New Book on Computer Security

The Civilization of Cyberspace by K J Hamer-Hodges
Visit www.sipantic.net to place advanced orders.
Cyberspace in the 21st Century and beyond is far more dangerous than anyone appreciates. It is not just endless, poorly guarded information; it is limitless battlegrounds in a software empowered war between good and evil in a conflicted world. Worse still, General-Purpose Computer Science replaces the standards of democracy with corrupt digital dictatorships. The Civilization of Cyberspace is the fight for a Digital Democracy that meets the needs of freedom loving nations. A level digital playing field without the centralized hacker privileges used by isolated mainframes architectures from the Cold War.
A mathematical machine is engineered for the people, instead of dictators, monopolies, criminals, and enemies. Kenneth J Hamer-Hodges wrote this microcode for the first capability-based computer. The PP250 deconstructed statically compiled procedures into dynamic object-oriented machine code, where digital boundaries detect and prevent malware and hacking. He takes a deep dive into the dilemmas of the General-Purpose Computer, using history to explain nature's fail-safe, future-safe machinery of life. A universal model of computation revealed by the Church-Turing Thesis. Kenneth shows how form and function define the DNA of object boundaries needed for the flawless
automation of software that obeys all the laws of the λ-calculus.
The PP250 pioneered this Church-Turing Computer Architecture by adding a λ-calculus meta-machine. Distributing the mathematical powers of software this way protects the future. Crucially, the λ-calculus secures private data in the hands of concerned individuals. A capability controlled, software-run society using a true to form level playing field, where digital computations are data-tight, and the colonization of cyberspace is mathematically pure, equal and just to one and all. The commercial computer is security limited by centralized Identity Based Access Control while increasing complexity plus Artificial Intelligent Malware guarantees impending national disasters. Ken simplifies the opaque art of cyber security to explain, in human terms for all to understand, the need for trusted mathematical machines that began in Babylon with the Abacus.

Comments