Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Computer security
  • Virtuelle Realität
  • Computer Science  (102)
Material
Language
  • 1
    Book
    Book
    Lüneburg : meson press
    ISBN: 9783957960436
    Language: English
    Pages: 247 Seiten , Illustrationen , 17.8 cm x 12.7 cm
    Series Statement: Configurations of film
    DDC: 302.23101
    RVK:
    RVK:
    Keywords: Digital-, Video- und New Media-Kunst ; Digitale- oder Internetökonomie ; Film, Kino ; Internet und digitale Medien: Kunst und Performance ; Künstliche Intelligenz ; Medienwissenschaften: Internet, digitale Medien und Gesellschaft ; Robotik ; Soziale Medien / Soziale Netzwerke ; Vernetzte smarte Technologien ; Virtuelle Realität ; Artificial intelligence ; Bodies ; Capitalism ; Embodiment ; Robotics ; Virtual Reality ; Wearables ; aesthetics ; algorithms ; media technologies ; Embodiment ; Neue Medien ; Künstliche Intelligenz ; Virtuelle Realität ; Robotik ; Embodiment ; Neue Medien ; Künstliche Intelligenz ; Virtuelle Realität ; Robotik
    Abstract: How is human embodiment transformed in an age of algorithms? How do post-cinematic media technologies such as AI, VR, and robotics target and re-shape our bodies? Post-Cinematic Bodies grapples with these questions by attending both to mundane devices-such as smartphones, networked exercise machines, and smart watches and other wearables equipped with heartrate sensors-as well as to new media artworks that rework such equipment to reveal to us the ways that our fleshly existences are increasingly up for grabs. Through an equally philosophical and interpretive analysis, the book aims to develop a new aesthetics of embodied experience that is attuned to a new age of predictive technology and metabolic capitalism
    Note: Literaturverzeichnis: Seite 235-242
    URL: Cover  (lizenzpflichtig)
    URL: Inhaltsverzeichnis  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    ISBN: 9783837666762 , 383766676X
    Language: English
    Pages: 210 Seiten , Illustrationen , 22.5 cm x 14.8 cm, 393 g
    Series Statement: Digital society volume 61
    Series Statement: Digital society
    Parallel Title: Erscheint auch als
    Dissertation note: Dissertation Universität Potsdam 2022
    DDC: 302.23101
    RVK:
    RVK:
    RVK:
    Keywords: Leiblichkeit ; Virtuelle Realität ; Medienphilosophie ; Phenomenology ; Post-Phenomenology ; Virtual Reality ; Cognition ; Philosophy of Technology ; Neuro-Phenomenology ; Digitalization ; Aesthetics ; Media Philosophy ; Digital Media ; Media Aesthetics ; Media Studies ; Hochschulschrift ; Hochschulschrift ; Hochschulschrift ; Hochschulschrift ; Virtuelle Realität ; Leiblichkeit ; Medienphilosophie
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Book
    Book
    Marburg : Metropolis-Verlag
    ISBN: 9783731614906 , 3731614901
    Language: German
    Pages: 256 Seiten , Diagramme
    DDC: 303.483
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Benutzerprofil ; Künstliche Intelligenz ; Industrie 4.0 ; Mensch-Maschine-Kommunikation ; Kundenprofil ; Virtuelle Realität ; Technikbewertung ; Kommunalpolitik ; Digitale Revolution ; Big Data ; Industrie 4.0 ; Digitalisierung ; Ecommerce ; Aufsatzsammlung ; Aufsatzsammlung ; Aufsatzsammlung ; Technikbewertung ; Digitale Revolution ; Künstliche Intelligenz ; Mensch-Maschine-Kommunikation ; Virtuelle Realität ; Kommunalpolitik ; Industrie 4.0 ; Kundenprofil ; Benutzerprofil
    Note: Literaturangaben
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Cham :Springer International Publishing, | Cham :Palgrave Macmillan.
    ISBN: 978-3-030-72907-3
    Language: English
    Pages: 1 Online-Ressource (xi, 153 Seiten) : , Illustrationen, Diagramme.
    Parallel Title: Erscheint auch als
    DDC: 601
    RVK:
    RVK:
    RVK:
    Keywords: Philosophy of Technology ; Philosophy ; Virtuelle Realität. ; Einfühlung. ; Ethik. ; Virtuelle Realität ; Einfühlung ; Ethik
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    ISBN: 9783455503982 , 3455503985
    Language: German
    Pages: 479 Seiten , Illustrationen , 20.5 cm x 12.5 cm
    Edition: 1. Auflage
    Uniform Title: Who owns the future?
    DDC: 303.4833
    RVK:
    RVK:
    Keywords: Internet ; Vertrauen ; Datensicherheit ; Kundenzufriedenheit ; Kommerzialisierung ; Virtuelle Realität ; Zukunftsforschung ; New Economy ; Informationsökonomie ; Informationstechnik ; Technikbewertung ; Wissenschaftsethik ; Internetökonomie ; Technischer Fortschritt ; Auswirkung
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Cham : Springer International Publishing | Cham : Palgrave Macmillan
    ISBN: 9783030825478
    Language: English
    Pages: 1 Online-Ressource (XIII, 213 p. 35 illus., 34 illus. in color)
    Edition: 1st ed. 2021
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    DDC: 306.46
    RVK:
    RVK:
    RVK:
    Keywords: Culture and Technology ; Film/TV Technology ; Media and Communication ; Digital/New Media ; Culture ; Technology ; Motion pictures ; Communication ; Digital media ; Neue Medien ; Technologie ; Film ; Virtuelle Realität ; Kommunikation ; Kultur ; Virtuelle Realität ; Kultur ; Technologie ; Film ; Kommunikation ; Neue Medien
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Cambridge, Massachusetts ; London, England : The MIT Press
    ISBN: 9780262361927 , 9780262366250
    Language: English
    Pages: 1 Online-Ressource (188 Seiten) , Illustrationen
    Parallel Title: Erscheint auch als
    DDC: 302.23/1
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Medien ; Erweiterte Realität ; Virtuelle Realität ; Mass media / Technological innovations ; Virtual reality ; Augmented reality ; Virtuelle Realität ; Erweiterte Realität ; Erweiterte Realität ; Medien ; Virtuelle Realität ; Medien
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Oxford : Oxford University Press
    ISBN: 9780191840166
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Oxford handbooks online
    Series Statement: Political Science
    Parallel Title: Erscheint auch als The Oxford handbook of cyber security
    DDC: 005.8
    RVK:
    Keywords: Computer security ; Computer networks Security measures ; Computersicherheit ; Cyberattacke ; Computerkriminalität ; Sicherheitspolitik
    Abstract: 'The Oxford Handbook of Cyber Security' presents forty-eight chapters examining the technological, economic, commercial, and strategic aspects of cyber security, including studies at the international, regional, amd national level.
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Book
    Book
    Jefferson, North Carolina : McFarland & Company, Inc., Publishers
    ISBN: 9781476676869 , 1476676860
    Language: English
    Pages: vii, 225 Seiten , Illustrationen , 26 cm
    Series Statement: Studies in gaming
    Parallel Title: Erscheint auch als
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Gemeinschaft ; Rollenspiel ; Entwickler ; Computerspiel ; Virtuelle Realität ; Fantasy games / Technological innovations ; Video games ; Virtual reality ; Video games ; Virtual reality ; Aufsatzsammlung ; Aufsatzsammlung ; Computerspiel ; Rollenspiel ; Virtuelle Realität ; Gemeinschaft ; Entwickler
    Abstract: ""The Digital Age has created massive technological and disciplinary shifts in tabletop role-playing, increasing the appreciation of games like Dungeons & Dragons. Millions tune in each week to watch and listen to RPG players on podcasts and streaming platforms, while virtual tabletops connect online players across the world. Such shifts elicit new scholarly perspectives from a variety of disciplines. This collection includes essays on the transmedia ecology that has connected analog with digital and audio spaces. Essays explore the boundaries of virtual tabletops and how users engage with a variety of technology to further role-playing. Authors map the growing diversity of the TRPG fandom and detail how players interact with RPG-related podcasts. Interviewed are content creators like Griffin McElroy of The Adventure Zone podcast, Roll20 co-creator Nolan T. Jones, board game designers Nikki Valens and Isaac Childres and fan artists Tracey Alvarez and Alex Schiltz. These essays and interviews expand the academic perspective to reflect the future of role-playing."-Provided by publisher"--
    Description / Table of Contents: Introduction : structure to the stories / Stephanie Hedge and Jennifer Grouling -- Paratextuality and transmediation in D&D board games / Jennifer Grouling -- Gateway game and kickstarted community : an interview with Gloomhaven creator Isaac Childres / Jennifer Grouling -- The quest for more yarn : fiber fictions as transmedia narratives / Shelly Jones -- Cultists, apps and player choice : an interview with Mansions of madness creator Nikki Valens / Jennifer Grouling -- Dungeons and digital affordances and dragons : "extremely online" TRPGs / Stephanie Hedge -- Multi-windowed play commitments : the virtual tabletop role-playing game / Noémie Roques -- The unexpected responsibilities of managing an entire ecosystem : an interview with Roll20 creator Nolan T. Jones / Jennifer Grouling -- Roll20, access and rhetorical agency in digital game spaces / Daniel Lawson and Justin Wigard -- Creating canons in tabletop role-playing games played online / Maria Alberto -- Off the rails : convergence through tabletop role-playing modules / Colin Stricklin -- The adventure zone as transmedia stunt spectacular : an interview with Griffin McElroy / Stephanie Hedge -- The fandom rushes in : multiplicity and the evolution of inclusive storytelling, through fan participation in The adventure zone / Michelle McMullin and Lee W. Hibbard -- The limits of the "infinite imagisphere" : collaborative storytelling and audience participation in The adventure zone podcast / Kira Apple -- "Is it Thursday yet?" : narrative time in a live-streamed tabletop RPG / Emily C. Friedman -- Building on resonances : an interview with TRPG fan artists / Stephanie Hedge -- Conclusion : how do you want to do this? / Stephanie Hedge and Jennifer Grouling
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    ISBN: 978-0-300-23307-0
    Language: English
    Pages: xiv, 271 Seiten.
    DDC: 303.4833
    RVK:
    RVK:
    Keywords: Internet of things ; Internet governance ; Cyberinfrastructure / Security measures ; Computer security ; POLITICAL SCIENCE / Public Policy / Communication Policy ; Internet. ; Internet der Dinge. ; Politische Steuerung. ; Technische Infrastruktur. ; Internet ; Internet der Dinge ; Politische Steuerung ; Technische Infrastruktur
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    Article
    Article
    Show associated volumes/articles
    In:  Museumskunde 84(2019), 1/2, Seite 148-155 | volume:84 | year:2019 | number:1/2 | pages:148-155
    ISSN: 0027-4178
    Language: German
    Pages: Fotografien
    Titel der Quelle: Museumskunde
    Publ. der Quelle: Berlin : Holy-Verlag, 1905
    Angaben zur Quelle: 84(2019), 1/2, Seite 148-155
    Angaben zur Quelle: volume:84
    Angaben zur Quelle: year:2019
    Angaben zur Quelle: number:1/2
    Angaben zur Quelle: pages:148-155
    RVK:
    RVK:
    Keywords: Senckenberg Museum für Naturkunde Görlitz ; Elektronische Medien ; Virtuelle Realität ; Naturkundemuseum ; Neue Medien
    Note: Literaturangaben , Abweichender Titel: Museen im digitalen Zeitalter , Abweichender Titel: museum4punkt0 , Betrifft: Senckenberg Museum für Naturkunde Görlitz, Projekt museum4punkt0, Virtual-Reality-Animation
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    Online Resource
    Online Resource
    Frankfurt am Main :Suhrkamp,
    ISBN: 978-3-518-77178-5
    Language: German
    Pages: 1 Online-Ressource (325 Seiten).
