At ScienceOfTechnology.org we seek to establish and apply the fundamental principles of the new era of Synergetic Technology; but patently this goal can only be achieved with the help of our knowledgeable readership.
Luckily, already a large number of security experts have contributed to our developing Science Of Cybersecurity Framework—and said theory reflect(s) the knowledge of several hundred of these academic researchers, engineers and practitioners. In a like manner, hopefully we can recruit the support of experts in the new subject areas as well.
We are on the lookout for partners/contributors; plus seek details of the very best resources—so drop us a line!
Dr Alan Radley , Blackpool, UK.
Alan Radley is the founder and chief editor of ScienceOfTechnology.org, ScienceOfIoT.com and ScienceOfCybersecurity.com; Plus CTO of Imont and CEO of KeyMail.
Alan holds a Ph.D. in Physics from University College London, and he has worked as a Senior Research Scientist plus Lecturer at NASA / ESA, University College London and General Dynamics. He has given private briefings to the Secretaries of Defence of both the United States and United Kingdom, and also advised the CEOs of organisations such as General Dynamics, British Aerospace, Raytheon Systems and SAIC (NSA).
Alan holds 1 granted patent, and has several others under development. He serves on a number of scientific committees for the International Association of Interactive Communication. Alan has been a member of 60 professional organisations; and he has attended over 100 scientific / technology conferences and meetings worldwide (often as a presenter / keynoter).
Alan has been a co-author / co-editor of 5 handbooks on computing (he is a member of the Editorial Advisory Board for Blue Herons Computing Editions); plus he is a member of the scientific committee for the international Alaipo conferences in Italy and Spain and the CCGIDIS Communicability Symposia.
Alan is the author of several other books including in 2017 the much-heralded “The Science Of Cybersecurity”, and in 2015 the encyclopaedic ‘Self As Computer’.
Science of Smart Things Book
A Treatise On The Programmable World
The Internet of Things or IoT would seem to be a very big deal. Indeed it is claimed that within 20-30 years, over 1 billion Things will be connected to the Internet. Evidently, the IoT will revolutionise almost every area of human life—in the process changing the way(s) that we humans perform business, educational and leisure activities.
But many questions arise. What will this new era of programmable Things be like? Which new capabilities will be enabled—and how will our lives change as a result? Will the IoT limit us in certain detrimental ways—and/or affect our fundamental freedom(s)? What are the potential dangers of the IoT revolution—such as spying, mass-surveillance and reduced/compromised privacy and security—rendering the IoT dream into an IoT nightmare?
Evidently, we must develop IoT solutions that avoid the big dangers and negative potentials that such a powerful new technology could foreshadow. Rather we wish to provide truly humanistic benefits for all of human kind.
Outlined here for the first time is a logical explanation of the fundamental theory and principal axioms of the IoT. Accordingly, we seek to establish a foundational framework for the entire field of: the Internet of Things; and by means of logical, integrated and holistic perspective(s)—combined with use of the scientific method.
Download pdf book: The Science Of Smart Things:
You can purchase “The Science Of Smart Things” on Amazon.
This site is based on the 2018 book: ‘The Science Of Cybersecurity: A Treatise On Communications Security’; which grew out of the “Absolute Security Bulletins” first published in 2015 on LinkedIn.
The Science Of Cybersecurity
A Treatise On Communications Security
How can we characterise Cybersecurity? How do data breaches, hacks, system exploits and computer intrusions happen – and why? What occurs when Cybersecurity really works effectively, and can we systemise it? Or will the clever hacker always break into any networked device, sweeping all defences aside?
On a quest for insightful answers in this ground-breaking book, Dr Alan Radley proceeds to completely deconstruct, rationally analyse, meticulously rebuild and then sanely reassess the entire field of Cybersecurity.
A rigorous scientific methodology is applied to networked system design, leading to a comprehensive new model – and accurate taxonomic tree – of all possible types and classes of cyber attacks and associated countermeasures. The upshot is a wholly original, astute and fearlessly honest – yet practically oriented – treatise on Cybersecurity.
Outlined here for the first time is a logical explanation of the fundamental theory and principal axioms of Cybersecurity as developed from first principles, and in a format ideally suited to both – the engineering-minded professional – and the less technically-oriented.
You can purchase “The Science Of Cybersecurity” on Amazon.
List of Contributors / Reviewers
‘The Science Of Cybersecurity’ has been approved (and contributed to) by over 100 prominent cybersecurity experts, and most are listed below.
