0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (123)
  • R250 - R500 (224)
  • R500+ (770)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

Information And Communications Technology Law (Paperback, 3rd Edition): Dana van der Merwe Information And Communications Technology Law (Paperback, 3rd Edition)
Dana van der Merwe
R1,320 R1,199 Discovery Miles 11 990 Save R121 (9%) In Stock

This title is meant to convey the emphasis which is now placed on the valuable contents of the safe (the information) rather than just on the safe in which those contents are stored (the computer).

It should also convey to potential readers the impact of information communication technologies on the law, the increasing importance of telecommunications law and legal aspects of electronic commerce and the convergence between these fields and IT law.

EU General Data Protection Regulation (GDPR) - An Implementation and Compliance Guide (Paperback, 3rd ed.): It Governance... EU General Data Protection Regulation (GDPR) - An Implementation and Compliance Guide (Paperback, 3rd ed.)
It Governance Privacy Team
R762 Discovery Miles 7 620 Ships in 10 - 15 working days
Broken Code - Inside Facebook And The Fight To Expose Its Toxic Secrets (Paperback): Jeff Horwitz Broken Code - Inside Facebook And The Fight To Expose Its Toxic Secrets (Paperback)
Jeff Horwitz
R578 Discovery Miles 5 780 In Stock

Facebook had a problem. Along with its sister platforms Instagram and WhatsApp, it was a daily destination for billions of users around the world, extolling its products for connecting people. But as a succession of scandals rocked Facebook from 2016, some began to question whether the company could control, or even understood, its own platforms.

As Facebook employees searched for answers, what they uncovered was worse than they could've imagined. The problems ran far deeper than politics. Facebook was peddling and amplifying anger, looking the other way at human trafficking, enabling drug cartels and authoritarians and allowing VIP users to break the platform's supposedly inviolable rules.

It turned out to be eminently possible to isolate many of Facebook's worst problems, but whenever employees offered solutions their work was consistently delayed, watered down or stifled by a company that valued user engagement above all else. The only option left was to blow the whistle.

In Broken Code, award-winning Wall Street Journal reporter Jeff Horwitz tells the riveting inside story of these employees and their explosive discoveries, uncovering the shocking cost of Facebook's blind ambition in the process.

Pegasus - The Story Of The World's Most Dangerous Spyware (Paperback): Laurent Richard, Sandrine Rigaud Pegasus - The Story Of The World's Most Dangerous Spyware (Paperback)
Laurent Richard, Sandrine Rigaud
R385 R349 Discovery Miles 3 490 Save R36 (9%) Ships in 5 - 10 working days

The gripping, behind-the scenes story of one of the most sophisticated surveillance weapons ever created, which is threatening democracy and human rights.

Pegasus is widely regarded as the most powerful cyber-surveillance system on the market – available to any government that can afford its multimillion-dollar price tag. The system’s creator, the NSO group, a private corporation headquartered in Israel, boasts about its ability to thwart terrorists and criminals: ‘Thousands of people in Europe owe their lives to hundreds of our company employees’, they declared in 2019. That may be true – but the Pegasus system doesn’t just catch bad guys.

Pegasus has been used by repressive regimes to spy on thousands of innocent people around the world: heads of state, diplomats, human rights defenders, lawyers, political opponents, and journalists. Virtually undetectable, the system can track a person’s daily movement in real time, gain control of the device’s microphones and cameras at will, and capture all videos, photos, emails, texts, and passwords – encrypted or not. Its full reach is not even known.

This is the gripping story of how Pegasus was uncovered, written by Laurent Richard and Sandrine Rigaud, the two intrepid reporters who revealed the scandal in collaboration with an international consortium of journalists. They received a leaked list of 50,000 mobile phone numbers, but they needed to prove NSO’s involvement. After a dangerous and secretive investigation spanning the globe, their findings shook the world. Tense and compelling, Pegasus reveals how thousands of lives have been turned upside down by this unprecedented threat, and exposes the chilling new ways governments and corporations are laying waste to human rights – and silencing innocent citizens.

