Book tips - Security
Security
Security has been a hot IT topic for years. It was a long time ago that viruses spread mainly through the exchange of floppy disks. At the end of the 1990s, hacking was the main focus of media coverage. At the beginning of the new millennium, the threat of terrorist-motivated cyber attacks entered the public debate after 9/11. The ever-increasing spread of laptops and, subsequently, the use of mobile devices presented security and IT managers with new challenges. Cloud services were questioned very critically, especially in German-speaking countries. IoT, Big Data and Industry 4.0 raise new questions. In a networked world, it is impossible to hermetically seal yourself off. Security, both in politics and in IT, is always a trade-off between resource deployment, risk assessment and agility.
" Those who give up freedom to gain security will end up losing both. " -Benjamin Franklin
Source: E-3 Magazine - Issue October 2016
SAP Systems Protect
This book shows how companies identify and secure the attack points of their SAP system. In order to implement security according to current standards, network worlds and server worlds that have grown over decades often have to be redesigned. Whether network security, SAProuter, application server, RFC calls or database - the authors clearly explain how hackers proceed and show how possible security gaps can be closed and systems can be saved.
Mobile hacking
Algorithms cast in software that defeat world chess champions or successfully compete against humans in interrogative games demonstrate the radical changes in a software-driven world that require bridges between computer scientists and technicians and philosophers to understand. In this sense, the author argues for a philosophy of technology in which software plays a significant role. Concepts thereby experience new perspectives and meanings.
Make Security Simple
Technology determines our lives. Although it has been considered in individual aspects by Plato and Aristotle until the twentieth century, it became an independent subject of philosophy only in the last decades. Thus, it is about the clarification of quite central and challenging tasks - from human creative power to a clarification of what a technical artifact is, to technical knowledge, in all these elements linked to the problem of responsibility.
AMNESIE - Peter Carey
Peter Carey's new novel Amnesia tackles the repression of an incredible political scandal - and says more about our present than a novel should. A boisterous mix of WikiLeaks, Edward Snowden and Chaos Computer Club - full of vicious wit, of breathtaking pace. It centers on a young Australian woman, Gaby Baillieux, who hacks into a U.S. security system and now faces the death penalty.
Legal risks of autonomous and networked systems
Responsible Research & Innovation RRI has become an important buzzword in EU research policy. The goal: Technical innovations should be oriented toward ethical and societal requirements and not be determined solely by commercial interests. RRI therefore calls for the early involvement of technology assessment (TA) in innovation processes. But what can TA achieve within this framework? And how viable is the concept of RRI anyway?