|
![]() |
|||
|
||||
OverviewThe human condition is plagued by a labyrinth of shortcomings, frailties, and limitations that hinder man from reaching his fullest potential. Therefore, it only makes sense that we find ourselves at the next phase in human evolution where restricted man merges with the infinite possibilities of hyper-evolving technologies. This techno-human transmutation will prove to be THE quantum leap in human progression. The harmonization of technologically extending oneself, consciousness, artificial intelligence and machine learning will reverse the failures of genetic predisposition and limitation. Cyborgification is simply the process of compensating technologically for the inherent limitations of natural man. Cybernetic implants ranging from near-field communication (NFC) tags to pacemakers to neural meshes are already available to consumers. Before this quantum leap, it is essential that device developers implement security-by-design at each stage of the developmental lifecycle to mitigate the privacy and security impacts that could be realized if adversaries compromised vulnerable implant devices. This document briefly examines some contemporary devices and their technical limitations, as well as exploitable attack vectors and some mitigation strategies. Full Product DetailsAuthor: James Scott (University of Manchester UK)Publisher: Createspace Independent Publishing Platform Imprint: Createspace Independent Publishing Platform Dimensions: Width: 15.20cm , Height: 0.40cm , Length: 22.90cm Weight: 0.118kg ISBN: 9781979379021ISBN 10: 1979379025 Pages: 80 Publication Date: 04 November 2017 Audience: General/trade , General Format: Paperback Publisher's Status: Active Availability: Available To Order ![]() We have confirmation that this item is in stock with the supplier. It will be ordered in for you and dispatched immediately. Table of ContentsReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |