparatuses"--

     

    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Union catalogues
    Contributor: Ghertner, D. Asher (HerausgeberIn); McFann, Hudson (HerausgeberIn); Goldstein, Daniel M. (HerausgeberIn)
    Language: English
    Media type: Book
    Format: Print
    ISBN: 9781478006909; 9781478006091
    RVK Categories: MS 1190 ; LH 61360
    Series: Global insecurities
    Subjects: Human security; Emergency management; Risk management; Biosecurity; Computer security
    Scope: xii, 298 Seiten, Illustrationen, Karten
    Notes:

    Includes bibliographical references and index

  7. Belize
    technical assistance report : cybersecurity regulation, supervision, and resilience
    Published: 2020
    Publisher:  International Monetary Fund, Washington, D.C.

    Cybersecurity risk is embedded in the CBB's supervisory framework, but additional enhancements are needed to formalize guidance and develop more intensive supervisory practices. Supervisory expectations on cybersecurity are presented in an informal... more

    Access:
    Verlag (kostenfrei)
    Verlag (kostenfrei)
    Resolving-System (kostenfrei)
    Verlag (kostenfrei)
    Orient-Institut Beirut
    Online
    No inter-library loan
    Staatsbibliothek zu Berlin - Preußischer Kulturbesitz, Haus Potsdamer Straße
    No inter-library loan
    Universitätsbibliothek Braunschweig
    No inter-library loan
    Staats- und Universitätsbibliothek Bremen
    No inter-library loan
    Universitätsbibliothek Erfurt / Forschungsbibliothek Gotha, Universitätsbibliothek Erfurt
    No inter-library loan
    Bibliothek der Pädagogischen Hochschule Freiburg/Breisgau
    No inter-library loan
    Niedersächsische Staats- und Universitätsbibliothek Göttingen
    No inter-library loan
    Universitäts- und Landesbibliothek Sachsen-Anhalt / Zentrale
    No inter-library loan
    Helmut-Schmidt-Universität, Universität der Bundeswehr Hamburg, Universitätsbibliothek
    No inter-library loan
    Technische Universität Hamburg, Universitätsbibliothek
    No inter-library loan
    Technische Informationsbibliothek (TIB) / Leibniz-Informationszentrum Technik und Naturwissenschaften und Universitätsbibliothek
    No inter-library loan
    Duale Hochschule Baden-Württemberg Heidenheim, Bibliothek
    e-Book Nationallizenz
    No inter-library loan
    Thüringer Universitäts- und Landesbibliothek
    No inter-library loan
    Fachhochschule Kiel, Zentralbibliothek
    No inter-library loan
    ZBW - Leibniz-Informationszentrum Wirtschaft, Standort Kiel
    VS 302
    No inter-library loan
    Universitätsbibliothek Leipzig
    No inter-library loan
    Leuphana Universität Lüneburg, Medien- und Informationszentrum, Universitätsbibliothek
    No inter-library loan
    Duale Hochschule Baden-Württemberg Mosbach, Bibliothek
    E-Book Nationallizenz IMF
    No inter-library loan
    Hochschule Offenburg, University of Applied Sciences, Bibliothek Campus Offenburg
    E-Book International Monetary Fund
    No inter-library loan
    Hochschulbibliothek Pforzheim, Bereichsbibliothek Technik und Wirtschaft
    e-Book International Monetary Fund eLibrary
    No loan of volumes, only paper copies will be sent
    Hochschule Albstadt-Sigmaringen, Bibliothek Sigmaringen
    No loan of volumes, only paper copies will be sent
    Duale Hochschule Baden-Württemberg Villingen-Schwenningen, Bibliothek
    E_Book IMF
    No inter-library loan

     

    Cybersecurity risk is embedded in the CBB's supervisory framework, but additional enhancements are needed to formalize guidance and develop more intensive supervisory practices. Supervisory expectations on cybersecurity are presented in an informal guidance note, which should be formalized into regulation to ensure enforceability; and an IT/cybersecurity supervisory manual should be developed to promote effective and consistent practices. With its principle-based guidance note, the CBB highlights its priorities in strengthening the cybersecurity posture of Belizean financial institutions. The principles are an appropriate interpretation of international best practices on incident prevention, detection, response, and recovery measures, adapted to the cyber maturity of the Belizean financial institutions, and can be used as a foundation for the formalized guidelines. The manual could emphasize the review of cybersecurity strategies, policies, and responsibility specifications and should address obtaining assurance on the effectiveness of the financial institutions' processes for cyber risk identification, assessment, and mitigation

     

    Export to reference management software   RIS file
      BibTeX file
  8. Norway
    financial sector assessment program : technical note : cybersecurity risk supervision and oversight
    Published: 2020
    Publisher:  International Monetary Fund, Washington, D.C.