Especial thanks to Professor Kim Veltman, Professor Francisco V. Cipolla-Ficarra, Nigel Pugh, Ruth Grundy, Chris Green, Bill Montgomery, Frank Rowland, Vic Hyder, Ross Johnson, Richard Vizor, Michael Krausz, Julian Cordingley, Eugene Panferov, Christian Rogan,Vitali Kremez, Professor John Walker, Sean McGurk, Ahmed W, Troels Oerting, Kent Schramm, Peter E. Sand, Dr Merrick S. Watchorn, Richard Stiennon, Daniel McGarvey, Bruce Roberts, Ricardo Baretzky, Kevin T. McDonald, Jim O’Conner, Jonathan Trull, Marcus H. Sachs, Subrahmanya Gupra Boda, Ross Johnson, Sunil Varkey, David Jordan, Pantazis Kourtis, Benoit Piton, Graham Thompson, Martin Lee, Utkarsh Sinha, Dr Rizwan Ahmad, Laszlo Dellei, Ratan Jyoti,Tony Robinson, Ido Naor, Anthony Scarola, Stuart Naisbett, Anand R. Prasad, Kevin Hickey, Allan Watt, Jonathan Coombes, David Marugan, Dave Brown, Martin Visser, Michael Lester, Paul Kearney, Michael Hopkins, Cedric Thevenet, Colonel John Doody, Paul Crespo, Richard Redditt,Alex Smirnoff, Patric J.M.Versteeg, Christophe Duhamel, Arno Brok, Peter Bassill, Carl Landwehr, Roy Maxion, Dusko Pavlovic, Fred Schneider, Ged Austen,Tim Burnett, Sanjay Basu, Bobby Woodard, Bradley Rotter,Tony Collings (OBE) and Professor Richard Benham for reading/correcting/inspiring and discussing the manuscript—and for supplying expert advice/support inspiration.
Excellent read! Succinct and accurate on a subject that normally wanders into tangential discussions confusing and diffusing the goal. Radley breaks down today’s hottest topic in a way that provides reference to students as well as guidance to the more learned. Absolute Security will give you an optimistic understanding that, even in an ever-increasing world of digital surveillance and criminal threats, … absolute security is eminently achievable… I found it spot on and a fine addition to the body of work on cyber-security but specifically to the discussion of privacy within communications… I see this short book as a reference document for students studying cyber security as well as an excellent read for CTOs, CSOs, CISOs, and CEOs laboring over how to analyze their needs for increased security. Absolute Security allows you to hit the highlights or dive deeper into the subject with your many charts, diagrams, and glossary of terms. Well done.
Vic Hyder – Chief Strategy Officer at Silent Circle. Commander, U.S. Navy (SEAL), retired.
“Absolute Security” will no doubt be recognized as one of the seminal works on security, establishing definitions and clarity where others have dealt with assumptions. It is not very often that one is exposed to a work that is truly ground breaking in a field, but “Absolute Security” is one of those works. Rather than expounding on the implementation of security as many do, Dr. Alan Radley astutely asks (and then suggests an answer for) the rather naive, yet deceptively complex question “What is security?”, or more precisely “How does one characterize a communication system that provides secure (private) data transfer?”
Michael Lester, MSEE, MBA, CIPP/US, CISM
Chief Information Security-Officer/ Vice President, Magenic.
ABSOLUTE SECURITY: A TREATISE ON COMMUNICATIONS SECURITY should be considered required reading for anyone focused on secure and private communication. In this book, Alan Radley makes sense of the complexities which ordinarily restrict this topic to IT people only. What’s more, Alan’s no-nonsense approach and fearless honesty, is refreshing. I recommend this to everyone who is interested in making certain that their communication is more private, secure and resilient.
Bill Montgomery – CEO – Connect In Private Corp.
This is a unique piece of work which correctly recognises the socio-economic implications of modern day embracement, and dependency on technology, and the ever present interface between man-and-machine. The book provides the reader with an accurate and objective view of the life-cycle of the exposures and vulnerabilities which are associated with the technological shadow cast over all individuals, and organisations. As an Expert Witness in the discipline of Digital, this publication also provides very useful descriptions in ‘people-speak’ and includes very accurate definitions of the complex, transposed into understandable terminology. This is an excellent read, and deserves a place on every security professional’s bookshelf who is seeking a balanced and objective of the current, and futuristic Cyber Security Landscape.
Professor John Walker – Nottingham Trent University.
As cyber education evolves to meet the pace of change in our digital world so does the need for good reference books. Absolute Security is a timely and spot on publication that I shall be recommending to my students; well done Dr Radley.
Professor Richard Benham – National Cyber Skills Centre, UK.
In “Absolute Security: A Treatise on Commuications Security”, Dr. Radley exhibited an extraordinary passion for cybersecurity and privacy in the mold of the principles that conform to secure and just society. In a world full of privacy breaches, Radley timely develops a framework that delves into complexity of technical and human-centric factors that affect our perception of privacy and cybersecurity. I recommend this book to everyone who is interested in making our cyber world more secure.
Vitali Kremez – CyberCrime Investigative Analyst.
For someone with over 20 years in IT Security and almost 40 years in ICT it is invigorating to read a book that introduces terminologies that would resonate with the academic world and is not burdened with technical jargon. Reading Absolute Security also raises optimism that as an industry we have a chance in the imbalanced battle against cyber criminals. This also means that the statement ‘there is no such thing as 100% secure’ might be proven wrong. An excellent read and would definitely recommend this to our AISA members as a read to get a different perspective on security.
Arno Brok – Chief Information Security Officer – Australian Information Security Association.