Chapter 1: Geographies of Cyberspace: Internet, Community, Space and Place.- Chapter 2: A Phenomenological Approach on Cyberspace: Cyberplace, Community and Neighbourhood.- Chapter 3: Methodology and Methods of Analysing Representations on Websites.- Chapter 4: The Contemporary Contrade of Siena.- Chapter 5: The Symbolic Realm and Historical Framework of the Contrade.- Chapter 6: The Websites of the Contrade.- Chapter 7: Unlocking Cyberspace - Creating Cyberplaces.- Chapter 8: Idealising Cyberplaces - the Style of Representation in the Global Arena.- Chapter 9: Inhabiting Cyberspace and Emerging Cyberplaces.
Автор: Jiangxing Wu Название: Cyberspace Mimic Defense ISBN: 3030298434 ISBN-13(EAN): 9783030298432 Издательство: Springer Рейтинг: Цена: 27950.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book discusses uncertain threats, which are caused by unknown attacks based on unknown vulnerabilities or backdoors in the information system or control devices and software/hardware. Generalized robustness control architecture and the mimic defense mechanisms are presented in this book, which could change "the easy-to-attack and difficult-to-defend game" in cyberspace. The endogenous uncertain effects from the targets of the software/hardware based on this architecture can produce magic "mimic defense fog", and suppress in a normalized mode random disturbances caused by physical or logic elements, as well as effects of non-probability disturbances brought by uncertain security threats.
Although progress has been made in the current security defense theories in cyberspace and various types of security technologies have come into being, the effectiveness of such theories and technologies often depends on the scale of the prior knowledge of the attackers, on the part of the defender and on the acquired real-timing and accuracy regarding the attackers' behavior features and other information. Hence, there lacks an efficient active defense means to deal with uncertain security threats from the unknown. Even if the bottom-line defense technologies such as encrypted verification are adopted, the security of hardware/software products cannot be quantitatively designed, verified or measured.
Due to the "loose coupling" relationship and border defense modes between the defender and the protected target, there exist insurmountable theoretical and technological challenges in the protection of the defender and the target against the utilization of internal vulnerabilities or backdoors, as well as in dealing with attack scenarios based on backdoor-activated collaboration from both inside and outside, no matter how augmented or accumulated protective measures are adopted. Therefore, it is urgent to jump out of the stereotyped thinking based on conventional defense theories and technologies, find new theories and methods to effectively reduce the utilization of vulnerabilities and backdoors of the targets without relying on the priori knowledge and feature information, and to develop new technological means to offset uncertain threats based on unknown vulnerabilities and backdoors from an innovative perspective. This book provides a solution both in theory and engineering implementation to the difficult problem of how to avoid the uncontrollability of product security caused by globalized marketing, COTS and non-trustworthy software/hardware sources.
It has been proved that this revolutionary enabling technology has endowed software/hardware products in IT/ICT/CPS with endogenous security functions and has overturned the attack theories and methods based on hardware/software design defects or resident malicious codes. This book is designed for educators, theoretical and technological researchers in cyber security and autonomous control and for business technicians who are engaged in the research on developing a new generation of software/hardware products by using endogenous security enabling technologies and for other product users. Postgraduates in IT/ICT/CPS/ICS will discover that (as long as the law of "structure determines the nature and architecture determines the security is properly used), the problem of software/hardware design defects or malicious code embedding will become the swelling of Achilles in the process of informationization and will no longer haunt Pandora's box in cyberspace.
Security and opening-up, advanced progressiveness and controllability seem to be contradictory, but there can be theoretically and technologically unified solutions to the problem.
Автор: Tobias Boos Название: Inhabiting Cyberspace and Emerging Cyberplaces ISBN: 3319584537 ISBN-13(EAN): 9783319584539 Издательство: Springer Рейтинг: Цена: 7685.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book explores the concept of cyberplace as a mode of inhabiting the contemporary world. As a result, it suggests that, for many communities, unlocking cyberspace and inhabiting cyberplaces is now an integral part of their coming-to-the-globalised-world. Boos reviews in the detail the existing academic literature from cultural anthropology, human geography, and sociology on "cyberspace," concluding that a phenomenological perspective on cyberspace provides the possibility of gaining a deep understanding of our contemporary lifeworlds, in which on- and offline practices constantly intermingle. In four chapters, he applies the developed theoretical and methodological approaches to the case of Siena's neighbourhoods, the contrade, analysing their websites and discussing the implications of his findings for understanding contemporary processes of community building and for future research on cyberspace. This concise and accessible book will be of interest to advanced students and scholars in cultural anthropology, human geography, media studies and sociology.
Описание: Through a rich ethnography of street and working children in Calcutta, India, this book offers the first sustained enquiry into postcolonial childhoods, arguing that the lingering effects of colonialism are central to comprehending why these children struggle to inhabit the transition from labour to schooling.
Автор: Laidlaw Название: Regulating Speech in Cyberspace ISBN: 110704913X ISBN-13(EAN): 9781107049130 Издательство: Cambridge Academ Рейтинг: Цена: 17424.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: When a social networking provider deletes a group it deems offensive or an ISP blocks access to content online, it takes on a powerful role in regulating speech on the internet. Regulating Speech in Cyberspace examines the legal and social challenges of the impact of businesses on free speech online.
Описание: Research in - operative information agents has expanded to include agent negotiation, agent communities, agent mobility, as well as agent collaboration for information d- covery in constrained environments.
Автор: Berger Teresa Название: Liturgy in Migration: From the Upper Room to Cyberspace ISBN: 0814662757 ISBN-13(EAN): 9780814662755 Издательство: Неизвестно Цена: 6429.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: From the Upper Room to Cyberspace
Автор: Jan-Frederik Kremer; Benedikt M?ller Название: Cyberspace and International Relations ISBN: 3662511746 ISBN-13(EAN): 9783662511749 Издательство: Springer Рейтинг: Цена: 18167.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book presents new theoretical approaches on international relations and cyber security. It focuses on specific empirical fields of activity and addresses emerging challenges and prospects for international politics and relations.
Описание: This two-volume set (CCIS 1137 and CCIS 1138) constitutes the proceedings of the Third International Conference on Cyberspace Data and Intelligence, Cyber DI 2019, and the International Conference on Cyber-Living, Cyber-Syndrome, and Cyber-Health, CyberLife 2019, held under the umbrella of the 2019 Cyberspace Congress, held in Beijing, China, in December 2019.The 64 full papers presented together with 18 short papers were carefully reviewed and selected from 160 submissions. The papers are grouped in the following topics: cyber data, information and knowledge; cyber and cyber-enabled intelligence; communication and computing; cyber philosophy, cyberlogic and cyber science; and cyber health and smart healthcare.