    The Norwegian financial system has a long history of incorporating new technology. Norway is at the forefront of digitization and has tight interdependencies within its financial system, making it particularly vulnerable to evolving cyber threats.... more

    Access:
    Verlag (kostenfrei)
    Verlag (kostenfrei)
    Resolving-System (kostenfrei)
    Verlag (kostenfrei)
    Orient-Institut Beirut
    Online
    No inter-library loan
    Staatsbibliothek zu Berlin - Preußischer Kulturbesitz, Haus Potsdamer Straße
    No inter-library loan
    Universitätsbibliothek Braunschweig
    No inter-library loan
    Staats- und Universitätsbibliothek Bremen
    No inter-library loan
    Universitätsbibliothek Erfurt / Forschungsbibliothek Gotha, Universitätsbibliothek Erfurt
    No inter-library loan
    Bibliothek der Pädagogischen Hochschule Freiburg/Breisgau
    No inter-library loan
    Niedersächsische Staats- und Universitätsbibliothek Göttingen
    No inter-library loan
    Universitäts- und Landesbibliothek Sachsen-Anhalt / Zentrale
    No inter-library loan
    Helmut-Schmidt-Universität, Universität der Bundeswehr Hamburg, Universitätsbibliothek
    No inter-library loan
    Technische Universität Hamburg, Universitätsbibliothek
    No inter-library loan
    Technische Informationsbibliothek (TIB) / Leibniz-Informationszentrum Technik und Naturwissenschaften und Universitätsbibliothek
    No inter-library loan
    Duale Hochschule Baden-Württemberg Heidenheim, Bibliothek
    e-Book Nationallizenz
    No inter-library loan
    Thüringer Universitäts- und Landesbibliothek
    No inter-library loan
    Fachhochschule Kiel, Zentralbibliothek
    No inter-library loan
    ZBW - Leibniz-Informationszentrum Wirtschaft, Standort Kiel
    VS 302
    No inter-library loan
    Universitätsbibliothek Leipzig
    No inter-library loan
    Leuphana Universität Lüneburg, Medien- und Informationszentrum, Universitätsbibliothek
    No inter-library loan
    Duale Hochschule Baden-Württemberg Mosbach, Bibliothek
    E-Book Nationallizenz IMF
    No inter-library loan
    Hochschule Offenburg, University of Applied Sciences, Bibliothek Campus Offenburg
    E-Book International Monetary Fund
    No inter-library loan
    Hochschulbibliothek Pforzheim, Bereichsbibliothek Technik und Wirtschaft
    e-Book International Monetary Fund eLibrary
    No loan of volumes, only paper copies will be sent
    Hochschule Albstadt-Sigmaringen, Bibliothek Sigmaringen
    No loan of volumes, only paper copies will be sent
    Duale Hochschule Baden-Württemberg Villingen-Schwenningen, Bibliothek
    E_Book IMF
    No inter-library loan

     

    The Norwegian financial system has a long history of incorporating new technology. Norway is at the forefront of digitization and has tight interdependencies within its financial system, making it particularly vulnerable to evolving cyber threats. Norway is increasingly a cashless society, with surveys and data collection suggesting that only 10 percent of point-of-sale and person-to-person transactions in 2019 were made using cash.1 Most payments made in Norway are digital (e.g., 475 card transactions per capita per annum)2 and there is an increase in new market entrants providing a broad range of services. Thus, good cybersecurity is a prerequisite for financial stability in Norway

     

    Export to reference management software   RIS file
      BibTeX file
  9. Cyber risk and financial stability
    it's a small world after all

    The ability of attackers to undermine, disrupt and disable information and communication technology systems used by financial institutions is a threat to financial stability and one that requires additional attention more

    Access:
    Verlag (kostenfrei)
    Verlag (kostenfrei)
    Resolving-System (kostenfrei)
    Verlag (kostenfrei)
    Orient-Institut Beirut
    Online
    No inter-library loan
    Staatsbibliothek zu Berlin - Preußischer Kulturbesitz, Haus Potsdamer Straße
    No inter-library loan
    Universitätsbibliothek Braunschweig
    No inter-library loan
    Staats- und Universitätsbibliothek Bremen
    No inter-library loan
    Universitätsbibliothek Erfurt / Forschungsbibliothek Gotha, Universitätsbibliothek Erfurt
    No inter-library loan
    Bibliothek der Pädagogischen Hochschule Freiburg/Breisgau
    No inter-library loan
    Niedersächsische Staats- und Universitätsbibliothek Göttingen
    No inter-library loan
    Universitäts- und Landesbibliothek Sachsen-Anhalt / Zentrale
    No inter-library loan
    Helmut-Schmidt-Universität, Universität der Bundeswehr Hamburg, Universitätsbibliothek
    No inter-library loan
    Technische Universität Hamburg, Universitätsbibliothek
    No inter-library loan
    Technische Informationsbibliothek (TIB) / Leibniz-Informationszentrum Technik und Naturwissenschaften und Universitätsbibliothek
    No inter-library loan
    Max-Planck-Institut für ausländisches öffentliches Recht und Völkerrecht, Bibliothek
    No inter-library loan
    Duale Hochschule Baden-Württemberg Heidenheim, Bibliothek
    e-Book Nationallizenz
    No inter-library loan
    Thüringer Universitäts- und Landesbibliothek
    No inter-library loan
    Fachhochschule Kiel, Zentralbibliothek
    No inter-library loan
    ZBW - Leibniz-Informationszentrum Wirtschaft, Standort Kiel
    LZ 140
    No inter-library loan
    Universitätsbibliothek Leipzig
    No inter-library loan
    Leuphana Universität Lüneburg, Medien- und Informationszentrum, Universitätsbibliothek
    No inter-library loan
    Duale Hochschule Baden-Württemberg Mosbach, Bibliothek
    E-Book Nationallizenz IMF
    No inter-library loan
    Hochschule Offenburg, University of Applied Sciences, Bibliothek Campus Offenburg
    E-Book International Monetary Fund
    No inter-library loan
    Hochschulbibliothek Pforzheim, Bereichsbibliothek Technik und Wirtschaft
    e-Book International Monetary Fund eLibrary
    No loan of volumes, only paper copies will be sent
    Hochschule Albstadt-Sigmaringen, Bibliothek Sigmaringen
    No loan of volumes, only paper copies will be sent
    Duale Hochschule Baden-Württemberg Villingen-Schwenningen, Bibliothek
    E_Book IMF
    No inter-library loan

     

    The ability of attackers to undermine, disrupt and disable information and communication technology systems used by financial institutions is a threat to financial stability and one that requires additional attention

     

    Export to reference management software   RIS file
      BibTeX file
  10. Central bank risk management, fintech, and cybersecurity
    Published: April 2021
    Publisher:  International Monetary Fund, [Washington, D.C.]