    Edition: 5. Auflage
    Series Statement: Suhrkamp-Taschenbuch Wissenschaft 1379
    Series Statement: Suhrkamp-Taschenbuch Wissenschaft
    Parallel Title: Erscheint auch als
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Computers ; Massamedia ; Virtuele werkelijkheid ; Werkelijkheid ; Werkelijkheidsbeeld ; Medien ; Human-computer interaction ; Virtual reality ; Neue Medien. ; Virtuelle Realität. ; Wirklichkeit. ; Wahrnehmung. ; Verstehen. ; Medien. ; Information. ; Aufsatzsammlung ; Neue Medien ; Virtuelle Realität ; Wirklichkeit ; Wahrnehmung ; Verstehen ; Neue Medien ; Medien ; Neue Medien ; Information
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    Online Resource
    Online Resource
    San Francisco, CA : No Starch Press
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Parallel Title: Erscheint auch als Sweigart, Al Cracking codes with Python
    DDC: 005.8
    RVK:
    Keywords: Data encryption (Computer science) ; Python (Computer program language) ; Computer security ; Hacking ; Electronic books ; Electronic books ; local ; Python ; Python
    Abstract: "Learn how to program in Python while making and breaking ciphers-algorithms used to create and send secret messages! After a crash course in Python programming basics, you'll learn to make, test, and hack programs that encrypt text with classical ciphers like the transposition cipher and Vigenère cipher. You'll begin with simple programs for the reverse and Caesar ciphers and then work your way up to public key cryptography, the type of encryption used to secure today's online transactions, including digital signatures, email, and Bitcoin. Each program includes the full code and a line-by-line explanation of how things work. By the end of the book, you'll have learned how to code in Python and you'll have the clever programs to prove it! You'll also learn how to: • Combine loops, variables, and flow control statements into real working programs• Use dictionary files to instantly detect whether decrypted messages are valid English or gibberish• Create test programs to make sure that your code encrypts and decrypts correctly• Code (and hack!) a working example of the affine cipher, which uses modular arithmetic to encrypt a message• Break ciphers with techniques such as brute-force and frequency analysis There's no better way to learn to code than to play with real programs. Cracking Codes with Python makes the learning fun!"
    Note: Includes index. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    ISBN: 9783455003994 , 3455003990
    Language: German
    Pages: 444 Seiten , Illustrationen , 21 cm
    Edition: 1. Auflage
    Uniform Title: Dawn of the new everything
    Parallel Title: Erscheint auch als Lanier, Jaron, 1960 - Anbruch einer neuen Zeit
    Parallel Title: Erscheint auch als Lanier, Jaron, 1960 - Anbruch einer neuen Zeit
    DDC: 303.4834
    RVK:
    RVK:
    Keywords: Lanier, Jaron ; Virtuelle Realität ; Kommunikationsmedien ; Philosophie ; Virtuelle Realität ; Gesellschaft ; Autobiografie ; Autobiografie ; Lanier, Jaron 1960- ; Technischer Fortschritt ; Virtuelle Realität ; Neue Medien ; Sozialer Wandel ; Virtuelle Realität ; Neue Medien ; Psychologie ; Selbstbild ; Wahrnehmung
    Abstract: Jaron Lanier, Tech-Guru und Vater der Virtual Reality, gibt einen faszinierenden Einblick in sein Leben, die Anfänge des Silicon Valleys, den grossen Traum von der virtuellen Realität, und warum sie in Kürze unser aller Leben grundlegend verändern wird. In einem fesselnden Mix aus Autobiografie, Fachwissen und philosophischen Überlegungen schildert er seinen aussergewöhnlichen Werdegang - von seiner ärmlichen Kindheit als Kind von Holocaust-Überlebenden in der Wüste New Mexicos, über die ersten Schritte in der virtuellen Realität bis hin zu ihren modernen Einsatzmöglichkeiten. Sein neues Buch ist eine visionäre Liebeserklärung an eine Technologie, die ungeahnte Chancen bietet und gleichzeitig ein immenses Missbrauchspotential birgt. Dabei wirft er einen unvergleichlichen Blick darauf, was es im Angesicht unbegrenzter Möglichkeiten heisst, heute Mensch zu sein. (Verlagstext)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    Online Resource
    Online Resource
    Newark : John Wiley & Sons, Incorporated
    ISBN: 9781119433736
    Language: English
    Pages: 1 Online-Ressource (322 pages)
    Edition: 2nd ed
    Parallel Title: Erscheint auch als Hadnagy, Christopher Social Engineering
    DDC: 301
    RVK:
    RVK:
    Keywords: Social engineering ; Social engineering ; Electronic books ; Computer security ; Hackers ; Human-computer interaction ; Social engineering ; Hacking ; Sicherheit ; social-hacking ; Social Engineering ; Social Engineering
    Abstract: Cover -- Title Page -- Copyright -- About the Author -- About the Technical Editor -- Credits -- Acknowledgments -- Contents -- Foreword -- Preface -- 1 A Look into the New World of Professional Social Engineering -- What Has Changed? -- Why Should You Read This Book? -- An Overview of Social Engineering -- The SE Pyramid -- OSINT -- Pretext Development -- Attack Plan -- Attack Launch -- Reporting -- What's in This Book? -- Summary -- 2 Do You See What I See? -- A Real-World Example of Collecting OSINT -- Nontechnical OSINT -- Observational Skills -- Technical Open Source Intelligence -- Two Other Things -- Tools of the Trade -- SET -- IntelTechniques -- FOCA -- Maltego: The Granddaddy of Them All -- Summary -- 3 Profiling People Through Communication -- The Approach -- Enter the DISC -- What Is DISC? -- To Know Thyself Is the Beginning of Wisdom -- Summary -- 4 Becoming Anyone You Want to Be -- The Principles of Pretexting -- Principle One: Thinking Through Your Goals -- Principle Two: Understanding Reality vs. Fiction -- Principle Three: Knowing How Far to Go -- Principle Four: Avoiding Short-Term Memory Loss -- Principle Five: Getting Support for Pretexting -- Principle Six: Executing the Pretext -- Summary -- 5 I Know How to Make You Like Me -- The Tribe Mentality -- Building Rapport as a Social Engineer -- The Moral Molecule -- The 10 Principles of Building Rapport -- The Rapport Machine -- Use the Friends and Family Plan -- Read -- Take Special Note of Failures -- Summary -- 6 Under the Influence -- Principle One: Reciprocity -- Reciprocity in Action -- Using Reciprocity as a Social Engineer -- Principle Two: Obligation -- Obligation in Action -- Using Obligation as a Social Engineer -- Principle Three: Concession -- Concession in Action -- Using Concession as a Social Engineer -- Principle Four: Scarcity -- Scarcity in Action
    Abstract: Using Scarcity as a Social Engineer -- Principle Five: Authority -- Authority in Action -- Using Authority as a Social Engineer -- Principle Six: Consistency and Commitment -- Consistency and Commitment in Action -- Using Commitment and Consistency as a Social Engineer -- Principle Seven: Liking -- Using Liking as a Social Engineer -- Principle Eight: Social Proof -- Social Proof in Action -- Using Social Proof as a Social Engineer -- Influence vs. Manipulation -- Manipulation in Action -- Principles of Manipulation -- Summary -- 7 Building Your Artwork -- The Dynamic Rules of Framing -- Rule 1: Everything You Say Evokes the Frame -- Rule 2: Words T hat Are Defined with the Frame Evoke the Frame -- Rule 3: Negating the Frame -- Rule 4: Causing the Target to T hink About the Frame Reinforces the Frame -- Elicitation -- Ego Appeals -- Mutual Interest -- Deliberate False Statement -- Having Knowledge -- The Use of Questions -- Summary -- 8 I Can See What You Didn't Say -- Nonverbals Are Essential -- All Your Baselines Belong to Us -- Be Careful of Misconceptions -- Know the Basic Rules -- Understand the Basics of Nonverbals -- Comfort vs. Discomfort -- Anger -- Disgust -- Contempt -- Fear -- Surprise -- Sadness -- Happiness -- Summary -- 9 Hacking the Humans -- An Equal Opportunity Victimizer -- The Principles of the Pentest -- Document Everything -- Be Judicious with Pretexts -- Phishing -- Educational Phishing -- Pentest Phishing -- Spear Phishing -- Phishing Summary -- Vishing -- Credential Harvesting -- Vishing for OSINT -- Vishing for Full Compromise -- Vishing Summary -- SMiShing -- Impersonation -- Planning an Impersonation Pentest -- Considerations of Sanitization -- Equipment Procurement -- Impersonation Summary -- Reporting -- Professionalism -- Grammar and Spelling -- All the Details -- Mitigation -- Next Steps
    Abstract: Top Questions for the SE Pentester -- How Can I Get a Job Being a Social Engineer? -- How Do I Get My Clients to Do SE Stuff? -- How Much Should I Charge? -- Summary -- 10 Do You Have a M.A.P.P.? -- Step 1: Learn to Identify Social Engineering Attacks -- Step 2: Develop Actionable and Realistic Policies -- Take the Thinking out of the Policy -- Remove the Ability for Empathy Bypasses -- Make Policies Realistic and Actionable -- Step 3: Perform Regular Real-World Checkups -- Step 4: Implement Applicable Security-Awareness Programs -- Tie It All Together -- Gotta Keep 'Em Updated -- Let the Mistakes of Your Peers Be Your Teacher -- Create a Security Awareness Culture -- Summary -- 11 Now What? -- Soft Skills for Becoming an Social Engineer -- Humility -- Motivation -- Extroverted -- Willingness to Try -- It Really Works! -- Technical Skills -- Education -- Job Prospects -- Start Your Own Company -- Get Hired by a Pentest Company -- Get Hired by a Social Engineering Company -- The Future of Social Engineering -- Index -- EULA
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    ISBN: 9783455004014
    Language: German
    Pages: 1 Online-Ressource (604 ungezählte Seiten) , Illustrationen
    Uniform Title: Dawn of the new everything
    Parallel Title: Erscheint auch als Lanier, Jaron, 1960 - Anbruch einer neuen Zeit
    DDC: 303.4834
    RVK:
    Keywords: Lanier, Jaron ; Virtuelle Realität ; Kommunikationsmedien ; Philosophie ; Virtuelle Realität ; Gesellschaft ; Autobiografie ; Autobiografie ; Autobiografie ; Gesellschaft ; Virtuelle Realität
    URL: Volltext  (Einzellizenz)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    ISBN: 978-0-12-804157-4 , 0-12-804157-9
    Language: English
    Pages: xxvii, 329 Seiten : , Illustrationen ; , 24 cm.
    DDC: 302.23/1
    RVK:
    RVK:
    RVK:
    Keywords: Internet / Social aspects ; Virtual reality / Social aspects ; Self / Social aspects ; Identity (Psychology) ; Gesellschaft ; Virtuelle Realität. ; Identität. ; Aufsatzsammlung ; Aufsatzsammlung ; Aufsatzsammlung ; Aufsatzsammlung ; Virtuelle Realität ; Identität
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    ISBN: 9783958456372 , 3958456375
    Language: German
    Pages: 1 Online-Ressource , illustrations
    Edition: 1. Auflage.