#Myprivacy #Myright - Protect It While You Can (Hardcover): Robin M Singh #Myprivacy #Myright - Protect It While You Can (Hardcover)
Robin M Singh
R536 Discovery Miles 5 360 Ships in 10 - 15 working days
Handbook of Research on Advanced Practical Approaches to Deepfake Detection and Applications (Hardcover): Ahmed J. Obaid,... Handbook of Research on Advanced Practical Approaches to Deepfake Detection and Applications (Hardcover)
Ahmed J. Obaid, Ghassan H Abdul-Majeed, Adriana Burlea-Schiopoiu, Parul Aggarwal
R7,311 Discovery Miles 73 110 Ships in 18 - 22 working days

In recent years, falsification and digital modification of video clips, images, as well as textual contents have become widespread and numerous, especially when deepfake technologies are adopted in many sources. Due to adopted deepfake techniques, a lot of content currently cannot be recognized from its original sources. As a result, the field of study previously devoted to general multimedia forensics has been revived. The Handbook of Research on Advanced Practical Approaches to Deepfake Detection and Applications discusses the recent techniques and applications of illustration, generation, and detection of deepfake content in multimedia. It introduces the techniques and gives an overview of deepfake applications, types of deepfakes, the algorithms and applications used in deepfakes, recent challenges and problems, and practical applications to identify, generate, and detect deepfakes. Covering topics such as anomaly detection, intrusion detection, and security enhancement, this major reference work is a comprehensive resource for cyber security specialists, government officials, law enforcement, business leaders, students and faculty of higher education, librarians, researchers, and academicians.

Elementary... the Art and Science of Finding Information - Achieving More Knowledge Advantage through OSINT - Revised and... Elementary... the Art and Science of Finding Information - Achieving More Knowledge Advantage through OSINT - Revised and Expanded Edition (Hardcover)
Miguel Fernandez, Alan Millington, Mark Monday
R1,097 Discovery Miles 10 970 Ships in 18 - 22 working days
Modern Day Surveillance Ecosystem and Impacts on Privacy (Hardcover): Ananda Mitra Modern Day Surveillance Ecosystem and Impacts on Privacy (Hardcover)
Ananda Mitra
R5,333 Discovery Miles 53 330 Ships in 18 - 22 working days

The notion of surveillance has become increasingly more crucial in public conversation as new tools of observation are obtained by many different players. The traditional notion of "overseeing" is being increasingly replaced by multi-level surveillance where many different actors, at different levels of hierarchy, from the child surveilling the parent to the state surveilling its citizens, are entering the surveillance theater. This creates a unique surveillance ecosystem where the individual is observed not only as an analog flesh-and-blood body moving through real spaces such as a shopping mall, but also tracked as a data point where the volume of data is perpetually and permanently expanding as the digital life story is inscribed in the digital spaces. The combined narrative of the individual is now under surveillance. Modern Day Surveillance Ecosystem and Impacts on Privacy navigates the reader through an understanding of the self as a narrative element that is open for observation and analysis. This book provides a broad-based and theoretically grounded look at the overall processes of surveillance in a global system. Covering topics including commodity, loss of privacy, and big data, this text is essential for researchers, government officials, policymakers, security analysts, lawmakers, teachers, professors, graduate and undergraduate students, practitioners, and academicians interested in communication, technology, surveillance, privacy, and more.

Auditing Corporate Surveillance Systems - Research Methods for Greater Transparency (Hardcover, New Ed): Isabel Wagner Auditing Corporate Surveillance Systems - Research Methods for Greater Transparency (Hardcover, New Ed)
Isabel Wagner
R1,846 Discovery Miles 18 460 Ships in 18 - 22 working days

News headlines about privacy invasions, discrimination, and biases discovered in the platforms of big technology companies are commonplace today, and big tech's reluctance to disclose how they operate counteracts ideals of transparency, openness, and accountability. This book is for computer science students and researchers who want to study big tech's corporate surveillance from an experimental, empirical, or quantitative point of view and thereby contribute to holding big tech accountable. As a comprehensive technical resource, it guides readers through the corporate surveillance landscape and describes in detail how corporate surveillance works, how it can be studied experimentally, and what existing studies have found. It provides a thorough foundation in the necessary research methods and tools, and introduces the current research landscape along with a wide range of open issues and challenges. The book also explains how to consider ethical issues and how to turn research results into real-world change.

