Computer-Related Risks (ACM Press)

 Taschenbuch
Lieferzeit: Nicht lieferbar I

bi - bibliotheksexemplar beschädigungen verschmutzungen gestempelt aufkleber altersgemäßer zustand

4,65 €*

Alle Preise inkl. MwSt. | zzgl. Versand
Gewicht:
558 g
SKU:
INF1000303421
Beschreibung:
In diesem Buch werden die Risiken thematisiert, die mit der Anwendung von Computertechnologien in den verschiedensten Bereichen verbunden sind. Der Autor ist einer der führenden Experten auf dem Gebiete der Technikfolgenabschätzung von Computeranwendungen. Problembereiche wie Datensicherheit, Datenkommunikation, Schutz der Persönlichkeitsrechte werden ebenso dargestellt wie spezielle Entwicklungen auf dem Hard- und Softwaresektor. Der Autor wendet sich dabei sowohl an Softwareentwickler und Systemprogrammierer als auch an den ganz normalen Leser, der sich für die gesellschaftlichen Risiken und Chancen der Computertechnologien interessiert.This book presents the various computer-related risks, describes events drawn from the auhtor's comprehensive data archive on computing mishaps, and suggests ways to lessen such risks in the future, and:
At once entertains and informs all people interested in uses and policies surrounding the widespread use of computers in the modern world.
Organizes and describes the risks inherent in the mix of computers
Gives concise accounts of mishaps, accidents and other problems that have occured over the year; some humerous, some tragic
Suggests ways to minimize computer-related risks in the future
Provides software developers, systems engineers, and policymakers with an important awareness of the risks they face.
1. The Nature Of Risks. Background on Risks. Sources of Risks. Adverse Effects. Defensive Measures. Guide to Summary Tables. 2. Reliability And Safety Problems. Communication Systems. Problems in Space. Defense. Civil Aviation. Trains. Ships. Control-System Safety. Robotics and Safety. Medical Health and Safety. Electrical Power. Computer Calendar Clocks. Computing Errors. 3. Security Vulnerabilities. Security Vulnerabilities and Misuse Types. Pest Programs and Deferred Effects. Bypass of Intended Controls. Resource Misuse. Other Attack Methods. Comparison of the Attack Methods. Classical Security Vulnerabilities. Avoidance of Security Vulnerabilities. 4. Causes And Effects. Weak Links and Multiple Causes. Accidental versus Intentional Causes. 5. Security And Integrity Problems. Intentional Misuse. Security Accidents. Spoofs and Pranks. Intentional Denials of Service. Unintentional Denials of Service. Financial Fraud by Computer. Accidental Financial Losses. Risks in Computer-Based Elections. Jail Security. 6. Threats To Privacy And Well-Being. Needs for Privacy Protection. Privacy Violations. Prevention of Privacy Abuses. Annoyances in Life, Death, and Taxes. What's in a Name? Use of Names as Identifiers. 7. A System-Oriented Perspective. The Not-So-Accidental Holist: A System View. Putting Your Best Interface Forward. Distributed Systems. Woes of System Development. Modeling and Simulation. Coping with Complexity. Techniques for Increasing Reliability. Techniques for Software Development. Techniques for Increasing Security. Risks in Risk Analysis. Risks Considered Global(ly). 8. A Human-Oriented Perspective. The Human Element. Trust in Computer-Related Systems and in People. Computers, Ethics, and the Law. Mixed Signals on Social Responsibility. Group Dynamics. Certification of Computer Professionals. 9. Implications And Conclusions. Where to Place the Blame. Expect the Unexpected! Avoidance of Weak Links. Assessment of the Risks. Assessment of the Feasibility of Avoiding Risks. Risks in the Information Infrastructure. Questions Concerning the NII. Avoidance of Risks. Assessment of the Future. 020155805XT04062001

Kunden Rezensionen

Zu diesem Artikel ist noch keine Rezension vorhanden.
Helfen sie anderen Besuchern und verfassen Sie selbst eine Rezension.