Search Results: 'cyber future'


70 results for "cyber future"
Cyber Tiger By Robert D. Greco, Jr
Hardcover: $39.95
Prints in 3-5 business days
A fast paced story about a newly developed security software system that revolutionizes not only the United States and NATO defense industry, but also the very boundaries of science itself. The... More > programming code, named “the Vault”, is based on the human genome, making its encryption so complex, that hacking it is nearly impossible. Professor Jihad Shareed heads the team of world-class program developers and bio-geneticist who are secretly developing the Vault. The project is commissioned by Maxwell Von Wexler, the newly selected head of the Department of Homeland Security. Only, Wexler has a secret that threatens not only the United States and its allies but the future of the entire human race. Shrouded in mystery, a subversive team of rogue ex-CIA agents help Maxwell Wexler to realize his psychopathic vision to not only change the nature of national defense, but of his true vision of ruling the world from within a digital realm.< Less
Cyber Pathways By Science Fiction and Fantasy Short Stories
Paperback: $11.03
Prints in 3-5 business days
(1 Ratings)
Below are three intriguing tasters of seventeen fascinating and spell-binding stories written by various authors from Europe and the USA: TIME BOMBSHELL: It’s the year 2030. Together with his... More > girlfriend, Iris, Anton Nadin escapes from an horrific situation by transporting their minds – but not their bodies – back in time by fifty years. But when they rendezvous in the centre of a far different London, Anton finds he has exchanged one nightmare for another. QOHELETH: Q sees numbers everywhere. He can't escape them. How can he live his life when his world is filled with countdowns to death? LAUNCH OF THE SPACESHIP ARCTURUS: When the Chaos Wars threaten to bring the end of life on Earth, brilliant programmer Loc Phuket and his team battle ruthless Luddite forces to arrive at the secret jungle launch station of the Spaceship Arcturus. There, Loc's team of humans, avatars and artificial intelligences successfully launch Arcturus on a voyage to the edge of the universe to assure the future of humankind.< Less
Cyber Sapiens Clan Book By Elizabeth Valdez
Hardcover: $28.00
Prints in 3-5 business days
From the far distant future they came to our world in peace, but by our own hands we caused a new war and they are claiming Earth as the final battleground. The Cyber Sapiens clan book has all you... More > need to level the playing field and crush your opponents.< Less
Cyber Gem 2012 By Me Decor Cybrary
eBook (PDF): $8.99
Contains art, designs, photography and manuscript by a Cybrarian. Handwritten manuscript, photographed and epublished. Memoirs of an artist / cybrarian's pilgrimage to the libraries of Santa Fe New... More > Mexico. Keeping notes and documenting interesting material for present and future reference. Cybrarian's handwritten notes. Fun augmented reality content tonic. For cultural and creative reference. Complimetns of the Me Decor Cybrary - R&DEP Research and Development Electronic Publishing node. 2012. - Outsource yur digital publishing projects to us.< Less
Cloud Computing and Cyber-Security By Jim Ras
Paperback: $65.00
Prints in 3-5 business days
Cloud computing transforms the way information technology (IT) is consumed and managed, promising improved cost efficiencies, accelerated innovation, faster time-to-market, and the ability to scale... More > applications on demand. It is clear that there is a major shift towards the cloud computing model and that the benefits may be substantial. However, as the shape of the cloud computing is emerging and developing rapidly both conceptually and in reality, the legal/contractual, economic, service quality, interoperability, security and privacy issues still pose significant challenges. In this book, we describe various service and deployment models of cloud computing and identify major challenges. In particular, we discuss three critical challenges: regulatory, security and privacy issues in cloud computing. Some solutions to mitigate these challenges are also proposed along with a brief presentation on the future trends in cloud computing deployment.< Less
Stories of 10,000 Tomorrows By Future Writers
Paperback: $43.00
Prints in 3-5 business days
From cyber, post-apocalyptic societies to rampaging robots, "Stories of 10,000 Tomorrows" represents what young authors of today imagine the future to be like. It all started as a simple... More > Creative Writing class project, and has bloomed into an entrancing anthology. Readers will discover and explore whole new worlds while reading the ten memorable short stories in the book. The inspiring, heroic characters and dangerous, risky plot lines are sure to leave readers thinking of the possibilities tomorrow can bring.< Less
Journal of Law & Cyber Warfare: The New Frontier of Warfare By Daniel Garrie et al.
Paperback: List Price: $25.00 $20.00 | You Save: 20%
Prints in 3-5 business days
FOREWORD Cyber Warfare, What are the Rules? By Daniel B. Garrie ARTICLES Cyber Attacks and the Laws of War By Michael Gervais If You Wish Cyber Peace, Prepare for Cyber War: The Need for the... More > Federal Government to Protect Critical Infrastructure From Cyber Warfare. By Michael Preciado They Did it For the Lulz: Future Policy Considerations in the Wake of Lulz Security and Other Hacker Groups’ Attacks on Stored Private Customer Data By Jesse Noa A New Perspective on the Achievement of Psychological Effects from Cyber Warfare Payloads: The Analogy of Parasitic Manipulation of Host Behavior By Dr. Mils Hills< Less
Designing A Future By Guiniture
Paperback: $30.25
Prints in 3-5 business days
Artificial intelligence, massive dehumanization, totalitarian rule, natural disasters, cyber-genetic technologies, robots reigning supreme... // Utopian visions and science fiction present pictures... More > of the future that can be both exiting and disturbing // What will our future be like and how will we live in it? // Drawing on popular fictional ideas and projections concerning the state of our world to be, we will examine future scenarios and speculate as to how architectural forms may adapt to suit extreme and changing conditions.< Less
CyberCrime - A Clear and Present Danger The CEO's Guide to Cyber Security By Roger Smith
Paperback: $61.49
Prints in 3-5 business days
Is Your Information Easy to Steal? Every business has something it needs to protect. Whether it’s top-secret IP, an exclusive client list, or a secure payment portal, your data is what sets... More > you apart from the competition. But most businesses aren’t doing a very good job of protecting what’s theirs. The digital world is changing fast—and cybercrime is changing with it. Whether it’s a 12-year-old “script kiddie” crippling your website with denial-of-service attacks, or a master hacker targeting a project leader with phishing e-mails, the bad guys have dozens of clever and creative ways to take your assets. Sooner or later, you will come under attack. The future of your organisation depends on making your information hard to steal. But most business owners don’t know where to start. This book is the answer.< Less
Proceedings Second Annual Cyber Security and Information Infrastructure Research Workshop By Frederick Sheldon et al.
eBook (PDF): $0.00
Cyber Security: Beyond the Maginot Line. Recently the FBI reported that computer crime has skyrocketed costing over $67B in 2005 and affecting 2.8M+ businesses and organizations. Attack... More > sophistication is unprecedented along with availability of open source concomitant tools. Private, academic, and public sectors invest significant resources in cyber security. Industry primarily performs cyber security research as an investment in future products and services. While the public sector also funds cyber security R&D, the majority of this activity focuses on the specific agency mission. Broad areas of cyber security remain neglected or underdeveloped. Consequently, this workshop endeavors to explore issues involving cyber security and related technologies toward strengthening such areas and enabling the development of new tools and methods for securing our information infrastructure critical assets. We aim to assemble new ideas and proposals about robust models on which we can architect a secure cyberspace.< Less