Handbook of Research on Intelligent Data Processing and Information Security Systems (Hardcover): Stepan Mykolayovych Bilan,... Handbook of Research on Intelligent Data Processing and Information Security Systems (Hardcover)
Stepan Mykolayovych Bilan, Saleem Issa Al-Zoubi
R9,365 Discovery Miles 93 650 Ships in 18 - 22 working days

Intelligent technologies have emerged as imperative tools in computer science and information security. However, advanced computing practices have preceded new methods of attacks on the storage and transmission of data. Developing approaches such as image processing and pattern recognition are susceptible to breaches in security. Modern protection methods for these innovative techniques require additional research. The Handbook of Research on Intelligent Data Processing and Information Security Systems provides emerging research exploring the theoretical and practical aspects of cyber protection and applications within computer science and telecommunications. Special attention is paid to data encryption, steganography, image processing, and recognition, and it targets professionals who want to improve their knowledge in order to increase strategic capabilities and organizational effectiveness. As such, this book is ideal for analysts, programmers, computer engineers, software engineers, mathematicians, data scientists, developers, IT specialists, academicians, researchers, and students within fields of information technology, information security, robotics, artificial intelligence, image processing, computer science, and telecommunications.

Cyber Security and Threats - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover): Information Reso Management... Cyber Security and Threats - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover)
Information Reso Management Association
R9,416 Discovery Miles 94 160 Ships in 18 - 22 working days
Your Safety and Privacy Online - The CIA and NSA (Hardcover): Siggi Bjarnason Your Safety and Privacy Online - The CIA and NSA (Hardcover)
Siggi Bjarnason
R520 R489 Discovery Miles 4 890 Save R31 (6%) Ships in 18 - 22 working days
Cyber Security and Threats - Concepts, Methodologies, Tools, and Applications, VOL 2 (Hardcover): Information Reso Management... Cyber Security and Threats - Concepts, Methodologies, Tools, and Applications, VOL 2 (Hardcover)
Information Reso Management Association
R9,416 Discovery Miles 94 160 Ships in 18 - 22 working days
Advanced Methodologies and Technologies in System Security, Information Privacy, and Forensics (Hardcover): Mehdi Khosrowpour Advanced Methodologies and Technologies in System Security, Information Privacy, and Forensics (Hardcover)
Mehdi Khosrowpour
R7,137 Discovery Miles 71 370 Ships in 18 - 22 working days

Cyber-attacks are rapidly becoming one of the most prevalent issues globally, and as they continue to escalate, it is imperative to explore new approaches and technologies that help ensure the security of the online community. Beyond cyber-attacks, personal information is now routinely and exclusively housed in cloud-based systems. The rising use of information technologies requires stronger information security and system procedures to reduce the risk of information breaches. Advanced Methodologies and Technologies in System Security, Information Privacy, and Forensics presents emerging research and methods on preventing information breaches and further securing system networks. While highlighting the rising concerns in information privacy and system security, this book explores the cutting-edge methods combatting digital risks and cyber threats. This book is an important resource for information technology professionals, cybercrime researchers, network analysts, government agencies, business professionals, academicians, and practitioners seeking the most up-to-date information and methodologies on cybercrime, digital terrorism, network security, and information technology ethics.

