0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (118)
  • R250 - R500 (231)
  • R500+ (827)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

EU General Data Protection Regulation (GDPR) - An Implementation and Compliance Guide (Paperback, 3rd ed.): It Governance... EU General Data Protection Regulation (GDPR) - An Implementation and Compliance Guide (Paperback, 3rd ed.)
It Governance Privacy Team
R805 Discovery Miles 8 050 Ships in 12 - 19 working days
Pegasus - The Story Of The World's Most Dangerous Spyware (Paperback): Laurent Richard, Sandrine Rigaud Pegasus - The Story Of The World's Most Dangerous Spyware (Paperback)
Laurent Richard, Sandrine Rigaud
R385 R349 Discovery Miles 3 490 Save R36 (9%) Ships in 5 - 10 working days

The gripping, behind-the scenes story of one of the most sophisticated surveillance weapons ever created, which is threatening democracy and human rights.

Pegasus is widely regarded as the most powerful cyber-surveillance system on the market – available to any government that can afford its multimillion-dollar price tag. The system’s creator, the NSO group, a private corporation headquartered in Israel, boasts about its ability to thwart terrorists and criminals: ‘Thousands of people in Europe owe their lives to hundreds of our company employees’, they declared in 2019. That may be true – but the Pegasus system doesn’t just catch bad guys.

Pegasus has been used by repressive regimes to spy on thousands of innocent people around the world: heads of state, diplomats, human rights defenders, lawyers, political opponents, and journalists. Virtually undetectable, the system can track a person’s daily movement in real time, gain control of the device’s microphones and cameras at will, and capture all videos, photos, emails, texts, and passwords – encrypted or not. Its full reach is not even known.

This is the gripping story of how Pegasus was uncovered, written by Laurent Richard and Sandrine Rigaud, the two intrepid reporters who revealed the scandal in collaboration with an international consortium of journalists. They received a leaked list of 50,000 mobile phone numbers, but they needed to prove NSO’s involvement. After a dangerous and secretive investigation spanning the globe, their findings shook the world. Tense and compelling, Pegasus reveals how thousands of lives have been turned upside down by this unprecedented threat, and exposes the chilling new ways governments and corporations are laying waste to human rights – and silencing innocent citizens.

Research Handbook on Privacy and Data Protection Law - Values, Norms and Global Politics (Hardcover): Gloria Gonzalez,... Research Handbook on Privacy and Data Protection Law - Values, Norms and Global Politics (Hardcover)
Gloria Gonzalez, Rosamunde van Brakel, Paul De Hert
R6,731 Discovery Miles 67 310 Ships in 12 - 19 working days

This Research Handbook is an insightful overview of the key rules, concepts and tensions in privacy and data protection law. It highlights the increasing global significance of this area of law, illustrating the many complexities in the field through a blend of theoretical and empirical perspectives. Providing an excellent in-depth analysis of global privacy and data protection law, it explores multiple regional and national jurisdictions, bringing together interdisciplinary international contributions from Europe and beyond. Chapters cover critical topics in the field, including key features of the General Data Protection Regulation (GDPR), border surveillance, big data, artificial intelligence, and biometrics. It also investigates the relationship between privacy and data protection law and other fields of law, such as consumer law and competition law. With its detailed exploration and insights into privacy and data protection, this Research Handbook will prove a useful resource for information and media law students as well as academics researching fields such as data protection and privacy law and surveillance or security studies.

