0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (121)
  • R250 - R500 (230)
  • R500+ (761)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

Information And Communications Technology Law (Paperback, 3rd Edition): Dana van der Merwe Information And Communications Technology Law (Paperback, 3rd Edition)
Dana van der Merwe
R1,320 R1,208 Discovery Miles 12 080 Save R112 (8%) In Stock

This title is meant to convey the emphasis which is now placed on the valuable contents of the safe (the information) rather than just on the safe in which those contents are stored (the computer).

It should also convey to potential readers the impact of information communication technologies on the law, the increasing importance of telecommunications law and legal aspects of electronic commerce and the convergence between these fields and IT law.

Broken Code - Inside Facebook And The Fight To Expose Its Toxic Secrets (Paperback): Jeff Horwitz Broken Code - Inside Facebook And The Fight To Expose Its Toxic Secrets (Paperback)
Jeff Horwitz
R485 R265 Discovery Miles 2 650 Save R220 (45%) In Stock

Facebook had a problem. Along with its sister platforms Instagram and WhatsApp, it was a daily destination for billions of users around the world, extolling its products for connecting people. But as a succession of scandals rocked Facebook from 2016, some began to question whether the company could control, or even understood, its own platforms.

As Facebook employees searched for answers, what they uncovered was worse than they could've imagined. The problems ran far deeper than politics. Facebook was peddling and amplifying anger, looking the other way at human trafficking, enabling drug cartels and authoritarians and allowing VIP users to break the platform's supposedly inviolable rules.

It turned out to be eminently possible to isolate many of Facebook's worst problems, but whenever employees offered solutions their work was consistently delayed, watered down or stifled by a company that valued user engagement above all else. The only option left was to blow the whistle.

In Broken Code, award-winning Wall Street Journal reporter Jeff Horwitz tells the riveting inside story of these employees and their explosive discoveries, uncovering the shocking cost of Facebook's blind ambition in the process.

Pegasus - The Story Of The World's Most Dangerous Spyware (Paperback): Laurent Richard, Sandrine Rigaud Pegasus - The Story Of The World's Most Dangerous Spyware (Paperback)
Laurent Richard, Sandrine Rigaud
R401 Discovery Miles 4 010 Ships in 10 - 15 working days

The gripping, behind-the scenes story of one of the most sophisticated surveillance weapons ever created, which is threatening democracy and human rights.

Pegasus is widely regarded as the most powerful cyber-surveillance system on the market – available to any government that can afford its multimillion-dollar price tag. The system’s creator, the NSO group, a private corporation headquartered in Israel, boasts about its ability to thwart terrorists and criminals: ‘Thousands of people in Europe owe their lives to hundreds of our company employees’, they declared in 2019. That may be true – but the Pegasus system doesn’t just catch bad guys.

Pegasus has been used by repressive regimes to spy on thousands of innocent people around the world: heads of state, diplomats, human rights defenders, lawyers, political opponents, and journalists. Virtually undetectable, the system can track a person’s daily movement in real time, gain control of the device’s microphones and cameras at will, and capture all videos, photos, emails, texts, and passwords – encrypted or not. Its full reach is not even known.

This is the gripping story of how Pegasus was uncovered, written by Laurent Richard and Sandrine Rigaud, the two intrepid reporters who revealed the scandal in collaboration with an international consortium of journalists. They received a leaked list of 50,000 mobile phone numbers, but they needed to prove NSO’s involvement. After a dangerous and secretive investigation spanning the globe, their findings shook the world. Tense and compelling, Pegasus reveals how thousands of lives have been turned upside down by this unprecedented threat, and exposes the chilling new ways governments and corporations are laying waste to human rights – and silencing innocent citizens.