Using Computational Intelligence for the Dark Web and Illicit Behavior Detection (Hardcover): Romil Rawat, Upinder Kaur, Shadab... Using Computational Intelligence for the Dark Web and Illicit Behavior Detection (Hardcover)
Romil Rawat, Upinder Kaur, Shadab Pasha Khan, Ranjana Sikarwar, K. Sakthidasan Sankaran
R6,212 Discovery Miles 62 120 Ships in 18 - 22 working days

The Dark Web is a known hub that hosts myriad illegal activities behind the veil of anonymity for its users. For years now, law enforcement has been struggling to track these illicit activities and put them to an end. However, the depth and anonymity of the Dark Web has made these efforts difficult, and as cyber criminals have more advanced technologies available to them, the struggle appears to only have the potential to worsen. Law enforcement and government organizations also have emerging technologies on their side, however. It is essential for these organizations to stay up to date on these emerging technologies, such as computational intelligence, in order to put a stop to the illicit activities and behaviors presented in the Dark Web. Using Computational Intelligence for the Dark Web and Illicit Behavior Detection presents the emerging technologies and applications of computational intelligence for the law enforcement of the Dark Web. It features analysis into cybercrime data, examples of the application of computational intelligence in the Dark Web, and provides future opportunities for growth in this field. Covering topics such as cyber threat detection, crime prediction, and keyword extraction, this premier reference source is an essential resource for government organizations, law enforcement agencies, non-profit organizations, politicians, computer scientists, researchers, students, and academicians.

On Thin Ice (Hardcover): Leading Cybersecurity Experts On Thin Ice (Hardcover)
Leading Cybersecurity Experts
R680 Discovery Miles 6 800 Ships in 18 - 22 working days
Large-Scale Data Streaming, Processing, and Blockchain Security (Hardcover): Hemraj Saini, Geetanjali Rathee, Dinesh Kumar Saini Large-Scale Data Streaming, Processing, and Blockchain Security (Hardcover)
Hemraj Saini, Geetanjali Rathee, Dinesh Kumar Saini
R6,163 Discovery Miles 61 630 Ships in 18 - 22 working days

Data has cemented itself as a building block of daily life. However, surrounding oneself with great quantities of information heightens risks to one's personal privacy. Additionally, the presence of massive amounts of information prompts researchers into how best to handle and disseminate it. Research is necessary to understand how to cope with the current technological requirements. Large-Scale Data Streaming, Processing, and Blockchain Security is a collection of innovative research that explores the latest methodologies, modeling, and simulations for coping with the generation and management of large-scale data in both scientific and individual applications. Featuring coverage on a wide range of topics including security models, internet of things, and collaborative filtering, this book is ideally designed for entrepreneurs, security analysts, IT consultants, security professionals, programmers, computer technicians, data scientists, technology developers, engineers, researchers, academicians, and students.

Security and Privacy Management, Techniques, and Protocols (Hardcover): Yassine Maleh Security and Privacy Management, Techniques, and Protocols (Hardcover)
Yassine Maleh
R5,124 Discovery Miles 51 240 Ships in 18 - 22 working days

The security of information and communication technology is a high priority for any organization. By examining the current problems and challenges this domain is facing, more efficient strategies can be established to safeguard personal information against invasive pressures. Security and Privacy Management, Techniques, and Protocols is a critical scholarly resource that examines emerging protocols and methods for effective management of information security at organizations. Featuring coverage on a broad range of topics such as cryptography, secure routing protocols, and wireless security, this book is geared towards academicians, engineers, IT specialists, researchers, and students seeking current research on security and privacy management.

Coding for Penetration Testers - Building Better Tools (Paperback, 2nd edition): Jason Andress, Ryan Linn Coding for Penetration Testers - Building Better Tools (Paperback, 2nd edition)
Jason Andress, Ryan Linn
R1,040 Discovery Miles 10 400 Ships in 10 - 15 working days

Coding for Penetration Testers: Building Better Tools, Second Edition provides readers with an understanding of the scripting languages that are commonly used when developing tools for penetration testing, also guiding users through specific examples of custom tool development and the situations where such tools might be used. While developing a better understanding of each language, the book presents real-world scenarios and tool development that can be incorporated into a tester's toolkit. This completely updated edition focuses on an expanded discussion on the use of Powershell, and includes practical updates to all tools and coverage.