Smart-Tech Society - Convenience, Control, and Resistance (Hardcover): Mark Whitehead, William G.A. Collier Smart-Tech Society - Convenience, Control, and Resistance (Hardcover)
Mark Whitehead, William G.A. Collier
R3,031 Discovery Miles 30 310 Ships in 12 - 19 working days

Informed by the latest theoretical developments in studies of the social impacts of digital technology, Smart-Tech Society provides an empirically grounded and conceptually informed analysis of the impacts and paradoxes of smart-technology. While making life more convenient, smart-tech has also been associated with a loss of privacy and control over decision-making autonomy. Mark Whitehead and William Collier provide a critical analysis of the lived experience of smart-technology, presenting stories of varied social engagements with digital platforms and devices. Chapters explore the myriad contexts in and through which smart-tech insinuates itself within everyday life, the benefits it brings, and the processes through which it is being resisted. Detailed case studies explore the impacts of smart-technology across a broad range of fields including personal health, work, social life, urban management, and politics. Presenting new empirical evidence and analytical perspectives on the relationships between humans and smart-tech, this book will be of interest to academics and students in the fields of sociology, political science, human geography, and technology studies.

Pandemic Surveillance - Privacy, Security, and Data Ethics (Hardcover): Margaret Hu Pandemic Surveillance - Privacy, Security, and Data Ethics (Hardcover)
Margaret Hu
R3,175 Discovery Miles 31 750 Ships in 12 - 19 working days

As the COVID-19 pandemic surged in 2020, questions of data privacy, cybersecurity, and ethics of the surveillance technologies centred an international conversation on the benefits and disadvantages of the appropriate uses and expansion of cyber surveillance and data tracking. This timely book examines and answers these important concerns. Pandemic Surveillance frames and defines digital privacy and security in the context of emerging surveillance technologies, providing informed dialogue on international conversations regarding pandemic surveillance. The book examines the challenges of regulating pandemic surveillance technologies across diverse geographical settings, including Europe and Latin America, along with comparative analysis of social credit systems in China and the United States. Margaret Hu and her impressive selection of contributors explore the legal, scientific and ethical challenges in a world with a growing data surveillance architecture, providing policy recommendations and forward-looking solutions, including the importance of ethical frameworks, to minimise potential misuse and abuse of surveillance technologies. Delivering a well-rounded examination of pandemic surveillance and data-tracking technologies, this book is a crucial read for researchers and scholars focused on information security and data privacy, including specialists in the area of cyber ethics and data ethics. Students and academics interested in health policy and bioethics will also benefit from the insights in this text.

Identified, Tracked, and Profiled - The Politics of Resisting Facial Recognition Technology (Hardcover): Peter Dauvergne Identified, Tracked, and Profiled - The Politics of Resisting Facial Recognition Technology (Hardcover)
Peter Dauvergne
R2,354 Discovery Miles 23 540 Ships in 12 - 19 working days

Revealing the politics underlying the rapid globalization of facial recognition technology (FRT), this topical book provides a cutting-edge, critical analysis of the expanding global market for FRT, and the rise of the transnational social movement that opposes it. With the use of FRT for policing, surveillance, and business steadily increasing, this book provides a timely examination of both the benefits of FRT, and the threats it poses to privacy rights, human rights, and civil liberties. Interviews with analysts and activists with expertise in FRT find that the anti-FRT movement is highly uneven, with disproportionate influence in Western democracies and relatively little influence in authoritarian states and low-income countries in the developing world. Through a global analysis of the uptake and regulation of FRT, chapters create a holistic understanding of the politics behind this technology. Concluding with a look towards the future prospects of FRT in the face of the growing size, reach, and power of its opposition, the book reflects more broadly on the power of transnational social movements and civil society activism to prevent the globalization and normalization of new technologies. A visionary exploration of FRT, this book will be invaluable to students and scholars of politics and policy, alongside activists, stakeholders, and policy makers interested in the growing power of social movements to resist new technology.

