Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Datasource
Material
Language
Subjects(RVK)
  • 1
    ISBN: 3826692160 , 9783826692161
    Language: German
    Pages: 461 S. , graph. Darst. , 21 cm
    Edition: Dt. Ausg., 1. Aufl.
    Uniform Title: Liars and outliers 〈dt.〉
    DDC: 004
    RVK:
    RVK:
    Keywords: Vertrauen ; Sicherheit ; Soziologie
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Book
    Book
    New York ; London :W. W. Norton & Company,
    ISBN: 0-393-24481-4 , 978-0-393-24481-6 , 978-0-393-35217-7 , 0-393-35217-X
    Language: English
    Pages: 383 Seiten.
    Edition: First edition
    DDC: 005.8
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Datenschutz. ; Internet. ; Überwachung. ; Personenbezogene Daten. ; Datenerfassung. ; Elektronische Überwachung. ; Datenschutz ; Internet ; Überwachung ; Personenbezogene Daten ; Datenerfassung ; Elektronische Überwachung
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    ISBN: 9780393866667
    Language: English
    Pages: 284 Seiten , 23 cm
    Edition: First edition
    Parallel Title: Erscheint auch als
    DDC: 303.4834
    Keywords: COMPUTERS / Security / General ; COMPUTERS / Social Aspects / General ; Computer science ; Computersicherheit ; Digital- und Informationstechnologien: soziale und ethische Aspekte ; Krieg und Verteidigung ; POLITICAL SCIENCE / Political Freedom & Security / International Security ; SOC071000 ; Wissenschaft, Technologie und Gesellschaft ; Finanzwirtschaft ; Rechtssystem ; Politisches System ; Soziales System ; Künstliche Intelligenz ; Missbrauch
    Abstract: Long associated with computing technology, a hack is way to subvert a system's rules to the hacker's benefit in a way that is unanticipated and unintended by the system's designers. In A Hacker's Mind, Bruce Schneier takes the term out of the world of computing and uses it to analyze the social systems that underpin our society: from tax laws to financial markets and beyond. He reveals an array of powerful actors who deploy hacks to bend our economic, political, and legal systems to their will. In Schneier's estimation, "even the loopholes have loopholes," and this is by design. Left unchecked, and supercharged by techniques from artificial intelligence, these hacks threaten to upend our financial markets, weaken our democracy, and infiltrate our own cognitive systems. But if we can understand the hacking mindset properly, we can improve existing systems, predict and defend against hacks, and realize a more equitable world
    URL: Cover  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    ISBN: 9781118143308 , 1118143302
    Language: English
    Pages: XIV, 366 S. , Ill., graph. Darst.
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    DDC: 302.14
    RVK:
    Keywords: Gesellschaft ; Vertrauen ; Trust--Social aspects. ; Truthfulness and falsehood--Social aspects. ; Social interaction. ; Social stability.
    URL: Cover
    URL: Cover
    URL: Cover
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    ISBN: 978-3-8266-9216-1 , 3-8266-9216-0
    Language: German
    Pages: 461 S. : , graph. Darst. ; , 210 mm x 148 mm.
    Edition: Dt. Ausg., 1. Aufl.
    Uniform Title: Liars and outliers
    DDC: 302.14
    RVK:
    RVK:
    Keywords: Vertrauen. ; Sicherheit. ; Soziologie. ; Vertrauen ; Sicherheit ; Soziologie
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    ISBN: 9783864147425
    Language: German
    Pages: 1 Online-Ressource (400 Seiten)
    Edition: 1. Auflage
    Parallel Title: Print version Schneier, Bruce Data und Goliath - Die Schlacht um die Kontrolle unserer Welt : Wie wir uns gegen Überwachung, Zensur und Datenklau wehren müssen
    Parallel Title: Erscheint auch als Schneier, Bruce, 1963 - Data und Goliath
    DDC: 303.4833028558
    RVK:
    Keywords: Internet ; Big Data ; Überwachungstechnik ; Privatsphäre ; Datenschutz ; Datensicherung
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Indianapolis : Wiley
    Language: English
    Pages: 1 online resource (viii, 328 p.)
