Narrow Search
Last searches

Results for *

Displaying results 126 to 130 of 130.

  1. Stealing the network
    the complete series collector's edition
    Published: c2009
    Publisher:  Syngress, Burlington, MA

    Hide and sneak -- The worm turns -- Just another day at the office -- h3X's adventures in network land -- The thief no one saw -- Flying the friendly skies -- dis-card -- Social (in)security -- BabelNet -- The art of tracking -- Control yourself --... more

    Hochschule Zittau / Görlitz, Hochschulbibliothek
    Unlimited inter-library loan, copies and loan

     

    Hide and sneak -- The worm turns -- Just another day at the office -- h3X's adventures in network land -- The thief no one saw -- Flying the friendly skies -- dis-card -- Social (in)security -- BabelNet -- The art of tracking -- Control yourself -- The lagos creeper box -- The evolution of a hacker -- A real gullible genius -- For whom Ma Bell tolls -- Return on investment -- h3X and the big picture -- The story of Dex -- Automatic terror machine -- Get out quick -- In the beginning -- Sins of the father -- Saul on the run -- The seventh wave -- BlcktoW3r -- The Java Script Café -- Death by a thousand cuts -- A really gullible genius makes amends -- Near miss -- There's something else -- Epilogue : the chase -- The conversation -- Social insecurity -- Travel plans -- Back in the saddle -- Old man and a ghost -- Rootkit -- Paul -- The birth of Pawn -- Dishonorable discharge -- McGaylver -- The final chapter

     

    Export to reference management software   RIS file
      BibTeX file
    Source: Union catalogues
    Language: English
    Media type: Book
    Format: Print
    ISBN: 9781597492997
    Subjects: Computer hackers; Computer security; Cyberterrorism; Short stories, American
    Scope: xxxi, 1038 S., graph. Darst.
  2. La fortaleza digital
    Author: Brown, Dan
    Published: 2006
    Publisher:  Umbriel, Barcelona

    La supercomputadora de la Agencia de Seguridad Nacional se encuentra con un código el cual no puede descifrar. El subdirector de la agencia llama a la hermosa criptógrafa Susan Fletcher. La única pista para romper ese código parece estar en el... more

    Ibero-Amerikanisches Institut Preußischer Kulturbesitz, Bibliothek
    A 19 / 12609
    Unlimited inter-library loan, copies and loan

     

    La supercomputadora de la Agencia de Seguridad Nacional se encuentra con un código el cual no puede descifrar. El subdirector de la agencia llama a la hermosa criptógrafa Susan Fletcher. La única pista para romper ese código parece estar en el cadáver de un hombre fallecido en Espańa, donde ha sido enviado el prometido de Susan, David Becker. Mientras David intenta hallar la clave y sobrevivir a la persecución de un metódico e implacable asesino en las calles de Sevilla, Susan se enfrentará a su propio drama en las desoladas instalaciones de máxima seguridad de la Agencia, durante una larga noche en la que la mentira y el asesinato acechan tras cada puerta The supercomputer of the National Security Agency has encountered a code which it can not decipher. The deputy director of the agency calls the beautiful cryptographer Susan Fletcher. The only way to break the code seems to be in the body of a man who died in Spain. Susan's fiance, David Becker, is sent to Spain to investigate. While David tries to find the key and survive a methodical and ruthless murderer on the streets of Seville, Susan will face her own drama in the isolated maximum security facilities of the Agency, during a long night where lies and murder lurk behind every door

     

    Export to reference management software   RIS file
      BibTeX file
    Content information
  3. Understanding new security threats
    Contributor: Gueldry, Michel R. (HerausgeberIn); Gokcek, Gigi (HerausgeberIn); Hebron, Lui (HerausgeberIn)
    Published: 2019
    Publisher:  Routledge, Taylor & Francis Group, London

    This textbook examines non-traditional forms of security and expands the notion of security to include non-state actors and non-human actors. Proposing an expansive view of non-traditional forms of security that go beyond traditionally recognized... more

    Fachinformationsverbund Internationale Beziehungen und Länderkunde
    No inter-library loan
    Staatsbibliothek zu Berlin - Preußischer Kulturbesitz, Haus Potsdamer Straße
    No inter-library loan
    Peace Research Institute Frankfurt, Bibliothek
    E-Book HSFK
    Unlimited inter-library loan, copies and loan
    German Institute for Global and Area Studies, Bibliothek
    E-Book EBA TF-21
    Unlimited inter-library loan, copies and loan

     