#Myprivacy #Myright - Protect It While You Can (Hardcover): Robin M Singh #Myprivacy #Myright - Protect It While You Can (Hardcover)
Robin M Singh
R565 Discovery Miles 5 650 Ships in 12 - 19 working days
Handbook of Research on Advanced Practical Approaches to Deepfake Detection and Applications (Hardcover): Ahmed J. Obaid,... Handbook of Research on Advanced Practical Approaches to Deepfake Detection and Applications (Hardcover)
Ahmed J. Obaid, Ghassan H Abdul-Majeed, Adriana Burlea-Schiopoiu, Parul Aggarwal
R7,930 Discovery Miles 79 300 Ships in 10 - 15 working days

In recent years, falsification and digital modification of video clips, images, as well as textual contents have become widespread and numerous, especially when deepfake technologies are adopted in many sources. Due to adopted deepfake techniques, a lot of content currently cannot be recognized from its original sources. As a result, the field of study previously devoted to general multimedia forensics has been revived. The Handbook of Research on Advanced Practical Approaches to Deepfake Detection and Applications discusses the recent techniques and applications of illustration, generation, and detection of deepfake content in multimedia. It introduces the techniques and gives an overview of deepfake applications, types of deepfakes, the algorithms and applications used in deepfakes, recent challenges and problems, and practical applications to identify, generate, and detect deepfakes. Covering topics such as anomaly detection, intrusion detection, and security enhancement, this major reference work is a comprehensive resource for cyber security specialists, government officials, law enforcement, business leaders, students and faculty of higher education, librarians, researchers, and academicians.

The Age of AI - And Our Human Future (Paperback): Henry A. Kissinger, Eric Schmidt, Daniel Huttenlocher The Age of AI - And Our Human Future (Paperback)
Henry A. Kissinger, Eric Schmidt, Daniel Huttenlocher
R366 R335 Discovery Miles 3 350 Save R31 (8%) Ships in 12 - 19 working days

A Wall Street Journal Bestseller 'IT SHOULD BE READ BY ANYONE TRYING TO MAKE SENSE OF GEOPOLITICS TODAY' FINANCIAL TIMES Three of our most accomplished and deep thinkers come together to explore Artificial Intelligence (AI) and the way it is transforming human society - and what it means for us all. An AI learned to win chess by making moves human grand masters had never conceived. Another AI discovered a new antibiotic by analysing molecular properties human scientists did not understand. Now, AI-powered jets are defeating experienced human pilots in simulated dogfights. AI is coming online in searching, streaming, medicine, education, and many other fields and, in so doing, transforming how humans are experiencing reality. In The Age of AI, three leading thinkers have come together to consider how AI will change our relationships with knowledge, politics, and the societies in which we live. The Age of AI is an essential roadmap to our present and our future, an era unlike any that has come before.

Online Predators, an Internet Insurgency - A Field Manual for Teaching and Parenting in the Digital Arena (Paperback): Jeffrey... Online Predators, an Internet Insurgency - A Field Manual for Teaching and Parenting in the Digital Arena (Paperback)
Jeffrey A. Lee
R606 Discovery Miles 6 060 Ships in 12 - 19 working days

In Online Predators, An Internet Insurgency: A Field Manual for Teaching and Parenting in the Digital Arena Jeffrey A. Lee brings his ten plus years' experience in the fight against online child exploitation to bear in an easy to follow guide for all with a stake in the life of a child. This book equips parents, guardians, extended family, and educational professionals with practical strategies to help keep kids safe in a technology connected world. Instead of focusing on ever changing technology, Lee proposes a key fundamental change in the fight against online predation-to develop an insatiable curiosity about their child's online life, then get in the front lines and stay there.

Elementary... the Art and Science of Finding Information - Achieving More Knowledge Advantage through OSINT - Revised and... Elementary... the Art and Science of Finding Information - Achieving More Knowledge Advantage through OSINT - Revised and Expanded Edition (Hardcover)
Miguel Fernandez, Alan Millington, Mark Monday
R1,184 Discovery Miles 11 840 Ships in 10 - 15 working days
Handbook of Research on Intelligent Data Processing and Information Security Systems (Hardcover): Stepan Mykolayovych Bilan,... Handbook of Research on Intelligent Data Processing and Information Security Systems (Hardcover)
Stepan Mykolayovych Bilan, Saleem Issa Al-Zoubi
R10,160 Discovery Miles 101 600 Ships in 10 - 15 working days

