![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Social & legal aspects of computing > General
Exploring questions of both exploitation and empowerment, Understanding Social Media provides a critical conceptual toolbox for navigating the evolution and practices of social media. Taking an interdisciplinary and intercultural approach, it explores the key themes and concepts, going beyond specific platforms to show you how to place social media more critically within the changing media landscape. Updated throughout, the Second Edition of this bestselling text includes new and expanded discussions of: Qualitative and quantitative approaches to researching social media Datafication and algorithmic cultures Surveillance, privacy and intimacy The rise of apps and platforms, and how they shape our experiences Sharing economies and social media publics The increasing importance of visual economies AR, VR and social media play Death and digital legacy Tying theory to the real world with a range of contemporary case studies throughout, it is essential reading for students and researchers of social media, digital media, digital culture, and the creative and cultural industries.
In one modest-sized volume, this book offers three valuable sets of knowledge. First, it provides best practice guidance on virtually every large-scale task a modern manager may be involved in-from recruiting and hiring to onboarding and leading teams, and from employee engagement and retention to performance management and working with difficult employees. Second, it explains the essential concepts and practice of a range of effective leadership styles-including (but not limited to) servant leadership, crisis leadership, change agent leadership, and diversity and inclusion leadership. Third, it offers brief case studies from select CISOs and CSOs on how these management and leadership principles and practices play out in real-life workplace situations. The best practice essentials provided throughout this volume will empower aspiring leaders and also enable experienced managers to take their leadership to the next level. Many if not most CISOs and other leaders have had very little, if any, formal training in management and leadership. The select few that have such training usually obtained it through academic courses that take a theoretical, broad brush approach. In contrast, this book provides much actionable guidance in the nitty-gritty tasks that managers must do every day. Lack of management practical knowledge puts CISOs and CSOs at a disadvantage vis-a-vis other executives in the C-suite. They risk being pigeonholed as "security cops" rather than respected business leaders. Many articles on these subjects published in the press are too incomplete and filled with bad information. And combing through the few high-quality sources that are out there, such as Harvard Business Publishing, can take hundreds of dollars in magazine subscription and book purchase fees and weeks or months of reading time. This book puts all the essential information into your hands through a series of concise chapters authored by an award-winning writer.
This book explores the different treatment of writing by women and writing by men in twenty-first-century Spain. Focusing on contemporary Spanish authors Ana Maria Matute (1926-2014), Rosa Montero (1952-), and Lucia Etxebarria (1966-), the author examines how Spanish women writers are marketed in Spain and, in particular, how current marketing strategies reinforce traditional structures of femininity. Through an analysis of their work and lives in the context of the Franco Regime, the Transition to democracy and contemporary Spain, this book provides an innovative study of the construction of the public personae of these key female writers. As social media and the internet transform authors' relationship with their readers, the rapidly shifting publishing industry offers an important context for the difficult balance between high levels of reception and visibility and the persistence of traditional gender stereotypes.
Placing contemporary technological developments in their historical context, this book argues for the importance of law in their regulation. Technological developments are focused upon overcoming physical and human constraints. There are no normative constraints inherent in the quest for ongoing and future technological development. In contrast, law proffers an essential normative constraint. Just because we can do something, does not mean that we should. Through the application of critical legal theory and jurisprudence to pro-actively engage with technology, this book demonstrates why legal thinking should be prioritised in emerging technological futures. This book articulates classic skills and values such as ethics and justice to ensure that future and ongoing legal engagements with socio-technological developments are tempered by legal normative constraints. Encouraging them to foreground questions of justice and critique when thinking about law and technology, the book addresses law students and teachers, lawyers and critical thinkers concerned with the proliferation of technology in our lives.
This book aims to indicate several problems related to apparent ideology understandings that are accepted in communication studies. To this end, we endeavored to touch on produced meanings and power of ideology within media that has transformed in Turkey as from 2000. Samples from different channels of Turkish media rather than theoretical discussion were chosen to trace ideological structurings within Turkish media. It was also cared for studies in the book to complete each other; by this means, we also wanted to provide convenience for the reader to comprehend the ideological structuring of transformation in Turkish media after 2000.