    This textbook examines non-traditional forms of security and expands the notion of security to include non-state actors and non-human actors. Proposing an expansive view of non-traditional forms of security that go beyond traditionally recognized issues of threats to state and national territory, this new textbook rests on the following premises: traditional state-centered threats, such as nuclear proliferation and espionage, remain a concern; old and new threats combine and create interlocking puzzles - a feature of wicked problems and wicked messes; because of the global erosion of borders, new developments of unconventional insecurity interact in ways that frustrate traditional conceptual definitions, conceptual maps, and national policies; unconventional security challenges which have traditionally been seen as "low politics" or "soft" issues are now being recognized as "hard security" challenges in the twenty-first century; many of the so-called "new" threats detailed here are in fact very old: diseases, gender violence, food insecurity, under-development, and crime are all traditional security threats, but deeply modified today by globalization. The chapters offer local and global examples and engage with various theoretical approaches to help readers see the bigger picture. Solutions are also suggested to these problems. Each chapter contains discussion questions to help readers understand the key points and facilitate class discussion.

     

    Export to reference management software   RIS file
      BibTeX file
    Content information
    Volltext (lizenzpflichtig)
    Source: Staatsbibliothek zu Berlin
    Contributor: Gueldry, Michel R. (HerausgeberIn); Gokcek, Gigi (HerausgeberIn); Hebron, Lui (HerausgeberIn)
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 9781315102061
    Other identifier:
    RVK Categories: MF 9500 ; MK 8000
    Subjects: Security, International; National security; Human security; Energy security; Biosecurity; Computer security; Non-state actors (International relations); Terrorism; Computer Security; Kollektive Sicherheit; Bedrohungsvorstellung; Vorstellung; Sicherheitspolitik; Ursache; Einflussgröße; Risikofaktor; Wandel; Entwicklung; Security, International; National security; Human security; Energy security; Biosecurity; Computer security; Non-state actors (International relations); Terrorism ; Prevention; Electronic books; HISTORY / Military / Other; TECHNOLOGY & ENGINEERING / Military Science
    Scope: 1 Online-Ressource (xviii, 254 Seiten), Diagramme
    Notes:

    Literaturangaben, Register

    Michel Gueldry, Gigi gokcek and Lui Hebron: Introduction : Yesterday’s security debates, today’s realities

    Amy Below: Climate change : the existential security threat multiplier

    Michael D. Beevers: Geoengineering : a new and emerging security threat?

    Neda A. Zawahri and Erika Weinthal: The intersecting dimensions of water security

    Michael A. Davis and Jonathan Drake: Competition and cooperation in energy policies : dilemmas for national security and influence

    Marissa Quie: The body politics of security : sexual and reproductive health rights

    Nicole Gerring: Gender-based violence : a threat to human security in the global north and global south

    Erika Resende and Adriana Erthal Abnedur: Food security governance : lessons from the global south

    Adrienne Formentos and Gigi Gokcek: Invisible foes and micro-enemies : pathogens, diseases, and global health security

    Joel R. Campbell: Push, pull, and politics : the international migration issues after the Syrian Civil War, Brexit, and Trump

    Sharad Joshi: Sub-state actors' threats to international security : religious extremists and terrorist groups

    Colin P. Clarke: Organized crime and trafficking : mapping out the threats and actors to find solutions

    Serena Simoni: Transnational organized crime and globalization : godmothers of the Mafia and the undermining of the Italian state and society

    Christian-Marc Lifländer: Emerging threats in cyber space : the next domain of warfare

    Daniel Addington and Mike Manrod: Cyber threats and solutions for the private sector

    Jason Sebastiani, Joe Sanchez and Mike Manrod: Threats from STEM

    Khalid Bachkar and Lui Hebron: Risk and uncertainty in the global container supply chain

    Crister S. Garrett: Steeped in insecurity? : democracy, conflict, and the threat of populist security

  4. Cyber risk, market failures, and financial stability
    Published: 07 August 2017
    Publisher:  International Monetary Fund, [Washington, D.C.]

    Cyber-attacks on financial institutions and financial market infrastructures are becoming more common and more sophisticated. Risk awareness has been increasing, firms actively manage cyber risk and invest in cybersecurity, and to some extent... more