    Based on technical assistance to central banks by the IMF's Monetary and Capital Markets Department and Information Technology Department, this paper examines fintech and the related area of cybersecurity from the perspective of central bank risk... more

    Access:
    Verlag (kostenfrei)
    Verlag (kostenfrei)
    Resolving-System (kostenfrei)
    Verlag (kostenfrei)
    Orient-Institut Beirut
    Online
    No inter-library loan
    Staatsbibliothek zu Berlin - Preußischer Kulturbesitz, Haus Potsdamer Straße
    No inter-library loan
    Universitätsbibliothek Braunschweig
    No inter-library loan
    Staats- und Universitätsbibliothek Bremen
    No inter-library loan
    Universitätsbibliothek Erfurt / Forschungsbibliothek Gotha, Universitätsbibliothek Erfurt
    No inter-library loan
    Bibliothek der Pädagogischen Hochschule Freiburg/Breisgau
    No inter-library loan
    Niedersächsische Staats- und Universitätsbibliothek Göttingen
    No inter-library loan
    Universitäts- und Landesbibliothek Sachsen-Anhalt / Zentrale
    No inter-library loan
    Helmut-Schmidt-Universität, Universität der Bundeswehr Hamburg, Universitätsbibliothek
    No inter-library loan
    Technische Universität Hamburg, Universitätsbibliothek
    No inter-library loan
    Technische Informationsbibliothek (TIB) / Leibniz-Informationszentrum Technik und Naturwissenschaften und Universitätsbibliothek
    No inter-library loan
    Duale Hochschule Baden-Württemberg Heidenheim, Bibliothek
    e-Book Nationallizenz
    No inter-library loan
    Thüringer Universitäts- und Landesbibliothek
    No inter-library loan
    Fachhochschule Kiel, Zentralbibliothek
    No inter-library loan
    ZBW - Leibniz-Informationszentrum Wirtschaft, Standort Kiel
    VS 301
    No inter-library loan
    Universitätsbibliothek Leipzig
    No inter-library loan
    Leuphana Universität Lüneburg, Medien- und Informationszentrum, Universitätsbibliothek
    No inter-library loan
    Duale Hochschule Baden-Württemberg Mosbach, Bibliothek
    E-Book Nationallizenz IMF
    No inter-library loan
    Hochschule Offenburg, University of Applied Sciences, Bibliothek Campus Offenburg
    E-Book International Monetary Fund
    No inter-library loan
    Hochschulbibliothek Pforzheim, Bereichsbibliothek Technik und Wirtschaft
    e-Book International Monetary Fund eLibrary
    No loan of volumes, only paper copies will be sent
    Hochschule Albstadt-Sigmaringen, Bibliothek Sigmaringen
    No loan of volumes, only paper copies will be sent
    Duale Hochschule Baden-Württemberg Villingen-Schwenningen, Bibliothek
    E_Book IMF
    No inter-library loan

     

    Based on technical assistance to central banks by the IMF's Monetary and Capital Markets Department and Information Technology Department, this paper examines fintech and the related area of cybersecurity from the perspective of central bank risk management. The paper draws on findings from the IMF Article IV Database, selected FSAP and country cases, and gives examples of central bank risks related to fintech and cybersecurity. The paper highlights that fintech- and cybersecurity-related risks for central banks should be addressed by operationalizing sound internal risk management by establishing and strengthening an integrated risk management approach throughout the organization, including a dedicated risk management unit, ongoing sensitizing and training of Board members and staff, clear reporting lines, assessing cyber resilience and security posture, and tying risk management into strategic planning.. Given the fast-evolving nature of such risks, central banks could make use of timely and regular inputs from external experts

     

    Export to reference management software   RIS file
      BibTeX file
  11. Exegesis
    Published: 1997
    Publisher:  Vintage Contemporaries, New York, NY [u.a.]

    Niedersächsische Staats- und Universitätsbibliothek Göttingen
    2000 A 11826
    Unlimited inter-library loan, copies and loan
    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Union catalogues
    Language: English
    Media type: Book
    Format: Print
    ISBN: 037570051X
    Edition: 1. ed
    Series: Vintage contemporaries original
    Subjects: Artificial intelligence; Hackers; Computer security
    Scope: ca. 224 S
  12. Operational resilience in digital payments
    experiences and issues
    Published: Dec 2021
    Publisher:  International Monetary Fund, [Washington, D.C.]