Intelligent Data Analysis for e-Learning - Enhancing Security and Trustworthiness in Online Learning Systems (Paperback): Jorge... Intelligent Data Analysis for e-Learning - Enhancing Security and Trustworthiness in Online Learning Systems (Paperback)
Jorge Miguel, Santi Caballe, Fatos Xhafa
R2,520 R2,325 Discovery Miles 23 250 Save R195 (8%) Ships in 10 - 15 working days

Intelligent Data Analysis for e-Learning: Enhancing Security and Trustworthiness in Online Learning Systems addresses information security within e-Learning based on trustworthiness assessment and prediction. Over the past decade, many learning management systems have appeared in the education market. Security in these systems is essential for protecting against unfair and dishonest conduct-most notably cheating-however, e-Learning services are often designed and implemented without considering security requirements. This book provides functional approaches of trustworthiness analysis, modeling, assessment, and prediction for stronger security and support in online learning, highlighting the security deficiencies found in most online collaborative learning systems. The book explores trustworthiness methodologies based on collective intelligence than can overcome these deficiencies. It examines trustworthiness analysis that utilizes the large amounts of data-learning activities generate. In addition, as processing this data is costly, the book offers a parallel processing paradigm that can support learning activities in real-time. The book discusses data visualization methods for managing e-Learning, providing the tools needed to analyze the data collected. Using a case-based approach, the book concludes with models and methodologies for evaluating and validating security in e-Learning systems. Indexing: The books of this series are submitted to EI-Compendex and SCOPUS

Hiding Behind the Keyboard - Uncovering Covert Communication Methods with Forensic Analysis (Paperback): Brett Shavers, John... Hiding Behind the Keyboard - Uncovering Covert Communication Methods with Forensic Analysis (Paperback)
Brett Shavers, John Bair
R1,202 Discovery Miles 12 020 Ships in 10 - 15 working days

Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis exposes the latest electronic covert communication techniques used by cybercriminals, along with the needed investigative methods for identifying them. The book shows how to use the Internet for legitimate covert communication, while giving investigators the information they need for detecting cybercriminals who attempt to hide their true identity. Intended for practitioners and investigators, the book offers concrete examples on how to communicate securely, serving as an ideal reference for those who truly need protection, as well as those who investigate cybercriminals.

Privacy and Security Policies in Big Data (Hardcover): Sharvari Tamane, Vijender Kumar Solanki, Nilanjan Dey Privacy and Security Policies in Big Data (Hardcover)
Sharvari Tamane, Vijender Kumar Solanki, Nilanjan Dey
R5,297 Discovery Miles 52 970 Ships in 18 - 22 working days

In recent years, technological advances have led to significant developments within a variety of business applications. In particular, data-driven research provides ample opportunity for enterprise growth, if utilized efficiently. Privacy and Security Policies in Big Data is a pivotal reference source for the latest research on innovative concepts on the management of security and privacy analytics within big data. Featuring extensive coverage on relevant areas such as kinetic knowledge, cognitive analytics, and parallel computing, this publication is an ideal resource for professionals, researchers, academicians, advanced-level students, and technology developers in the field of big data.

A Study of Black Hole Attack Solutions - On AODV Routing Protocol in MANET (Paperback): Elahe Fazeldehkordi, I.S. Dr. Amiri,... A Study of Black Hole Attack Solutions - On AODV Routing Protocol in MANET (Paperback)
Elahe Fazeldehkordi, I.S. Dr. Amiri, Oluwatobi Ayodeji Akanbi
R1,277 Discovery Miles 12 770 Ships in 10 - 15 working days

Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact that they are dynamic, require no fixed infrastructure, and are scalable. However, MANETs are particularly susceptible to several different types of widely perpetrated cyberattack. One of the most common hacks aimed at MANETs is the Black Hole attack, in which a particular node within the network displays itself as having the shortest path for the node whose packets it wants to intercept. Once the packets are drawn to the Black Hole, they are then dropped instead of relayed, and the communication of the MANET is thereby disrupted, without knowledge of the other nodes in the network. Due to the sophistication of the Black Hole attack, there has been a lot of research conducted on how to detect it and prevent it. The authors of this short format title provide their research results on providing an effective solution to Black Hole attacks, including introduction of new MANET routing protocols that can be implemented in order to improve detection accuracy and network parameters such as total dropped packets, end-to-end delay, packet delivery ratio, and routing request overhead.