Intelligent technologies have emerged as imperative tools in computer science and information security. However, advanced computing practices have preceded new methods of attacks on the storage and transmission of data. Developing approaches such as image processing and pattern recognition are susceptible to breaches in security. Modern protection methods for these innovative techniques require additional research. The Handbook of Research on Intelligent Data Processing and Information Security Systems provides emerging research exploring the theoretical and practical aspects of cyber protection and applications within computer science and telecommunications. Special attention is paid to data encryption, steganography, image processing, and recognition, and it targets professionals who want to improve their knowledge in order to increase strategic capabilities and organizational effectiveness. As such, this book is ideal for analysts, programmers, computer engineers, software engineers, mathematicians, data scientists, developers, IT specialists, academicians, researchers, and students within fields of information technology, information security, robotics, artificial intelligence, image processing, computer science, and telecommunications.

Cyber Security and Threats - Concepts, Methodologies, Tools, and Applications, VOL 2 (Hardcover): Information Reso Management... Cyber Security and Threats - Concepts, Methodologies, Tools, and Applications, VOL 2 (Hardcover)
Information Reso Management Association
R10,216 Discovery Miles 102 160 Ships in 10 - 15 working days
Advanced Methodologies and Technologies in System Security, Information Privacy, and Forensics (Hardcover): Mehdi Khosrowpour Advanced Methodologies and Technologies in System Security, Information Privacy, and Forensics (Hardcover)
Mehdi Khosrowpour
R7,742 Discovery Miles 77 420 Ships in 10 - 15 working days

Cyber-attacks are rapidly becoming one of the most prevalent issues globally, and as they continue to escalate, it is imperative to explore new approaches and technologies that help ensure the security of the online community. Beyond cyber-attacks, personal information is now routinely and exclusively housed in cloud-based systems. The rising use of information technologies requires stronger information security and system procedures to reduce the risk of information breaches. Advanced Methodologies and Technologies in System Security, Information Privacy, and Forensics presents emerging research and methods on preventing information breaches and further securing system networks. While highlighting the rising concerns in information privacy and system security, this book explores the cutting-edge methods combatting digital risks and cyber threats. This book is an important resource for information technology professionals, cybercrime researchers, network analysts, government agencies, business professionals, academicians, and practitioners seeking the most up-to-date information and methodologies on cybercrime, digital terrorism, network security, and information technology ethics.

Cyber Security and Threats - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover): Information Reso Management... Cyber Security and Threats - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover)
Information Reso Management Association
R10,216 Discovery Miles 102 160 Ships in 10 - 15 working days
Your Safety and Privacy Online - The CIA and NSA (Hardcover): Siggi Bjarnason Your Safety and Privacy Online - The CIA and NSA (Hardcover)
Siggi Bjarnason
R564 R524 Discovery Miles 5 240 Save R40 (7%) Ships in 10 - 15 working days
On Thin Ice (Hardcover): Leading Cybersecurity Experts On Thin Ice (Hardcover)
Leading Cybersecurity Experts
R731 Discovery Miles 7 310 Ships in 10 - 15 working days
Using Computational Intelligence for the Dark Web and Illicit Behavior Detection (Hardcover): Romil Rawat, Upinder Kaur, Shadab... Using Computational Intelligence for the Dark Web and Illicit Behavior Detection (Hardcover)
Romil Rawat, Upinder Kaur, Shadab Pasha Khan, Ranjana Sikarwar, K. Sakthidasan Sankaran
R6,738 Discovery Miles 67 380 Ships in 10 - 15 working days

The Dark Web is a known hub that hosts myriad illegal activities behind the veil of anonymity for its users. For years now, law enforcement has been struggling to track these illicit activities and put them to an end. However, the depth and anonymity of the Dark Web has made these efforts difficult, and as cyber criminals have more advanced technologies available to them, the struggle appears to only have the potential to worsen. Law enforcement and government organizations also have emerging technologies on their side, however. It is essential for these organizations to stay up to date on these emerging technologies, such as computational intelligence, in order to put a stop to the illicit activities and behaviors presented in the Dark Web. Using Computational Intelligence for the Dark Web and Illicit Behavior Detection presents the emerging technologies and applications of computational intelligence for the law enforcement of the Dark Web. It features analysis into cybercrime data, examples of the application of computational intelligence in the Dark Web, and provides future opportunities for growth in this field. Covering topics such as cyber threat detection, crime prediction, and keyword extraction, this premier reference source is an essential resource for government organizations, law enforcement agencies, non-profit organizations, politicians, computer scientists, researchers, students, and academicians.

