LEADER 04031nam 22007575 450 001 9910437959903321 005 20251117071307.0 010 $a3-319-02390-X 024 7 $a10.1007/978-3-319-02390-8 035 $a(CKB)3710000000024351 035 $a(EBL)1697721 035 $a(OCoLC)897577659 035 $a(SSID)ssj0001120897 035 $a(PQKBManifestationID)11717708 035 $a(PQKBTitleCode)TC0001120897 035 $a(PQKBWorkID)11160280 035 $a(PQKB)10566473 035 $a(DE-He213)978-3-319-02390-8 035 $a(MiAaPQ)EBC1697721 035 $a(PPN)176105972 035 $a(EXLCZ)993710000000024351 100 $a20131025d2013 u| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aSecurity and the Networked Society /$fby Mark A. Gregory, David Glance 205 $a1st ed. 2013. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2013. 215 $a1 online resource (309 p.) 300 $aDescription based upon print version of record. 311 08$a3-319-02389-6 320 $aIncludes bibliographical references. 327 $aIntroduction -- Hacking -- Cyber Crime, Cyber Security and Cyber Warfare -- Internet -- Smart Phones -- Applications -- Predictions. 330 $aThis book examines technological and social events during 2011 and 2012, a period that saw the rise of the hacktivist, the move to mobile platforms, and the ubiquity of social networks. It covers key technological issues such as hacking, cyber-crime, cyber-security and cyber-warfare, the internet, smart phones, electronic security, and information privacy. This book traces the rise into prominence of these issues while also exploring the resulting cultural reaction. The authors? analysis forms the basis of a discussion on future technological directions and their potential impact on society. The book includes forewords by Professor Margaret Gardner AO, Vice-Chancellor and President of RMIT University, and by Professor Robyn Owens, Deputy Vice-Chancellor (Research) at the University of Western Australia. Security and the Networked Society provides a reference for professionals and industry analysts studying digital technologies. Advanced-level students in computer science and electrical engineering will also find this book useful as a thought-provoking resource. 606 $aComputers 606 $aComputer security 606 $aComputer networks 606 $aData encryption (Computer science) 606 $aApplication software 606 $aInformation Systems and Communication Service$3https://scigraph.springernature.com/ontologies/product-market-codes/I18008 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 615 0$aComputers. 615 0$aComputer security. 615 0$aComputer networks. 615 0$aData encryption (Computer science) 615 0$aApplication software. 615 14$aInformation Systems and Communication Service. 615 24$aSystems and Data Security. 615 24$aComputer Communication Networks. 615 24$aCryptology. 615 24$aInformation Systems Applications (incl. Internet). 676 $a004 676 $a004.6 676 $a005.7 676 $a005.8 700 $aGregory$b Mark A$4aut$4http://id.loc.gov/vocabulary/relators/aut$01059364 702 $aGlance$b David$4aut$4http://id.loc.gov/vocabulary/relators/aut 906 $aBOOK 912 $a9910437959903321 996 $aSecurity and the Networked Society$92505481 997 $aUNINA