    RVK:
    RVK:
    RVK:
    Keywords: Internet ; Security measures ; Computer security ; Data protection ; Privacy, Right of ; Electronic books ; Electronic books ; local ; Internet ; Personenbezogene Daten ; Privatsphäre ; Datenschutz ; Internet ; Daten ; Anonymität
    Abstract: Ob Sie wollen oder nicht - jede Ihrer Online-Aktivitäten wird beobachtet und analysiert. Sie haben keine Privatsphäre. Im Internet ist jeder Ihrer Klicks für Unternehmen, Regierungen und kriminelle Hacker uneingeschränkt sichtbar. Ihr Computer, Ihr Smartphone, Ihr Auto, Ihre Alarmanlage, ja sogar Ihr Kühlschrank bieten potenzielle Angriffspunkte für den Zugriff auf Ihre Daten. Niemand kennt sich besser aus mit dem Missbrauch persönlicher Daten als Kevin D. Mitnick. Als von der US-Regierung ehemals meistgesuchter Computer-Hacker kennt er alle Schwachstellen und Sicherheitslücken des digitalen Zeitalters. Seine Fallbeispiele sind spannend und erschreckend: Sie werden Ihre Aktivitäten im Internet neu überdenken. Mitnick weiß aber auch, wie Sie Ihre Daten bestmöglich schützen. Er zeigt Ihnen anhand zahlreicher praktischer Tipps und Schritt-für-Schritt-Anleitungen, was Sie tun können, um online und offline anonym zu sein. Bestimmen Sie selbst über Ihre Daten. Lernen Sie, Ihre Privatsphäre im Internet zu schützen. Kevin D. Mitnick zeigt Ihnen, wie es geht. Hinterlassen Sie keine Spuren • Sichere Passwörter festlegen und verwalten • Mit dem Tor-Browser im Internet surfen, ohne Spuren zu hinterlassen • E-Mails und Dateien verschlüsseln und vor fremden Zugriffen schützen • Öffentliches WLAN, WhatsApp, Facebook & Co. sicher nutzen • Sicherheitsrisiken vermeiden bei GPS, Smart-TV, Internet of Things und Heimautomation • Eine zweite Identität anlegen und unsichtbar werden
    Note: Authorized German translation of the English language edition: The art of invisibility : the world's most famous hacker teaches you how to be safe in the age of Big Brother and big data. Cf. Title page verso. - Place of publication from publisher's website. - Includes bibliographical references. - Description based on online resource; title from title page (Safari, viewed January 4, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 19
    Online Resource
    Online Resource
    Cambridge, MA : Syngress, an imprint of Elsevier
    ISBN: 9780128045053 , 0128045051 , 0128044586 , 9780128044582
    Language: English
    Pages: 1 online resource (144 pages) , illustrations
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    DDC: 004.67/8
    RVK:
    RVK:
    Keywords: COMPUTERS / Computer Literacy ; COMPUTERS / Computer Science ; COMPUTERS / Data Processing ; COMPUTERS / Hardware / General ; COMPUTERS / Information Technology ; COMPUTERS / Machine Theory ; COMPUTERS / Reference ; Computer networks / Security measures ; Computer security ; Internet of things ; Internet of things ; Computer networks Security measures ; Computer security ; Internet der Dinge ; Computersicherheit ; Internet der Dinge ; Computersicherheit
    Abstract: "Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge they need to know regarding security in the Internet of Things (IoT). This booming field, moving from strictly research to the marketplace, is advancing rapidly, yet security issues abound. This book explains the fundamental concepts of IoT security, describing practical solutions that account for resource limitations at IoT end-node, hybrid network architecture, communication protocols, and application characteristics. Highlighting the most important potential IoT security risks and threats, the book covers both the general theory and practical implications for people working in security in the Internet of Things. Helps researchers and practitioners understand the security architecture in IoT and the state-of-the-art in IoT security countermeasures ; Explores how the threats in IoT are different from traditional ad hoc or infrastructural networks ; Provides a comprehensive discussion on the security challenges and solutions in RFID, WSNs, and IoT ; Contributed material by Dr. Imed Romdhani"--Provided by publisher
    Note: Includes bibliographical references and index
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 20
    ISBN: 9780128038383 , 0128038381
    Language: English
    Pages: 1 online resource (273 pages) , illustrations
    Series Statement: Syngress advanced topics in information security
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    DDC: 005.8
    RVK:
    RVK:
    Keywords: COMPUTERS / Security / General ; Computer networks / Security measures ; Computer security ; Cyber intelligence (Computer security) ; Computer security ; Computer networks Security measures ; Cyber intelligence (Computer security) ; Informationssystem ; Unternehmen ; Datensicherung ; Computersicherheit ; Rechnernetz ; Rechnernetz ; Computersicherheit ; Datensicherung ; Unternehmen ; Datensicherung ; Informationssystem
    Abstract: "Handbook of System Safety and Security: Cyber Risk and Risk Management, Cyber Security, Adversary Modeling, Threat Analysis, Business of Safety, Functional Safety, Software Systems, and Cyber Physical Systems presents an update on the world's increasing adoption of computer-enabled products and the essential services they provide to our daily lives. The tailoring of these products and services to our personal preferences is expected and made possible by intelligence that is enabled by communication between them. Ensuring that the systems of these connected products operate safely, without creating hazards to us and those around us, is the focus of this book, which presents the central topics of current research and practice in systems safety and security as it relates to applications within transportation, energy, and the medical sciences. Each chapter is authored by one of the leading contributors to the current research and development on the topic.
    Abstract: The perspective of this book is unique, as it takes the two topics, systems safety and systems security, as inextricably intertwined. Each is driven by concern about the hazards associated with a system's performance.
    Abstract: Presents the most current and leading edge research on system safety and security, featuring a panel of top experts in the field Includes several research advancements published for the first time, including the use of 'goal structured notation' together with a 'judgment calculus' and their automation as a 'rule set' to facilitate systems safety and systems security process execution in compliance with existing standards Presents for the first time the latest research in the field with the unique perspective that systems safety and systems security are inextricably intertwined Includes coverage of systems architecture, cyber physical systems, tradeoffs between safety, security, and performance, as well as the current methodologies and technologies and implantation practices for system safety and security"--Provided by publisher
    Note: Includes bibliographical references and index
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 21
    ISBN: 9780128004784 , 9780128000069
    Language: English
    Pages: 1 online resource (xxi, 166 pages)
    Parallel Title: Erscheint auch als Pirc, John Threat forecasting
    DDC: 303.49
    RVK:
    Keywords: Computer security ; Big data Security measures ; Forecasting ; Computer security. ; Big data Security measures. ; Forecasting ; Electronic books ; Big Data ; Computersicherheit
    Abstract: Front Cover -- Threat Forecasting: Leveraging Big Data for Predictive Analysis -- Copyright -- Contents -- About the Authors -- Foreword -- Why Threat Forecasting is Relevant -- What You Will Learn and How You Will Benefit -- Preface -- Book Organization and Structure -- Closing Thoughts -- Acknowledgments -- Chapter 1: Navigating Todays Threat Landscape -- Introduction -- Why Threat Forecasting -- The Effects of a Data Breach -- Barriers to Adopting Threat Forecasting Practices -- Going Beyond Historical Threat Reporting -- Timing -- Generalization -- The State of Regulatory Compliance -- Industry Specific Guidelines -- Healthcare Institutions -- Financial Institutions -- Cyber Security Information Sharing Legislation: Watch this Space -- Best Practices, Standards, and Frameworks -- PCI DSS -- NIST Cyber Security Framework -- Defense in Depth -- Tier 1 Security Technologies -- Tier 2 Security Technologies -- Update and Evaluate Security Products and Technologies -- Cyber Security and the Human Factor -- Today's Information Assurance Needs -- Chapter 2: Threat Forecasting -- Synopsis -- Introduction -- Threat Forecasting -- Dangers of Technology Sprawl -- High Speed Big Data Collection and Surveillance -- Threat Epidemiology -- High Frequency Security Algorithms -- Summary -- Chapter 3: Security Intelligence -- Synopsis -- Introduction -- Security Intelligence -- Information Vetting -- KPIs -- Programs -- Scripts -- Shortcuts -- Other -- Office Macros -- Do It Yourself (DIY) Security Intelligence -- Build -- Buy -- Partner -- Key Indicator Attributes -- Dissemination of Intelligence -- Summary -- Chapter 4: Identifying Knowledge Elements -- Synopsis -- Introduction -- Defining Knowledge Elements -- Intelligence Versus Information -- A Quick Note About the Signal-to-Noise Ratio Metaphor -- A Brief Note on IOCs and IOIs.
    Note: Includes bibliographical references and index , Zielgruppe - Audience: Specialized
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 22
    Online Resource
    Online Resource
    Cambridge, MA : Syngress is an imprint of Elsevier
    ISBN: 9780128033357 , 0128033355 , 012803291X , 9780128032916
    Language: English
    Pages: 1 online resource
    Edition: Second edition
    Parallel Title: Erscheint auch als
    DDC: 364.16/8
    RVK:
    Keywords: Microsoft Windows (Computer file) ; Microsoft Windows (Computer file) ; SOCIAL SCIENCE / Criminology ; Component software ; Computer networks / Security measures ; Computer security ; Operating systems (Computers) ; Operating systems (Computers) ; Computer crimes Investigation ; Methodology ; Computer networks Security measures ; Computer security ; Component software ; Datensicherung ; Computerkriminalität ; Rechnernetz ; Computerforensik ; Datensicherung ; Rechnernetz ; Computerforensik ; Computerkriminalität
    Abstract: Harlan Carvey brings readers an advanced book on Windows Registry. The first book of its kind EVER -- Windows Registry Forensics provides the background of the Registry to help develop an understanding of the binary structure of Registry hive files. Approaches to live response and analysis are included, and tools and techniques for postmortem analysis are discussed at length. Tools and techniques will be presented that take the analyst beyond the current use of viewers and into real analysis of data contained in the Registry. Named a 2011 Best Digital Forens
    Note: Includes index
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 23
    Online Resource
    Online Resource
    Cambridge, MA : Syngress is an imprint of Elsevier
    ISBN: 9780128004784 , 0128004789 , 0128000066 , 9780128000069
    Language: English
    Pages: 1 online resource
    Parallel Title: Erscheint auch als
    DDC: 005.8
    RVK:
    Keywords: COMPUTERS / Security / Networking ; Big data ; Computer security ; Computer security ; Big data ; Computersicherheit ; Bedrohung ; Big Data ; Prognose ; Computersicherheit ; Big Data ; Bedrohung ; Prognose
    Abstract: This book discusses the danger of using historic data as the basis for predicting future breaches, how to use security intelligence as a tool to develop threat forecasting techniques, and how to use threat data visualization techniques and threat simulation tools
    Note: Includes index , Includes bibliographical references and index
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 24
    ISBN: 9781137400529
    Language: English
    Pages: 1 Online-Ressource (XIII, 222 Seiten)
    Edition: Springer eBook Collection. Political Science and International Studies
    Series Statement: New security challenges series
    Parallel Title: Erscheint auch als Christou, George, 1973 - Cybersecurity in the European Union
    DDC: 005.8
    RVK:
    RVK:
    Keywords: Computer science ; Political science ; European Union ; International relations ; Politics and war ; Computer security ; Computer science ; Political science ; European Union ; International relations ; Politics and war ; Computer security ; Außenpolitik ; Politische Wissenschaft ; Computersicherheit ; Europäische Union ; Internet ; Internetkriminalität ; Politik ; Sicherheit
    Abstract: Cybercrime affects over 1 million people worldwide a day, and cyber attacks on public institutions and businesses are increasing. This book interrogates the European Union's evolving cybersecurity policies and strategy and argues that while progress is being made, much remains to be done to ensure a secure and resilient cyberspace in the future.
    Abstract: Cybercrime affects over 1 million people worldwide a day, and cyber attacks on public institutions and businesses are increasing. This book interrogates the European Union's evolving cybersecurity policies and strategy and argues that while progress is being made, much remains to be done to ensure a secure and resilient cyberspace in the future
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 25
    Online Resource
    Online Resource
    Bielefeld : transcript Verlag
    ISBN: 9783837635591 , 9783839435595
    Language: German
    Pages: 1 Online-Ressource (1 electronic resource (368 p.))
    Parallel Title: Erscheint auch als Bareither, Christoph, 1982 - Gewalt im Computerspiel
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Kultur und soziale Praxis ; Media studies ; Virtuelle Realität ; Gewalt ; Computerspiel
    Abstract: Grand Theft Auto, Battlefield, Counterstrike ? more and more, violence in computer games is becoming the subject of heated discussion. But what emotional experiences does the playful use of virtual violence make possible? Through participato observation in online games and at LAN parties and analyses of interviews, magazines, and videos, Christopher Bareither presents in detail how millions of people can take pleasure from that which would shock others. By refraining from judgmental cliches, this ethnographic study is able to provide a decisive contribution to a debate at the crossroads of popular culture, politics, and the public sphere
    Abstract: Grand Theft Auto, Battlefield, Counter-Strike ? Gewalt in Computerspielen wird immer wieder kontrovers diskutiert. Doch welche emotionalen Erfahrungen ermöglicht der spielerische Umgang mit virtueller Gewalt? Durch teilnehmende Beobachtungen in Online-Games und auf LAN-Partys sowie mithilfe von Interview-, Zeitschriften- und Videoanalysen arbeitet Christoph Bareither heraus, wie Millionen von Menschen etwas als vergnüglich erleben können, was andere schockiert. Ohne wertende Klischees zu bedienen, leistet die ethnografische Studie damit einen entscheidenden Beitrag zu einer Debatte am Schnittfeld von Populärkultur, Politik und Öffentlichkeit
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 26
    ISBN: 9781317553700 , 1317553705
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Series Statement: Routledge studies in innovation, organization and technology 41
    Parallel Title: Erscheint auch als
    DDC: 658.4/78
    RVK:
    Keywords: Data protection ; Computer security ; Management information systems ; Security measures ; Computer networks ; Security measures ; Electronic books ; local ; Electronic books
    Abstract: As retail businesses migrate to the digital realm, internal information theft incidents continue to threaten on-line and off-line retail operations. The evolving propagation of internal information theft has surpassed the traditional techniques of crime prevention practices. Many business organizations search for internal information theft prevention guides that fit into their retail business operation, only to be inundated with generic and theoretical models. This book examines applicable methods for retail businesses to effectively prevent internal information theft. Information Theft Prevention offers readers a comprehensive understanding of the current status of the retail sector information theft prevention models in relation to the internationally recognized benchmark of information security. It presents simple and effective management processes for ensuring better information system security, fostering a proactive approach to internal information theft prevention. Furthermore, it builds on well-defined retail business cases to identify applicable solutions for businesses today. Integrating the retail business operations and information system security practices, the book identifies ways to coordinate efforts across a business in order to achieve the best results. IT security managers and professionals, financial frauds consultants, cyber security professionals and crime prevention professionals will find this book a valuable resource for identifying and creating tools to prevent internal information theft.
