The Cyberdimension
Title | The Cyberdimension PDF eBook |
Author | Eric Trozzo |
Publisher | Wipf and Stock Publishers |
Pages | 293 |
Release | 2019-04-29 |
Genre | Religion |
ISBN | 1532651198 |
In 2013, Edward Snowden released a trove of documents revealing the extent of government electronic surveillance. Since then, we have been inundated with reports of vicious malware attacks, election hacking, data breaches, potential cyberwars, fights over Net Neutrality, and fake internet news. Where once discussion of cyberspace was full of hope of incredible potential benefits for humanity and global connection, it has become the domain of fear, anxiety, conflict, and authoritarian impulses. As the cloud of the Net darkens into a storm, are there insights from Christian theology about our online existence? Is the divine present in this phenomenon known as cyberspace? Is it a realm of fear or a realm of hope? In The Cyberdimension, Eric Trozzo engages these questions, seeking not only a theological means of speaking about cyberspace in its ambiguity, but also how the spiritual dimension of life provokes resistance to the reduction of life to what can be calculated. Rather than focusing on the content available online, he looks to the structure of cyberspace itself to find a chastened yet still expectant vision of divinity amidst the political, economic, and social forces at play in the cyber realm.
Cyber War Will Not Take Place
Title | Cyber War Will Not Take Place PDF eBook |
Author | Thomas Rid |
Publisher | Oxford University Press, USA |
Pages | 235 |
Release | 2013 |
Genre | Computers |
ISBN | 0199330638 |
A fresh and refined appraisal of today's top cyber threats
Cyber Terrorism and Information Warfare: Assessment of challenges
Title | Cyber Terrorism and Information Warfare: Assessment of challenges PDF eBook |
Author | Yonah Alexander |
Publisher | |
Pages | 828 |
Release | 1999 |
Genre | Computers |
ISBN |
Cyber Terrorism and Information Warfare: Critical infrastructure protection issues
Title | Cyber Terrorism and Information Warfare: Critical infrastructure protection issues PDF eBook |
Author | Yonah Alexander |
Publisher | |
Pages | 584 |
Release | 1999 |
Genre | Computers |
ISBN |
NATO's Balancing Act
Title | NATO's Balancing Act PDF eBook |
Author | David Scott Yost |
Publisher | United States Institute of Peace Press |
Pages | 432 |
Release | 2014 |
Genre | Law |
ISBN |
NATO's Balancing Act evaluates the alliance's performance of its three core tasks--collective defense, crisis management, and cooperative security--and reviews its members' efforts to achieve the right balance among them. Yost considers NATO's role in the evolving global security environment and its implications for collective defense and crisis management in the Balkans, Afghanistan, Africa, Libya, and elsewhere.
Black Ice
Title | Black Ice PDF eBook |
Author | Dan Verton |
Publisher | McGraw Hill Professional |
Pages | 324 |
Release | 2003 |
Genre | Computers |
ISBN | 9780072227871 |
Internet security expert Verton investigates how cyber-terrorism could occur, what the global and financial implications are, the impact this is having and will continue to have on privacy and civil liberties, and how to prepare and prevent against cyber-terrorism.
The Virtual Battlefield
Title | The Virtual Battlefield PDF eBook |
Author | Christian Czosseck |
Publisher | IOS Press |
Pages | 328 |
Release | 2009 |
Genre | Computers |
ISBN | 1607500604 |
"All political and military conflicts now have a cyber dimension, the size and impact of which are difficult to predict. Internet-enabled propaganda, espionage, and attacks on critical infrastructure can target decision makers, weapons systems, and citizens in general, during times of peace or war. Traditional threats to national security now have a digital delivery mechanism which would increase the speed, diffusion, and power of an attack. There have been no true cyber wars to date, but cyber battles of great consequence are easy to find. This book is divided into two sections--Strategic viewpoints and Technical challenges & solutions--and highlights the growing connection between computer security and national security"--P. 4 of cover.