Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Internet 5
- Computer networks 4
- Security measures 4
- Computer security 3
- Computer crimes 2
- Computers 2
- Political aspects 2
- Access control 1
- Ai 1
- Ciencias Políticas / Seguridad Internacional 1
- Civil rights 1
- Commercial law 1
- Communication 1
- Computer science 1
- Consumption 1
- Control 1
- Cyber intelligence (Computer security) 1
- Data protection 1
- Digital media 1
- Digitalization 1
- Electronic data processing 1
- Electronic intelligence 1
- Electronic surveillance 1
- European Economic Community 1
- European Economic Law 1
- European Fundamental Rights and Freedoms 1
- European communities 1
- IT Law, Media Law, Intellectual Property 1
- Information Science & Library Science 1
- Information technology 1
-
1Publicado 2015“…Die aktuellen Debatten um Netzneutralität und Edward Snowdens Enthüllung der NSA-Überwachung bilden dabei lediglich die Spitze des Eisbergs. …”
Libro electrónico -
2por Sprenger, Florian“…Les débats actuels concernant la neutralité des réseaux et la révélation par Edward Snowden des activités de surveillance de la NSA ne sont que la partie immergée de l’iceberg. …”
Publicado 2017
Electrónico -
3Publicado 2015Libro electrónico
-
4por Marta Peirano“…Julian Assange es un informático que ha decidido hacer un trabajo al que los grandes periódicos han renunciado. Edward Snowden es un técnico informático que, ante la evidencia de un abuso contra los derechos de sus conciudadanos, decidió denunciar. …”
Publicado 2015
Texto completo en Odilo
Otros -
5
-
6Publicado 2022“…"In spite of Edward Snowden's disclosures about government abuses of dragnet communication surveillance, the surveillance industry continues to expand around the world. …”
Libro electrónico -
7Publicado 2015Tabla de Contenidos: “…Cover; Title Page; Copyright Page; Dedication; Contents; About the Authors; Acknowledgments; Introduction; Chapter 1 - Digital Reconnaissance and Surveillance; Digital Reconnaissance and Surveillance; Art and History of Spying; Threat of Digital Reconnaissance and Surveillance; Threat Landscape; Why Spy?; NSA and Edward Snowden; Public Trust; Cybercrime; Why Spy? Motivation; What Is to Gain? …”
Libro electrónico -
8por Naef, Tobias“…The interplay of privacy and trade became a topic of worldwide attention in the wake of Edward Snowden’s revelations concerning US mass surveillance. …”
Publicado 2023
Libro electrónico -
9Publicado 2023Tabla de Contenidos: “…The account of Joseph Nacchio -- 3.2.7. The account of Edward Snowden -- 3.2.8. The account of Julian Assange -- 3.3. …”
Libro electrónico -
10por Zurawski, Nils“…Warum aber gibt es dagegen so wenig Widerstand, obwohl Datenschützer immerzu warnen und Whistleblower wie Edward Snowden das ganze Ausmaß der Massenüberwachung öffentlich machen? …”
Publicado 2021
Libro electrónico -
11Publicado 2016“…Every day billions of people choose to share their details on social media, which are then sold to advertisers. The Edward Snowden revelations that governments - including those of the US and UK - have been snooping on their citizens, have rocked the world. …”
Libro electrónico -
12por Antoine Lefébure“…Hoy día todo el mundo sabe quién es Edward Snowden, el joven informático que trabajaba para la National Security Agency (NSA) estadounidense y que descubrió la dimensión de la vigilancia que Estados Unidos realiza en secreto: escuchas telefónicas, interceptación de correo electrónico, espionaje a empresas y gobiernos aliados. …”
Publicado 2016
Texto completo en Odilo
Otros -
13por Cherry, Denny“…These days, it's hard to be sure. But the recent Edward Snowden revelations of NSA data mining and the constant threat of identity theft from criminals mean your privacy is in jeopardy. …”
Publicado 2014
Libro electrónico -
14Publicado 2023Tabla de Contenidos: “…-- Zero Trust Strategy Overview -- Intrusion Kill Chain Prevention Strategy Overview -- Resilience Strategy Overview -- Risk Forecasting Strategy Overview -- Automation Strategy Overview -- Conclusion -- Chpater 3 Zero Trust -- Overview -- The Use Case for Zero Trust: Edward Snowden -- Zero Trust: Overhyped in the Market but. . . -- Cyber Hygiene, Defense in Depth, and Perimeter Defense: Zero Trust Before We Had Zero Trust -- Zero Trust Is Born -- Zero Trust Is a Philosophy, Not a Product -- Meat-and-Potatoes Zero Trust -- Logical and Micro Segmentation -- Vulnerability Management: A Zero Trust Tactic -- Vulnerability Management as an Intelligence Task -- Software Bill of Materials: A Zero Trust Tactic -- Automobile Manufacturing Is Similar to DevOps…”
Libro electrónico -
15por Hurley, WilliamTabla de Contenidos: “…Experiencing spooky action at astronomical distances -- Moving toward a fully implemented computer -- Investing More Resources from 2010-2015 -- Shipping a working annealer from D-Wave -- Adding software to the incorporation party -- Causing a quantum panic with Edward Snowden -- Putting down (square?) roots in quantum computing with Google -- Bending the Arc of Progress Upward, 2016 to Today -- Offering quantum computing through the cloud -- Ruling that there ought to be a law -- Going universal with IBM -- Claiming quantum supremacy with Google and others -- Getting entangled in a Nobel effort -- Asserting quantum utility with IBM -- Finding Out What's Still Needed for Quantum Computing -- Part 2 Quantum Computing Options -- Chapter 7 Choosing Between Classical and Quantum Computing -- Identifying Limitations in Classical Computing -- Watching the sun go down on Moore -- Suffering exponential growing pains -- Fighting fixed ways of thinking -- The bottom line -- Finding What's Right with Quantum Computing -- Highlighting where quantum computing is better -- Querying quantum's status today -- Looking for early access -- Needing what quantum computing offers -- Chapter 8 Getting Started with Quantum Computing -- Identifying Five Classes of Solutions -- Dancing to That Algorithm -- Deciding Whether to Start Now -- Getting Your Organization Involved -- Putting together a project team -- Involving an executive sponsor -- Depending on algorithm experts -- Setting goals -- Considering Quantum-Inspired Solutions -- Using CPUs and GPUs -- Using special-purpose hardware -- Including quantum-inspired solutions -- Chapter 9 It's All about the Stack -- Analyzing the Stack -- Examining how classical computers stack up -- Comparing the stack for quantum computers -- Qubits and control hardware -- Error mitigation firmware -- Error correction layer…”
Publicado 2023
Libro electrónico -
16Publicado 2018“…Sue Gardner (former executive director of Wikimedia Foundation, cochair of the campaign to pardon Edward Snowden) closes CHI by discussing her desire to ensure that everybody in the world has access to the information they want and need. …”
Libro electrónico