    Note: Includes bibliographical references and index. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 27
    ISBN: 9780124201842 , 0124201849
    Language: English
    Pages: 1 online resource (xix, 439 pages) , illustrations
    Edition: Second edition
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    DDC: 670.42/7
    RVK:
    Keywords: TECHNOLOGY & ENGINEERING / Industrial Engineering ; TECHNOLOGY & ENGINEERING / Industrial Technology ; TECHNOLOGY & ENGINEERING / Manufacturing ; TECHNOLOGY & ENGINEERING / Technical & Manufacturing Industries & Trades ; Computer security ; Corporate Network ; Computersicherheit ; Intelligentes Stromnetz ; SCADA / Programm ; Process control Security measures ; Computer security ; Intelligentes Stromnetz ; Computersicherheit ; SCADA ; Corporate Network ; Computersicherheit ; Corporate Network ; Intelligentes Stromnetz ; SCADA
    Abstract: Annotation
    Note: Previous edition: 2011 , Includes bibliographical references and index
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 28
    Online Resource
    Online Resource
    Waltham, MA : Syngress
    ISBN: 9780128010969 , 0128010967 , 0128008997 , 9780128008997
    Language: English
    Pages: 1 online resource (xvii, 262 pages) , illustrations
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    DDC: 363.28/9
    RVK:
    Keywords: HISTORY / Military / Other ; TECHNOLOGY & ENGINEERING / Military Science ; Computer security ; Private security services / Management ; Security systems / Management ; Computer Security ; Computer security ; Private security services Management ; Security systems Management ; Computersicherheit ; Unternehmen ; Unternehmen ; Computersicherheit
    Abstract: Do you know what weapons are used to protect against cyber warfare and what tools to use to minimize their impact? How can you gather intelligence that will allow you to configure your system to ward off attacks? Organizations need to be committed to defending their own assets and their customers' information. This book will show you how to develop the organization, infrastructure, and capabilities to protect your company and your customers effectively, efficiently, and discreetly. It explains how to develop and build a security operations center; shows how to gather invaluable intelligence to protect your organization; helps you evaluate the pros and cons behind each decision during the SOC-building process. --
    Note: Includes index
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 29
    ISBN: 9780128005064 , 0128005068
    Language: English
    Pages: 1 online resource (xv, 166 pages) , illustrations
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    DDC: 005.8
    RVK:
    Keywords: COMPUTERS / Internet / Security ; COMPUTERS / Networking / Security ; COMPUTERS / Security / General ; Computer security ; Information resources management / Security measures ; Computer security ; Information resources management Security measures ; Big data Security measures ; Big Data ; Datensicherung ; Big Data ; Datensicherung
    Abstract: The authors bring a wealth of analytics experience to demonstrate practical, hands-on techniques through case studies and using freely-available tools that will allow you to find anomalies and outliers by combining disparate data sets. They also teach you everything you need to know about threat simulation techniques and how to use analytics as a powerful decision-making tool to assess security control and process requirements within your organization. Ultimately, you will learn how to use these simulation techniques to help predict and profile potential risks to your organization. --
    Note: Includes bibliographical references and index
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 30
    ISBN: 9789042021099 , 9789004302303 , 9042021098
    Language: English
    Pages: 242 Seiten , Ill.
    Series Statement: Critical posthumanisms volume 1
    Series Statement: Critical posthumanisms
    DDC: 111
    RVK:
    Keywords: Virtual reality ; Reality ; Technology Philosophy ; Human-computer interaction ; Narration (Rhetoric) ; Psychoanalysis ; Genetic engineering ; Biotechnology ; Globalization Social aspects ; Art Philosophy ; Aufsatzsammlung ; Virtuelle Realität ; Ästhetik ; Diskurs
    Abstract: Is virtual reality the latest grand narrative that humanity has produced? This book attempts to disentangle the common characteristics of human reality and posthuman virtual reality by examining discourses on psychoanalysis, gene-technology, globalization, and contemporary art
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 31
    Book
    Book
    New York, NY [u.a.] :Bloomsbury,
    ISBN: 978-1-4411-7531-1
    Language: English
    Pages: VI, 204 S.
    Edition: 1. ed.
    DDC: 006.8
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Gesellschaft ; Virtual reality in mass media ; Mass media and technology ; Virtual reality Social aspects ; Virtuelle Realität. ; Medien. ; Virtuelle Realität ; Medien
    Note: Includes bibliographical references and index. - Includes filmography
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 32
    Book
    Book
    New York ; London ; Oxford ; New Delhi ; Sydney :Bloomsbury Academic,
    ISBN: 978-1-6235-6632-6 , 978-1-5013-1829-0
    Language: English
    Pages: 184 Seiten : , Illustrationen.
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    DDC: 794.8083
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: SOCIAL SCIENCE / Media Studies ; EDUCATION / Non-Formal Education ; Gesellschaft ; Video games Social aspects ; Virtual reality ; Play environments ; SOCIAL SCIENCE / Media Studies ; EDUCATION / Non-Formal Education ; Kind. ; Spiel. ; Alltag. ; Neue Medien. ; Computerspiel. ; Online-Spiel. ; Medienpädagogik. ; Virtuelle Realität. ; Kind ; Spiel ; Alltag ; Neue Medien ; Kind ; Computerspiel ; Online-Spiel ; Kind ; Computerspiel ; Medienpädagogik ; Virtuelle Realität
    Abstract: "Game studies is a rapidly developing field across the world, with a growing number of dedicated courses addressing video games and digital play as significant phenomena in contemporary everyday life and media cultures. Seth Giddings looks to fill a gap by focusing on the relationship between the actual and virtual worlds of play in everyday life. He addresses both the continuities and differences between digital play and longer-established modes of play. The 'gameworlds' title indicates both the virtual world designed into the videogame and the wider environments in which play is manifested: social relationships between players; hardware and software; between the virtual worlds of the game and the media universes they extend (e.g. Poke;mon, Harry Potter, Lego, Star Wars); and the gameworlds generated by children's imaginations and creativity (through talk and role-play, drawings and outdoor play). The gameworld raises questions about who, and what, is in play. Drawing on recent theoretical work in science and technology studies, games studies and new media studies, a key theme is the material and embodied character of these gameworlds and their components (players' bodies, computer hardware, toys, virtual physics, and the physical environment). Building on detailed small-scale ethnographic case studies, Gameworlds is the first book to explore the nature of play in the virtual worlds of video games and how this play relates to, and crosses over into, everyday play in the actual world"..
    Note: Includes bibliographical references and index
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 33
    ISBN: 9783763267255
    Language: German
    Pages: 479 S. , graph. Darst. , 22 cm
    Uniform Title: Who owns the future? 〈dt.〉
    DDC: 303.4833
    RVK:
    RVK:
    Keywords: Internet ; Vertrauen ; Datensicherheit ; Kundenzufriedenheit ; Kommerzialisierung ; Virtuelle Realität ; Zukunftsforschung ; New Economy ; Informationsökonomie ; Informationstechnik ; Technikbewertung
    Note: Lizenzausg. - Literaturangaben
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 34
    Language: German
    Pages: Online-Ressource
    Series Statement: DIVSI Studie
    Parallel Title: Druckausg. DIVSI - Deutsches Institut für Vertrauen und Sicherheit im Internet DIVSI U25-Studie
    DDC: 302.231083
    RVK:
    RVK:
    RVK:
    Keywords: Computer crimes Prevention ; Computer security ; Internet (Computer network) ; Internet ; Neue Medien ; Kind ; Jugend ; Erwachsener ; Sozialisation
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 35
    ISBN: 9780124170407
    Language: English
    Pages: XIX, 222 S. , zahlr. Ill.
    DDC: 305.8
    RVK:
    Keywords: Information technology Security measures ; Information technology Management ; Cloud computing ; Computer security ; Computer crimes Prevention ; Cloud Computing ; Möglichkeit ; Risiko
    Abstract: "It may seem a strange place to start, but a good beginning here is the Boston Marathon bombings in April, 2013 and the days that followed. In particular, the Friday when officials shut down the city of Boston and neighboring communities. Businesses all over the city were forced to shut down while the manhunt took place over the course of the day on Friday. While retail establishments were really out of luck because no one on the streets meant no one in the stores, other businesses were able to continue to operate because of a number of technologies that allowed remote workers to get access to their files, the systems they needed and their phone systems. Any business that implemented a full Unified Communications (UC) solution could have employees also communicating with instant messaging and know who was on-line because of the presence capabilities. Additionally, news of the events spread quickly and less because of news outlets who were, quite rightly, not allowed to provide specifics about many of the activities"--
    Description / Table of Contents: Machine generated contents note: 1. The Evolving Nature of Information Management Security 2. Cloud Computing 3. Software as a Service 4. Storage in the Cloud 5. Virtual Servers and Platform as a Service 6. Social Media 7. Mobile Computing 8. Unified Communications 9. Remote Workers 10. Risk Management and Policy Considerations 11. Future Technology 12. Pulling it all Together
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 36
    ISBN: 130645199X , 9781118608654 , 9781306451994
    Language: English
    Pages: Online-Ressource (224 pages)
    Parallel Title: Druckausg.
    Parallel Title: Druckausg. Hadnagy, Christopher Unmasking the social engineer
    DDC: 303.3/72
    RVK:
    Keywords: Christian sociology ; Social problems ; Computer hackers ; Computer security ; Social engineering ; Christian sociology ; Social problems ; Electronic books ; Electronic books ; Soziologie ; Körpersprache ; Datenschutz ; Soziologie ; Körpersprache ; Datenschutz
    Abstract: Learn to identify the social engineer by non-verbal behavior Unmasking the Social Engineer: The Human Element of Security focuses on combining the science of understanding non-verbal communications with the knowledge of how social engineers, scam artists and con men use these skills to build feelings of trust and rapport in their targets. The author helps readers understand how to identify and detect social engineers and scammers by analyzing their non-verbal behavior. Unmasking the Social Engineer shows how attacks work, explains nonverbal communications, and demonstrates with visuals the connection of non-verbal behavior to social engineering and scamming. Clearly combines both the practical and technical aspects of social engineering securityReveals the various dirty tricks that scammers usePinpoints what to look for on the nonverbal side to detect the social engineer Sharing proven scientific methodology for reading, understanding, and deciphering non-verbal communications, Unmasking the Social Engineer arms readers with the knowledge needed to help protect their organizations.
    Abstract: Cover -- Title Page -- Copyright -- Contents -- Foreword -- Acknowledgments and Preface -- Introduction -- The Scholar and the Student -- Using This Book as a Social Engineer -- Part I Building the Foundation -- Chapter 1 What Is Nonverbal Communication? -- The Different Aspects of Nonverbal Communication -- Kinesics -- Proxemics -- Touch -- Eye Contact -- Olfactics -- Adornment -- Facial Expressions -- How to Use This Information -- Summary -- Chapter 2 What Is Social Engineering? -- Information Gathering -- Pretexting -- Elicitation -- Rapport -- Influence/Manipulation -- Framing -- Nonverbal Communications -- The Three Basic Forms of Social Engineering -- Become Phishers of Men -- When The Phone Is More Dangerous Than Malware -- I Am Not the Social Engineer You Are Looking For -- Using Social Engineering Skills -- The Good -- The Bad -- The Ugly -- Summary -- Part II Decoding the Language of the Body -- Chapter 3 Understanding the Language of the Hands -- Communicating with Your Hands -- Origin -- Coding -- Usage -- High-Confidence Hand Displays -- Low-Confidence and Stress Hand Displays -- Getting a Handle on the Hands -- Summary -- Chapter 4 The Torso, Legs, and Feet -- Legs and Feet -- Torso and Arms -- Summary -- Chapter 5 The Science Behind the Face -- Just the FACS -- What Is a Truth Wizard? -- Emotions versus Feelings -- Fear -- Surprise -- Sadness -- Contempt -- Disgust -- Anger -- Happiness -- Perfect Practice Makes Perfect -- Summary -- Chapter 6 Understanding Nonverbal Displays of Comfort and Discomfort -- Neck and Face Pacifying -- What to Watch For -- Mouth Covers -- What to Watch For -- Lips -- What to Watch For -- Eye Blocking -- What to Watch For -- Self-Comforting and Head Tilts -- What to Watch For -- Summary -- Part III Deciphering the Science -- Chapter 7 The Human Emotional Processor -- Introducing the Amygdala.
