Managing Risk and Information Security: Protect to Enable, an ApressOpen title, describes the changing risk environment and why a fresh approach to information security is needed. Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from locking down assets to enabling the business while m...
Examine the evolving enterprise security landscape and discover how to manage and survive risk. While based primarily on the author's experience and insights at major companies where he has served as CISO and CSPO, the book also includes many examples from other well-known companies and provides guidance for a management-level audience.
Man...
This book summarizes work being pursued in the context of the CIPRNet (Critical Infrastructure Preparedness and Resilience Research Network) research project, co-funded by the European Union under the Seventh Framework Programme (FP7). The project is intended to provide concrete and on-going support to the Critical Infrastructure Protection (CIP) r...
The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts.
It is intended mainly for beginners to the field of information security, writte...
The International Civic and Citizenship Education Study (ICCS) investigates the ways in which young people are prepared to undertake their roles as citizens in a range of countries in the second decade of the 21st century. ICCS 2016 is a continuation of a study initiated in 2009. This document outlines the framework and assessment design for the IC...
Technology has made human lives incomparably better. Civilization as we know it would utterly collapse without it. However, if not properly managed, technology can and will be systematically abused and misuse and thereby become one of the biggest threats to humankind. This open access book applies proactive crisis management to the management of te...
I've already accepted the fact that Bring-Your-Own-Device (BYOD) is a business trend that's here to stay. According to one report I recently read, just 23 percent of enterprise employees use company-sanctioned mobile devices only - meaning 77 percent of employees are using their own devices in some capacity to do their job. 1 As the Chief...
This open access book follows the idea that security policy must be based on strategic analysis. Defence policy and the role of the armed forces can subsequently be determined on the grounds of said analysis. More than ever, internal and external security, and developments both in the Netherlands and abroad are interconnected. The world order is sh...
Your customers demand and deserve better security and privacy in their software. This book is the first to detail a rigorous, proven methodology that measurably minimizes security bugs - the Security Development Lifecycle (SDL). In this long-awaited book, security experts Michael Howard and Steve Lipner from the Microsoft Security Engineering Team ...
Defend Dissent is an introduction to cryptography paired with the social impacts of surveillance and the protective potential of encryption, with a focus on US social movements. Each chapter ends with a story that brings social context to the material - from surveillance used against contemporary US protests to the African National Congress's ...
The aim of this book is to review and analyse the goods and services of bivalve shellfish. How they are defined, what determines the ecological functions that are the basis for the goods and services, what controversies in the use of goods and services exist, and what is needed for sustainable exploitation of bivalves from the perspective of the va...
Platform Embedded Security Technology Revealed is an in-depth introduction to Intel's platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and management functionalities and protects appl...
This book presents theories and case studies for corporations in developed nations, including Japan, for designing strategies to maximize opportunities and minimize threats in business expansion into developing nations. The case studies featured here focus on Asia, including China and India, and use examples of Japanese manufacturers. Five case st...
This book asks just how climate-smart our food really is. It follows an average day's worth of food and drink to see where it comes from, how far it travels, and the carbon price we all pay for it. From our breakfast tea and toast, through breaktime chocolate bar, to take-away supper, Dave Reay explores the weather extremes the world's fa...
This open access volume explores how UN peace operations are adapting to four trends in the changing global order: (1) the rebalancing of relations between states of the global North and the global South; (2) the rise of regional organisations as providers of peace; (3) the rise of violent extremism and fundamentalist non-state actors; and (4) incr...
Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth.
The IoT presents unique challenges in implementing security and Inte...
This book presents the results from the second cycle of the IEA International Civic and Citizenship Education Study (ICCS 2016). Using data from 24 countries in Asia, Europe and Latin America, the study investigates the ways in which young people are prepared to undertake their roles as citizens in a range of countries in the second decade of the 2...
This book surveys the frontier of scientific river research and provides examples to guide management towards a sustainable future of riverine ecosystems. Principal structures and functions of the biogeosphere of rivers are explained; key threats are identified, and effective solutions for restoration and mitigation are provided. Rivers are among ...
The average person can name more bird species than they think, but do we really know what a bird "species" is? This book takes up several fascinating aspects of bird life to elucidate this basic concept in biology. From genetic and physiological basics to the phenomena of bird song and bird migration, it analyzes various interactions of b...
The Anthropocene is the human-dominated modern era that has accelerated social, environmental and climate change across the world in the last few decades. This book examines the challenges the Anthropocene presents to the sustainable management of deltas, both the many threats as well as the opportunities. In the world's deltas the Anthropocen...
This book explores the conscious and unconscious norms, values, and characteristics that drive behaviors within the high-tech capital of the world, Silicon Valley, and the sector it represents. In an era where the reach and influence of a single industry has the potential to define the future of our world, it has become apparent just how little we ...
This open access book provides the first comprehensive collection of papers that provide an integrative view on cybersecurity. It discusses theories, problems and solutions on the relevant ethical issues involved. This work is sorely needed in a world where cybersecurity has become indispensable to protect trust and confidence in the digital infras...
This open access monograph argues established democratic norms for freedom of expression should be implemented on the internet. Moderating policies of tech companies as Facebook, Twitter and Google have resulted in posts being removed on an industrial scale. While this moderation is often encouraged by governments - on the pretext that terrorism, b...
This book reviews the principles of infection control and the guidelines and standards of care in multiple countries, discussing them within the context of the practice of dentistry. The aim is to enable dental practitioners to ensure that the appropriate measures are adopted for each patient contact, thereby minimizing the risk of transmission of ...
This definitive text/reference on computer network and information security presents a comprehensive guide to the repertoire of security tools, algorithms and best practices mandated by the rapidly evolving ubiquitous technology we are increasingly dependent on. Fully revised and updated, this timely new edition encompasses the latest developments ...
There is agency in all we do: thinking, doing, or making. We invent a tune, play, or use it to celebrate an occasion. Or we make a conceptual leap and ask more abstract questions about the conditions for agency. They include autonomy and self-appraisal, each contested by arguments immersing us in circumstances we don't control. But can it be t...
This book is a compilation of all the general advice that a chess player needs to know. It's an excellent introduction to the wisdom of the game for novice players and a great refresher course for more experienced ones. It's recommended that this work be read monthly until all the information within it is instantly recallable....
Production ergonomics - the science and practice of designing industrial workplaces to optimize human well-being and system performance - is a complex challenge for a designer. Humans are a valuable and flexible resource in any system of creation, and as long as they stay healthy, alert and motivated, they perform well and also become more competen...
This open book explores the global challenges and experiences related to digital entrepreneurial activities, using carefully selected examples from leading companies and economies that shape world business today and tomorrow. Digital entrepreneurship and the companies steering it have an enormous global impact; they promise to transform the busines...
This open book examines recent advances in how artificial intelligence (AI) and robotics have elicited widespread debate over their benefits and drawbacks for humanity. The emergent technologies have for instance implications within medicine and health care, employment, transport, manufacturing, agriculture, and armed conflict. While there has been...
This open volume surveys the state of the field to examine whether a fifth wave of deterrence theory is emerging. Bringing together insights from world-leading experts from three continents, the volume identifies the most pressing strategic challenges, frames theoretical concepts, and describes new strategies.
The use and utility of deterrence in...
This open volume provides in-depth analysis of the wide range of ethical issues associated with drug-resistant infectious diseases. Antimicrobial resistance (AMR) is widely recognized to be one of the greatest threats to global public health in coming decades; and it has thus become a major topic of discussion among leading bioethicists and scholar...