The Age of AI - And Our Human Future (Paperback): Henry A. Kissinger, Eric Schmidt, Daniel Huttenlocher The Age of AI - And Our Human Future (Paperback)
Henry A. Kissinger, Eric Schmidt, Daniel Huttenlocher
R360 R321 Discovery Miles 3 210 Save R39 (11%) Ships in 5 - 10 working days

A Wall Street Journal Bestseller 'IT SHOULD BE READ BY ANYONE TRYING TO MAKE SENSE OF GEOPOLITICS TODAY' FINANCIAL TIMES Three of our most accomplished and deep thinkers come together to explore Artificial Intelligence (AI) and the way it is transforming human society - and what it means for us all. An AI learned to win chess by making moves human grand masters had never conceived. Another AI discovered a new antibiotic by analysing molecular properties human scientists did not understand. Now, AI-powered jets are defeating experienced human pilots in simulated dogfights. AI is coming online in searching, streaming, medicine, education, and many other fields and, in so doing, transforming how humans are experiencing reality. In The Age of AI, three leading thinkers have come together to consider how AI will change our relationships with knowledge, politics, and the societies in which we live. The Age of AI is an essential roadmap to our present and our future, an era unlike any that has come before.

EU General Data Protection Regulation (GDPR) - An Implementation and Compliance Guide (Paperback, 3rd ed.): It Governance... EU General Data Protection Regulation (GDPR) - An Implementation and Compliance Guide (Paperback, 3rd ed.)
It Governance Privacy Team
R762 Discovery Miles 7 620 Ships in 10 - 15 working days
Permanent Record (Paperback): Edward Snowden Permanent Record (Paperback)
Edward Snowden
R299 R271 Discovery Miles 2 710 Save R28 (9%) Ships in 5 - 10 working days

Edward Snowden, the man who risked everything to expose the US government’s system of mass surveillance, reveals for the first time the story of his life, including how he helped to build that system and what motivated him to try to bring it down.

In 2013, twenty-nine-year-old Edward Snowden shocked the world when he broke with the American intelligence establishment and revealed that the United States government was secretly pursuing the means to collect every single phone call, text message, and email. The result would be an unprecedented system of mass surveillance with the ability to pry into the private lives of every person on earth. Six years later, Snowden reveals for the very first time how he helped to build this system and why he was moved to expose it.

Spanning the bucolic Beltway suburbs of his childhood and the clandestine CIA and NSA postings of his adulthood, Permanent Record is the extraordinary account of a bright young man who grew up online – a man who became a spy, a whistleblower, and, in exile, the Internet’s conscience. Written with wit, grace, passion, and an unflinching candor, Permanent Record is a crucial memoir of our digital age and destined to be a classic.

#Myprivacy #Myright - Protect It While You Can (Hardcover): Robin M Singh #Myprivacy #Myright - Protect It While You Can (Hardcover)
Robin M Singh
R536 Discovery Miles 5 360 Ships in 10 - 15 working days
Security and Privacy Management, Techniques, and Protocols (Hardcover): Yassine Maleh Security and Privacy Management, Techniques, and Protocols (Hardcover)
Yassine Maleh
R5,124 Discovery Miles 51 240 Ships in 18 - 22 working days

The security of information and communication technology is a high priority for any organization. By examining the current problems and challenges this domain is facing, more efficient strategies can be established to safeguard personal information against invasive pressures. Security and Privacy Management, Techniques, and Protocols is a critical scholarly resource that examines emerging protocols and methods for effective management of information security at organizations. Featuring coverage on a broad range of topics such as cryptography, secure routing protocols, and wireless security, this book is geared towards academicians, engineers, IT specialists, researchers, and students seeking current research on security and privacy management.

Handbook of Research on Advanced Practical Approaches to Deepfake Detection and Applications (Hardcover): Ahmed J. Obaid,... Handbook of Research on Advanced Practical Approaches to Deepfake Detection and Applications (Hardcover)
Ahmed J. Obaid, Ghassan H Abdul-Majeed, Adriana Burlea-Schiopoiu, Parul Aggarwal
R7,311 Discovery Miles 73 110 Ships in 18 - 22 working days

In recent years, falsification and digital modification of video clips, images, as well as textual contents have become widespread and numerous, especially when deepfake technologies are adopted in many sources. Due to adopted deepfake techniques, a lot of content currently cannot be recognized from its original sources. As a result, the field of study previously devoted to general multimedia forensics has been revived. The Handbook of Research on Advanced Practical Approaches to Deepfake Detection and Applications discusses the recent techniques and applications of illustration, generation, and detection of deepfake content in multimedia. It introduces the techniques and gives an overview of deepfake applications, types of deepfakes, the algorithms and applications used in deepfakes, recent challenges and problems, and practical applications to identify, generate, and detect deepfakes. Covering topics such as anomaly detection, intrusion detection, and security enhancement, this major reference work is a comprehensive resource for cyber security specialists, government officials, law enforcement, business leaders, students and faculty of higher education, librarians, researchers, and academicians.