    Major operational incidents in payment systems suggest the need to improve their resiliency. Meanwhile, as payment infrastructures become more digitalized, integrated, and interdependent, they require an even higher degree of resilience. Moreover,... more

    Access:
    Verlag (kostenfrei)
    Verlag (kostenfrei)
    Resolving-System (kostenfrei)
    Verlag (kostenfrei)
    Orient-Institut Beirut
    Online
    No inter-library loan
    Staatsbibliothek zu Berlin - Preußischer Kulturbesitz, Haus Potsdamer Straße
    No inter-library loan
    Universitätsbibliothek Braunschweig
    No inter-library loan
    Staats- und Universitätsbibliothek Bremen
    No inter-library loan
    Universitätsbibliothek Erfurt / Forschungsbibliothek Gotha, Universitätsbibliothek Erfurt
    No inter-library loan
    Bibliothek der Pädagogischen Hochschule Freiburg/Breisgau
    No inter-library loan
    Niedersächsische Staats- und Universitätsbibliothek Göttingen
    No inter-library loan
    Universitäts- und Landesbibliothek Sachsen-Anhalt / Zentrale
    No inter-library loan
    Helmut-Schmidt-Universität, Universität der Bundeswehr Hamburg, Universitätsbibliothek
    No inter-library loan
    Technische Universität Hamburg, Universitätsbibliothek
    No inter-library loan
    Technische Informationsbibliothek (TIB) / Leibniz-Informationszentrum Technik und Naturwissenschaften und Universitätsbibliothek
    No inter-library loan
    Duale Hochschule Baden-Württemberg Heidenheim, Bibliothek
    e-Book Nationallizenz
    No inter-library loan
    Thüringer Universitäts- und Landesbibliothek
    No inter-library loan
    Fachhochschule Kiel, Zentralbibliothek
    No inter-library loan
    ZBW - Leibniz-Informationszentrum Wirtschaft, Standort Kiel
    VS 301
    No inter-library loan
    Universitätsbibliothek Leipzig
    No inter-library loan
    Leuphana Universität Lüneburg, Medien- und Informationszentrum, Universitätsbibliothek
    No inter-library loan
    Duale Hochschule Baden-Württemberg Mosbach, Bibliothek
    E-Book Nationallizenz IMF
    No inter-library loan
    Hochschule Offenburg, University of Applied Sciences, Bibliothek Campus Offenburg
    E-Book International Monetary Fund
    No inter-library loan
    Hochschulbibliothek Pforzheim, Bereichsbibliothek Technik und Wirtschaft
    e-Book International Monetary Fund eLibrary
    No loan of volumes, only paper copies will be sent
    Hochschule Albstadt-Sigmaringen, Bibliothek Sigmaringen
    No loan of volumes, only paper copies will be sent
    Duale Hochschule Baden-Württemberg Villingen-Schwenningen, Bibliothek
    E_Book IMF
    No inter-library loan

     

    Major operational incidents in payment systems suggest the need to improve their resiliency. Meanwhile, as payment infrastructures become more digitalized, integrated, and interdependent, they require an even higher degree of resilience. Moreover, risks that could trigger major disruptions have become more acute given the rise in power outages, cyber incidents, and natural disasters. International experiences suggest the need to strengthen reliability objectives, redundancies, assessment of critical service providers, endpoint security, and alternative arrangements

     

    Export to reference management software   RIS file
      BibTeX file
  13. Digital fortress
    Author: Brown, Dan
    Published: 2004
    Publisher:  St. Martin's Paperbacks, New York

    After cryptographer Susan Fletcher has been summoned to help the National Security Agency (NSA) crack a mysterious code, her report sends NSA into a state of collapse and Susan struggles to save the nation, and the man she loves more

    Max-Planck-Institut für Informatik, Campusbibliothek für Informatik und Mathematik
    No loan of volumes, only paper copies will be sent

     

    After cryptographer Susan Fletcher has been summoned to help the National Security Agency (NSA) crack a mysterious code, her report sends NSA into a state of collapse and Susan struggles to save the nation, and the man she loves

     

    Export to reference management software   RIS file
      BibTeX file
    Source: Union catalogues
    Language: English
    Media type: Book
    Format: Print
    ISBN: 9780312944926
    Edition: St. Martin's paperbacks edition
    Subjects: Computer security; Sécurité informatique - Romans, nouvelles, etc; Computer security; Thrillers (Fiction); Fiction; Adventure fiction; Thrillers (Fiction)
    Scope: 525 Seiten
  14. Futureproof
    security aesthetics and the management of life
    Contributor: Ghertner, D. Asher (HerausgeberIn); McFann, Hudson (HerausgeberIn); Goldstein, Daniel M. (HerausgeberIn)
    Published: 2020
    Publisher:  Duke University Press, Durham

    Security Aesthetics of and Beyond the Biopolitical / D. Asher Ghertner, Hudson McFann, and Daniel M. Goldstein -- The Aesthetics of Cyber Insecurity: Displaying the Digital in Three American Museum Exhibits / Victoria Bernal -- Danger Signs: The... more

    Access:
    Verlag (kostenfrei)
    Staatsbibliothek zu Berlin - Preußischer Kulturbesitz, Haus Potsdamer Straße
    No inter-library loan
    Universitätsbibliothek Clausthal
    No inter-library loan
    Niedersächsische Staats- und Universitätsbibliothek Göttingen
    No inter-library loan
    Max-Planck-Institut für ethnologische Forschung, Bibliothek
    No inter-library loan
    Universitäts- und Landesbibliothek Sachsen-Anhalt / Zentrale
    No inter-library loan
    Staats- und Universitätsbibliothek Hamburg Carl von Ossietzky
    No inter-library loan
    Gottfried Wilhelm Leibniz Bibliothek - Niedersächsische Landesbibliothek
    No inter-library loan
    Universitätsbibliothek Kiel, Zentralbibliothek
    No inter-library loan
    Hochschule für Grafik und Buchkunst, Bibliothek
    No inter-library loan
    Bibliotheks-und Informationssystem der Carl von Ossietzky Universität Oldenburg (BIS)
    No inter-library loan

     