This book explores the gamer's dilemma, which lies at the heart of theorising about the morality of certain video game content. The dilemma is as follows: given that gaming content involves virtual characters within a virtual environment, the moral permission of virtual murder would also appear to morally permit virtual paedophilia. Yet most gamers and members of wider society would not want to play, endorse, or find in any way morally acceptable the enactment of virtual paedophilia within a video game. Yet by accepting the moral permissibility of virtual murder they leave themselves vulnerable to having to accept the moral permissibility of virtual paedophilia. This book provides an incredibly thorough and systematic analysis and evaluation of the gamer's dilemma, by considering the origins of the intuitions around the dilemma, and exploring whether they find support from traditional or contemporary moral theory and psychological research. The book will be great interest to academics and students of philosophy and psychology, as well as members of the wider public interested in video game violence and taboo enactments more generally.
Is your enterprise's strategy for cybersecurity just crossing its fingers and hoping nothing bad ever happens? If so...you're not alone. Getting cybersecurity right is all too often an afterthought for Fortune 500 firms, bolted on and hopefully creating a secure environment. We all know this approach doesn't work, but what should a smart enterprise do to stay safe? Today, cybersecurity is no longer just a tech issue. In reality, it never was. It's a management issue, a leadership issue, a strategy issue: It's a "must have right"...a survival issue. Business leaders and IT managers alike need a new paradigm to work together and succeed. After years of distinguished work as a corporate executive, board member, author, consultant, and expert witness in the field of risk management and cybersecurity, David X Martin is THE pioneering thought leader in the new field of CyRMSM. Martin has created an entirely new paradigm that approaches security as a business problem and aligns it with business needs. He is the go-to guy on this vitally important issue. In this new book, Martin shares his experience and expertise to help you navigate today's dangerous cybersecurity terrain, and take proactive steps to prepare your company-and yourself -to survive, thrive, and keep your data (and your reputation) secure.
This book assesses the normative and practical challenges for artificial intelligence (AI) regulation, offers comprehensive information on the laws that currently shape or restrict the design or use of AI, and develops policy recommendations for those areas in which regulation is most urgently needed. By gathering contributions from scholars who are experts in their respective fields of legal research, it demonstrates that AI regulation is not a specialized sub-discipline, but affects the entire legal system and thus concerns all lawyers. Machine learning-based technology, which lies at the heart of what is commonly referred to as AI, is increasingly being employed to make policy and business decisions with broad social impacts, and therefore runs the risk of causing wide-scale damage. At the same time, AI technology is becoming more and more complex and difficult to understand, making it harder to determine whether or not it is being used in accordance with the law. In light of this situation, even tech enthusiasts are calling for stricter regulation of AI. Legislators, too, are stepping in and have begun to pass AI laws, including the prohibition of automated decision-making systems in Article 22 of the General Data Protection Regulation, the New York City AI transparency bill, and the 2017 amendments to the German Cartel Act and German Administrative Procedure Act. While the belief that something needs to be done is widely shared, there is far less clarity about what exactly can or should be done, or what effective regulation might look like. The book is divided into two major parts, the first of which focuses on features common to most AI systems, and explores how they relate to the legal framework for data-driven technologies, which already exists in the form of (national and supra-national) constitutional law, EU data protection and competition law, and anti-discrimination law. In the second part, the book examines in detail a number of relevant sectors in which AI is increasingly shaping decision-making processes, ranging from the notorious social media and the legal, financial and healthcare industries, to fields like law enforcement and tax law, in which we can observe how regulation by AI is becoming a reality.
Security without Obscurity: Frequently Asked Questions (FAQ) complements Jeff Stapleton's three other Security without Obscurity books to provide clear information and answers to the most commonly asked questions about information security (IS) solutions that use or rely on cryptography and key management methods. There are good and bad cryptography, bad ways of using good cryptography, and both good and bad key management methods. Consequently, information security solutions often have common but somewhat unique issues. These common and unique issues are expressed as an FAQ organized by related topic areas. The FAQ in this book can be used as a reference guide to help address such issues. Cybersecurity is based on information technology (IT) that is managed using IS controls, but there is information, misinformation, and disinformation. Information reflects things that are accurate about security standards, models, protocols, algorithms, and products. Misinformation includes misnomers, misunderstandings, and lack of knowledge. Disinformation can occur when marketing claims either misuse or abuse terminology, alluding to things that are inaccurate or subjective. This FAQ provides information and distills misinformation and disinformation about cybersecurity. This book will be useful to security professionals, technology professionals, assessors, auditors, managers, and hopefully even senior management who want a quick, straightforward answer to their questions. It will serve as a quick reference to always have ready on an office shelf. As any good security professional knows, no one can know everything.
