With the radical changes in information production that the Internet has introduced, we stand at an important moment of transition, says Yochai Benkler in this thought-provoking book. The phenomenon ...he describes as social production is reshaping markets, while at the same time offering new opportunities to enhance individual freedom, cultural diversity, political discourse, and justice. But these results are by no means inevitable: a systematic campaign to protect the entrenched industrial information economy of the last century threatens the promise of today's emerging networked information environment.
In this comprehensive social theory of the Internet and the networked information economy, Benkler describes how patterns of information, knowledge, and cultural production are changing-and shows that the way information and knowledge are made available can either limit or enlarge the ways people can create and express themselves. He describes the range of legal and policy choices that confront us and maintains that there is much to be gained-or lost-by the decisions we make today.
Chris Marsden argues that co-regulation is the defining feature of the Internet in Europe. Co-regulation offers the state a route back into questions of legitimacy, governance and human rights, ...thereby opening up more interesting conversations than a static no-regulation versus state regulation binary choice. The basis for the argument is empirical investigation, based on a multi-year, European Commission-funded study and is further reinforced by the direction of travel in European and English law and policy, including the Digital Economy Act 2010. He places Internet regulation within the regulatory mainstream, as an advanced technocratic form of self- and co-regulation which requires governance reform to address a growing constitutional legitimacy gap. The literature review, case studies and analysis shed a welcome light on policymaking at the centre of Internet regulation in Brussels, London and Washington, revealing the extent to which states, firms and, increasingly, citizens are developing a new type of regulatory bargain.
Future communication networks aim to build an intelligent and efficient living environment by connecting a variety of heterogeneous networks to fulfill complicated tasks. These communication networks ...bring significant challenges in building secure and reliable communication networks to address the numerous threat and privacy concerns. New research technologies are essential to preserve privacy, prevent attacks, and achieve the requisite reliability.
Security, Privacy and Reliability in Computer Communications and Networks studies and presents recent advances reflecting the state-of-the-art research achievements in novel cryptographic algorithm design, intrusion detection, privacy preserving techniques and reliable routing protocols.
Technical topics discussed in the book include:
Vulnerabilities and Intrusion Detection
Cryptographic Algorithms and Evaluation
Privacy
Reliable Routing Protocols
This book is ideal for personnel in computer communication and networking industries as well as academic staff and collegial, master, Ph.D. students in computer science, computer engineering, cyber security, information insurance and telecommunication systems.
As companies turn to burgeoning cloud computing technology to streamline and save money, security is a fundamental concern. Loss of certain control and lack of trust make this transition difficult ...unless you know how to handle it. Securing the Cloud discusses making the move to the cloud while securing your piece of it! The cloud offers flexibility, adaptability, scalability, and in the case of security-resilience. This book details the strengths and weaknesses of securing your company's information with different cloud approaches. Attacks can focus on your infrastructure, communications network, data, or services. The author offers a clear and concise framework to secure your business' assets while making the most of this new technology.
Named The 2011 Best Identity Management Book by InfoSec ReviewsProvides a sturdy and stable framework to secure your piece of the cloud, considering alternate approaches such as private vs. public clouds, SaaS vs. IaaS, and loss of control and lack of trustDiscusses the cloud's impact on security roles, highlighting security as a service, data backup, and disaster recoveryDetails the benefits of moving to the cloud-solving for limited availability of space, power, and storage
Network Routing: Algorithms, Protocols, and Architectures, Second Edition explores network routing and how it can be broadly categorized into Internet routing, PSTN routing, and telecommunication ...transport network routing. The book systematically considers these routing paradigms, as well as their interoperability, discussing how algorithms, protocols, analysis, and operational deployment impact these approaches and addressing both macro-state and micro-state in routing. Readers will learn about the evolution of network routing, the role of IP and E.164 addressing and traffic engineering in routing, the impact on router and switching architectures and their design, deployment of network routing protocols, and lessons learned from implementation and operational experience. Numerous real-world examples bring the material alive.
Bridges the gap between theory and practice in network routing, including the fine points of implementation and operational experienceRouting in a multitude of technologies discussed in practical detail, including, IP/MPLS, PSTN, and optical networkingPresents routing protocols such as OSPF, IS-IS, BGP in detailDetails various router and switch architecturesDiscusses algorithms on IP-lookup and packet classificationAccessible to a wide audience with a vendor-neutral approach