    Description / Table of Contents: Cover; Title Page; Copyright; Contents; Foreword; Acknowledgments and Preface; Introduction; The Scholar and the Student; Using This Book as a Social Engineer; Part I Building the Foundation; Chapter 1 What Is Nonverbal Communication?; The Different Aspects of Nonverbal Communication; Kinesics; Proxemics; Touch; Eye Contact; Olfactics; Adornment; Facial Expressions; How to Use This Information; Summary; Chapter 2 What Is Social Engineering?; Information Gathering; Pretexting; Elicitation; Rapport; Influence/Manipulation; Framing; Nonverbal Communications
    Description / Table of Contents: The Three Basic Forms of Social EngineeringBecome Phishers of Men; When The Phone Is More Dangerous Than Malware; I Am Not the Social Engineer You Are Looking For; Using Social Engineering Skills; The Good; The Bad; The Ugly; Summary; Part II Decoding the Language of the Body; Chapter 3 Understanding the Language of the Hands; Communicating with Your Hands; Origin; Coding; Usage; High-Confidence Hand Displays; Low-Confidence and Stress Hand Displays; Getting a Handle on the Hands; Summary; Chapter 4 The Torso, Legs, and Feet; Legs and Feet; Torso and Arms; Summary
    Description / Table of Contents: Chapter 5 The Science Behind the FaceJust the FACS; What Is a Truth Wizard?; Emotions versus Feelings; Fear; Surprise; Sadness; Contempt; Disgust; Anger; Happiness; Perfect Practice Makes Perfect; Summary; Chapter 6 Understanding Nonverbal Displays of Comfort and Discomfort; Neck and Face Pacifying; What to Watch For; Mouth Covers; What to Watch For; Lips; What to Watch For; Eye Blocking; What to Watch For; Self-Comforting and Head Tilts; What to Watch For; Summary; Part III Deciphering the Science; Chapter 7 The Human Emotional Processor; Introducing the Amygdala
    Description / Table of Contents: How the Amygdala Processes InformationHijacking the Amygdala; Human See, Human Do; Reading Other People's Expressions; Your Own Emotional Content; Nonverbal Social Proof; Using Amygdala Hijacking as a Social Engineer; Summary; Chapter 8 The Nonverbal Side of Elicitation; Artificial Time Constraints; Sympathy/Assistance Themes; Ego Suspension; Ask How, When, and Why Questions; Conversational Signals; Action Unit 1: Inner Brow Raiser; Action Unit 2: Outer Brow Raiser; Action Unit 4: Brow Lowerer; Conversational Signals of Emotions; Breaking Down Conversational Signals; Batons; Underliner
    Description / Table of Contents: PunctuationQuestion Mark; Word Search; Nonverbal Conversational Signals; Conversational Signals as a Social Engineer; Summary; Part IV Putting It All Together; Chapter 9 Nonverbal Communication and the Human Being; Applying This Information as a Professional Social Engineer; Using This Book to Defend; Becoming a Critical Thinker; Summary; Index
    Note: Description based upon print version of record
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 37
    ISBN: 9783662434017 , 3662434016 , 9783662434024
    Language: German
    Pages: VI, 310 S. , Ill. , 190 mm x 127 mm
    Series Statement: Sachbuch
    DDC: 303.4833
    RVK:
    RVK:
    Keywords: Soziale Identität ; Computerunterstützte Kommunikation ; Virtuelle Realität ; Neue Medien ; Internet ; Ambivalenz ; Alltag ; Soziales Netzwerk ; Nutzung ; App ; Alltag ; Neue Medien ; Nutzung ; Ambivalenz ; App ; Soziales Netzwerk ; Soziale Identität ; Virtuelle Realität ; Computerunterstützte Kommunikation ; Internet
    URL: Cover
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 38
    ISBN: 9780739164778 , 9780739184585
    Language: English
    Pages: x, 235 Seiten
    Edition: First paperback edition
    DDC: 302.2301
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Aufsatzsammlung ; Massenmedien ; Virtuelle Realität ; Wirklichkeit ; Simulation
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 39
    ISBN: 9781597499644 , 1597499641
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Parallel Title: Erscheint auch als
    DDC: 005.13/3
    RVK:
    Keywords: Python (Computer program language) ; Computer security ; Computer networks ; Security measures ; Electronic books ; local ; Electronic books
    Abstract: Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker's tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine popular social media websites and evade modern anti-virus. Demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts Write code to intercept and analyze network traffic using Python. Craft and spoof wireless frames to attack wireless and Bluetooth devices Data-mine popular social media websites and evade modern anti-virus
    Note: Includes bibliographical references and index. - Description based on online resource; title from PDF title page (Safari, viewed Jan. 24, 2013)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 40
    Language: English
    Pages: IV, 234 S. , Ill., graph. Darst.
    Dissertation note: Augsburg, Univ., Diss., 2012
    DDC: 303.4820286
    RVK:
    RVK:
    RVK:
    Keywords: Hochschulschrift ; Virtuelle Realität ; Computeranimation ; Verhaltensmuster ; Kulturelle Identität
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 41
    Language: English
    Pages: IV, 234 S. , Ill., graph. Darst.
    Parallel Title: Erscheint auch als
    Dissertation note: Augsburg, Univ., Diss., 2012
    DDC: 303.4820286
    RVK:
    RVK:
    RVK:
    Keywords: Informatik ; Computersimulation ; Virtuelle Realität ; Kulturkontakt ; Verhaltensmuster ; Computeranimation ; Kulturelle Identität ; Künstliche Intelligenz ; Hochschulschrift ; Virtuelle Realität ; Computeranimation ; Verhaltensmuster ; Kulturelle Identität ; Informatik ; Künstliche Intelligenz ; Computersimulation ; Kulturkontakt
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 42
    Language: English
    Pages: IV, 234 S. , Ill., graph. Darst.
    Parallel Title: Erscheint auch als
    Dissertation note: Augsburg, Univ., Diss., 2012
    DDC: 303.4820286
    RVK:
    RVK:
    RVK:
    Keywords: Informatik ; Computersimulation ; Virtuelle Realität ; Kulturkontakt ; Verhaltensmuster ; Computeranimation ; Kulturelle Identität ; Künstliche Intelligenz ; Hochschulschrift ; Virtuelle Realität ; Computeranimation ; Verhaltensmuster ; Kulturelle Identität ; Informatik ; Künstliche Intelligenz ; Computersimulation ; Kulturkontakt
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 43
    Language: English
    Pages: IV, 234 S. , Ill., graph. Darst.
    Parallel Title: Erscheint auch als
    Dissertation note: Augsburg, Univ., Diss., 2012
    DDC: 303.4820286
    RVK:
    RVK:
    RVK:
    Keywords: Informatik ; Computersimulation ; Virtuelle Realität ; Kulturkontakt ; Verhaltensmuster ; Computeranimation ; Kulturelle Identität ; Künstliche Intelligenz ; Hochschulschrift ; Virtuelle Realität ; Computeranimation ; Verhaltensmuster ; Kulturelle Identität ; Informatik ; Künstliche Intelligenz ; Computersimulation ; Kulturkontakt
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 44
    ISBN: 978-3-531-18349-7 , 3-531-18349-4
    Language: German
    Pages: 117 S. ; , 21 cm.
    Edition: 1. Aufl.
    DDC: 302.2310922
    RVK:
    RVK:
    RVK:
    Keywords: Bühl, Achim ; Faßler, Manfred ; Rammert, Werner ; Soziologische Theorie. ; Informationstechnik. ; Virtuelle Realität. ; 1956- Bühl, Achim ; 1949-2021 Faßler, Manfred ; 1949- Rammert, Werner ; Soziologische Theorie ; Informationstechnik ; Virtuelle Realität
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 45
    Online Resource
    Online Resource
    San Francisco : No Starch Press
    Language: English
    Pages: 1 online resource (xix, 299 p.) , ill.
    Parallel Title: Erscheint auch als
    DDC: 005.8
    RVK:
    RVK:
    Keywords: Computer networks ; Security measures ; Browsers (Computer programs) ; Computer security ; Electronic books ; Electronic books ; local
    Abstract: In The Tangled Web , Michal Zalewski, one of the world's top browser security experts, offers a compelling narrative that explains exactly how browsers work and why they're fundamentally insecure. Rather than dispense simplistic advice on vulnerabilities, Zalewski examines the entire browser security model, revealing weak points and providing crucial information for shoring up web application security.
    Note: Includes bibliographical references and index. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 46
    Language: English
    Pages: 1 online resource (xxvi, 716 p.) , ill.
    Parallel Title: Erscheint auch als
    DDC: 005.8
    RVK:
    Keywords: Malware (Computer software) ; Computer security ; Electronic books ; lcgft ; Electronic books ; local
    Abstract: A computer forensics "how-to" for fighting malicious code and analyzing incidents With our ever-increasing reliance on computers comes an ever-growing risk of malware. Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses, worms, spyware, rootkits, adware, and other invasive software. Written by well-known malware experts, this guide reveals solutions to numerous problems and includes a DVD of custom programs and tools that illustrate the concepts, enhancing your skills. Security professionals face a constant battle against malicious software; this practical manual will improve your analytical capabilities and provide dozens of valuable and innovative solutions Covers classifying malware, packing and unpacking, dynamic malware analysis, decoding and decrypting, rootkit detection, memory forensics, open source malware research, and much more Includes generous amounts of source code in C, Python, and Perl to extend your favorite tools or build new ones, and custom programs on the DVD to demonstrate the solutions Malware Analyst's Cookbook is indispensible to IT security administrators, incident responders, forensic analysts, and malware researchers.
    Note: Includes index. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 47
    Book
    Book
    München [u.a.] : Fink
    ISBN: 9783770552542 , 3770552547
    Language: German , English
    Pages: 232 S. , Ill., graph. Darst., Kt.
    Series Statement: PerceptionLab 1
    Series Statement: PerceptionLab
    DDC: 302.231
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Virtuelle Realität ; Hochschulschrift ; Konferenzschrift 2010 ; Hochschulschrift ; Konferenzschrift 2010 ; Konferenzschrift 2010 ; Hochschulschrift ; Konferenzschrift 2010 ; Virtuelle Realität
    Note: Beitr. teilw. dt., teilw. engl.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 48
    Book
    Book
    Chichester [u.a.] :Wiley-Blackwell,
    ISBN: 978-1-405-18167-9 , 978-1-405-18166-2
    Language: English
    Pages: VII, 216 S.
    Edition: 1. publ.
    DDC: 303.48/33
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Computers and civilization ; Cyberspace - Social aspects ; Information society ; Internet - Social aspects ; Gesellschaft ; Cyberspace Social aspects ; Internet Social aspects ; Computers and civilization ; Information society ; Neue Medien. ; Cyberspace. ; Virtuelle Realität. ; Informationsgesellschaft. ; Internet. ; Geschlechterrolle. ; Einführung ; Einführung ; Einführung ; Einführung ; Neue Medien ; Cyberspace ; Virtuelle Realität ; Neue Medien ; Cyberspace ; Virtuelle Realität ; Cyberspace ; Neue Medien ; Informationsgesellschaft ; Internet ; Geschlechterrolle
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 49
    Online Resource
    Online Resource
    Berkeley : University of California Press
    ISBN: 0520258983 , 0520258991 , 0520944844 , 1282359967 , 9780520258983 , 9780520258990 , 9780520944848 , 9781282359963
    Language: English
    Pages: 1 Online-Ressource (xii, 246 pages) , illustrations
    Edition: Online-Ausg. [S.l.] HathiTrust Digital Library Electronic reproduction
    Parallel Title: Erscheint auch als Dyson, Frances Sounding new media
    DDC: 302.23
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Virtual reality Philosophy ; Sounds ; Virtuelle Realität ; Aufsatzsammlung ; Virtual reality ; Philosophy ; Sounds ; Aufsatzsammlung ; Mixed media ; Klang ; Kultur ; Mixed media ; Kultur
    Abstract: "Examines the long-neglected role of sound and audio in the development of a new media theory and practice, including new technologies and performance art events, with particular emphasis on embodiment, art, and technological interactions ... focusing on technologies that became available in the mid-twentieth century--electronics, imaging, and digital and computer processing
    Abstract: Ethereal transmissions : the "tele" of phōnē -- Celestial telegraphies -- Aural objects, recording devices, and the proximate apparatus -- Death, silence, and the tape recorder -- Immersion -- Embodying technology : from sound effect to body effect -- Atmospheres
    Note: Includes bibliographical references and index , Use copy Restrictions unspecified star MiAaHDL , Electronic reproduction , Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 50
    Book
    Book
    Princeton, N.J. [u.a.] : Princeton Univ. Press
    ISBN: 9780691146270 , 0691146276
    Language: English
    Pages: XIII, 316 S. , Ill.
