Darknet : Geopolitics and Uses.
Material type:
- text
- computer
- online resource
- 9781119522485
- 004.678
- K564.C6 .G393 2018
Cover -- Half-Title Page -- Title Page -- Copyright Page -- Contents -- Preface -- Introduction -- PART 1: New Frontiers and Governance of Digital Space -- 1. Fragmentation and Compartmentalization of Virtual Space -- 1.1. The nymph Carna and Internet census -- 1.2. Dimensions of cyberspace -- 1.3. Deep web, darknet and dark web -- 2. A Society of Control and Panopticism -- 2.1. Horizontal panopticism and cyber-narcissism -- 2.2. The neutrality of the network in question -- 2.2.1. How can network neutrality be preserved? -- 2.2.2. A threatened principle -- 2.3. Going toward an Internet 3.0 and a new form of digital civility? -- 2.3.1. Is cyberspace a public space? -- 2.3.2. Tyrannies of privacy -- 3. The Internet, a Governance Subject to Controversy -- 3.1. ICANN, an influenced institution -- 3.1.1. Is this the end of US supremacy? -- 3.1.2. The role of the GAC -- 3.2. Cybersecurity, domains and electronic addressing -- 3.2.1. The essential role of WHOIS -- 3.2.2. Domain name extension and migration from IPv4 to IPv6 -- 3.3. Who regulates those who are in control? -- 3.3.1. Conflict within ICANN -- 3.3.2. Encrypted networks: a major security issue for ICANN -- PART 2: Crypto-Anarchism, Cryptography and Hidden Networks -- 4. From the ARPANET to the Darknet: When States Lose Cryptographic Warfare -- 4.1. From Minitel to ARPANET -- 4.1.1. Rapid growth -- 4.1.2. The privatization of the Internet -- 4.2. The rise of asymmetric cryptography -- 4.2.1. Steganography -- 4.2.2. Modern cryptographic methods -- 4.2.3. Asymmetric cryptography -- 4.3. "The Crypto Wars are over!" -- 4.3.1. Planetary electronic monitoring -- 4.3.2. "Rendering Big Brother obsolete" -- 4.3.3. Cryptography at the service of hidden networks -- 5. From Sneaker Nets to Darknets -- 5.1. Peer to peer: the first darknets.
5.1.1. P2P against the entertainment industry: David versus Goliath -- 5.1.2. The BitTorrent revolution -- 5.1.3. The emergence of darknets -- 5.2. "Netopias" and darknets: the appearance of parallel networks -- 5.2.1. Cypherpunks and cyberpunk -- 5.2.2. Crypto-anarchism and activism: Peekabooty -- 5.2.3. Freenet -- 5.2.4. It is a small world... -- 5.3. The Tor network -- 5.3.1. The origins of Tor -- 5.3.2. The Tor paradox -- 5.3.3. How Tor works -- 5.3.4. The principle of the .onion address -- 5.3.5. An evolution TOr uses thanks to Tor2Web? -- 6. Geopolitics and Cybersecurity -- 6.1. From "hacktivism" to "cyberwarfare" -- 6.1.1. The first hackers -- 6.1.2. When states engage in cyberwarfare -- 6.1.3. Computer attacks of an unprecedented magnitude -- 6.1.4. The darknet: cybercrime market -- 6.2. Cybercrime, politics and subversion in the "half-world" -- 6.2.1. The "half-world" appeal -- 6.2.2. Fighting crime and Bitcoins: current and future economic and security issues -- Conclusion -- APPENDICES -- Appendix 1: Declaration of Independence of Cyberspace (John P. Barlow, February 1996) -- Appendix 2: Digital Gangster Manifesto -- Glossary -- Bibliography -- Index -- Other titles from iSTE in Information Systems, Web and Pervasive Computing -- EULA.
Description based on publisher supplied metadata and other sources.
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
There are no comments on this title.