Elementary... the Art and Science of Finding Information - Achieving More Knowledge Advantage through OSINT - Revised and... Elementary... the Art and Science of Finding Information - Achieving More Knowledge Advantage through OSINT - Revised and Expanded Edition (Hardcover)
Miguel Fernandez, Alan Millington, Mark Monday
R1,097 Discovery Miles 10 970 Ships in 18 - 22 working days
Handbook of Research on Intelligent Data Processing and Information Security Systems (Hardcover): Stepan Mykolayovych Bilan,... Handbook of Research on Intelligent Data Processing and Information Security Systems (Hardcover)
Stepan Mykolayovych Bilan, Saleem Issa Al-Zoubi
R9,365 Discovery Miles 93 650 Ships in 18 - 22 working days

Intelligent technologies have emerged as imperative tools in computer science and information security. However, advanced computing practices have preceded new methods of attacks on the storage and transmission of data. Developing approaches such as image processing and pattern recognition are susceptible to breaches in security. Modern protection methods for these innovative techniques require additional research. The Handbook of Research on Intelligent Data Processing and Information Security Systems provides emerging research exploring the theoretical and practical aspects of cyber protection and applications within computer science and telecommunications. Special attention is paid to data encryption, steganography, image processing, and recognition, and it targets professionals who want to improve their knowledge in order to increase strategic capabilities and organizational effectiveness. As such, this book is ideal for analysts, programmers, computer engineers, software engineers, mathematicians, data scientists, developers, IT specialists, academicians, researchers, and students within fields of information technology, information security, robotics, artificial intelligence, image processing, computer science, and telecommunications.

Cyber Security and Threats - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover): Information Reso Management... Cyber Security and Threats - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover)
Information Reso Management Association
R9,416 Discovery Miles 94 160 Ships in 18 - 22 working days
Your Safety and Privacy Online - The CIA and NSA (Hardcover): Siggi Bjarnason Your Safety and Privacy Online - The CIA and NSA (Hardcover)
Siggi Bjarnason
R520 R489 Discovery Miles 4 890 Save R31 (6%) Ships in 18 - 22 working days
Cyber Security and Threats - Concepts, Methodologies, Tools, and Applications, VOL 2 (Hardcover): Information Reso Management... Cyber Security and Threats - Concepts, Methodologies, Tools, and Applications, VOL 2 (Hardcover)
Information Reso Management Association
R9,416 Discovery Miles 94 160 Ships in 18 - 22 working days
Advanced Methodologies and Technologies in System Security, Information Privacy, and Forensics (Hardcover): Mehdi Khosrowpour Advanced Methodologies and Technologies in System Security, Information Privacy, and Forensics (Hardcover)
Mehdi Khosrowpour
R7,137 Discovery Miles 71 370 Ships in 18 - 22 working days

Cyber-attacks are rapidly becoming one of the most prevalent issues globally, and as they continue to escalate, it is imperative to explore new approaches and technologies that help ensure the security of the online community. Beyond cyber-attacks, personal information is now routinely and exclusively housed in cloud-based systems. The rising use of information technologies requires stronger information security and system procedures to reduce the risk of information breaches. Advanced Methodologies and Technologies in System Security, Information Privacy, and Forensics presents emerging research and methods on preventing information breaches and further securing system networks. While highlighting the rising concerns in information privacy and system security, this book explores the cutting-edge methods combatting digital risks and cyber threats. This book is an important resource for information technology professionals, cybercrime researchers, network analysts, government agencies, business professionals, academicians, and practitioners seeking the most up-to-date information and methodologies on cybercrime, digital terrorism, network security, and information technology ethics.