This volume presents analyses of data protection systems and of 26 jurisdictions with data protection legislation in Africa, as well as additional selected countries without comprehensive data protection laws. In addition, it covers all sub-regional and regional data privacy policies in Africa. Apart from analysing data protection law, the book focuses on the socio-economic contexts, political settings and legal culture in which such laws developed and operate. It bases its analyses on the African legal culture and comparative international data privacy law. In Africa protection of personal data, the central preoccupation of data privacy laws, is on the policy agenda. The recently adopted African Union Cyber Security and Data Protection Convention 2014, which is the first and currently the only single treaty across the globe to address data protection outside Europe, serves as an illustration of such interest. In addition, there are data protection frameworks at sub-regional levels for West Africa, East Africa and Southern Africa. Similarly, laws on protection of personal data are increasingly being adopted at national plane. Yet despite these data privacy law reforms there is very little literature about data privacy law in Africa and its recent developments. This book fills that gap.
Today's high-speed and rapidly changing development environments demand equally high-speed security practices. Still, achieving security remains a human endeavor, a core part of designing, generating and verifying software. Dr. James Ransome and Brook S.E. Schoenfield have built upon their previous works to explain that security starts with people; ultimately, humans generate software security. People collectively act through a particular and distinct set of methodologies, processes, and technologies that the authors have brought together into a newly designed, holistic, generic software development lifecycle facilitating software security at Agile, DevOps speed. -Eric. S. Yuan, Founder and CEO, Zoom Video Communications, Inc. It is essential that we embrace a mantra that ensures security is baked in throughout any development process. Ransome and Schoenfield leverage their abundance of experience and knowledge to clearly define why and how we need to build this new model around an understanding that the human element is the ultimate key to success. -Jennifer Sunshine Steffens, CEO of IOActive Both practical and strategic, Building in Security at Agile Speed is an invaluable resource for change leaders committed to building secure software solutions in a world characterized by increasing threats and uncertainty. Ransome and Schoenfield brilliantly demonstrate why creating robust software is a result of not only technical, but deeply human elements of agile ways of working. -Jorgen Hesselberg, author of Unlocking Agility and Cofounder of Comparative Agility The proliferation of open source components and distributed software services makes the principles detailed in Building in Security at Agile Speed more relevant than ever. Incorporating the principles and detailed guidance in this book into your SDLC is a must for all software developers and IT organizations. -George K Tsantes, CEO of Cyberphos, former partner at Accenture and Principal at EY Detailing the people, processes, and technical aspects of software security, Building in Security at Agile Speed emphasizes that the people element remains critical because software is developed, managed, and exploited by humans. This book presents a step-by-step process for software security that uses today's technology, operational, business, and development methods with a focus on best practice, proven activities, processes, tools, and metrics for any size or type of organization and development practice.
Starting with the inception of an education program and progressing through its development, implementation, delivery, and evaluation, Managing an Information Security and Privacy Awareness and Training Program, Second Edition provides authoritative coverage of nearly everything needed to create an effective training program that is compliant with applicable laws, regulations, and policies. Written by Rebecca Herold, a well-respected information security and privacy expert named one of the "Best Privacy Advisers in the World" multiple times by Computerworld magazine as well as a "Top 13 Influencer in IT Security" by IT Security Magazine, the text supplies a proven framework for creating an awareness and training program. It also:
Complete with case studies and examples from a range of businesses and industries, this all-in-one resource provides the holistic and practical understanding needed to identify and implement the training and awareness methods best suited to, and most effective for, your organization. Praise for: The first edition was outstanding. The new second edition is
even better ... the definitive and indispensable guide for
information security and privacy awareness and training
professionals, worth every cent. As with the first edition, we
recommend it unreservedly..
