Amazon Price: N/A (as of February 12, 2018 08:12 –
How was the Internet born in Brazil? Who were its pioneers? How did they interact with the Internet’s fathers in the United States and Europe? What strategies guided the development of Brazil’s Internet? How has it developed in terms of coverage, usage, speed, pricing, and quality of service? What needs to be done to better realize its potential for accelerating economic, social and political development? What is the Brazilian model of Internet governance and how is it evolving? These are the major questions addressed in this book.
The author has been an observer and participant in the development and use of the Internet in Africa, Asia, Russia and the United States, but above all in Brazil. He has interacted with many Internet pioneers around the world who have inspired his work.
This book, completed immediately after the Global Stakeholder Meeting on the Future of Internet Governance (NETmundial) in São Paulo, seeks to provide background that will be useful to participants in that important gathering and to Internet enthusiasts in Brazil and around the world.
Amazon Price: $51.95 $51.95 (as of February 21, 2018 16:21 –
Wireless networking has become standard in many business and government networks. This book is the first book that focuses on the methods used by professionals to perform WarDriving and wireless pentration testing.
Unlike other wireless networking and security books that have been published in recent years, this book is geared primarily to those individuals that are tasked with performing penetration testing on wireless networks. This book continues in the successful vein of books for penetration testers such as Google Hacking for Penetration Testers and Penetration Tester's Open Source Toolkit. Additionally, the methods discussed will prove invaluable for network administrators tasked with securing wireless networks. By understanding the methods used by penetration testers and attackers in general, these administrators can better define the strategies needed to secure their networks.
Continue reading “WarDriving and Wireless Penetration Testing”
Amazon Price: N/A (as of August 16, 2017 23:05 –
Each era brings with it new techniques and methods of waging a war. While military scholars and experts have mastered land, sea, air and space warfare, time has come that they studied the art of cyberwar too. Our neighbours have acquired the capabilities to undertake this new form of asymmetric form of warfare. India too therefore needs to acquire the capabilities to counter their threat. Cyber space seems to have invaded every aspect of our life. More and more systems whether public or private are getting automated and networked. This high dependence of our critical infrastructure on Information and Communication Technology exposes it to the vulnerabilities of cyberspace. Enemy now can target such infrastructure through the cyberspace and degrade/ destroy them. This implies that the critical information infrastructure of the country and military networks today are both equally vulnerable to enemy’s cyberattacks. India therefore must protect its critical information infrastructure as she would protect the military infrastructure in the battlefield. Public – Private Partnership model is the only model which would succeed in doing so. While the Government needs to lay down the policies and frame the right laws, private sector needs to invest into cyber security. Organisations at national level and at the level of armed forces need to be raised which can protect our assets and are also capable of undertaking offensive cyber operations. This book is an attempt to understand various nuances of cyber warfare and how it affects our national security. Based on the cyber threat environment, the books recommends a framework of cyber doctrine and cyber strategies as well as organisational structure of various organisations which a nation needs to invest in.
Amazon Price: N/A (as of February 21, 2018 13:47 –
It is predicted that robots will surpass human intelligence within the next fifty years.
The ever increasing speed of advances in technology and neuroscience, coupled with the creation of super computers and enhanced body parts and artificial limbs, is paving the way for a merger of both human and machine.
Devices which were once worn on the body are now being implanted into the body, and as a result, a class of true cyborgs, who are displaying a range of skills beyond those of normal humans-beings, are being created. There are cyborgs which can see colour by hearing sound, others have the ability to detect magnetic fields, some are equipped with telephoto lenses to aid their vision or implanted computers to monitor their heart, and some use thought to communicate with a computer or to manipulate a robotic arm. This is not science-fiction, these are developments that are really happening now, and will continue to develop in the future. However, a range of legal and policy questions has arisen alongside this rise of artificial intelligence.
Cyber-Humans provides a deep and unique perspective on the technological future of humanity, and describes how law and policy will be particularly relevant in creating a fair and equal society and protecting the liberties of different life forms which will emerge in the 21st century.
Dr Woodrow (Woody) Barfield previously headed up the Sensory Engineering Laboratory, holding the position of Industrial and Systems Engineering Professor at the University of Washington. His research revolves around the design and use of wearable computers and augmented reality systems and holds both JD and LLM degrees in intellectual property law and policy. He has published over 350 articles and major presentations in the areas of computer science, engineering and law. He currently lives in Chapel Hill, NC, USA.
Amazon Price: $49.95 $43.40 You save: $6.55 (13%). (as of February 22, 2018 07:05 –
Stories of cyberattacks dominate the headlines. Whether it is theft of massive amounts of personally identifiable information or the latest intrusion of foreign governments in U.S. government and industrial sites, cyberattacks are now important. For professionals and the public, knowing how the attacks are launched and succeed is vital to ensuring cyber security. The book provides a concise summary in a historical context of the major global cyber security attacks since 1980. Each attack covered contains an overview of the incident in layman terms, followed by a technical details section, and culminating in a "lessons learned and recommendations" section.