The big stories -- The skills of the new machines : technology races ahead -- Moore's law and the second half of the chessboard -- The digitization of just about everything -- Innovation : declining or recombining? -- Artificial and human intelligence in the second machine age -- Computing bounty -- Beyond GDP -- The spread -- The biggest winners : stars and superstars -- Implications of the bounty and the spread -- Learning to race with machines : recommendations for individuals -- Policy recommendations -- Long-term recommendations -- Technology and the future (which is very different from "technology is the future").
· 2005
Offers a concise history of globalization, discussing a wide range of topics, from the September 11 terrorist attacks to the growth of the middle class in both China and India.
The essential guide to one of the most influential spiritual works ever written. In 1976, a mysterious “Inner Voice” called out to a woman named Helen Schucman, dictating a system of belief that ultimately became A Course in Miracles. This book, totaling 1,333 pages, went on to sell more than two million copies around the world. Its lessons are meant to be digested one at a time; those who study ACIM do so over years, often struggling to progress through its resonant but difficult-to-comprehend truths. Jon Mundy-who knew the Course's founders and the text from the very beginning-is the perfect guide to the book's central tenets. Using passages from ACIM, he illuminates its teachings on such subjects as the self, forgiveness, desire, health, money, addiction, and the afterlife. Through Jon's lively storytelling and in-depth knowledge of the Course's wisdom, readers gain wisdom that might otherwise have taken them a lifetime to grasp.
This text offers an international and interdisciplinary analysis of the complex interactions between infrastructure networks and urban spaces. Drawing on case studies and examples from across the globe, it offers a statement on the urban condition.
· 1995
In lively, mordantly witty prose, Negroponte decodes the mysteries--and debunks the hype--surrounding bandwidth, multimedia, virtual reality, and the Internet, and explains why such touted innovations as the fax and the CD-ROM are likely to go the way of the BetaMax. "Succinct and readable. . . . If you suffer from digital anxiety . . . here is a book that lays it all out for you."--Newsday. "From the Trade Paperback edition.
· 2016
Globally recognized and backed by the Cloud Security Alliance (CSA) and the (ISC)2 the CCSP credential is the ideal way to match marketability and credibility to your cloud security skill set. The Official (ISC)2 Guide to the CCSPSM CBK Second Edition is your ticket for expert insight through the 6 CCSP domains. You will find step-by-step guidance through real-life scenarios, illustrated examples, tables, best practices, and more. This Second Edition features clearer diagrams as well as refined explanations based on extensive expert feedback. Sample questions help you reinforce what you have learned and prepare smarter. Numerous illustrated examples and tables are included to demonstrate concepts, frameworks and real-life scenarios. The book offers step-by-step guidance through each of CCSP’s domains, including best practices and techniques used by the world's most experienced practitioners. Developed by (ISC)², endorsed by the Cloud Security Alliance® (CSA) and compiled and reviewed by cloud security experts across the world, this book brings together a global, thorough perspective. The Official (ISC)² Guide to the CCSP CBK should be utilized as your fundamental study tool in preparation for the CCSP exam and provides a comprehensive reference that will serve you for years to come.
Information Security is usually achieved through a mix of technical, organizational and legal measures. These may include the application of cryptography, the hierarchical modeling of organizations in order to assure confidentiality, or the distribution of accountability and responsibility by law, among interested parties. The history of Information Security reaches back to ancient times and starts with the emergence of bureaucracy in administration and warfare. Some aspects, such as the interception of encrypted messages during World War II, have attracted huge attention, whereas other aspects have remained largely uncovered. There has never been any effort to write a comprehensive history. This is most unfortunate, because Information Security should be perceived as a set of communicating vessels, where technical innovations can make existing legal or organisational frame-works obsolete and a breakdown of political authority may cause an exclusive reliance on technical means.This book is intended as a first field-survey. It consists of twenty-eight contributions, written by experts in such diverse fields as computer science, law, or history and political science, dealing with episodes, organisations and technical developments that may considered to be exemplary or have played a key role in the development of this field.These include: the emergence of cryptology as a discipline during the Renaissance, the Black Chambers in 18th century Europe, the breaking of German military codes during World War II, the histories of the NSA and its Soviet counterparts and contemporary cryptology. Other subjects are: computer security standards, viruses and worms on the Internet, computer transparency and free software, computer crime, export regulations for encryption software and the privacy debate.- Interdisciplinary coverage of the history Information Security- Written by top experts in law, history, computer and information science- First comprehensive work in Information Security
· 2001
The 'digital divide' refers to the gap between those who have access to the latest information technologies and those who do not. This book presents data supporting the existence of such a divide in the 1990s along racial, economic, and education lines.
· 2009
Handbook of Digital Forensics and Investigation builds on the success of the Handbook of Computer Crime Investigation, bringing together renowned experts in all areas of digital forensics and investigation to provide the consummate resource for practitioners in the field. It is also designed as an accompanying text to Digital Evidence and Computer Crime. This unique collection details how to conduct digital investigations in both criminal and civil contexts, and how to locate and utilize digital evidence on computers, networks, and embedded systems. Specifically, the Investigative Methodology section of the Handbook provides expert guidance in the three main areas of practice: Forensic Analysis, Electronic Discovery, and Intrusion Investigation. The Technology section is extended and updated to reflect the state of the art in each area of specialization. The main areas of focus in the Technology section are forensic analysis of Windows, Unix, Macintosh, and embedded systems (including cellular telephones and other mobile devices), and investigations involving networks (including enterprise environments and mobile telecommunications technology). This handbook is an essential technical reference and on-the-job guide that IT professionals, forensic practitioners, law enforcement, and attorneys will rely on when confronted with computer related crime and digital evidence of any kind. *Provides methodologies proven in practice for conducting digital investigations of all kinds*Demonstrates how to locate and interpret a wide variety of digital evidence, and how it can be useful in investigations *Presents tools in the context of the investigative process, including EnCase, FTK, ProDiscover, foremost, XACT, Network Miner, Splunk, flow-tools, and many other specialized utilities and analysis platforms*Case examples in every chapter give readers a practical understanding of the technical, logistical, and legal challenges that arise in real investigations
· 1997
Praise for Overdrive: Bill Gates and the Race to Control Cyberspace "James Wallace offers many tales of . . . temper tantrums, antitrust tussles with the Justice Department, and general dirty tricks Microsoft has allegedly played on its competitors." -The New York Times Book Review Praise for James Wallace's Hard Drive: Bill Gates and the Making of the Microsoft Empire "A stupendous success story. This is the most informative book yet on Bill Gates and Microsoft." -the Washington Post "Remarkable . . . This book will make you wonder why you didn't buy Microsoft stock when it went public." -The Wall Street Journal "An engaging, almost classic tale of a boy who finds power in gadgets and then won't let go." -Los Angeles Times