You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Why cyberinsurance has not improved cybersecurity and what governments can do to make it a more effective tool for cyber risk management. As cybersecurity incidents—ranging from data breaches and denial-of-service attacks to computer fraud and ransomware—become more common, a cyberinsurance industry has emerged to provide coverage for any resulting liability, business interruption, extortion payments, regulatory fines, or repairs. In this book, Josephine Wolff offers the first comprehensive history of cyberinsurance, from the early “Internet Security Liability” policies in the late 1990s to the expansive coverage offered today. Drawing on legal records, government reports, cyberinsur...
What we can learn from the aftermath of cybersecurity breaches and how we can do a better job protecting online data. Cybersecurity incidents make the news with startling regularity. Each breach—the theft of 145.5 million Americans' information from Equifax, for example, or the Russian government's theft of National Security Agency documents, or the Sony Pictures data dump—makes headlines, inspires panic, instigates lawsuits, and is then forgotten. The cycle of alarm and amnesia continues with the next attack, and the one after that. In this book, cybersecurity expert Josephine Wolff argues that we shouldn't forget about these incidents, we should investigate their trajectory, from techn...
The rich, untold origin story of the ubiquitous web cookie—what’s wrong with it, why it’s being retired, and how we can do better. Consent pop-ups continually ask us to download cookies to our computers, but is this all-too-familiar form of privacy protection effective? No, Meg Leta Jones explains in The Character of Consent, rather than promote functionality, privacy, and decentralization, cookie technology has instead made the internet invasive, limited, and clunky. Good thing, then, that the cookie is set for retirement in 2024. In this eye-opening book, Jones tells the little-known story of this broken consent arrangement, tracing it back to the major transnational conflicts around...
You make critical strategic and leadership decisions in real-time. You need clear, concise, timely information to meet goals, improve performance, and increase profitability. With threats, technology, and competition changing the game at cyber-speed you, as a corporate leader and strategist, are constantly faced with life-or-death business challenges. Leading international military strategists who have learned survival lessons the hard way on the front lines and yet emerged victoriously can be your guides to winning strategies. The Corporate Warrior is a practical book loaded with direct, actionable strategies. Thanks to James Farwell’s direct relationships and experiences working with these well-known military leaders, you will learn powerful strategies and tactics to enable your enterprise to confront insurmountable challenges and conquer competition while winning valuable customer recognition and support for your brand!
Important American periodical dating back to 1850.
Leading technologists, historians, and journalists reveal the stories behind the computer coding that touches all aspects of life—for better or worse Few of us give much thought to computer code or how it comes to be. The very word “code” makes it sound immutable or even inevitable. “You Are Not Expected to Understand This” demonstrates that, far from being preordained, computer code is the result of very human decisions, ones we all live with when we use social media, take photos, drive our cars, and engage in a host of other activities. Everything from law enforcement to space exploration relies on code written by people who, at the time, made choices and assumptions that would h...
This book presents a data-driven message that exposes the cyberwar media campaign being directed by the Pentagon and its patronage networks. By demonstrating that the American public is being coerced by a threat that has been blown out of proportion—much like the run-up to the Gulf War or the global war on terror—this book discusses how the notion of cyberwar instills a crisis mentality that discourages formal risk assessment, making the public anxious and hence susceptible to ill-conceived solutions. With content that challenges conventional notions regarding cyber security, Behold a Pale Farce covers topics—including cybercrime; modern espionage; mass-surveillance systems; and the threats facing infrastructure targets such as the Federal Reserve, the stock exchange, and telecommunications—in a way that provides objective analysis rather than advocacy. This book is a must-read for anyone concerned with the recent emergence of Orwellian tools of mass interception that have developed under the guise of national security.
New perspectives on the misinformation ecosystem that is the production and circulation of fake news. What is fake news? Is it an item on Breitbart, an article in The Onion, an outright falsehood disseminated via Russian bot, or a catchphrase used by a politician to discredit a story he doesn't like? This book examines the real fake news: the constant flow of purposefully crafted, sensational, emotionally charged, misleading or totally fabricated information that mimics the form of mainstream news. Rather than viewing fake news through a single lens, the book maps the various kinds of misinformation through several different disciplinary perspectives, taking into account the overlapping cont...