    DDC: 305.8
    RVK:
    RVK:
    RVK:
    Keywords: Ethnology ; Computer network resources ; Ethnology ; Interactive multimedia ; Ethnology ; Fieldwork ; Internet ; Virtual reality ; Second Life (Game) ; Second Life ; Virtuelle Realität ; Internet ; Feldforschung ; Anthropologie
    Note: Literatuverz. S. [271] - 301 , Originally published: 2008
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 51
    ISBN: 9783642166389
    Language: English
    Pages: Online-Ressource (XIII, 302 S.)
    Edition: Online-Ausg. 2010 Springer eBook collection. Computer science Electronic reproduction; Available via World Wide Web
    Series Statement: Lecture notes in computer science 6432
    Series Statement: Lecture notes in computer science
    Parallel Title: Druckausg. Interactive storytelling
    DDC: 006.7
    RVK:
    Keywords: Computer science ; Information systems ; Education ; Arts ; Konferenzschrift ; Interaktive Medien ; Virtuelle Realität ; Erzählen ; Softwareplattform ; Drama ; Immersion ; Charakter ; Agent ; Rollenspiel ; Autorensystem
    Note: Literaturangaben , Electronic reproduction; Available via World Wide Web
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 52
    Language: English
    Pages: 1 online resource (xxvi, 358 p.) , ill.
    Parallel Title: Erscheint auch als
    DDC: 005.8
    RVK:
    RVK:
    RVK:
    Keywords: Cloud computing ; Security measures ; Computer security ; Electronic books ; local
    Abstract: "Cloud computing allows for both large and small organizations to have the opportunity to use Internet-based services so that they can reduce start-up costs, lower capital expenditures, use services on a pay-as-you-use basis, access applications only as needed, and quickly reduce or increase capacities. However, these benefits are accompanied by a myriad of security issues, and this valuable book tackles the most common security challenges that cloud computing faces. The authors offer you years of unparalleled expertise and knowledge as they discuss the extremely challenging topics of data ownership, privacy protections, data mobility, quality of service and service levels, bandwidth costs, data protection, and support"--Resource description page.
    Note: Description based on print version record. - Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 53
    ISBN: 9783828204898
    Language: German
    Pages: VIII, 350 S. , Ill., graph. Darst. , 23 cm
    Series Statement: Qualitative Soziologie 11
    Series Statement: Qualitative Soziologie
    Dissertation note: Zugl.: Klagenfurt, Univ., Diss., 2008
    DDC: 302.231
    RVK:
    RVK:
    RVK:
    Keywords: Agent ; Benutzer ; Interaktionsritual ; Virtuelle Realität ; Hochschulschrift ; Hochschulschrift ; Hochschulschrift ; Virtuelle Realität ; Agent ; Benutzer ; Interaktionsritual
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 54
    Online Resource
    Online Resource
    Indianapolis, Ind. : Wiley
    Language: English
    Pages: 1 online resource (xxv, 309 p.) , ill.
    Series Statement: Wrox professional guides
    Parallel Title: Erscheint auch als
    DDC: 005.268
    RVK:
    Keywords: Mac OS ; Cocoa (Application development environment) ; Object-oriented programming (Computer science) ; Computer security ; Electronic books ; local
    Abstract: The first comprehensive security resource for Mac and iPhone developers The Mac platform is legendary for security, but consequently, Apple developers have little appropriate security information available to help them assure that their applications are equally secure. This Wrox guide provides the first comprehensive go-to resource for Apple developers on the available frameworks and features that support secure application development. While Macs are noted for security, developers still need to design applications for the Mac and the iPhone with security in mind; this guide offers the first comprehensive reference to Apple's application security frameworks and features Shows developers how to consider security throughout the lifecycle of a Cocoa application, including how Mac and iPhone security features work and how to leverage them Describes how to design, implement, and deploy secure Mac and iPhone software, covering how user configurations affect application security, the keychain feature, how to maximize filesystem security, how to write secure code, and much more Professional Cocoa Application Security arms Apple developers with essential information to help them create Mac and iPhone applications as secure as the operating system they run on.
    Note: Description based on print version record. - "Wrox programmer to programmer"--Cover. - Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 55
    ISBN: 9783642022753
    Language: English
    Pages: X, 200 S. , Ill., graph. Darst. , 24 cm
    Series Statement: Lecture notes in computer science 5322 : Lecture notes in artificial intelligence
    Series Statement: Lecture notes in computer science
    DDC: 302.231
    RVK:
    Keywords: Virtuelle Gemeinschaft - Soziale Software - Kongress - Dunedin 〈2008〉 ; Virtuelle Realität - Second Life - Kongress - Dunedin 〈2008〉 ; World Wide Web 2.0 - Computerunterstützte Kommunikation - Soziale Software - Kongress - Dunedin 〈2008〉 ; World Wide Web 2.0 ; Virtuelle Realität ; Second Life ; Soziale Software ; Social Media ; Computerunterstützte Kommunikation ; Konferenzschrift 2008 ; Konferenzschrift 2008 ; Social Media ; Soziale Software ; Virtuelle Realität ; Second Life ; World Wide Web 2.0 ; Computerunterstützte Kommunikation ; Soziale Software
    Note: Literaturangaben
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 56
    ISBN: 9781605662374
    Language: English
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    DDC: 303.48330113
    RVK:
    Keywords: Social systems Computer simulation ; Social evolution Computer simulation ; Intelligent agents (Computer software) ; Human-computer interaction ; Artificial intelligence Social aspects ; Agent ; Computersimulation ; Künstliche Intelligenz ; Soziales System ; Virtuelle Realität ; Aufsatzsammlung ; Soziales System ; Computersimulation ; Künstliche Intelligenz ; Soziales System ; Virtuelle Realität ; Agent
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 57
    Book
    Book
    Hershey, Pa. [u.a.] : Information Science Reference
    ISBN: 1605662364 , 9781605662367
    Language: English
    Pages: xxii, 412 p , ill , 29 cm
    DDC: 303.48/330113
    RVK:
    Keywords: Social systems Computer simulation ; Social evolution Computer simulation ; Intelligent agents (Computer software) ; Human-computer interaction ; Artificial intelligence Social aspects ; Aufsatzsammlung ; Aufsatzsammlung ; Aufsatzsammlung ; Soziales System ; Computersimulation ; Künstliche Intelligenz ; Soziales System ; Virtuelle Realität ; Agent
    Abstract: "This volume addresses a variety of issues, in particular the emergence of societal phenomena in the interactions of systems of agents (software, robot or human)"--Provided by publisher
    Abstract: "This volume addresses a variety of issues, in particular the emergence of societal phenomena in the interactions of systems of agents (software, robot or human)"--Provided by publisher
    Note: Includes bibliographical references (p. 364-399) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 58
    Online Resource
    Online Resource
    Hershey, PA. [u.a.] : Information Science Reference
    ISBN: 9786611943356 , 9781281943354 , 9781605662374
    Language: English
    Pages: Online-Ressource (XXII, 412 S.) , Ill , 29 cm
    Edition: Online-Ausg. UK MyiLibrary 2009 Electronic reproduction
    DDC: 303.48/330113
    RVK:
    Keywords: Social systems Computer simulation ; Social evolution Computer simulation ; Intelligent agents (Computer software) ; Human-computer interaction ; Artificial intelligence Social aspects ; Aufsatzsammlung ; Aufsatzsammlung ; Aufsatzsammlung ; Soziales System ; Computersimulation ; Künstliche Intelligenz ; Soziales System ; Virtuelle Realität ; Agent
    Abstract: "This volume addresses a variety of issues, in particular the emergence of societal phenomena in the interactions of systems of agents (software, robot or human)"--Provided by publisher
    Abstract: "This volume addresses a variety of issues, in particular the emergence of societal phenomena in the interactions of systems of agents (software, robot or human)"--Provided by publisher
    Note: Includes bibliographical references (p. 364-399) and index , Electronic reproduction
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 59
    ISBN: 9780820488660 , 0820488666 , 9780820488677
    Language: English
    Pages: X, 418 S. , 230 mm x 160 mm
    Edition: 1. Aufl.
    Series Statement: Digital Formations 45
    Series Statement: Digital formations
    DDC: 006.7
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Wikipedia ; Soziale Software ; Social Media ; Content ; Weblog ; Second Life ; Internet ; Virtuelle Realität
    Note: Literaturverz. S. [409] - 418
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 60
    ISBN: 9783540894247
    Language: English
    Pages: XII, 334 S. , Ill., graph. Darst. , 24 cm
    Series Statement: Lecture notes in computer science 5334
    Series Statement: Lecture notes in computer science
    DDC: 006.7
    RVK:
    Keywords: Interaktive Medien - Drama - Immersion 〈Virtuelle Realität〉 - Kongress - Erfurt 〈2008〉 ; Interaktive Medien - Virtuelle Realität - Charakter - Agent 〈Informatik〉 - Kongress - Erfurt 〈2008〉 ; Interaktive Medien - Virtuelle Realität - Erzählen - Softwareplattform - Kongress - Erfurt 〈2008〉 ; Interaktive Medien - Virtuelle Realität - Rollenspiel - Autorensystem - Kongress - Erfurt 〈2008〉 ; Künstliche Intelligenz ; Artificial intelligence Congresses ; Entertainment computing Congresses ; Interactive multimedia Congresses ; Storytelling Congresses ; Storytelling Congresses Interactive multimedia ; Softwareplattform ; Rollenspiel ; Autorensystem ; Charakter ; Erzählen ; Drama ; Interaktive Medien ; Immersion ; Agent ; Virtuelle Realität ; Konferenzschrift 2008 ; Konferenzschrift 2008 ; Kongress ; Konferenzschrift ; Interaktive Medien ; Virtuelle Realität ; Erzählen ; Softwareplattform ; Interaktive Medien ; Drama ; Immersion ; Interaktive Medien ; Virtuelle Realität ; Charakter ; Agent ; Interaktive Medien ; Virtuelle Realität ; Rollenspiel ; Autorensystem
    Note: Literaturangaben
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 61
    Online Resource
    Online Resource
    Indianapolis, Ind. : Wiley Pub.
    Language: English
    Pages: 1 online resource (xl, 1040 p.) , ill.
    Edition: 2nd ed.
    Parallel Title: Erscheint auch als
    DDC: 005.1
    RVK:
    RVK:
    RVK:
    Keywords: Computer security ; Electronic data processing ; Distributed processing ; Electronic books ; lcgft ; Electronic books ; local
    Abstract: The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems that stay dependable whether faced with error or malice. Here?s straight talk on critical topics such as technical engineering basics, types of attack, specialized protection mechanisms, security psychology, policy, and more.
    Note: Cover title. - Includes bibliographical references (p. 893-996) and index. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 62
    Online Resource
    Online Resource
    San Francisco, Calif. : No Starch Press | Boston, Mass. :Safari Books Online
    ISBN: 9781593271442 , 1593271441
    Language: English
    Pages: x, 472 p , ill. , 23 cm. +
    Edition: 2nd ed.
    DDC: 005.8
    RVK:
    Keywords: Computer security ; Computer hackers ; Computer networks ; Security measures ; Electronic books ; local
    Abstract: Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope. Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective. The included LiveCD provides a complete Linux programming and debugging environment-all without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to: Program computers using C, assembly language, and shell scripts Corrupt system memory to run arbitrary code using buffer overflows and format strings Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening Outsmart common security measures like nonexecutable stacks and intrusion detection systems Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presence Redirect network traffic, conceal open ports, and hijack TCP connections Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix Hackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don't already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the included Linux environment, and all you need is your own creativity.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 63
    Online Resource
    Online Resource
    Amsterdam : Elsevier/Morgan Kaufmann
    ISBN: 9780080555881 , 0080555888
    Language: English
    Pages: 1 online resource (xxxvii, 537 pages) , illustrations
    Series Statement: Morgan Kaufmann series in networking
    Series Statement: Morgan Kaufmann series in computer security
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    DDC: 005.8
    RVK:
    Keywords: COMPUTERS / Internet / Security ; COMPUTERS / Networking / Security ; COMPUTERS / Security / General ; Computer networks / Security measures ; Computer networks / Reliability ; Computer security ; Computer networks / Reliability ; Computer networks / Security measures ; Computer security ; Security measures ; Reliability ; Computer networks / Security measures ; Computer security ; Computer networks / Reliability ; Computer networks / Security measures ; Computer networks / Reliability ; Computer networks ; Computer networks Security measures ; Computer networks Reliability ; Computer security ; Computersicherheit ; Rechnernetz ; Zuverlässigkeit ; Rechnernetz ; Zuverlässigkeit ; Computersicherheit
    Abstract: In todays fast paced, infocentric environment, professionals increasingly rely on networked information technology to do business. Unfortunately, with the advent of such technology came new and complex problems that continue to threaten the availability, integrity, and confidentiality of our electronic information. It is therefore absolutely imperative to take measures to protect and defend information systems by ensuring their security and non-repudiation. Information Assurance skillfully addresses this issue by detailing the sufficient capacity networked systems need to operate while under attack, and itemizing failsafe design features such as alarms, restoration protocols, and management configurations to detect problems and automatically diagnose and respond. Moreover, this volume is unique in providing comprehensive coverage of both state-of-the-art survivability and security techniques, and the manner in which these two components interact to build robust Information Assurance (IA). KEY FEATURES * The first and (so far) only book to combine coverage of both security AND survivability in a networked information technology setting * Leading industry and academic researchers provide state-of-the-art survivability and security techniques and explain how these components interact in providing information assurance * Additional focus on security and survivability issues in wireless networks
    Abstract: Printbegrænsninger: Der kan printes kapitelvis
    Note: Includes bibliographical references and index
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 64
    ISBN: 9780415439909 , 9780415339681 , 0415439906 , 0415339685
    Language: English
    Pages: XI, 200 S. , 24 cm
    Edition: 1. publ., transferred to digital print.