    Parallel Title: Erscheint auch als
    Keywords: Computer security ; United States ; Computer networks ; Security measures ; United States ; Privacy, Right of ; United States ; Terrorism ; United States ; Prevention ; Electronic books ; Electronic books ; local
    Abstract: Presenting invaluable advice from the world's most famous computer security expert, this intensely readable collection features some of the most insightful and informative coverage of the strengths and weaknesses of computer security and the price people pay -- figuratively and literally -- when security fails. Discussing the issues surrounding things such as airplanes, passports, voting machines, ID cards, cameras, passwords, Internet banking, sporting events, computers, and castles, this book is a must-read for anyone who values security at any level -- business, technical, or personal.
    Note: Cover title. - Includes bibliographical references (p. [267]-314) and index. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Indianapolis, IN : John Wiley & Sons
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Edition: 20th anniversary edition.
    Parallel Title: Erscheint auch als
    Keywords: Cryptography ; C (Computer program language) ; Electronic books ; Electronic books ; local
    Abstract: From the world's most renowned security technologist, Bruce Schneier, this 20th Anniversary Edition is the most definitive reference on cryptography ever published and is the seminal work on cryptography. Cryptographic techniques have applications far beyond the obvious uses of encoding and decoding information. For developers who need to know about capabilities, such as digital signatures, that depend on cryptographic techniques, there's no better overview than Applied Cryptography , the definitive book on the subject. Bruce Schneier covers general classes of cryptographic protocols and then specific techniques, detailing the inner workings of real-world cryptographic algorithms including the Data Encryption Standard and RSA public-key cryptosystems. The book includes source-code listings and extensive advice on the practical aspects of cryptography implementation, such as the importance of generating truly random numbers and of keeping keys secure. ". . .the best introduction to cryptography I've ever seen. . . .The book the National Security Agency wanted never to be published. . . ." -Wired Magazine ". . .monumental . . . fascinating . . . comprehensive . . . the definitive work on cryptography for computer programmers . . ." -Dr. Dobb's Journal ". . .easily ranks as one of the most authoritative in its field." -PC Magazine The book details how programmers and electronic communications professionals can use cryptography-the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. The book shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. With a new Introduction by the author, this premium edition will be a keepsake for all those committed to computer and cyber security.
    Note: Includes bibliographical references and index. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Parallel Title: Erscheint auch als
    Keywords: Trust ; Social aspects ; Truthfulness and falsehood ; Social aspects ; Social interaction ; Social stability ; Electronic books ; Electronic books ; local
    Abstract: How does society function when you can't trust everyone? When we think about trust, we naturally think about personal relationships or bank vaults. That's too narrow. Trust is much broader, and much more important. Nothing in society works without trust. It's the foundation of communities, commerce, democracy-everything. In this insightful and entertaining book, Schneier weaves together ideas from across the social and biological sciences to explain how society induces trust. He shows how trust works and fails in social settings, communities, organizations, countries, and the world. In today's hyper-connected society, understanding the mechanisms of trust is as important as understanding electricity was a century ago. Issues of trust and security are critical to solving problems as diverse as corporate responsibility, global warming, and our moribund political system. After reading Liars and Outliers, you'll think about social problems, large and small, differently.
    Note: Includes bibliographical references. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Indianapolis, IN : J. Wiley & Sons
    ISBN: 9781118790823 , 1118790820
    Language: English
    Pages: 1 online resource (1 v.)
    Keywords: Security systems ; Security systems ; Case studies ; Terrorism ; Case studies ; Electronic books ; Electronic books ; local
    Abstract: Up-to-the-minute observations from a world-famous security expert Bruce Schneier is known worldwide as the foremost authority and commentator on every security issue from cyber-terrorism to airport surveillance. This groundbreaking book features more than 160 commentaries on recent events including the Boston Marathon bombing, the NSA's ubiquitous surveillance programs, Chinese cyber-attacks, the privacy of cloud computing, and how to hack the Papal election. Timely as an Internet news report and always insightful, Schneier explains, debunks, and draws lessons from current events that are valuable for security experts and ordinary citizens alike. Bruce Schneier's worldwide reputation as a security guru has earned him more than 250,000 loyal blog and newsletter readers This anthology offers Schneier's observations on some of the most timely security issues of our day, including the Boston Marathon bombing, the NSA's Internet surveillance, ongoing aviation security issues, and Chinese cyber-attacks It features the author's unique take on issues involving crime, terrorism, spying, privacy, voting, security policy and law, travel security, the psychology and economics of security, and much more Previous Schneier books have sold over 500,000 copies Carry On: Sound Advice from Schneier on Security is packed with information and ideas that are of interest to anyone living in today's insecure world.
    Note: Includes bibliographical references. - Description based on online resource; title from title page (Safari, viewed Apr. 8, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...