You know your dog is the cutest but does everyone else know it too? In this book, Loni Edwards, the human behind the world's most influential pets, breaks down the path to fame. Discover insights into the success of social media's top pups and follow the essential steps on the road to fame - from crafting your brand to advocating for your pup on set. With expert guidance on how to be a good dog parent and make sure your pup is happy and healthy every step of the way, this is your one-stop guide to helping your dog win over hearts, one adorable post at a time. Featuring the stories of more than 40 of the most successful pet influencers: 157 of Gemma, Amazing Graciedoodle, Barkley Sir Charles, Bertie Bert the Pom, Bronson the Bully, Brussels Sprout, Bully Baloo, Charlie the Black Shepherd, Chloe the Mini Frenchie (& Emma Bear), Coco the Maltese Dog (Coco & Cici), Cookie Malibu, Crusoe the Celebrity Dachshund, Daily Dougie, Dog named Stella, Ducky the Yorkie, Frame the Weim, Gone to the Snow Dogs, Harlow and Sage, Hi Wiley, Kelly Bove, Lilybug, Lizzie Bear, Louboutina the Hugging Dog, Maya Polar Bear, Mervin the Chihuahua, Milo and Noah, MJ the Beagle, Mr. Biggie, Popeye the Foodie, Puggy Smalls, Reagandoodle, Remix the Dog, Rocco Roni, Super Corgi Jojo, Super Scooty, Tatum, That Goldendoodle, The Bike Dog, Tika the Iggy, Tuna Melts my Heart, Tupey the Borzoi, Verpinscht, Winnie the Cocker, Wolfgang 2242
Save some green by going green with these environmentally friendly gadgets With concern for the future of our environment growing stronger and more serious every day, there has never been a better time to take a new approach to some of the most popular gizmos and gadgets on the market and learn how you can convernt to electronics that have minimal environmental impact. Green gadgets encompass everything from iPods to energy-efficient home entertainment devices to solar laptop chargers and crank-powered gizmos. This helpful resource explains how to research green gadgets, make a smart purchasing decision, use products you already own in a more environmentally friendly way, and say goodbye to electronics that zap both energy and money.Explore the environmental and financial benefits of green gadgets with this friendly referenceDiscusses which gadgets save energy-and which ones create energyLearn ways to offset your carbon footprint when you can't reduce consumptionGet tips for understanding products labels and avoiding "greenwash"Discover how to calculate the energy and money your gadgets consume Get moving and start living green with this informative guide to environmentally and wallet-friendly gadgets Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.
This topical book critically examines the regulatory framework for generic Top-Level Domains (gTLDs) on the Internet. The regulation drawn up by the Internet Corporation for Assigned Names and Numbers (ICANN) applies at a global level, complementing national and international law. These rules form part of a growing body of transnational private regulation. Generic Top-Level Domains offers a clear and engaging analysis of how ICANN has tackled a diverse set of regulatory issues related to the introduction of new gTLDs, such as property rights, competition and consumer protection. Studying recent case law, the book argues for a stronger focus on procedural fairness for future introductions of new gTLDs. It also highlights how ICANN's contractual framework regulates the registration and use of domain names and argues that ICANN's regulatory authority ought to be clarified in order to avoid regulatory overreach. Uniquely comprehensive, this book will appeal to students and scholars with an interest in Internet governance, domain name law and transnational private regulation. Practitioners working in the domain name industry will also find this a valuable resource.
Tackling the cybersecurity challenge is a matter of survival for society at large. Cyber attacks are rapidly increasing in sophistication and magnitude-and in their destructive potential. New threats emerge regularly, the last few years having seen a ransomware boom and distributed denial-of-service attacks leveraging the Internet of Things. For organisations, the use of cybersecurity risk management is essential in order to manage these threats. Yet current frameworks have drawbacks which can lead to the suboptimal allocation of cybersecurity resources. Cyber insurance has been touted as part of the solution - based on the idea that insurers can incentivize companies to improve their cybersecurity by offering premium discounts - but cyber insurance levels remain limited. This is because companies have difficulty determining which cyber insurance products to purchase, and insurance companies struggle to accurately assess cyber risk and thus develop cyber insurance products. To deal with these challenges, this volume presents new models for cybersecurity risk management, partly based on the use of cyber insurance. It contains: A set of mathematical models for cybersecurity risk management, including (i) a model to assist companies in determining their optimal budget allocation between security products and cyber insurance and (ii) a model to assist insurers in designing cyber insurance products. The models use adversarial risk analysis to account for the behavior of threat actors (as well as the behavior of companies and insurers). To inform these models, we draw on psychological and behavioural economics studies of decision-making by individuals regarding cybersecurity and cyber insurance. We also draw on organizational decision-making studies involving cybersecurity and cyber insurance. Its theoretical and methodological findings will appeal to researchers across a wide range of cybersecurity-related disciplines including risk and decision analysis, analytics, technology management, actuarial sciences, behavioural sciences, and economics. The practical findings will help cybersecurity professionals and insurers enhance cybersecurity and cyber insurance, thus benefiting society as a whole. This book grew out of a two-year European Union-funded project under Horizons 2020, called CYBECO (Supporting Cyber Insurance from a Behavioral Choice Perspective).