    Security Aesthetics of and Beyond the Biopolitical / D. Asher Ghertner, Hudson McFann, and Daniel M. Goldstein -- The Aesthetics of Cyber Insecurity: Displaying the Digital in Three American Museum Exhibits / Victoria Bernal -- Danger Signs: The Aesthetics of Insecurity in Bogota / Austin Zeiderman -- We All Have the Same Red Blood?: Security Aesthetics and Rescue Ethics on the Arizona's Sonora Border / Ieva Jusionyte -- Fugitive Horizons and the Arts of Security in Honduras / Jon Carter -- Security Aesthetics and Political Community Formation in Kingston, Jamaica / Rivke Jaffe -- Staging Safety in Brooklyn's Real Estate / Zaire Dinzey-Flores and Alexandra Demshock -- Expecting the Worst: Active-Shooter Scenario Play in American Schools / Rachel Hall -- H5N1 and the Aesthetics of Biosecurity: From Danger to Risk / Limor Samimian-Darash -- Securing Stand-by and Urban Space Making in Jakarta: Intensities in Search of Forms / -- AbdouMaliq Simone -- Securing the Street: Urban Renewal and the Fight Against 'Informality' in Mexico City / -- Alejandra Leal Martinez -- The Age of Security / Didier Fassin "From terrorism and public health to museums, schools, and homes, FUTUREPROOF asks us to expand our purview of security, turning our attention to how security is lived, felt, and perceived through the violences of everyday life. Editors Asher Ghertner, Daniel Goldstein, and Hudson Fann propose the modality of "security aesthetics" as a way to understand how sensory and affective experiences help regulate bodies, spaces, and states in the service of "futureproofing" society against anticipated risks and perils. Taken broadly as the domain of sense perception, aesthetics provides a framework for considering the body's interactions with the material world and the processes by which these interactions translate into subjective judgments of taste. The contributions to this volume show us how security aesthetics work to fashion differently imagined futures, illuminating the interplay of sense perception and articulated reason in the operations of security apparatuses"--

     

    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Staatsbibliothek zu Berlin
    Contributor: Ghertner, D. Asher (HerausgeberIn); McFann, Hudson (HerausgeberIn); Goldstein, Daniel M. (HerausgeberIn)
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 9781478093398
    RVK Categories: MS 1190 ; LH 61360
    Series: Global insecurities
    Subjects: Human security; Emergency management; Risk management; Biosecurity; Computer security
    Scope: 1 Online-Ressource (xii, 298 Seiten), Illustrationen, Karten
    Notes:

    Includes bibliographical references and index

  15. Critical perspectives on cybersecurity
    feminist and postcolonial interventions
    Contributor: Mhajne, Anwar (HerausgeberIn); Henshaw, Alexis Leanna (HerausgeberIn)
    Published: [2024]; © 2024
    Publisher:  Oxford University Press, New York

    Traditional notions of national security have generally dominated cybersecurity debates, but the response to emerging cybersecurity issues should not merely focus on the militarization of cyberspace. Weaponizing a space heavily populated by civilians... more

    Fachinformationsverbund Internationale Beziehungen und Länderkunde
    Unlimited inter-library loan, copies and loan
    Peace Research Institute Frankfurt, Bibliothek
    52.599
    Unlimited inter-library loan, copies and loan

     

    Traditional notions of national security have generally dominated cybersecurity debates, but the response to emerging cybersecurity issues should not merely focus on the militarization of cyberspace. Weaponizing a space heavily populated by civilians has enormous implications for human rights. Yet, cybersecurity studies in international relations have largely overlooked the impact of cybersecurity policies on individuals and communities - including the consequences of surveillance, data overcollection, cybercrime, and cyberbullying. Critical Perspectives on Cybersecurity offers a new approach to understanding cybersecurity in international relations. As a counterpoint to existing work, which focuses largely on the security of states, private actors, and infrastructure, chapter authors examine how women and communities across the Global South understand "cybersecurity," including what threats and forms of resistance are most important to them. They make the case that policies need to consider individual human rights by putting people's empowerment and wellbeing at their center. Drawing on feminist and postcolonial theory, the chapters also cover issues that challenge conventional notions of cybersecurity, including disinformation, gender-based violence online, and technology as a neocolonial force. Bringing together contributions from a globally diverse range of authors, Anwar Mhajne and Alexis Henshaw provide a human security perspective on cybersecurity that pays attention to the interplay of race, ethnicity, gender, class, and other social hierarchies, especially regarding cybersecurity in the Global South.

     

    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Union catalogues
    Contributor: Mhajne, Anwar (HerausgeberIn); Henshaw, Alexis Leanna (HerausgeberIn)
    Language: English
    Media type: Book
    Format: Print
    ISBN: 9780197695883; 9780197695890
    Series: Oxford studies in gender and international relations
    Subjects: Women and human security; Technology and women; Computer security; Computer crimes; Cyberspace; Information; Sicherheit; Datensicherung; Informationstechnik; Kommunikationstechnik; Soziales Feld; Einflussgröße; Menschliche Sicherheit; Feminismus; Postkolonialismus
    Scope: viii, 204 Seiten, 25 cm
    Notes:

    Literaturangaben, Register

    Crystal Whetstone and Luna K.C.: A call for human security in cyber : implementing United Nations Security Council Resolution 1325 on Women, Peace and Security in cyberspace

    Erin Saltman and Dina Hussein: Cyberspace and the nouveau colonialism

    Julia Hofstetter: Gendered and postcolonial perspectives on data weaponization in armed conflict : the case of Afghanistan