    Access:
    Verlag (kostenfrei)
    Verlag (kostenfrei)
    Orient-Institut Beirut
    Online
    No inter-library loan
    Staatsbibliothek zu Berlin - Preußischer Kulturbesitz, Haus Potsdamer Straße
    No inter-library loan
    Universitätsbibliothek Braunschweig
    No inter-library loan
    Staats- und Universitätsbibliothek Bremen
    No inter-library loan
    Universitätsbibliothek Erfurt / Forschungsbibliothek Gotha, Universitätsbibliothek Erfurt
    No inter-library loan
    Bibliothek der Pädagogischen Hochschule Freiburg/Breisgau
    No inter-library loan
    Niedersächsische Staats- und Universitätsbibliothek Göttingen
    No inter-library loan
    Universitäts- und Landesbibliothek Sachsen-Anhalt / Zentrale
    No inter-library loan
    Helmut-Schmidt-Universität, Universität der Bundeswehr Hamburg, Universitätsbibliothek
    No inter-library loan
    Technische Universität Hamburg, Universitätsbibliothek
    No inter-library loan
    Technische Informationsbibliothek (TIB) / Leibniz-Informationszentrum Technik und Naturwissenschaften und Universitätsbibliothek
    No inter-library loan
    Duale Hochschule Baden-Württemberg Heidenheim, Bibliothek
    e-Book Nationallizenz
    No inter-library loan
    Thüringer Universitäts- und Landesbibliothek
    No inter-library loan
    Fachhochschule Kiel, Zentralbibliothek
    No inter-library loan
    ZBW - Leibniz-Informationszentrum Wirtschaft, Standort Kiel
    VS 301 (2017,185)
    No inter-library loan
    Universitätsbibliothek Leipzig
    No inter-library loan
    Leuphana Universität Lüneburg, Medien- und Informationszentrum, Universitätsbibliothek
    No inter-library loan
    Duale Hochschule Baden-Württemberg Mosbach, Bibliothek
    E-Book Nationallizenz IMF
    No inter-library loan
    Hochschule Offenburg, University of Applied Sciences, Bibliothek Campus Offenburg
    E-Book International Monetary Fund
    No inter-library loan
    Hochschulbibliothek Pforzheim, Bereichsbibliothek Technik und Wirtschaft
    e-Book International Monetary Fund eLibrary
    No loan of volumes, only paper copies will be sent
    Hochschule Albstadt-Sigmaringen, Bibliothek Sigmaringen
    No loan of volumes, only paper copies will be sent
    Duale Hochschule Baden-Württemberg Villingen-Schwenningen, Bibliothek
    E_Book IMF
    No inter-library loan

     

    Cyber-attacks on financial institutions and financial market infrastructures are becoming more common and more sophisticated. Risk awareness has been increasing, firms actively manage cyber risk and invest in cybersecurity, and to some extent transfer and pool their risks through cyber liability insurance policies. This paper considers the properties of cyber risk, discusses why the private market can fail to provide the socially optimal level of cybersecurity, and explore how systemic cyber risk interacts with other financial stability risks. Furthermore, this study examines the current regulatory frameworks and supervisory approaches, and identifies information asymmetries and other inefficiencies that hamper the detection and management of systemic cyber risk. The paper concludes discussing policy measures that can increase the resilience of the financial system to systemic cyber risk

     

    Export to reference management software   RIS file
      BibTeX file
    Content information
  5. Stealing the network
    how to own a shadow
    Published: c2007
    Publisher:  Syngress, Rockland, Mass

    Cover; Title; Authors & Creators; Preface; Foreword; Travel Plans; Back in the Saddle; Old Man and a Ghost; Rootkit; Paul; The Birth of Pawn; Dishonorable Discharge; McGaylver; Appendix: Flashback to Knuth; There's Something Else; The Chase. The... more

    Access:
    Aggregator (lizenzpflichtig)
    Hochschule Aalen, Bibliothek
    E-Book EBSCO
    No inter-library loan
    Hochschule Esslingen, Bibliothek
    E-Book Ebsco
    No inter-library loan
    Saarländische Universitäts- und Landesbibliothek
    No inter-library loan
    Universitätsbibliothek der Eberhard Karls Universität
    No inter-library loan

     

    Cover; Title; Authors & Creators; Preface; Foreword; Travel Plans; Back in the Saddle; Old Man and a Ghost; Rootkit; Paul; The Birth of Pawn; Dishonorable Discharge; McGaylver; Appendix: Flashback to Knuth; There's Something Else; The Chase. The best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attempt to bring down the shadowy hacker-villain known as Knuth in the most technically sophisticated Stealing book yet

     

    Export to reference management software   RIS file
      BibTeX file
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 9781429456487; 1429456485
    Series: Stealing the Network Ser
    Subjects: Hackers; Computer security; Cyberterrorism; Computer hackers; Computer security; Cyberterrorism; Hackers; Computer security; Cyberterrorism; FICTION ; General; Fiction; Hackers
    Scope: Online Ressource (xxxvi, 409 p.), ill.
    Notes:

    "Black Hat"--Cover. - " ... fourth book in the "Stealing the network series."--Pref. - "The chase for Knuth"--Cover. - Description based on print version record

    "The chase for Knuth"--Cover

    " ... fourth book in the "Stealing the network series."--Pref