Les genres discursifs, penses comme outil theorique necessaire pour faciliter la production et la reception des textes, evoluent dans le temps, mais egalement dans l'espace. Chaque aire linguistique et culturelle possede des specificites generiques qui se manifestent dans la realisation des discours mediatiques. En raison de la digitalisation grandissante, les discours mediatiques sont de plus en plus diffuses et consommes sous leur forme numerique, ce qui implique une reconfiguration des pratiques de production et de reception. Le present ouvrage se propose d'examiner les enjeux interculturels de ces discours mediatiques. Les textes reunis dans cet ouvrage font ressortir les contrastes entre le francais et l'allemand, mais egalement entre le francais et d'autres langues.
How cats became the undisputed mascot of the internet. The advertising slogan of the social news site Reddit is "Come for the cats. Stay for the empathy." Journalists and their readers seem to need no explanation for the line, "The internet is made of cats." Everyone understands the joke, but few know how it started. A Unified Theory of Cats on the Internet is the first book to explore the history of how the cat became the internet's best friend. Internet cats can differ in dramatic ways, from the goth cats of Twitter to the glamourpusses of Instagram to the giddy, nonsensical silliness of Nyan Cat. But they all share common traits and values. Bringing together fun anecdotes, thoughtful analyses, and hidden histories of the communities that built the internet, Elyse White shows how japonisme, punk culture, cute culture, and the battle among different communities for the soul of the internet informed the sensibility of online felines. Internet cats offer a playful-and useful-way to understand how culture shapes and is shaped by technology. Western culture has used cats for centuries as symbols of darkness, pathos, and alienation, and the communities that helped build the internet explicitly constructed themselves as outsiders, with snark and alienation at the core of their identity. Thus cats became the sine qua non of cultural literacy for the Extremely Online, not to mention an everyday medium of expression for the rest of us. Whatever direction the internet takes next, the "series of tubes" is likely to remain cat-shaped.
Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks to build an air-tight information security (IS) program and governance structure. Defining the leadership skills required by IS officers, the book examines the pros and cons of different reporting structures and highlights the various control frameworks available. It details the functions of the security department and considers the control areas, including physical, network, application, business continuity/disaster recover, and identity management. Todd Fitzgerald explains how to establish a solid foundation for building your security program and shares time-tested insights about what works and what doesn't when building an IS program. Highlighting security considerations for managerial, technical, and operational controls, it provides helpful tips for selling your program to management. It also includes tools to help you create a workable IS charter and your own IS policies. Based on proven experience rather than theory, the book gives you the tools and real-world insight needed to secure your information while ensuring compliance with government regulations.
The every person's guide to social media... how to use it and what never to do. Are you trying to figure out how to safely use social media but finding yourself struggling? Here's a book specifically designed to help regular people figure out social media platforms. It begins with a chapter about social media basics: how they normally work, why people use them, and general safety tips. It is easy to get confused by the large number of options that are out there so this book breaks down each major network into its own chapter. Chapters are included for: Facebook Snapchat Pinterest LinkedIn Instagram YouTube Twitter Reddit, and Tumblr. Because each social media platform has its their own rules, benefits, and challenges, each chapter gives a summary of the platform and tells the reader why people use it. Next, each chapter has a glossary of terms to explain language and slang that are used. This will help people who are new to social media learn about terminology like subreddits, retweets, and more. If readers decide to use the platform (or already use it and want to learn more), each chapter guides users through a "how-to" of using each platform. This includes the basic functionality, setting up profiles, settings, and odd features that even current users may not know about. Privacy and safety are also covered, with a platform-specific section devoted to these important issues in each chapter. Two final chapters cover other notable social media platforms that readers might want to know about and archiving tips for saving social media posts and information. This book can help people new to social media, people joining new social media, and people who are already on but want to learn how to better manage and protect their accounts.
