0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (169)
  • R250 - R500 (198)
  • R500+ (857)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

Distributed Denial of Service (DDoS) Attacks - Classification, Attacks, Challenges and Countermeasures (Hardcover): Brij B.... Distributed Denial of Service (DDoS) Attacks - Classification, Attacks, Challenges and Countermeasures (Hardcover)
Brij B. Gupta, Amrita Dahiya
R1,559 Discovery Miles 15 590 Ships in 12 - 17 working days

The complexity and severity of the Distributed Denial of Service (DDoS) attacks are increasing day-by-day. The Internet has a highly inconsistent structure in terms of resource distribution. Numerous technical solutions are available, but those involving economic aspects have not been given much consideration. The book, DDoS Attacks - Classification, Attacks, Challenges, and Countermeasures, provides an overview of both types of defensive solutions proposed so far, exploring different dimensions that would mitigate the DDoS effectively and show the implications associated with them. Features: Covers topics that describe taxonomies of the DDoS attacks in detail, recent trends and classification of defensive mechanisms on the basis of deployment location, the types of defensive action, and the solutions offering economic incentives. Introduces chapters discussing the various types of DDoS attack associated with different layers of security, an attacker's motivations, and the importance of incentives and liabilities in any defensive solution. Illustrates the role of fair resource-allocation schemes, separate payment mechanisms for attackers and legitimate users, negotiation models on cost and types of resources, and risk assessments and transfer mechanisms. DDoS Attacks - Classification, Attacks, Challenges, and Countermeasures is designed for the readers who have an interest in the cybersecurity domain, including students and researchers who are exploring different dimensions associated with the DDoS attack, developers and security professionals who are focusing on developing defensive schemes and applications for detecting or mitigating the DDoS attacks, and faculty members across different universities.

Internet of Things, Threats, Landscape, and Countermeasures (Hardcover): Stavros Shiaeles, Nicholas Kolokotronis Internet of Things, Threats, Landscape, and Countermeasures (Hardcover)
Stavros Shiaeles, Nicholas Kolokotronis
R3,431 Discovery Miles 34 310 Ships in 12 - 17 working days

Internet of Things (IoT) is an ecosystem comprised of heterogeneous connected devices that communicate to deliver capabilities making our living, cities, transport, energy, and other areas more intelligent. This book delves into the different cyber-security domains and their challenges due to the massive amount and the heterogeneity of devices. This book introduces readers to the inherent concepts of IoT. It offers case studies showing how IoT counteracts the cyber-security concerns for domains. It provides suggestions on how to mitigate cyber threats by compiling a catalogue of threats that currently comprise the contemporary threat landscape. It then examines different security measures that can be applied to system installations or operational environment and discusses how these measures may alter the threat exploitability level and/or the level of the technical impact. Professionals, graduate students, researchers, academicians, and institutions that are interested in acquiring knowledge in the areas of IoT and cyber-security, will find this book of interest.

Privacy and Identity in a Networked Society - Refining Privacy Impact Assessment (Paperback): Stefan Strauss Privacy and Identity in a Networked Society - Refining Privacy Impact Assessment (Paperback)
Stefan Strauss
R1,300 Discovery Miles 13 000 Ships in 12 - 17 working days

This book offers an analysis of privacy impacts resulting from and reinforced by technology and discusses fundamental risks and challenges of protecting privacy in the digital age. Privacy is among the most endangered "species" in our networked society: personal information is processed for various purposes beyond our control. Ultimately, this affects the natural interplay between privacy, personal identity and identification. This book investigates that interplay from a systemic, socio-technical perspective by combining research from the social and computer sciences. It sheds light on the basic functions of privacy, their relation to identity, and how they alter with digital identification practices. The analysis reveals a general privacy control dilemma of (digital) identification shaped by several interrelated socio-political, economic and technical factors. Uncontrolled increases in the identification modalities inherent to digital technology reinforce this dilemma and benefit surveillance practices, thereby complicating the detection of privacy risks and the creation of appropriate safeguards. Easing this problem requires a novel approach to privacy impact assessment (PIA), and this book proposes an alternative PIA framework which, at its core, comprises a basic typology of (personally and technically) identifiable information. This approach contributes to the theoretical and practical understanding of privacy impacts and thus, to the development of more effective protection standards. This book will be of much interest to students and scholars of critical security studies, surveillance studies, computer and information science, science and technology studies, and politics.

