The Information Age has dawned at the same time the global political system is in transition. High technology performance and economic productivity are converging across the major developed regions of North America, East Asia, and Europe. If U.S. economic, military, and political leadership is to continue, it must depend more on flexible adaptation to the new technical and organizational realities and less on technological dominance. The heart of this adaptation lies in the evolution of a national technology policy that emphasizes market forces and the exploitation of network linkages within and among commercial and military organizations.
In this age of an open Internet, it is easy to forget that every American information industry, beginning with the telephone, has eventually been taken captive by some ruthless monopoly or cartel. With all our media now traveling a single network, an unprecedented potential is building for centralized control over what Americans see and hear. Could history repeat itself with the next industrial consolidation? Could the Internet—the entire flow of American information—come to be ruled by one corporate leviathan in possession of “the master switch”? That is the big question of Tim Wu’s pathbreaking book.
As Wu’s sweeping history shows, each of the new media of the twentieth century—radio, telephone, television, and film—was born free and open. Each invited unrestricted use and enterprising experiment until some would-be mogul battled his way to total domination. Here are stories of an uncommon will to power, the power over information: Adolph Zukor, who took a technology once used as commonly as YouTube is today and made it the exclusive prerogative of a kingdom called Hollywood . . . NBC’s founder, David Sarnoff, who, to save his broadcast empire from disruptive visionaries, bullied one inventor (of electronic television) into alcoholic despair and another (this one of FM radio, and his boyhood friend) into suicide . . . And foremost, Theodore Vail, founder of the Bell System, the greatest information empire of all time, and a capitalist whose faith in Soviet-style central planning set the course of every information industry thereafter.
Explaining how invention begets industry and industry begets empire—a progress often blessed by government, typically with stifling consequences for free expression and technical innovation alike—Wu identifies a time-honored pattern in the maneuvers of today’s great information powers: Apple, Google, and an eerily resurgent AT&T. A battle royal looms for the Internet’s future, and with almost every aspect of our lives now dependent on that network, this is one war we dare not tune out.
Part industrial exposé, part meditation on what freedom requires in the information age, The Master Switch is a stirring illumination of a drama that has played out over decades in the shadows of our national life and now culminates with terrifying implications for our future.
Cyber war and cyber-attack is an engaging review of the basic knowledge all up to date readers should have about cyber war and cyber-attacks before diving into more complex texts, as well as extra information for those already familiar with the topic. This work takes a look at general issues involving cyber vulnerability and our growing dependency on computers systems and networks. It goes beyond simple concepts such as hackers, hacktivism and espionage without neglecting them. It exposes the relevance of cyberdefence to both companies and ordinary users, giving especial attention to e-commerce platforms. At a time that many countries are employing strategies and money to prevent or minimize attacks as well as defend themselves against cyber threats this work pinpoints the key factors around the intentions behind attacks without minimizing their scale and variety. The jargon-free language and the current examples included help to set the discussion in the present day, while stressing important historical connections and pointing to how our strong network is at risk of becoming our weakest link.
The security in MANET has become a significant and active topic within the research community. In spite of the several attacks aimed at specific nodes in MANET that have been uncovered, some attacks involving multiple nodes still receive little attention. Furthermore, it may also have to do with the fact that no survey or taxonomy has been done to clarify the characteristics of different multiple node attacks. This thesis addresses the aforementioned gap by providing a proper definition and categorization of collaborative attacks against MANET from the various multiple node attacks found. Simulation using OPNET Modeler was used to investigate the performance impact of a collaborative blackhole attack on a mobile ad hoc network. Network throughput, packet delivery ratio and end-to-end delay are the performance metrics used in our result analysis. Based on the analyses of performance metrics made, we realised the consequences of a collaborative blackhole attack on MANET. In order to prevent or reduce these consequences, we also discuss a number of mitigation plans to counteract the different kinds of collaborative attacks.
SCADA (Supervisory Control and Data Acquisition) systems are at the heart of the modern industrial enterprise ranging from mining plants, water and electrical utility installations to oil and gas plants. In a market that is crowded with high-level monographs and reference guides, more practical information for professional engineers is required. This book covers the essentials of SCADA communication systems focussing on DNP3, the IEC 60870.5 standard and other new developments in this area. It commences with a brief review of the fundamentals of SCADA systems’ hardware, software and the communications systems (such as RS-232, RS-485, Ethernet and TCP/IP) that connect the SCADA Modules together. A solid review is then done on the DNP3 and IEC 60870.5 protocols where its features, message structure, practical benefits and applications are discussed. This book provides you with the knowledge to design your next SCADA system more effectively with a focus on using the latest communications technologies available.
* Covers the essentials of SCADA communication systems and other new developments in this area
* Covers a wide range of specialist networking topics and other topics ideal for practicing engineers and technicians looking to further and develop their knowledge of the subject
* Extremely timely subject as the industry has made a strong movement towards standard protocols in modern SCADA communications systems