You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
People research everything online – shopping, school, jobs, travel – and other people. Your online persona is your new front door. It is likely the first thing that new friends and colleagues learn about you. In the years since this book was first published, the Internet profile and reputation have grown more important in the vital human activities of work, school and relationships. This updated edition explores the various ways that people may use your Internet identity, including the ways bad guys can bully, stalk or steal from you aided by the information they find about you online. The authors look into the Edward Snowden revelations and the government’s voracious appetite for pers...
Digital devices have made our busy lives a little easier and they do great things for us, too – we get just-in-time coupons, directions, and connection with loved ones while stuck on an airplane runway. Yet, these devices, though we love them, can invade our privacy in ways we are not even aware of. The digital devices send and collect data about us whenever we use them, but that data is not always safeguarded the way we assume it should be to protect our privacy. Privacy is complex and personal. Many of us do not know the full extent to which data is collected, stored, aggregated, and used. As recent revelations indicate, we are subject to a level of data collection and surveillance never...
Around the world, SCADA (supervisory control and data acquisition) systems and other real-time process control networks run mission-critical infrastructure--everything from the power grid to water treatment, chemical manufacturing to transportation. These networks are at increasing risk due to the move from proprietary systems to more standard platforms and protocols and the interconnection to other networks. Because there has been limited attention paid to security, these systems are seen as largely unsecured and very vulnerable to attack. This book addresses currently undocumented security issues affecting SCADA systems and overall critical infrastructure protection. The respective co-auth...
Thoroughly updates the first edition by addressing the significant advances in data-driven technologies, their intrusion deeper in our lives, the limits on data collection newly required by governments in North America and Europe, and the new security challenges of a world rife with ransomware and hacking.
When Jeff, a retired airline pilot, joins his son, Todd, in a long-haul trucking business, venture, the freedom of the open road sets them on an unexpected journey of discovery that will profoundly affect the rest of their lives. This gripping and intelligent novel explores the new relationship between a parent and an adult child when the old titles become inadequate to redefine it. This is done by contrasting four sets of father/sons from dysfunctional to devoted, although they are unaware of the others they exert a profound influence upon each other, and collide in a tale full of depth and wisdom. A mystery from Jeff ’s military past must be solved and come to terms with while he and Todd learn to build love, fight their fears and deal with life on life’s terms. Join these intriguing, flawed and courageous men on that endless black ribbon, like the rest of us unknowing the final destination.
“If I were the only survivor on a remote island and all I had with me were this book, a Swiss army knife and a bottle, I would throw the bottle into the sea with the note: ‘Don’t worry, I have everything I need.’” — Ciril Horjak, alias Dr. Horowitz, a comic artist “The writing is understandable, but never simplistic. Instructive, but never patronizing. Straightforward, but never trivial. In-depth, but never too intense.” — Ali Žerdin, editor at Delo, the main Slovenian newspaper “Does science think? Heidegger once answered this question with a decisive No. The writings on modern science skillfully penned by Sašo Dolenc, these small stories about big stories, quickly con...
The second edition of Historical Dictionary of Human Rights explores both the theory and the practice of international human rights with a focus on the norms and institutions that make up the “architecture” of the global human rights regime and the tools, processes and procedures through which such norms are realized and “enforced.” Particular attention is given to the contextual political and sociological factors that shape and constrain the operation and functioning of international human rights institutions and their state and non-state actors. This is done through a chronology, an introduction, and an extensive bibliography. The dictionary section has more than 1.000 cross-referenced entries on terminology, conventions, treaties, intergovernmental organizations in the United Nations, and non-governmental organizations, as well as some of the pioneers and defenders. This book is an excellent resource for students, researchers, and anyone wanting to know more about human rights.
Cybersecurity expert Theresa Payton tells battlefront stories from the global war being conducted through clicks, swipes, internet access, technical backdoors and massive espionage schemes. She investigates the cyberwarriors who are planning tomorrow’s attacks, weaving a fascinating tale of Artificial Intelligent mutations carrying out attacks without human intervention, “deepfake” videos that look real to the naked eye, and chatbots that beget other chatbots. Finally, Payton offers readers telltale signs that their most fundamental beliefs are being meddled with and actions they can take or demand that corporations and elected officials must take before it is too late. The updated paperback edition, including new information on real world cases of AI, chatgpt, tiktok, and all the latest and greatest exploits of manipulation campaigns, will leave readers both captivated and chilled to the bone.
Written for legal professionals, this comprehensive desk reference lists, categorizes and describes hundreds of free and fee-based Internet sites. You'll find it useful for investigations, depositions, and trial presentations, as well as company and medical research, gathering competitive intelligence, finding expert witnesses, and fact checking of all kinds.
The benefits offered by wearable devices seem limitless, and for many people, the devices are really chic. These wireless gadgets can track the number of steps people take each day; measure their heart rates, the number of calories they ate, or the amount of energy they expended; or access data by using cloud computing. "Wearables"--bracelets, rings, eyeglasses, necklaces, shoe clips, and more--enable individuals to read, text, send e-mails, stay connected via social networks, or access the Internet as they walk. This intriguing volume also explains the devices' cutting-edge medical applications, including as impact indicators for concussion studies.