Analyzing and Securing Social Networks focuses on the two major technologies that have been developed for online social networks (OSNs): (i) data mining technologies for analyzing these networks and extracting useful information such as location, demographics, and sentiments of the participants of the network, and (ii) security and privacy technologies that ensure the privacy of the participants of the network as well as provide controlled access to the information posted and exchanged by the participants. The authors explore security and privacy issues for social media systems, analyze such systems, and discuss prototypes they have developed for social media systems whose data are represented using semantic web technologies. These experimental systems have been developed at The University of Texas at Dallas. The material in this book, together with the numerous references listed in each chapter, have been used for a graduate-level course at The University of Texas at Dallas on analyzing and securing social media. Several experimental systems developed by graduate students are also provided. The book is divided into nine main sections: (1) supporting technologies, (2) basics of analyzing and securing social networks, (3) the authors' design and implementation of various social network analytics tools, (4) privacy aspects of social networks, (5) access control and inference control for social networks, (6) experimental systems designed or developed by the authors on analyzing and securing social networks, (7) social media application systems developed by the authors, (8) secure social media systems developed by the authors, and (9) some of the authors' exploratory work and further directions.
As the distributed architecture underpinning the initial Bitcoin anarcho-capitalist, libertarian project, 'blockchain' entered wider public imagination and vocabulary only very recently. Yet in a short space of time it has become more mainstream and synonymous with a spectacular variety of commercial and civic 'problem'/'solution' concepts and ideals. From commodity provenance, to electoral fraud prevention, to a wholesale decentralisation of power and the banishing of the exploitative practices of 'middlemen', blockchain stakeholders are nothing short of evangelical in their belief that it is a force for good. For these reasons and more the technology has captured the attention of entrepreneurs, venture capitalists, global corporations and governments the world over. Blockchain may indeed offer a unique technical opportunity to change cultures of transparency and trust within cyberspace, and as 'revolutionary' and 'disruptive' has the potential to shift global socioeconomic and political conventions. But as a yet largely unregulated, solutionist-driven phenomenon, blockchain exists squarely within the boundaries of capitalist logic and reason, fast becoming central to the business models of many sources of financial and political power the technology was specifically designed to undo, and increasingly allied to neoliberal strategies with scant regard for collective, political or democratic accountability in the public interest. Regulating Blockchain casts a critical eye over the technology, its 'ecosystem' of stakeholders, and offers a challenge to the prevailing discourse proclaiming it to be the great techno-social enabler of our times.
A heterogeneous network is a network which connects computers and other devices with different operating systems, protocols, or access technologies. By definition, managing heterogenous networks is more difficult that homogenous networks. Confidentiality, integrity, availability (CIA) remain the foundation of security. This book sheds light upon security threats, defenses, and remediation on various networking and data processing domains, including wired networks, wireless networks, mobile ad-hoc networks, wireless sensor networks, and social networks through the prisms of confidentiality, integrity, availability, authentication, and access control. The book is broken into different chapters that explore central subjects and themes in the development of the heterogenous networks we see today. The chapters look at: Access control methods in cloud-enabled Internet of Things Secure routing algorithms for mobile ad-hoc networks Building security trust in mobile ad-hoc networks using soft computing methods The use and development of Blockchain technology, with a particular focus on the nonce-free hash generation in Blockchain Password authentication and keystroke biometrics Health care data analytics over Big Data Bluetooth: and its open issues for managing security services in heterogenous networks Managing Security Services in Heterogenous Networks will be a valuable resource for a whole host of undergraduate and postgraduate students studying related topics, as well as career professionals who have to effectively manage heterogenous networks in the workplace.
Providing comprehensive coverage of cyberspace and cybersecurity, this textbook not only focuses on technologies but also explores human factors and organizational perspectives and emphasizes why asset identification should be the cornerstone of any information security strategy. Topics include addressing vulnerabilities, building a secure enterprise, blocking intrusions, ethical and legal issues, and business continuity. Updates include topics such as cyber risks in mobile telephony, steganography, cybersecurity as an added value, ransomware defense, review of recent cyber laws, new types of cybercrime, plus new chapters on digital currencies and encryption key management. |
![]() ![]() You may like...
Computational Diffusion MRI…
Elisenda Bonet-Carne, Francesco Grussu, …
Hardcover
R2,934
Discovery Miles 29 340
Conceptual Foundations of Materials…
Steven G. Louie, Marvin L. Cohen
Hardcover
R5,511
Discovery Miles 55 110
Real-Time Visual Effects for Game…
Chang-Hun Kim, Sun-Jeong Kim, …
Hardcover
Pearson Edexcel GCSE (9-1) Computer…
Ann Weidmann, Cynthia Selby, …
Paperback
R1,077
Discovery Miles 10 770
Engineering Education 4.0 - Excellent…
Sulamith Frerich, Tobias Meisen, …
Hardcover
R6,550
Discovery Miles 65 500
|