Cyber Warfare and Terrorism - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover): Information Reso Management... Cyber Warfare and Terrorism - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover)
Information Reso Management Association
R10,327 Discovery Miles 103 270 Ships in 18 - 22 working days
Using Computational Intelligence for the Dark Web and Illicit Behavior Detection (Hardcover): Romil Rawat, Upinder Kaur, Shadab... Using Computational Intelligence for the Dark Web and Illicit Behavior Detection (Hardcover)
Romil Rawat, Upinder Kaur, Shadab Pasha Khan, Ranjana Sikarwar, K. Sakthidasan Sankaran
R6,212 Discovery Miles 62 120 Ships in 18 - 22 working days

The Dark Web is a known hub that hosts myriad illegal activities behind the veil of anonymity for its users. For years now, law enforcement has been struggling to track these illicit activities and put them to an end. However, the depth and anonymity of the Dark Web has made these efforts difficult, and as cyber criminals have more advanced technologies available to them, the struggle appears to only have the potential to worsen. Law enforcement and government organizations also have emerging technologies on their side, however. It is essential for these organizations to stay up to date on these emerging technologies, such as computational intelligence, in order to put a stop to the illicit activities and behaviors presented in the Dark Web. Using Computational Intelligence for the Dark Web and Illicit Behavior Detection presents the emerging technologies and applications of computational intelligence for the law enforcement of the Dark Web. It features analysis into cybercrime data, examples of the application of computational intelligence in the Dark Web, and provides future opportunities for growth in this field. Covering topics such as cyber threat detection, crime prediction, and keyword extraction, this premier reference source is an essential resource for government organizations, law enforcement agencies, non-profit organizations, politicians, computer scientists, researchers, students, and academicians.

On Thin Ice (Hardcover): Leading Cybersecurity Experts On Thin Ice (Hardcover)
Leading Cybersecurity Experts
R680 Discovery Miles 6 800 Ships in 18 - 22 working days
Coding for Penetration Testers - Building Better Tools (Paperback, 2nd edition): Jason Andress, Ryan Linn Coding for Penetration Testers - Building Better Tools (Paperback, 2nd edition)
Jason Andress, Ryan Linn
R1,040 Discovery Miles 10 400 Ships in 10 - 15 working days

Coding for Penetration Testers: Building Better Tools, Second Edition provides readers with an understanding of the scripting languages that are commonly used when developing tools for penetration testing, also guiding users through specific examples of custom tool development and the situations where such tools might be used. While developing a better understanding of each language, the book presents real-world scenarios and tool development that can be incorporated into a tester's toolkit. This completely updated edition focuses on an expanded discussion on the use of Powershell, and includes practical updates to all tools and coverage.

Intelligent Data Analysis for e-Learning - Enhancing Security and Trustworthiness in Online Learning Systems (Paperback): Jorge... Intelligent Data Analysis for e-Learning - Enhancing Security and Trustworthiness in Online Learning Systems (Paperback)
Jorge Miguel, Santi Caballe, Fatos Xhafa
R2,520 R2,325 Discovery Miles 23 250 Save R195 (8%) Ships in 10 - 15 working days

Intelligent Data Analysis for e-Learning: Enhancing Security and Trustworthiness in Online Learning Systems addresses information security within e-Learning based on trustworthiness assessment and prediction. Over the past decade, many learning management systems have appeared in the education market. Security in these systems is essential for protecting against unfair and dishonest conduct-most notably cheating-however, e-Learning services are often designed and implemented without considering security requirements. This book provides functional approaches of trustworthiness analysis, modeling, assessment, and prediction for stronger security and support in online learning, highlighting the security deficiencies found in most online collaborative learning systems. The book explores trustworthiness methodologies based on collective intelligence than can overcome these deficiencies. It examines trustworthiness analysis that utilizes the large amounts of data-learning activities generate. In addition, as processing this data is costly, the book offers a parallel processing paradigm that can support learning activities in real-time. The book discusses data visualization methods for managing e-Learning, providing the tools needed to analyze the data collected. Using a case-based approach, the book concludes with models and methodologies for evaluating and validating security in e-Learning systems. Indexing: The books of this series are submitted to EI-Compendex and SCOPUS