    Murat Yilmaz: Transnational authoritarianism in cyberspace : a case study of Uyghurs

    Margaret Monyani and Allan Wefwafwa: Disciplinary power and feminism : nudity as resistance to cyber space bullying in Kenya

    Anwar Mhajne: The application of IHL on Israeli's cyber strategies against the Palestinians

    Alexis Henshaw: Capacity building and cyber insecurity in Latin America : geopolitics, surveillance, and disinformation

  16. Attack surface
    Published: 2020; ©2020
    Publisher:  Tor, New York

    "Most days, Masha Maximow was sure she'd chosen the winning side. In her day job as a counterterrorism wizard for an transnational cybersecurity firm, she made the hacks that allowed repressive regimes to spy on dissidents, and manipulate their every... more

    Hochschule Anhalt , Hochschulbibliothek
    CS 29532
    Unlimited inter-library loan, copies and loan

     

    "Most days, Masha Maximow was sure she'd chosen the winning side. In her day job as a counterterrorism wizard for an transnational cybersecurity firm, she made the hacks that allowed repressive regimes to spy on dissidents, and manipulate their every move. The perks were fantastic, and the pay was obscene. Just for fun, and to piss off her masters, Masha sometimes used her mad skills to help those same troublemakers evade detection, if their cause was just. It was a dangerous game and a hell of a rush. But seriously self-destructive. And unsustainable. When her targets were strangers in faraway police states, it was easy to compartmentalize, to ignore the collateral damage of murder, rape, and torture. But when it hits close to home, and the hacks and exploits she's devised are directed at her friends and family--including boy wonder Marcus Yallow, her old crush and archrival, and his entourage of naïve idealists--Masha realizes she has to choose. And whatever choice she makes, someone is going to get hurt.--

     

    Export to reference management software   RIS file
      BibTeX file
  17. Women in security :
    changing the face of technology and innovation /
    Contributor: Christofferson, Debra A. (Publisher)
    Published: [2018].; © 2018.
    Publisher:  Springer,, Cham :

    Freie Universität Berlin, Universitätsbibliothek, Zentralbibliothek
    Unlimited inter-library loan, copies and loan
    Hochschule für Technik und Wirtschaft Berlin, Hochschulbibliothek
    Unlimited inter-library loan, copies and loan
    Brandenburgische Technische Universität Cottbus - Senftenberg, Universitätsbibliothek
    Unlimited inter-library loan, copies and loan
    Export to reference management software   RIS file
      BibTeX file
    Content information
    Volltext (URL des Erstveröffentlichers)
    Volltext (URL des Erstveröffentlichers)
    Volltext (URL des Erstveröffentlichers)
    Source: Philologische Bibliothek, FU Berlin
    Contributor: Christofferson, Debra A. (Publisher)
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 978-3-319-57795-1
    Other identifier:
    Series: Women in engineering and science
    Subjects: Engineering; Computer security; System safety; Engineering / Vocational guidance; Sociology; Sex (Psychology); Gender expression; Gender identity; Job Careers in Science and Engineering; Gender Studies; Systems and Data Security; Security Science and Technology; Computersicherheit; Datensicherung; Geschlechterforschung; Ingenieurwissenschaften
    Scope: 1 Online-Ressource (XIX, 136 Seiten) :, Illustrationen.
  18. Stealing the network :
    how to own a shadow /
    Published: 2007.
    Publisher:  Syngress,, Rockland, MA :

    The best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attempt to bring down the shadowy hacker-villain known as Knuth in the most technically sophisticated... more

    Humboldt-Universität zu Berlin, Universitätsbibliothek, Jacob-und-Wilhelm-Grimm-Zentrum
    Unlimited inter-library loan, copies and loan

     

    The best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attempt to bring down the shadowy hacker-villain known as Knuth in the most technically sophisticated Stealing book yet.Stealing the Network: How to Own a Shadow is the final book in Syngress' ground breaking, best-selling, Stealing the Network series. As with previous title, How to Own a Shadow is a fictional story that demonstrates accurate, highly detailed scenarios of computer intrusions and counter-strikes. In How to Own a Thief, Knuth, th

     

    Export to reference management software   RIS file
      BibTeX file
    Source: Union catalogues
    Contributor: Russell, Ryan,; Mullen, Timothy.; Pinzon, Scott.
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 1-282-55249-X; 9786612552496; 0-08-051775-7
    Edition: 1st edition
    Series: Stealing the network
    Subjects: Hackers; Computer security; Cyberterrorism
    Scope: 1 online resource (448 p.)
    Notes:

    "Black Hat"--Cover.

    "... fourth book in the "Stealing the network series."--Preface.

    "The chase for Knuth"--Cover.

    Front Cover; Visit us at; How to Own a Shadow; Copyright Page; Acknowledgments; Authors; Story Editor; Technical Inspiration; Contributing Authors and Technical Editors, STN: How to Own an Identity; Contributing Authors; Special Contributor; Foreword Contributor; Copyeditor; Technical Editor and Contributor, STN: How to Own a Continent; Contributors; Technical Reviewer; Technicai Advisors; Technical Editor STN: How to Own the Box; Contributing Authors; Preface; Foreword; Chapter 1. Travel Plans; Chapter 2. Back in the Saddle; Chapter 3. Old Man and a Ghost; Chapter 4. Rootkit; Chapter 5. Paul

