Fear has long served elites. They rely on fear to keep and expand their privileges and control the masses. In the current crisis of the capitalist world system, elites in the United States, along with other central countries, promote fear of crime and terrorism. They shaped these fears so that people looked to authorities for security, which permitted extension of apparatuses of coercion like p…
This open access book follows the idea that security policy must be based on strategic analysis. Defence policy and the role of the armed forces can subsequently be determined on the grounds of said analysis. More than ever, internal and external security, and developments both in the Netherlands and abroad are interconnected. The world order is shifting, the cooperation within NATO and the EU …
This open access book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical institutions, and user institutions in a circle of trust. It begins by discussing the most relevant technical issues involved in creating safe and privacy-preserving big data distribution platforms, and especially focuses on cryptographic primitives and pri…
This open access book addresses several questions regarding the implementation of human and organisational factors (HOF) so that recent improvements in industrial safety can be built upon. It addresses sources of frustration in senior management with high expectations of operational recommendations and disquiet on the part of HOF specialists struggling to have an impact on high-level decision m…
"The Australian National University’s Strategic & Defence Studies Centre (SDSC) is Australia’s premier university-based strategic studies think tank. Fifty years after the Centre was founded in 1966, SDSC celebrated its continued research, publications, teaching and government advisory role with a two-day conference entitled ‘New Directions in Strategic Thinking 2.0’. The event saw the …
Intel® Trusted Execution Technology (Intel TXT) is a new security technology that started appearing on Intel server platforms in 2010. This book explains Intel Trusted Execution Technology for Servers, its purpose, application, advantages, and limitations. This book guides the server administrator / datacenter manager in enabling the technology as well as establishing a launch control policy t…
"It's our thesis that privacy will be an integral part of the next wave in the technology revolution and that innovators who are emphasizing privacy as an integral part of the product life cycle are on the right track." --The authors of The Privacy Engineer's Manifesto The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value is the first book of its kind, offering industr…
For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components necessary to build and enable trusted clouds. Here …
Platform Embedded Security Technology Revealed is an in-depth introduction to Intel’s platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and management functionalities and protects applications’ secrets and users’ privacy in a secu…
The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts. It is intended mainly for beginners to the field of information security, written in a way that makes it easy for them to under…