You: For Sale - Protecting Your Personal Data and Privacy Online (Paperback): Stuart Sumner You: For Sale - Protecting Your Personal Data and Privacy Online (Paperback)
Stuart Sumner
R853 Discovery Miles 8 530 Ships in 10 - 15 working days

Everything we do online, and increasingly in the real world, is tracked, logged, analyzed, and often packaged and sold on to the highest bidder. Every time you visit a website, use a credit card, drive on the freeway, or go past a CCTV camera, you are logged and tracked. Every day billions of people choose to share their details on social media, which are then sold to advertisers. The Edward Snowden revelations that governments - including those of the US and UK - have been snooping on their citizens, have rocked the world. But nobody seems to realize that this has already been happening for years, with firms such as Google capturing everything you type into a browser and selling it to the highest bidder. Apps take information about where you go, and your contact book details, harvest them and sell them on - and people just click the EULA without caring. No one is revealing the dirty secret that is the tech firms harvesting customers' personal data and selling it for vast profits - and people are totally unaware of the dangers. You: For Sale is for anyone who is concerned about what corporate and government invasion of privacy means now and down the road. The book sets the scene by spelling out exactly what most users of the Internet and smart phones are exposing themselves to via commonly used sites and apps such as facebook and Google, and then tells you what you can do to protect yourself. The book also covers legal and government issues as well as future trends. With interviews of leading security experts, black market data traders, law enforcement and privacy groups, You: For Sale will help you view your personal data in a new light, and understand both its value, and its danger.

Code Based Secret Sharing Schemes: Applied Combinatorial Coding Theory (Hardcover): Patrick Sole, Selda Calkavur, Alexis... Code Based Secret Sharing Schemes: Applied Combinatorial Coding Theory (Hardcover)
Patrick Sole, Selda Calkavur, Alexis Bonnecaze, Romar Dela Cruz
R2,155 Discovery Miles 21 550 Ships in 18 - 22 working days

Secret sharing schemes form one of the most important topic in Cryptography. These protocols are used in many areas, applied mathematics, computer science, electrical engineering. A secret is divided into several pieces called shares. Each share is given to a user of the system. Each user has no information about the secret, but the secret can be retrieved by certain authorized coalition of users.This book is devoted to such schemes inspired by Coding Theory. The classical schemes of Shamir, Blakley, Massey are recalled. Survey is made of research in Combinatorial Coding Theory they triggered, mostly self-dual codes, and minimal codes. Applications to engineering like image processing, and key management of MANETs are highlighted.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Speakout 3rd Edition B1 Student's Book…
J Wilson, Antonia Clare Paperback R1,639 Discovery Miles 16 390
Gold Preliminary Coursebook with CD-ROM…
Clare Walsh, Lindsay Warwick Paperback R1,140 Discovery Miles 11 400
Wider World 2e Starter Student's Book…
Paperback R1,717 Discovery Miles 17 170
Wider World 2 Teacher's Book with…
Rod Fricker Spiral bound R2,242 Discovery Miles 22 420
Wider World 2e 2 Workbook with Online…
Digital product license key R1,328 Discovery Miles 13 280
English Code British Starter Pupil…
Paperback R1,361 Discovery Miles 13 610
Wider World 2e 4 Student's Book for…
Digital product license key R1,719 Discovery Miles 17 190
Rise and Shine Level 4 Teacher's Book…
Paperback R2,054 Discovery Miles 20 540
Wider World 1 eBook Students' Access…
Digital product license key R858 Discovery Miles 8 580
Speakout Starter 2nd Edition Students…
Frances Eales, Steve Oakes Paperback R1,206 Discovery Miles 12 060

 

Partners