"These are the basic tools to protect confidentiality, integrity and availability of your information. This list has been built with the support of the Information Security and Capacity Project (ISC Project)." (Page 1)
"Ein praktisches, verständliches und effizientes Schutzprogramm für alle, die sich in der digitalen Welt bewegen. Safe Surfer funktioniert wie ein Arbeitsbuch – alle Tipps lassen sich parallel zum Lesen umsetzen. Google, Facebook oder die NSA – wie können wir unsere Privatsphäre im digitalen
...
Zeitalter noch schützen? Diese Frage ist nicht nur in den Medien ein Thema, sondern betrifft uns alle. Denn jeder von uns kann Opfer eines digitalen Anschlags werden. Safe Surfer ist ein praktisches, effizientes Präventionsprogramm für den Nutzer mit IT-Grundkenntnissen. Mit zahlreichen Fallbeispielen und konkreten Ratschlägen für Laptop, Tablet und Smartphone rüsten Sie sich gegen unerlaubte Überwachung, Datenklau, Trickbetrug und Hackerangriffe" (Verlagsbeschreibung)
more
"Given the Internet’s potential for full-spectrum surveillance and information disruption, the marshaling of computer networks represents the next stage of cyberwar. Indeed, it is upon us already. The recent Stuxnet episode, in which Israel fed a malignant computer virus into Iran’s nuclear faci
...
lities, is one such example. Penetration into US government computer systems by Chinese hackers-presumably sponsored by the Chinese government-is another. Together, they point to a new era in the evolution of human conflict. In Cybersecurity: What Everyone Needs to Know, noted experts Peter W. Singer and Allan Friedman lay out how the revolution in military cybernetics occurred and explain where it is headed. They begin with an explanation of what cyberspace is before moving on to discussions of how it can be exploited and why it is so hard to defend. Throughout, they discuss the latest developments in military and security technology. Singer and Friedman close with a discussion of how people and governments can protect themselves." (Publisher description)
more
"Internet censorship poses a large and growing challenge to online freedom of expression around the world. Censorship circumvention tools are critical to bypass restrictions on the internet and thereby to protect free expression online. Circumvention tools are primarily designed to bypass internet f
...
iltering. Therefore, the core principle behind these technologies is to find alternative paths for data packets. These alternative paths use one or more collaborative servers in order to bypass the network of blocking mechanisms. This document provides a comparison among different circumvention tools, both in terms of their technical merits, as well as how users of these tools describe their experience with them. The countries included in this report are Azerbaijan, Burma, China and Iran." (Executive summary, page 9)
more
"This primer provides a broad perspective on the localization of Free/Open Source Software (FOSS) for the benefit of policy- and decision-makers in developing countries. It highlights the benefits and strategies of FOSS localization, along with case studies from various countries that are on the roa
...
d to software freedom. The primer begins with an introduction to localization and the benefits of choosing FOSS over proprietary software. The next section provides a survey of initiatives and efforts in localization of FOSS within the Asia-Pacific region, including best practices and lessons learned specifically in countries such as Viet Nam, Thailand, Cambodia, India and Malaysia. The primer also provides three case studies of localization efforts in Thailand, Lao PDR and Cambodia, as well as recommendations on technical issues, resource allocation, skills and tools, implementation, costs and language considerations. To help localizers get started, two annexes regarding key concepts and the technical aspects of localization are provided. These are intended for project managers and implementers who are planning software localization projects." (Introduction)
more