    Series Statement: Routledge studies in business organizations and networks 29
    Series Statement: Routledge studies in business organizations and networks
    DDC: 303.48/33
    RVK:
    Keywords: Gesellschaft ; Information technology Social aspects ; Information warfare ; Business intelligence ; Computer security ; Corporate Network ; Information warfare ; Computersicherheit ; Corporate Network ; Computersicherheit ; Information warfare
    Note: Includes bibliographical references (p. [188] - 196) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 65
    ISBN: 9783929118667
    Language: German
    Pages: 42 S. , Ill., graph. Darst.
    DDC: 302.3
    RVK:
    RVK:
    RVK:
    Keywords: Virtuelle Realität ; Soziales Kapital ; Konferenzschrift 2007 ; Konferenzschrift 2007 ; Konferenzschrift 2007 ; Konferenzschrift 2007 ; Virtuelle Realität ; Soziales Kapital
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 66
    ISBN: 1846282675 , 9781846282676
    Language: English
    Pages: XI, 430 S. , Ill., graph. Darst., Kt.
    DDC: 303.4833
    RVK:
    Keywords: Electronic villages (Computer networks) ; Social networks ; Virtuelle Realität ; Aufsatzsammlung ; Aufsatzsammlung ; Aufsatzsammlung
    Note: Includes index
    URL: Cover
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 67
    ISBN: 0415339685
    Language: English
    Pages: XI, 200 S. , graph. Darst. , 24 cm
    Edition: 1. publ.
    Series Statement: Routledge studies in business organizations and networks 29
    Series Statement: Routledge studies in business organizations and networks
    DDC: 303.48/33
    RVK:
    Keywords: Informatiemaatschappij ; Informatietechnologie ; Politieke aspecten ; Sociaal-economische aspecten ; Gesellschaft ; Politik ; Information technology Social aspects ; Information warfare ; Business intelligence ; Computer security ; Information warfare ; Corporate Network ; Computersicherheit ; Corporate Network ; Computersicherheit ; Information warfare
    Note: Includes bibliographical references (p. [188] - 196) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 68
    ISBN: 3-89942-176-0 , 978-3-8394-0176-7
    Language: German
    Pages: 327 S. : , Ill., graph. Darst. : 24 cm.
    Parallel Title: Erscheint auch als
    Dissertation note: Zugl.: Essen, Univ., Diss., 2001
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Gesellschaft ; Computers and civilization ; Internet Social aspects ; Technology Social aspects ; Virtual reality Social aspects ; Virtuelle Realität. ; Techniksoziologie. ; Hochschulschrift ; Virtuelle Realität ; Techniksoziologie
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 69
    ISBN: 9780080520094 , 008052009X
    Language: English
    Pages: 1 online resource (xxiv, 582 pages, 16 unnumbered pages of plates) , illustrations (some color)
    Series Statement: Morgan Kaufmann series in computer graphics and geometric modeling
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    DDC: 004/.01/9
    RVK:
    Keywords: Interaction homme-machine (Informatique) ; Réalité virtuelle ; COMPUTERS / Interactive & Multimedia ; COMPUTERS / Social Aspects / Human-Computer Interaction ; Human-computer interaction ; Virtual reality ; Human-computer interaction. Virtual reality ; Human-computer interaction ; Virtual reality ; Virtuelle Realität ; Virtuelle Realität
    Abstract: Understanding Virtual Reality arrives at a time when the technologies behind virtual reality have advanced to the point that it is possible to develop and deploy meaningful, productive virtual reality applications. The aim of this thorough, accessible exploration is to help you take advantage of this moment, equipping you with the understanding needed to identify and prepare for ways VR can be used in your field, whatever your field may be. By approaching VR as a communications medium, the authors have created a resource that will remain relevant even as the underlying technologies evolve. You get a history of VR, along with a good look at systems currently in use. However, the focus remains squarely on the application of VR and the many issues that arise in the application design and implementation, including hardware requirements, system integration, interaction techniques, and usability. This book also counters both exaggerated claims for VR and the view that would reduce it to entertainment, citing dozens of real-world examples from many different fields and presenting (in a series of appendices) four in-depth application case studies. * Substantive, illuminating coverage designed for technical and business readers and well-suited to the classroom. * Examines VR's constituent technologies, drawn from visualization, representation, graphics, human-computer interaction, and other fields, and explains how they are being united in cohesive VR systems. * Via a companion Web site, provides additional case studies, tutorials, instructional materials, and a link to an open-source VR programming system
    Note: Includes bibliographical references (pages 541-556) and index
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 70
    Online Resource
    Online Resource
    Florence : Taylor and Francis | Ann Arbor, Michigan : ProQuest
    ISBN: 9780203165270
    Language: English
    Pages: 1 Online-Ressource (281 pages)
    Edition: 1st ed.
    DDC: 303.4833
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Geografie ; Cyberspace ; Kartografie ; Computerkartografie ; Virtuelle Realität
    Abstract: Mapping Cyberspace is a ground-breaking geographic exploration and critical reading of cyberspace, and information and communication technologies. The book: * provides an understanding of what cyberspace looks like and the social interactions that occur there * explores the impacts of cyberspace, and information and communication technologies, on cultural, political and economic relations * charts the spatial forms of virutal spaces * details empirical research and examines a wide variety of maps and spatialisations of cyberspace and the information society * has a related website at http://www.MappingCyberspace.com. This book will be a valuable addition to the growing body of literature on cyberspace and what it means for the future.
    Note: Description based on publisher supplied metadata and other sources
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 71
    Book
    Book
    Cambridge ; London :MIT Press,
    ISBN: 0-262-06227-5 , 0-262-56150-6 , 978-0-262-56150-1
    Language: English
    Pages: xiv, 581 Seiten : , Illustrationen.
    DDC: 813.50809287
    RVK:
    RVK:
    RVK:
    Keywords: Feminismus. ; Cyberspace. ; Cyberpunk. ; Frau. ; Virtuelle Realität. ; Aufsatzsammlung ; Feminismus ; Cyberspace ; Feminismus ; Cyberpunk ; Frau ; Virtuelle Realität
    Note: Literaturangaben
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 72
    Book
    Book
    London [u.a.] : Routledge
    ISBN: 0415183782 , 0415183790
    Language: English
    Pages: XXV, 768 S , Ill.
    Edition: Repr.
    Series Statement: Cultural studies
    DDC: 303.48/33
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Computers and civilization ; Cyberspace ; Social aspects ; Aufsatzsammlung ; Internet ; Virtuelle Realität ; Netzkunst
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 73
    ISBN: 1878289926
    Language: English
    Pages: ii, 250 p , ill , 25 cm
    DDC: 303.48/33
    RVK:
    Keywords: Information society ; Information technology Social aspects ; Internet Social aspects ; Bibliografie ; Bibliografie ; Virtuelle Realität
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 74
    ISBN: 3211836357
    Language: German
    Pages: 402 S., [6] Bl. , zahlr. Ill.
    Series Statement: Theorie - Gestaltung 1
    Series Statement: Theorie - Gestaltung
    DDC: 302.222
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Datenverarbeitung ; Naturwissenschaft ; Science -- Data processing ; Image processing ; Science -- Computer simulation ; Computer graphics ; Visualization ; Naturwissenschaften ; Virtuelle Realität ; Visualisierung ; Aufsatzsammlung ; Aufsatzsammlung ; Aufsatzsammlung ; Aufsatzsammlung ; Aufsatzsammlung ; Aufsatzsammlung ; Visualisierung ; Naturwissenschaften ; Visualisierung ; Virtuelle Realität
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 75
    Book
    Book
    London : Routledge
    ISBN: 0415246598 , 041524658X
    Language: English
    Pages: VIII, 246 Seiten
    DDC: 303.4833
    RVK:
    RVK:
    RVK:
    Keywords: Gesellschaft ; Informationstechnik ; Cyberspace ; Kultur ; Kommunikationsverhalten ; Virtuelle Realität ; Einführung ; Einführung
    Note: Literaturverzeichnis Seite 221-238
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 76
    Online Resource
    Online Resource
    Berlin, Heidelberg : Springer-Verlag Berlin Heidelberg
    ISBN: 9783540672654 , 3540672656 , 9783540464228 (Sekundärausgabe) , 3540464220 (Sekundärausgabe)
    Language: English
    Pages: ... S.
    Edition: Online-Ausg. Berlin [u.a.] Springer 2011 Online-Ressource SpringerLink: Springer e-Books ISBN 9783540464228
    Edition: ISBN 3540464220
    Edition: Online-Ausg.
    Series Statement: Lecture Notes in Computer Science 1765
    Series Statement: Lecture notes in computer science
    DDC: 303.4833
    RVK:
    RVK:
    Keywords: Virtuelle Realität ; Stadt ; Soziales Netzwerk ; Aufsatzsammlung ; Online-Publikation
    Note: Online-Ausg.:
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 77
    ISBN: 0761950842 , 0761950850
    Language: English
    Pages: 280 S , 24 cm
    Edition: Repr.
    Series Statement: Theory, culture & society
    DDC: 303.4833
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Body, Human Social aspects ; Cybernetics Social aspects ; Virtual reality ; Information society ; Culture Related to ; Technology ; Cybernetics ; Sociology ; Technology ; Body, Human Social aspects ; Culture Related to ; Technology ; Cybernetics Social aspects ; Information society ; Virtual reality ; Aufsatzsammlung ; Körper ; Virtuelle Realität ; Informationsgesellschaft
    Description / Table of Contents: Literaturangaben
    Note: Simultaneously published in: Body & Society, vol. 1, issue 3/4. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 78
    ISBN: 3540672656
    Language: English
    Pages: IX, 444 S. , Ill., graph. Darst. , 24 cm
    Series Statement: Lecture notes in computer science 1765
    Series Statement: Lecture notes in computer science
    DDC: 303.4833
    RVK:
    RVK:
    Keywords: Virtuelle Realität ; Stadt ; Soziales Netzwerk ; Aufsatzsammlung ; Aufsatzsammlung ; Konferenzschrift ; Aufsatzsammlung ; Konferenzschrift ; Aufsatzsammlung ; Konferenzschrift
    Note: Literaturangaben
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 79
    ISBN: 3-7705-3371-2
    Language: German
    Pages: 263 S. : Ill.
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Beroepsethiek ; Massacommunicatie ; Virtuele werkelijkheid ; Datenverarbeitung ; Communication -- Data processing ; Virtuelle Realität. ; Ethik. ; Medienkunst. ; Ästhetik. ; Konferenzschrift 1996 ; Virtuelle Realität ; Ethik ; Medienkunst ; Ästhetik
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 80
    Book
    Book
    London [u.a.] : Routledge
    ISBN: 0415168287 , 0415168279
    Language: English
    Pages: X, 322 S.
    Series Statement: Sussex studies in culture and communication
    DDC: 303.4833
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Geografie ; Informationstechnik ; Telekommunikation ; Virtuelle Realität ; Neue Medien ; Kommunikationstechnik ; Datennetz ; Sozialer Wandel ; Psychologie ; Aufsatzsammlung ; Aufsatzsammlung ; Aufsatzsammlung ; Aufsatzsammlung ; Aufsatzsammlung ; Aufsatzsammlung ; Aufsatzsammlung
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 81
    Book
    Book
    Frankfurt [u.a.] :Campus,
    ISBN: 3-593-36044-6
    Language: German
    Pages: 263 S. : Ill.
