Atnaujinkite slapukų nuostatas

El. knyga: Darknet: Geopolitics and Uses

  • Formatas: EPUB+DRM
  • Išleidimo metai: 16-Apr-2018
  • Leidėjas: ISTE Ltd and John Wiley & Sons Inc
  • Kalba: eng
  • ISBN-13: 9781119522492
Kitos knygos pagal šią temą:
  • Formatas: EPUB+DRM
  • Išleidimo metai: 16-Apr-2018
  • Leidėjas: ISTE Ltd and John Wiley & Sons Inc
  • Kalba: eng
  • ISBN-13: 9781119522492
Kitos knygos pagal šią temą:

DRM apribojimai

  • Kopijuoti:

    neleidžiama

  • Spausdinti:

    neleidžiama

  • El. knygos naudojimas:

    Skaitmeninių teisių valdymas (DRM)
    Leidykla pateikė šią knygą šifruota forma, o tai reiškia, kad norint ją atrakinti ir perskaityti reikia įdiegti nemokamą programinę įrangą. Norint skaityti šią el. knygą, turite susikurti Adobe ID . Daugiau informacijos  čia. El. knygą galima atsisiųsti į 6 įrenginius (vienas vartotojas su tuo pačiu Adobe ID).

    Reikalinga programinė įranga
    Norint skaityti šią el. knygą mobiliajame įrenginyje (telefone ar planšetiniame kompiuteryje), turite įdiegti šią nemokamą programėlę: PocketBook Reader (iOS / Android)

    Norint skaityti šią el. knygą asmeniniame arba „Mac“ kompiuteryje, Jums reikalinga  Adobe Digital Editions “ (tai nemokama programa, specialiai sukurta el. knygoms. Tai nėra tas pats, kas „Adobe Reader“, kurią tikriausiai jau turite savo kompiuteryje.)

    Negalite skaityti šios el. knygos naudodami „Amazon Kindle“.

This collaborative research project allows for fundamental advances not only in the understanding of the phenomena but also in the development of practical calculation methods that can be used by engineers. This collaborative research project allows for fundamental advances not only in the understanding of the phenomena but also in the development of practical calculation methods that can be used by engineers.

Preface ix
Introduction xiii
Part 1 New Frontiers and Governance of Digital Space
1(44)
Chapter 1 Fragmentation and Compartmentalization of Virtual Space
3(10)
1.1 The nymph Carna and Internet census
3(2)
1.2 Dimensions of cyberspace
5(3)
1.3 Deep web, darknet and dark web
8(5)
Chapter 2 A Society of Control and Panopticism
13(14)
2.1 Horizontal panopticism and cyber-narcissism
13(2)
2.2 The neutrality of the network in question
15(7)
2.2.1 How can network neutrality be preserved?
18(1)
2.2.2 A threatened principle
19(3)
2.3 Going toward an Internet 3.0 and a new form of digital civility?
22(5)
2.3.1 Is cyberspace a public space?
22(2)
2.3.2 Tyrannies of privacy
24(3)
Chapter 3 The Internet, a Governance Subject to Controversy
27(18)
3.1 ICANN, an influenced institution
27(5)
3.1.1 Is this the end of US supremacy?
28(1)
3.1.2 The role of the GAC
29(3)
3.2 Cybersecurity, domains and electronic addressing
32(7)
3.2.1 The essential role of WHOIS
34(3)
3.2.2 Domain name extension and migration from IPv4 to IPv6
37(2)
3.3 Who regulates those who are in control?
39(6)
3.3.1 Conflict within ICANN
40(2)
3.3.2 Encrypted networks: a major security issue for ICANN
42(3)
Part 2 Crypto-Anarchism, Cryptography and Hidden Networks
45(96)
Chapter 4 From the ARPANET to the Darknet: When States Lose Cryptographic Warfare
49(22)
4.1 From Minitel to ARPANET
49(4)
4.1.1 Rapid growth
51(1)
4.1.2 The privatization of the Internet
52(1)
4.2 The rise of asymmetric cryptography
53(7)
4.2.1 Steganography
53(3)
4.2.2 Modern cryptographic methods
56(1)
4.2.3 Asymmetric cryptography
57(3)
4.3 "The Crypto Wars are over!"
60(11)
4.3.1 Planetary electronic monitoring
62(2)
4.3.2 "Rendering Big Brother obsolete"
64(4)
4.3.3 Cryptography at the service of hidden networks
68(3)
Chapter 5 From Sneaker Nets to Darknets
71(46)
5.1 Peer to peer: the first darknets
71(13)
5.1.1 P2P against the entertainment industry: David versus Goliath
73(4)
5.1.2 The BitTorrent revolution
77(4)
5.1.3 The emergence of darknets
81(3)
5.2 "Netopias" and darknets: the appearance of parallel networks
84(14)
5.2.1 Cypherpunks and cyberpunk
84(4)
5.2.2 Crypto-anarchism and activism: Peekabooty
88(2)
5.2.3 Freenet
90(3)
5.2.4 It is a small world
93(5)
5.3 The Tor network
98(19)
5.3.1 The origins of Tor
100(3)
5.3.2 The Tor paradox
103(2)
5.3.3 How Tor works
105(3)
5.3.4 The principle of the onion address
108(4)
5.3.5 An evolution of Tor uses thanks to Tor2Web?
112(5)
Chapter 6 Geopolitics and Cybersecurity
117(24)
6.1 From "hacktivism" to "cyberwarfare"
117(9)
6.1.1 The first hackers
118(2)
6.1.2 When states engage in cyberwarfare
120(2)
6.1.3 Computer attacks of an unprecedented magnitude
122(2)
6.1.4 The darknet: cybercrime market
124(2)
6.2 Cybercrime, politics and subversion in the "half-world"
126(15)
6.2.1 The "half-world" appeal
130(4)
6.2.2 Fighting crime and Bitcoins: current and future economic and security issues
134(7)
Conclusion 141(4)
Appendices 145(2)
Appendix 1 147(6)
Appendix 2 153(4)
Glossary 157(6)
Bibliography 163(6)
Index 169
Gayard Laurent, professor at the institut Catholique, Paris, France.