Rather than buy a shiny red sports car during middle age, one man took a humorous look at "growing up geek", and wrote an autobiography of his adventures in cybersecurity. From the earliest days of computers to the current age, technology provides the lens for a look back over the course of a whole lifetime, which will ideally turn out to be half a lifetime, or really, ideally, even less than that, because the author wants to live forever.
User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember passwords littered with obscure characters and random numerals.
Every computer user must face the problems of password security. According to a recent British study, passwords are usually obvious: around 50 percent of computer users select passwords based on names of a family member, spouse, partner, or a pet. Many users face the problem of selecting strong passwords that meet corporate security requirements. Too often, systems reject user-selected passwords because they are not long enough or otherwise do not meet complexity requirements. This book teaches users how to select passwords that always meet complexity requirements.
Continue reading “Perfect Password: Selection, Protection, Authentication”
Written by a team of experts at the forefront of the cyber-physical systems (CPS) revolution, this book provides an in-depth look at security and privacy, two of the most critical challenges facing both the CPS research and development community and ICT professionals. It explores, in depth, the key technical, social, and legal issues at stake, and it provides readers with the information they need to advance research and development in this exciting area.
Cyber-physical systems (CPS) are engineered systems that are built from, and depend upon the seamless integration of computational algorithms and physical components. Advances in CPS will enable capability, adaptability, scalability, resiliency, safety, security, and usability far in excess of what today’s simple embedded systems can provide. Just as the Internet revolutionized the way we interact with information, CPS technology has already begun to transform the way people interact with engineered systems. In the years ahead, smart CPS will drive innovation and competition across industry sectors, from agriculture, energy, and transportation, to architecture, healthcare, and manufacturing. A priceless source of practical information and inspiration, Security and Privacy in Cyber-Physical Systems: Foundations, Principles and Applications is certain to have a profound impact on ongoing R&D and education at the confluence of security, privacy, and CPS.
The Sabrent EC-DFLT SATA Lay-Flat Docking Station supports the direct insertion of Desktop 2.5"/3.5" SATA Hard Drives. It is a caseless solution that makes swapping hard drives easier than ever before. Plus, now you can take advantage of the lightening speed of USB 3.0 to quickly transfer files up to 5 Gbps!
Continue reading “Sabrent USB 3.0 to SATA External Hard Drive Lay-Flat Docking Station for 2.5 or 3.5in HDD, SSD [Support UASP and 4TB] (EC-DFLT)”
Securing cyberspace has become one of the most pressing security challenges of the twenty-first century, impacting as it does on the everyday activity of governments, businesses and citizens alike. The cyber world and its associated technologies have, on the one hand, created social, cultural, economic and political opportunities for all. On the other hand, its borderless nature has fostered threats in the form of cyber attacks and cybercrime. The European Union (EU) is not immune to such threats, and produced its first Cybersecurity Strategy in 2013 to address more comprehensively the challenges that it faces. Drawing on the concepts of resilience and security governance, this book offers a novel framework for understanding and assessing how far the EU has progressed in embedding the necessary conditions for a resilient and secure ecosystem to emerge in Europe and beyond. It asks how far the EU has facilitated movement to an effective culture of cybersecurity that will allow it to fulfil its own ambitions; promote its values; and exert its influence in a dynamic global order that is increasingly reliant on digital interoperability and connectivity.