An examination of how technological failures defined nature and national identity in Cold War Canada.OCLC-licensed vendor bibliographic record.
This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successf…
This volume provides a systematic framework for energy suppliers, policy makers, academics, students, and all others interested in energy security, and analyzes key issues concerning energy, security and sustainability with the help of a wealth of data. While sustainability is the broadest objective, energy security is an important part of it, at the global, national and societal levels. The de…
Challenges to security and human rights involving extractive and other industries are addressed in a framework known as business and human rights (BHR), which shares many challenges and goals with SSR. This paper describes the grounds where BHR and SSR coincide in principles, actors and activities and which synergies can be built on that base. Opportunities for bridging BHR and SSR are drawn fr…
"This book provides a paradigm changing approach for protecting organizational email users from falling prey to social engineering"--OCLC-licensed vendor bibliographic record.
"Shows the flaws in using "the war metaphor" to understand and organize our response to pandemics and urges its abandonment"--OCLC-licensed vendor bibliographic record.
"Traces the cyberinsurance industry's history, challenges, and legal disputes to understand why insurance has not helped to strengthen cybersecurity and what governments could do to make it a more effective tool for cyber risk management"--OCLC-licensed vendor bibliographic record.
Drawing on two decades of government efforts to secure the homeland, experts offer crucial strategic lessons and detailed recommendations for homeland security.For Americans, the terrorist attacks of September 11, 2001, crystallized the notion of homeland security. But what does it mean to secure the homeland in the twenty-first century? What lessons can be drawn from the first two decades of U…
"This book debunks 10 myths about how hard it really is to design privacy-friendly systems"--OCLC-licensed vendor bibliographic record.
Hackers as vital disruptors, inspiring a new wave of activism in which ordinary citizens take back democracy. Hackers have a bad reputation, as shady deployers of bots and destroyers of infrastructure. In Coding Democracy , Maureen Webb offers another view. Hackers, she argues, can be vital disruptors. Hacking is becoming a practice, an ethos, and a metaphor for a new wave of activism in which …