    Blue Paint, Dark SkiesRubber Bouncing Swords; A Hacker in the Making; Chapter 6. The Birth of Pawn; Showing Off For Rafa; The POST Challenge; ""C"" Is For Cookie; Chapter 7. Dishonorable Discharge; A 'Blah' Sort of Day; Just Another Random Encounter; Damsel In Distress; You're Not Just a Customer; First Contact; I've got an RFIDea...; Testing the Shark-Infested Waters; I've Got Good News and Bad News; Chapter 8. McGaylver; Appendix; Sins of the Father; The Interview; The Post Office; The Key; The Spreadsheet; Codewheels; The Restrooom; The Address; There's Something Else; The Chase

  19. Zero day exploit
    countdown to darkness /
    Author: Shein, Rob.
    Published: c2004.
    Publisher:  Syngress,, Rockland, MA :

    Humboldt-Universität zu Berlin, Universitätsbibliothek, Jacob-und-Wilhelm-Grimm-Zentrum
    Unlimited inter-library loan, copies and loan
    Export to reference management software   RIS file
      BibTeX file
    Source: Union catalogues
    Contributor: Sachs, Marcus H.
    Media type: Book
    Format: Online
    Subjects: Computer security; Computer hackers; Computer networks
    Scope: xxii, 339 p.
    Notes:

    "Rob Shein aka Rogue Shoten."

    "Foreword by David Litchfield."

  20. Stealing the network :
    how to own a shadow /
    Published: 2007.
    Publisher:  Syngress,, Rockland, MA :

    The best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attempt to bring down the shadowy hacker-villain known as Knuth in the most technically sophisticated... more

    Freie Universität Berlin, Universitätsbibliothek, Zentralbibliothek
    Unlimited inter-library loan, copies and loan

     

    The best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attempt to bring down the shadowy hacker-villain known as Knuth in the most technically sophisticated Stealing book yet.Stealing the Network: How to Own a Shadow is the final book in Syngress' ground breaking, best-selling, Stealing the Network series. As with previous title, How to Own a Shadow is a fictional story that demonstrates accurate, highly detailed scenarios of computer intrusions and counter-strikes. In How to Own a Thief, Knuth, th

     

    Export to reference management software   RIS file
      BibTeX file
    Source: Philologische Bibliothek, FU Berlin
    Contributor: Russell, Ryan,; Mullen, Timothy.; Pinzon, Scott.
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 1-282-55249-X; 9786612552496; 0-08-051775-7
    Edition: 1st edition
    Series: Stealing the network
    Subjects: Hackers; Computer security; Cyberterrorism
    Scope: 1 online resource (448 p.)
    Notes:

    "Black Hat"--Cover.

    "... fourth book in the "Stealing the network series."--Preface.

    "The chase for Knuth"--Cover.

    Front Cover; Visit us at; How to Own a Shadow; Copyright Page; Acknowledgments; Authors; Story Editor; Technical Inspiration; Contributing Authors and Technical Editors, STN: How to Own an Identity; Contributing Authors; Special Contributor; Foreword Contributor; Copyeditor; Technical Editor and Contributor, STN: How to Own a Continent; Contributors; Technical Reviewer; Technicai Advisors; Technical Editor STN: How to Own the Box; Contributing Authors; Preface; Foreword; Chapter 1. Travel Plans; Chapter 2. Back in the Saddle; Chapter 3. Old Man and a Ghost; Chapter 4. Rootkit; Chapter 5. Paul

    Blue Paint, Dark SkiesRubber Bouncing Swords; A Hacker in the Making; Chapter 6. The Birth of Pawn; Showing Off For Rafa; The POST Challenge; ""C"" Is For Cookie; Chapter 7. Dishonorable Discharge; A 'Blah' Sort of Day; Just Another Random Encounter; Damsel In Distress; You're Not Just a Customer; First Contact; I've got an RFIDea...; Testing the Shark-Infested Waters; I've Got Good News and Bad News; Chapter 8. McGaylver; Appendix; Sins of the Father; The Interview; The Post Office; The Key; The Spreadsheet; Codewheels; The Restrooom; The Address; There's Something Else; The Chase

  21. Futureproof
    security aesthetics and the management of life
    Contributor: Ghertner, D. Asher (Publisher); McFann, Hudson (Publisher); Goldstein, Daniel M. (Publisher)
    Published: 2020
    Publisher:  Duke University Press, Durham

    "From terrorism and public health to museums, schools, and homes, FUTUREPROOF asks us to expand our purview of security, turning our attention to how security is lived, felt, and perceived through the violences of everyday life. Editors Asher... more

     

    "From terrorism and public health to museums, schools, and homes, FUTUREPROOF asks us to expand our purview of security, turning our attention to how security is lived, felt, and perceived through the violences of everyday life. Editors Asher Ghertner, Daniel Goldstein, and Hudson Fann propose the modality of "security aesthetics" as a way to understand how sensory and affective experiences help regulate bodies, spaces, and states in the service of "futureproofing" society against anticipated risks and perils. Taken broadly as the domain of sense perception, aesthetics provides a framework for considering the body's interactions with the material world and the processes by which these interactions translate into subjective judgments of taste. The contributions to this volume show us how security aesthetics work to fashion differently imagined futures, illuminating the interplay of sense perception and articulated reason in the operations of security apparatuses"--

     

    Export to reference management software   RIS file
      BibTeX file
    Source: Union catalogues
    Contributor: Ghertner, D. Asher (Publisher); McFann, Hudson (Publisher); Goldstein, Daniel M. (Publisher)
    Language: English
    Media type: Book
    Format: Print
    ISBN: 9781478006909; 9781478006091
    Series: Global insecurities
    Subjects: Menschliche Sicherheit; Risikomanagement; Katastrophenmanagement; Ästhetik; Zukunft;
    Other subjects: Human security; Emergency management; Risk management; Biosecurity; Computer security; Biosecurity; Computer security; Emergency management; Human security; Risk management
    Scope: xii, 298 Seiten, Illustrationen, Karten, 23 cm
    Notes:

