The emergence of the hominids, more than five million years ago, marked the start of the human odyssey through space and time. This book deals with the last stage of this fascinating journey: the exploration of cyberspace and cybertime. Through the rapid global implementation of information and communication technologies, a new realm for human experience and imagination has been disclosed. Reversely, these postgeographical and posthistorical technologies have started to colonize our bodies and minds. Taking Homer's Odyssey and Kubrick's 2001: A Space Odyssey as his starting point, the author investigates the 'informatization of the world-view', focusing on its implications for our culture – arts, religion, and science – and, ultimately, our form of life. Moving across a wide range of disciplines, varying from philosophical anthropology and palaeontology to information theory, and from astrophysics to literary, film and new media studies, the author discusses our 'cyberspace odyssey' from a reflective position beyond euphoria and nostalgia. His analysis is as profound as nuanced and deals with issues that will be high on the agenda for many decades to come. In 2003 a Dutch Edition of Cyberspace Odyssey received the Socrates Prize for the best philosophy book published in Dutch.
There's a common belief that cyberspace cannot be regulated-that it is, in its very essence, immune from the government's (or anyone else's) control. Code, first published in 2000, argues that this belief is wrong. It is not in the nature of cyberspace to be unregulable; cyberspace has no “nature.” It only has code-the software and hardware that make cyberspace what it is. That code can create a place of freedom-as the original architecture of the Net did-or a place of oppressive control. Under the influence of commerce, cyberpsace is becoming a highly regulable space, where behavior is much more tightly controlled than in real space. But that's not inevitable either. We can-we must-choose what kind of cyberspace we want and what freedoms we will guarantee. These choices are all about architecture: about what kind of code will govern cyberspace, and who will control it. In this realm, code is the most significant form of law, and it is up to lawyers, policymakers, and especially citizens to decide what values that code embodies.
Since its original publication, this seminal book has earned the status of a minor classic. This second edition, or Version 2.0, has been prepared through the author's wiki, a web site that allows readers to edit the text, making this the first reader-edited revision of a popular book.
AFDD 3-12 is the US Air Force’s foundational doctrine publication for Air Force operations in, through, and from the cyberspace domain. It defines Cyberspace Superiority and speaks to US Air Force support of maintaining Cyberspace Superiority, a common military function.
“Today, we live in a globally-networked society that is increasingly dependent upon cyberspace access and security. Our ability to gain and maintain superiority in cyberspace has become essential to our ability to deliver global reach, power, and vigilance. As an integral member of the joint warfighting team, the Air Force is committed to growing, sustaining, and presenting highly skilled and well-equipped forces to joint force commanders who can deliver decisive effects in, from, and through cyberspace, while assuring our mission against an asymmetric cyber threat.
Freedom of action in the cyberspace domain enables our command, control, communication, computers, intelligence, surveillance, and reconnaissance capabilities. Our modern defenses, industrial base, and global commerce, as well as that of our nation’s enemies, depend on free use of land, sea, air, space, and cyberspace. Leverage in cyberspace affords influence and control across all other domains. This leverage increases our forces’ access, speed, reach, stealth, and precision.
Controlling the portions of cyberspace integral to our mission is a fundamental prerequisite to effective operations across the range of military operations. While we appreciate the power that cyber-enabled capabilities add, we also maintain a healthy respect for the asymmetric power that cyberspace affords our adversaries. We must maintain a constant commitment to educate, train, and equip our Airman to prevail in the contested domain of cyberspace.
In the past decade, technological advances have provided the means to generate decisive and magnified effects in domains that traditionally could only be achieved via kinetic means. We must continually adapt our operating concepts to leverage emerging cyberspace capabilities to ensure the Air Force maintains the decisive advantage over our adversaries.”
MAURICE H. FORSYTH
Major General, USAF
Commander, LeMay Center for Doctrine
Development and Education
Over the last decade, VxWorks and the IDE Tornado have become the dominating force in the embedded market place. This makes the operating system and its development environment a unique choice to start development for Embedded Applications. This book provides vital information gathered in years of experience working with VxWorks, offering support and fundamental insights into real time development using the platform. It covers Basics, Development and Deployment, giving hints and tips what should be done and what better be omitted. From the Author This book covers the experience I gained over years, supporting vxWorks from version 5.0.2 on.
Cyberspace and the Use of Force focuses specifically on one of the most challenging, contentious, and important issues in international law; how to determine what constitutes a use of force between states in CyberSpace under the contemporary international law paradigm of conflict management defined by the Charter of the United Nations. This text provides a detailed analysis of existing international law and state practice that reveals which state activities in CyberSpace may constitute a use of force and an armed attack that invokes a state's right to use force in self-defense. Though referenced in detail for lawyers, this text provides the necessary legal background to make it a useful desk reference for government officials, military operators, students, and others who are interested in the application of international law in CyberSpace.