Privacy and Security Policies in Big Data (Hardcover): Sharvari Tamane, Vijender Kumar Solanki, Nilanjan Dey Privacy and Security Policies in Big Data (Hardcover)
Sharvari Tamane, Vijender Kumar Solanki, Nilanjan Dey
R5,297 Discovery Miles 52 970 Ships in 18 - 22 working days

In recent years, technological advances have led to significant developments within a variety of business applications. In particular, data-driven research provides ample opportunity for enterprise growth, if utilized efficiently. Privacy and Security Policies in Big Data is a pivotal reference source for the latest research on innovative concepts on the management of security and privacy analytics within big data. Featuring extensive coverage on relevant areas such as kinetic knowledge, cognitive analytics, and parallel computing, this publication is an ideal resource for professionals, researchers, academicians, advanced-level students, and technology developers in the field of big data.

A Study of Black Hole Attack Solutions - On AODV Routing Protocol in MANET (Paperback): Elahe Fazeldehkordi, I.S. Dr. Amiri,... A Study of Black Hole Attack Solutions - On AODV Routing Protocol in MANET (Paperback)
Elahe Fazeldehkordi, I.S. Dr. Amiri, Oluwatobi Ayodeji Akanbi
R1,277 Discovery Miles 12 770 Ships in 10 - 15 working days

Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact that they are dynamic, require no fixed infrastructure, and are scalable. However, MANETs are particularly susceptible to several different types of widely perpetrated cyberattack. One of the most common hacks aimed at MANETs is the Black Hole attack, in which a particular node within the network displays itself as having the shortest path for the node whose packets it wants to intercept. Once the packets are drawn to the Black Hole, they are then dropped instead of relayed, and the communication of the MANET is thereby disrupted, without knowledge of the other nodes in the network. Due to the sophistication of the Black Hole attack, there has been a lot of research conducted on how to detect it and prevent it. The authors of this short format title provide their research results on providing an effective solution to Black Hole attacks, including introduction of new MANET routing protocols that can be implemented in order to improve detection accuracy and network parameters such as total dropped packets, end-to-end delay, packet delivery ratio, and routing request overhead.

The Basics of Digital Privacy - Simple Tools to Protect Your Personal Information and Your Identity Online (Paperback): Denny... The Basics of Digital Privacy - Simple Tools to Protect Your Personal Information and Your Identity Online (Paperback)
Denny Cherry
R616 Discovery Miles 6 160 Ships in 10 - 15 working days

Who s watching you online? These days, it s hard to be sure. But the recent Edward Snowden revelations of NSA data mining and the constant threat of identity theft from criminals mean your privacy is in jeopardy.

"The Basics of Digital Privacy" teaches you how to protect the privacy of your data and your identity while surfing, searching, and interacting with others in a virtual world. Author Denny Cherry teaches professionals how to keep huge databases secure, and he will introduce you to the basic concepts of protecting your identity, your financial data, and your personal information from prying eyes while using your computer and smartphone. You ll learn how to stay connected and conduct business online, while protecting your privacy with every keystroke and click.

"The Basics of Digital Privacy" gives you clear, non-technical explanations of how to safely store personal information online, create secure usernames and passwords for websites, and participate in social media without compromising your privacy. Learn how to find out who s watching you online, and what the law has to say about your privacy rights. A great resource for anyone who ventures into the online world on a daily basis
The most straightforward and up-to-date guide to privacy for anyone who goes online for work, school, or personal useReal-world examples show you how cyber criminals commit their crimes, and what you can do to keep your identity and your data safeWritten by author Denny Cherry, who teaches top security professionals how to protect huge databases of informationLearn the best ways to create secure passwords, chat, text, email and conduct business online without compromising your identity and your personal data"

Practical Anonymity - Hiding in Plain Sight Online (Paperback): Pete Loshin Practical Anonymity - Hiding in Plain Sight Online (Paperback)
Pete Loshin
R622 Discovery Miles 6 220 Ships in 10 - 15 working days

For those with legitimate reason to use the Internet anonymously--diplomats, military and other government agencies, journalists, political activists, IT professionals, law enforcement personnel, political refugees and others--anonymous networking provides an invaluable tool, and many good reasons that anonymity can serve a very important purpose. Anonymous use of the Internet is made difficult by the many websites that know everything about us, by the cookies and ad networks, IP-logging ISPs, even nosy officials may get involved. It is no longer possible to turn off browser cookies to be left alone in your online life. "Practical Anonymity: Hiding in Plain Sight Online "shows you how to use the most effective and widely-used anonymity tools--the ones that protect diplomats, military and other government agencies to become invisible online. This "practical "guide skips the theoretical and technical details and focuses on getting from zero to anonymous as fast as possible.