    Security Aesthetics of and Beyond the Biopolitical / D. Asher Ghertner, Hudson McFann, and Daniel M. Goldstein -- The Aesthetics of Cyber Insecurity: Displaying the Digital in Three American Museum Exhibits / Victoria Bernal -- Danger Signs: The Aesthetics of Insecurity in Bogota / Austin Zeiderman -- We All Have the Same Red Blood?: Security Aesthetics and Rescue Ethics on the Arizona's Sonora Border / Ieva Jusionyte -- Fugitive Horizons and the Arts of Security in Honduras / Jon Carter -- Security Aesthetics and Political Community Formation in Kingston, Jamaica / Rivke Jaffe -- Staging Safety in Brooklyn's Real Estate / Zaire Dinzey-Flores and Alexandra Demshock -- Expecting the Worst: Active-Shooter Scenario Play in American Schools / Rachel Hall -- H5N1 and the Aesthetics of Biosecurity: From Danger to Risk / Limor Samimian-Darash -- Securing Stand-by and Urban Space Making in Jakarta: Intensities in Search of Forms / -- AbdouMaliq Simone -- Securing the Street: Urban Renewal and the Fight Against 'Informality' in Mexico City / -- Alejandra Leal Martinez -- The Age of Security / Didier Fassin

  22. Core security patterns :
    best practices and strategies for J2EE, web services and identity management /
    Published: 2005.
    Publisher:  Prentice Hall,, Upper Saddle River, NJ ; Munich [u.a.] :

    Freie Universität Berlin, Universitätsbibliothek, Zentralbibliothek
    Unlimited inter-library loan, copies and loan
    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Philologische Bibliothek, FU Berlin
    Contributor: Nagappan, Ramesh; Lai, Ray
    Language: English
    Media type: Book
    Format: Print
    ISBN: 0-13-146307-1
    RVK Categories: ST 253 ; ST 250
    Edition: 1. print.
    Series: Prentice Hall core series
    Subjects: J2EE; Java 2 platform Enterprise Edition; Java 2; datasikkerhed; programmering; programmeringssprog; sikkerhed; vejledninger; Java (Computer program language); Computer security
    Scope: XLVI, 1041 S.
    Notes:

    Includes bibliographical references and index

  23. Open-source-Software und IT-Sicherheit
    Unternehmensbefragung Frühjahr 2005 in Baden-Württemberg
    Contributor: Bertschek, Irene (Herausgeber)
    Published: 2005
    Publisher:  MFG-Stiftung Baden-Württemberg [u.a.], Stuttgart

  24. Core security patterns
    best practices and strategies for J2EE, web services and identity management
    Published: 2005
    Publisher:  Prentice Hall, Upper Saddle River, NJ

    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Union catalogues
    Contributor: Nagappan, Ramesh (Publisher); Lai, Ray (Publisher)
    Language: English
    Media type: Book
    Format: Print
    ISBN: 0131463071
    RVK Categories: ST 250 ; ST 277
    Edition: 1. print.
    Series: Prentice Hall core series
    Subjects: J2EE; Java 2 platform Enterprise Edition; Java 2; datasikkerhed; programmering; programmeringssprog; sikkerhed; vejledninger; Java (Computer program language); Computer security
    Scope: XLVI, 1041 S.
    Notes:

    Includes bibliographical references and index

  25. Zero day exploit :
    countdown to darkness /
    Author: Shein, Rob.
    Published: c2004.
    Publisher:  Syngress,, Rockland, MA :

    The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious ""Zero-Day"" attack will appeal to every corner of the IT community. Although finctional, the numerous accounts of real events and references... more

    Freie Universität Berlin, Universitätsbibliothek, Zentralbibliothek
    Unlimited inter-library loan, copies and loan
    Humboldt-Universität zu Berlin, Universitätsbibliothek, Jacob-und-Wilhelm-Grimm-Zentrum
    Unlimited inter-library loan, copies and loan

     

    The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious ""Zero-Day"" attack will appeal to every corner of the IT community. Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community. This book will also satisfy those not on the ""inside"" of this community, who are fascinated by the real tactics and motives of criminal, malicous hackers and those who defent the Internet from them.* The realistic portrayals of researching, developing, and ultimat

     

    Export to reference management software   RIS file
      BibTeX file
    Source: Philologische Bibliothek, FU Berlin
    Contributor: Sachs, Marcus H.
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 1-281-07850-6; 9786611078508; 0-08-054392-8
    Series: Cyber-Fiction
    Subjects: Computer security; Computer hackers; Computer networks
    Scope: 1 online resource (363 p.)
    Notes:

    "Rob Shein aka Rogue Shoten."

    "Foreword by David Litchfield."

    Front Cover; Zero Day Exploit; Copyright Page; Contents; Foreword; Chapter 1. Prologue; Chapter 2. DefCon in Las Vegas, 2000; Chapter 3. The DoJ Project, Washington DC, 2001; Chapter 4. The Arrival of MadFast; Chapter 5. ZFon Vulnerability; Chapter 6. Scanning the System, 2003; Chapter 7. Zero Day; Chapter 8. Exploit Impact; Chapter 9. Damage Control; Chapter 10. Recovery; Appendix: The Laws of Security