Hacking - Beginners Guide, Wireless Hacking, 17 Must Tools every Hacker should have, 17 Most Dangerous Hacking Attacks, 10 Most... Hacking - Beginners Guide, Wireless Hacking, 17 Must Tools every Hacker should have, 17 Most Dangerous Hacking Attacks, 10 Most Dangerous Cyber Gangs (Hardcover)
Alex Wagner
R1,606 R1,331 Discovery Miles 13 310 Save R275 (17%) Ships in 10 - 15 working days
Security and Privacy Management, Techniques, and Protocols (Hardcover): Yassine Maleh Security and Privacy Management, Techniques, and Protocols (Hardcover)
Yassine Maleh
R5,556 Discovery Miles 55 560 Ships in 10 - 15 working days

The security of information and communication technology is a high priority for any organization. By examining the current problems and challenges this domain is facing, more efficient strategies can be established to safeguard personal information against invasive pressures. Security and Privacy Management, Techniques, and Protocols is a critical scholarly resource that examines emerging protocols and methods for effective management of information security at organizations. Featuring coverage on a broad range of topics such as cryptography, secure routing protocols, and wireless security, this book is geared towards academicians, engineers, IT specialists, researchers, and students seeking current research on security and privacy management.

Hacking - 17 Must Tools every Hacker should have & 17 Most Dangerous Hacking Attacks (Hardcover): Alex Wagner Hacking - 17 Must Tools every Hacker should have & 17 Most Dangerous Hacking Attacks (Hardcover)
Alex Wagner
R1,020 R871 Discovery Miles 8 710 Save R149 (15%) Ships in 10 - 15 working days
Coding for Penetration Testers - Building Better Tools (Paperback, 2nd edition): Jason Andress, Ryan Linn Coding for Penetration Testers - Building Better Tools (Paperback, 2nd edition)
Jason Andress, Ryan Linn
R1,101 Discovery Miles 11 010 Ships in 12 - 19 working days

Coding for Penetration Testers: Building Better Tools, Second Edition provides readers with an understanding of the scripting languages that are commonly used when developing tools for penetration testing, also guiding users through specific examples of custom tool development and the situations where such tools might be used. While developing a better understanding of each language, the book presents real-world scenarios and tool development that can be incorporated into a tester's toolkit. This completely updated edition focuses on an expanded discussion on the use of Powershell, and includes practical updates to all tools and coverage.

Intelligent Data Analysis for e-Learning - Enhancing Security and Trustworthiness in Online Learning Systems (Paperback): Jorge... Intelligent Data Analysis for e-Learning - Enhancing Security and Trustworthiness in Online Learning Systems (Paperback)
Jorge Miguel, Santi Caballe, Fatos Xhafa
R2,681 R2,468 Discovery Miles 24 680 Save R213 (8%) Ships in 12 - 19 working days

Intelligent Data Analysis for e-Learning: Enhancing Security and Trustworthiness in Online Learning Systems addresses information security within e-Learning based on trustworthiness assessment and prediction. Over the past decade, many learning management systems have appeared in the education market. Security in these systems is essential for protecting against unfair and dishonest conduct-most notably cheating-however, e-Learning services are often designed and implemented without considering security requirements. This book provides functional approaches of trustworthiness analysis, modeling, assessment, and prediction for stronger security and support in online learning, highlighting the security deficiencies found in most online collaborative learning systems. The book explores trustworthiness methodologies based on collective intelligence than can overcome these deficiencies. It examines trustworthiness analysis that utilizes the large amounts of data-learning activities generate. In addition, as processing this data is costly, the book offers a parallel processing paradigm that can support learning activities in real-time. The book discusses data visualization methods for managing e-Learning, providing the tools needed to analyze the data collected. Using a case-based approach, the book concludes with models and methodologies for evaluating and validating security in e-Learning systems. Indexing: The books of this series are submitted to EI-Compendex and SCOPUS