For many, using any of the open-source, peer-reviewed tools for connecting to the Internet via an anonymous network may be (or seem to be) too difficult becausemost of the information about these tools is burdened with discussions of how they work and how to maximize security. Even tech-savvy users may find the burden too great--but actually using the tools can be pretty simple.

The primary market for this book consists of IT professionals who need/want tools for anonymity to test/work around corporate firewalls and router filtering as well as provide anonymity tools to their customers.

Simple, step-by-step instructions for configuring and using anonymous networking software Simple, step-by-step instructions for configuring and using anonymous networking software Use of open source, time-proven and peer-reviewed tools for anonymity Plain-language discussion of actual threats and concrete suggestions for appropriate responses Easy-to-follow tips for safer computing
Simple, step-by-step instructions for configuring and using anonymous networking software Use of open source, time-proven and peer-reviewed tools for anonymity Plain-language discussion of actual threats, and concrete suggestions for appropriate responses Easy to follow tips for safer computing. "

Modern Day Surveillance Ecosystem and Impacts on Privacy (Hardcover): Ananda Mitra Modern Day Surveillance Ecosystem and Impacts on Privacy (Hardcover)
Ananda Mitra
R5,333 Discovery Miles 53 330 Ships in 18 - 22 working days

The notion of surveillance has become increasingly more crucial in public conversation as new tools of observation are obtained by many different players. The traditional notion of "overseeing" is being increasingly replaced by multi-level surveillance where many different actors, at different levels of hierarchy, from the child surveilling the parent to the state surveilling its citizens, are entering the surveillance theater. This creates a unique surveillance ecosystem where the individual is observed not only as an analog flesh-and-blood body moving through real spaces such as a shopping mall, but also tracked as a data point where the volume of data is perpetually and permanently expanding as the digital life story is inscribed in the digital spaces. The combined narrative of the individual is now under surveillance. Modern Day Surveillance Ecosystem and Impacts on Privacy navigates the reader through an understanding of the self as a narrative element that is open for observation and analysis. This book provides a broad-based and theoretically grounded look at the overall processes of surveillance in a global system. Covering topics including commodity, loss of privacy, and big data, this text is essential for researchers, government officials, policymakers, security analysts, lawmakers, teachers, professors, graduate and undergraduate students, practitioners, and academicians interested in communication, technology, surveillance, privacy, and more.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Security, Trust, and Regulatory Aspects…
S. Srinivasan Hardcover R4,930 Discovery Miles 49 300
Handbook of Research on Emerging…
Manish Gupta Hardcover R8,121 Discovery Miles 81 210
Handbook of Research on Medical Data…
Butta Singh, Barjinder Singh Saini, … Hardcover R9,015 Discovery Miles 90 150
Exchanging Terrorism Oxygen for Media…
Mahmoud Eid Hardcover R4,959 Discovery Miles 49 590
Managing IoT and Mobile Technologies…
Shuang Geng, Kris M y Law, … Paperback R1,221 Discovery Miles 12 210
Social Implications of Data Mining and…
Ephrem Eyob Hardcover R4,937 Discovery Miles 49 370
Security, Privacy, and Anonymization in…
B. K. Tripathy, Kiran Baktha Hardcover R3,830 Discovery Miles 38 300
Research Anthology on Combating…
Information R Management Association Hardcover R11,906 Discovery Miles 119 060
Personal Data Privacy and Protection in…
Christina Akrivopoulou Hardcover R4,602 Discovery Miles 46 020
Information Security Management-Global…
Gurpreet Dhillon Paperback R1,854 Discovery Miles 18 540

 

Partners