Search database
Filter
7
Topics
Cybersecurity, Digital Safety, Privacy, Right to Privacy
4
Computer Networks, Local Area Networks (LAN)
4
Network Software
3
Open Source Software
3
Internet Censorship Circumvention Tools & Strategies
1
Cyberwarfare, Cyber Operations: Attacking Enemy Computers, Software, and Control Systems
1
Language
Document type
Countries / Regions
Authors & Publishers
Media focus
Publication Years
Output Type
"These are the basic tools to protect confidentiality, integrity and availability of your information. This list has been built with the support of the Information Security and Capacity Project (ISC Project)." (Page 1)
"Ein praktisches, verständliches und effizientes Schutzprogramm für alle, die sich in der digitalen Welt bewegen. Safe Surfer funktioniert wie ein Arbeitsbuch – alle Tipps lassen sich parallel zum Lesen umsetzen. Google, Facebook oder die NSA – wie können wir unsere Privatsphäre im digitalen ... more
"Given the Internet’s potential for full-spectrum surveillance and information disruption, the marshaling of computer networks represents the next stage of cyberwar. Indeed, it is upon us already. The recent Stuxnet episode, in which Israel fed a malignant computer virus into Iran’s nuclear faci ... more
"Internet censorship poses a large and growing challenge to online freedom of expression around the world. Censorship circumvention tools are critical to bypass restrictions on the internet and thereby to protect free expression online. Circumvention tools are primarily designed to bypass internet f ... more
"This primer provides a broad perspective on the localization of Free/Open Source Software (FOSS) for the benefit of policy- and decision-makers in developing countries. It highlights the benefits and strategies of FOSS localization, along with case studies from various countries that are on the roa ... more