Privacy and Security Policies in Big Data (Hardcover): Sharvari Tamane, Vijender Kumar Solanki, Nilanjan Dey Privacy and Security Policies in Big Data (Hardcover)
Sharvari Tamane, Vijender Kumar Solanki, Nilanjan Dey
R5,744 Discovery Miles 57 440 Ships in 10 - 15 working days

In recent years, technological advances have led to significant developments within a variety of business applications. In particular, data-driven research provides ample opportunity for enterprise growth, if utilized efficiently. Privacy and Security Policies in Big Data is a pivotal reference source for the latest research on innovative concepts on the management of security and privacy analytics within big data. Featuring extensive coverage on relevant areas such as kinetic knowledge, cognitive analytics, and parallel computing, this publication is an ideal resource for professionals, researchers, academicians, advanced-level students, and technology developers in the field of big data.

A Study of Black Hole Attack Solutions - On AODV Routing Protocol in MANET (Paperback): Elahe Fazeldehkordi, I.S. Dr. Amiri,... A Study of Black Hole Attack Solutions - On AODV Routing Protocol in MANET (Paperback)
Elahe Fazeldehkordi, I.S. Dr. Amiri, Oluwatobi Ayodeji Akanbi
R1,354 Discovery Miles 13 540 Ships in 12 - 19 working days

Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact that they are dynamic, require no fixed infrastructure, and are scalable. However, MANETs are particularly susceptible to several different types of widely perpetrated cyberattack. One of the most common hacks aimed at MANETs is the Black Hole attack, in which a particular node within the network displays itself as having the shortest path for the node whose packets it wants to intercept. Once the packets are drawn to the Black Hole, they are then dropped instead of relayed, and the communication of the MANET is thereby disrupted, without knowledge of the other nodes in the network. Due to the sophistication of the Black Hole attack, there has been a lot of research conducted on how to detect it and prevent it. The authors of this short format title provide their research results on providing an effective solution to Black Hole attacks, including introduction of new MANET routing protocols that can be implemented in order to improve detection accuracy and network parameters such as total dropped packets, end-to-end delay, packet delivery ratio, and routing request overhead.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Damaged Goods - The Rise and Fall of Sir…
Oliver Shah Paperback  (1)
R308 R280 Discovery Miles 2 800
Psychic Medium - Unlock the Secrets of…
Mari Silva Hardcover R876 Discovery Miles 8 760
Hiking Beyond Cape Town - 40 Inspiring…
Nina du Plessis, Willie Olivier Paperback R340 R314 Discovery Miles 3 140
Digital Information Culture - The…
Luke Tredinnick Paperback R1,220 Discovery Miles 12 200
Management of Irrigation and Drainage…
Hector M. Malano, Paul van Hofwegen Hardcover R4,620 Discovery Miles 46 200
Nintendo Switch OLED Deluxe Bundle…
R10,799 R9,499 Discovery Miles 94 990
Composting - Yard and Municipal Solid…
United States Environmental Protection Agency Hardcover R3,196 R1,165 Discovery Miles 11 650
Nintendo Switch 2 Camera
R1,247 Discovery Miles 12 470
Landscape Patterns in a Range of…
Alexander V. Khoroshev, Kirill N. Dyakonov Hardcover R2,956 Discovery Miles 29 560
Mapping the Epidemic, Volume 9 - A…
Emanuela Casti, Fulvio Adobati, … Paperback R2,993 Discovery Miles 29 930

 

Partners