    Series Statement: Visionen für das 21. Jahrhundert 6
    Series Statement: Visionen für das 21. Jahrhundert
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Bildung ; Globalisierung ; Internet ; Wissenschaft ; Cyberspace ; Information society ; Internet ; Virtual reality ; Internet. ; Virtuelle Realität. ; Gesellschaft. ; Cyberspace. ; Informationsgesellschaft. ; Zukunft. ; Aufsatzsammlung ; Internet ; Virtuelle Realität ; Gesellschaft ; Cyberspace ; Informationsgesellschaft ; Informationsgesellschaft ; Zukunft ; Internet ; Cyberspace
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 82
    ISBN: 3-540-65465-8
    Language: German
    Pages: VIII, 300 S. : , Ill.
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Rechnernetz. ; Virtuelle Realität. ; Wissensorganisation. ; Wissenserwerb. ; Wissensvermittlung. ; Rechnernetz ; Virtuelle Realität ; Wissensorganisation ; Wissenserwerb ; Wissensvermittlung
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 83
    Book
    Book
    Stanford, Calif. : CSLI Publ.
    ISBN: 1575861550 , 1575861542
    Language: English
    Pages: V, 369 S. , graph. Darst.
    Series Statement: Center for the Study of Language and Information 〈Stanford, Calif.〉: CSLI lecture notes 94
    Series Statement: Center for the Study of Language and Information 〈Stanford, Calif.〉: CSLI lecture notes
    DDC: 302.23
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: ElseMOO ; Chatten ; Internet ; Sociale aspecten ; Virtuele gemeenschappen ; Gesellschaft ; Communities Case studies Computer network resources ; Internet Social aspects ; Multi-user dungeons Case studies ; Social interaction Case studies Computer network resources ; Interaktion ; Chatten ; Virtuelle Realität ; Fallstudiensammlung ; Fallstudiensammlung ; Chatten ; Interaktion ; Chatten ; Virtuelle Realität
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 84
    ISBN: 3-518-28979-9
    Language: German
    Pages: 328 Seiten.
    Edition: erste Auflage
    Series Statement: Suhrkamp-Taschenbuch Wissenschaft 1379
    Series Statement: Suhrkamp-Taschenbuch Wissenschaft
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Computers ; Massamedia ; Virtuele werkelijkheid ; Werkelijkheid ; Werkelijkheidsbeeld ; Medien ; Human-computer interaction ; Virtual reality ; Neue Medien. ; Virtuelle Realität. ; Wirklichkeit. ; Wahrnehmung. ; Verstehen. ; Medien. ; Information. ; Aufsatzsammlung ; Neue Medien ; Virtuelle Realität ; Wirklichkeit ; Wahrnehmung ; Verstehen ; Neue Medien ; Medien ; Neue Medien ; Information
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 85
    Book
    Book
    New York u.a. :Oxford Univ. Press,
    ISBN: 0-19-510426-9
    Language: English
    Pages: XIII, 238 S. : Ill., graph. Darst.
    DDC: 303.48/34 21
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Computacao (aspectos socio-economicos e politicos) ; Culturele aspecten ; Processamento grafico (graphics) ; Psychologische aspecten ; Virtuele werkelijkheid ; Gesellschaft ; Kultur ; Psychologie ; Human-computer interaction ; Virtual reality ; Computers -- Social aspects ; Virtuelle Realität. ; Virtuelle Realität
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 86
    Book
    Book
    Frankfurt am Main :Suhrkamp,
    ISBN: 3-518-12010-7
    Language: German
    Pages: 393 S. : , graph. Darst.
    Edition: Erstausg., 1. Aufl.
    Series Statement: edition suhrkamp 2010
    Series Statement: edition suhrkamp
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Internet. ; Informationsgesellschaft. ; Mythos. ; Virtuelle Realität. ; Adressbuch ; Internet ; Informationsgesellschaft ; Mythos ; Virtuelle Realität
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 87
    Language: German
    Pages: L, 185 S. : Ill., graph. Darst.
    RVK:
    RVK:
    Keywords: Virtuelle Realität. ; Gesellschaft. ; Wirtschaft. ; Politik. ; Hochschulschrift ; Virtuelle Realität ; Gesellschaft ; Virtuelle Realität ; Wirtschaft ; Virtuelle Realität ; Politik
    Note: Erlangen-Nürnberg, Univ., Diss., 1997
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 88
    ISBN: 3-531-13123-0
    Language: German
    Pages: 397 S. : , Ill., graph. Darst.
    Dissertation note: Zugl.: Marburg, Univ., Diss., 1997
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Virtuelle Realität. ; Gesellschaft. ; Cyberspace. ; Hochschulschrift ; Virtuelle Realität ; Gesellschaft ; Cyberspace ; Gesellschaft
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 89
    Book
    Book
    London [u.a.] :Sage publ.,
    ISBN: 0-7619-5526-7 , 0-7619-5525-9
    Language: English
    Pages: X, 262 S. : , Tab.
    Edition: 1st publ.
    DDC: 303.4833 21
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Virtuelle Realität. ; Kommunikation. ; Teilnehmer. ; Aufsatzsammlung ; Aufsatzsammlung ; Aufsatzsammlung ; Aufsatzsammlung ; Virtuelle Realität ; Kommunikation ; Virtuelle Realität ; Teilnehmer
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 90
    ISBN: 978-1-4462-5030-3
    Language: English
    Pages: x, 262 p.
    Parallel Title: Erscheint auch als
    DDC: 303.4834
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Internet Social aspects ; Computer networks Social aspects ; Telematics Social aspects ; Cyberspace Social aspects ; Online identities ; Virtuelle Realität. ; Teilnehmer. ; Kommunikation. ; Aufsatzsammlung ; Virtuelle Realität ; Teilnehmer ; Virtuelle Realität ; Kommunikation
    Abstract: 'Virtual Culture' provides a unique analysis of a previously undocumented aspect of the cybersociety: the way in which under-represented groups are exploiting opportunities provided for social and political change
    Description / Table of Contents: Includes bibliographical references and index
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 91
    Book
    Book
    London ; Thousand Oaks ; New Delhi : SAGE Publications
    ISBN: 0761955259 , 0761955267
    Language: English
    Pages: x, 262 Seiten
    DDC: 303.48/33 21
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Gesellschaft ; Internet -- Social aspects ; Computer networks -- Social aspects ; Telematics -- Social aspects ; Cyberspace -- Social aspects ; Communication ; Computers and civilization ; Community ; Kommunikation ; Teilnehmer ; Virtuelle Realität ; Aufsatzsammlung ; Aufsatzsammlung ; Aufsatzsammlung ; Virtuelle Realität ; Kommunikation ; Virtuelle Realität ; Teilnehmer
    Note: Literaturangaben
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 92
    Book
    Book
    New York :Princeton Architectural Press,
    ISBN: 1-56898-048-5
    Language: English
    Pages: 245 Seiten : , Illustrationen.
    Edition: First edition
    DDC: 720/.1/05
    RVK:
    RVK:
    RVK:
    Keywords: Beeldcommunicatie ; Culturele aspecten ; Sociologische aspecten ; Telecommunicatie ; Virtuele werkelijkheid ; Kultur ; Computers and civilization ; Telecommunication ; Virtual reality ; Datenverarbeitung. ; Sozialer Wandel. ; Telekommunikation. ; Virtuelle Realität. ; Kunst. ; Stadtforschung. ; Visuelle Wahrnehmung. ; Stadt. ; Zivilisation. ; Cyberspace. ; Datenverarbeitung ; Sozialer Wandel ; Telekommunikation ; Sozialer Wandel ; Virtuelle Realität ; Kunst ; Datenverarbeitung ; Stadtforschung ; Visuelle Wahrnehmung ; Stadt ; Zivilisation ; Cyberspace
    Abstract: Noted urban historian M. Christine Boyer turns to the new frontier - cybercities - in this important and compelling new book. Boyer argues that the computer is to contemporary society what the machine was to modernism, and that this new metaphor profoundly affects the way we think, imagine, and ultimately grasp reality. But there is, she believes, an inherent danger here: that as cyberspace pulls us into its electronic grasp, we withdraw from the world
    Abstract: Transferred, plugged in, and down-loaded, reality becomes increasingly immaterial. Frozen to one side of our terminal's screen, Boyer concludes, we risk becoming incapable of action in a real city plagued by crime, hatred, disease, unemployment, and under-education
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 93
    ISBN: 0761950842 , 0761950850
    Language: English
    Pages: 280 S , 24 cm
    Edition: Reprinted
    Series Statement: Theory, culture & society
    DDC: 303.4833
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Body, Human Social aspects ; Cybernetics Social aspects ; Virtual reality ; Information society ; Culture Related to ; Technology ; Aufsatzsammlung ; Körper ; Cyberspace ; Cyberpunk ; Körper ; Kybernetik ; Virtuelle Realität ; Informationsgesellschaft
    Description / Table of Contents: Literaturangaben
    Note: Simultaneously published in: Body & Society, vol. 1, issue 3/4. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 94
    ISBN: 3-85114-284-5
    Language: German
    Pages: 192 S. : Ill.
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Virtuelle Realität. ; Philosophie. ; Informationsgesellschaft. ; Elektronische Medien. ; Kommunikation. ; Ethik. ; Virtuelle Realität ; Philosophie ; Virtuelle Realität ; Informationsgesellschaft ; Virtuelle Realität ; Elektronische Medien ; Kommunikation ; Ethik ; Virtuelle Realität ; Ethik
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 95
    Book
    Book
    Seattle : Bay Press
    ISBN: 0941920429
    Language: English
    Pages: X, 371 S. , Ill.
    Additional Material: 1 CD-ROM
    Former Title: Titel auf der CD-ROM: Clicking on
    DDC: 303.4833
    RVK:
    RVK:
    Keywords: Virtuelle Realität ; Kultur ; Aufsatzsammlung ; CD-ROM ; Aufsatzsammlung ; Aufsatzsammlung ; Aufsatzsammlung ; CD-ROM ; Aufsatzsammlung ; Aufsatzsammlung ; Aufsatzsammlung ; CD-ROM
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 96
    Language: German
    Pages: 503 S. , graph. Darst
    Edition: Reproduction. München Bayerische Staatsbibliothek 2009
    Parallel Title: Druckausg. Faßler, Manfred Mediale Interaktion
    Parallel Title: Erscheint auch als
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Virtuelle Realität ; Soziologie ; Interaktion ; Mensch-Maschine-Kommunikation ; Gesellschaftsleben ; Sozialverhalten ; Computer ; Computer ; Gesellschaftsleben ; Mensch-Maschine-Kommunikation ; Soziologie ; Virtuelle Realität ; Interaktion ; Sozialverhalten
    Note: Volltext // 2009 digitalisiert von: Bayerische Staatsbibliothek, München. Exemplar der Bayerischen Staatsbibliothek mit der Signatur: 2009.57853
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 97
    ISBN: 3770531051
    Language: German
    Pages: 503 S.
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Mensch-Maschine-Kommunikation ; Soziologie ; Virtuelle Realität ; Interaktion ; Sozialverhalten
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 98
    Book
    Book
    Cambridge, Mass. : The MIT Press
    ISBN: 0262133091
    Language: English
    Pages: 225 S. , Ill., graph Darst.
    DDC: 303.4833
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Stadt ; Rechnernetz ; Informationstechnik ; Stadtentwicklung ; Cyberspace ; Telekommunikation ; Virtuelle Realität
    Note: Hier auch später erschienene, identische Nachdrucke
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 99
    Book
    Book
    Cambridge, Mass. [u.a.] : MIT Press
    ISBN: 0262133091
    Language: English
    Pages: 225 S. , Ill.
    Edition: 2. print.
    DDC: 303.48/33 20
    RVK:
    RVK:
    Keywords: Computer networks ; Information technology ; Virtual reality ; Computer networks ; Information technology ; Virtual reality ; Informationstechnik ; Cyberspace ; Datenautobahn ; Virtuelle Realität ; Rechnernetz ; Gesellschaft ; Rechnernetz ; Virtuelle Realität ; Informationstechnik ; Gesellschaft ; Cyberspace ; Datenautobahn
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 100
    Book
    Book
    Oxford [u.a.] : Blackwell
    ISBN: 0631182144
    Language: English
    Pages: VIII, 274 S. , Ill.
    Edition: Repr.
    DDC: 306.46
    RVK:
    RVK:
    Keywords: Künstliche Intelligenz ; Cyberspace ; Soziologie ; Computer ; Virtuelle Realität
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...