Internet of Things - Integration and Security Challenges (Hardcover): P. Karthikeyan, S. Velliangiri, Sathish A.P. Kumar Internet of Things - Integration and Security Challenges (Hardcover)
P. Karthikeyan, S. Velliangiri, Sathish A.P. Kumar
R2,489 Discovery Miles 24 890 Ships in 12 - 17 working days

IoT is empowered by various technologies used to detect, gather, store, act, process, transmit, oversee, and examine information. The combination of emergent technologies for information processing and distributed security, such as Cloud computing, Artificial intelligence, and Blockchain, brings new challenges in addressing distributed security methods that form the foundation of improved and eventually entirely new products and services. As systems interact with each other, it is essential to have an agreed interoperability standard, which is safe and valid. This book aims at providing an introduction by illustrating state-of-the-art security challenges and threats in IoT and the latest developments in IoT with Cloud, AI, and Blockchain security challenges. Various application case studies from domains such as science, engineering, and healthcare are introduced, along with their architecture and how they leverage various technologies Cloud, AI, and Blockchain. This book provides a comprehensive guide to researchers and students to design IoT integrated AI, Cloud, and Blockchain projects and to have an overview of the next generation challenges that may arise in the coming years.

Data Security in Internet of Things Based RFID and WSN Systems Applications (Hardcover): Rohit Sharma, Rajendra Prasad... Data Security in Internet of Things Based RFID and WSN Systems Applications (Hardcover)
Rohit Sharma, Rajendra Prasad Mahapatra, Korhan Cengiz
R4,273 Discovery Miles 42 730 Ships in 12 - 17 working days

This book focuses on RFID (Radio Frequency Identification), IoT (Internet of Things), and WSN (Wireless Sensor Network). It includes contributions that discuss the security and privacy issues as well as the opportunities and applications that are tightly linked to sensitive infrastructures and strategic services. This book addresses the complete functional framework and workflow in IoT-enabled RFID systems and explores basic and high-level concepts. It is based on the latest technologies and covers the major challenges, issues, and advances in the field. It presents data acquisition and case studies related to data-intensive technologies in RFID-based IoT and includes WSN-based systems and their security. It can serve as a manual for those in the industry while also helping beginners to understand both the basic and advanced aspects of IoT-based RFID-related issues. This book can be a premier interdisciplinary platform for researchers, practitioners, and educators to present and discuss the most recent innovations, trends, and concerns as well as practical challenges encountered, and find solutions that have been adopted in the fields of IoT and analytics.

Health Data Privacy under the GDPR - Big Data Challenges and Regulatory Responses (Hardcover): Maria Tzanou Health Data Privacy under the GDPR - Big Data Challenges and Regulatory Responses (Hardcover)
Maria Tzanou
R4,137 Discovery Miles 41 370 Ships in 12 - 17 working days

The growth of data-collecting goods and services, such as ehealth and mhealth apps, smart watches, mobile fitness and dieting apps, electronic skin and ingestible tech, combined with recent technological developments such as increased capacity of data storage, artificial intelligence and smart algorithms, has spawned a big data revolution that has reshaped how we understand and approach health data. Recently the COVID-19 pandemic has foregrounded a variety of data privacy issues. The collection, storage, sharing and analysis of health- related data raises major legal and ethical questions relating to privacy, data protection, profiling, discrimination, surveillance, personal autonomy and dignity. This book examines health privacy questions in light of the General Data Protection Regulation (GDPR) and the general data privacy legal framework of the European Union (EU). The GDPR is a complex and evolving body of law that aims to deal with several technological and societal health data privacy problems, while safeguarding public health interests and addressing its internal gaps and uncertainties. The book answers a diverse range of questions including: What role can the GDPR play in regulating health surveillance and big (health) data analytics? Can it catch up with internet-age developments? Are the solutions to the challenges posed by big health data to be found in the law? Does the GDPR provide adequate tools and mechanisms to ensure public health objectives and the effective protection of privacy? How does the GDPR deal with data that concern children's health and academic research? By analysing a number of diverse questions concerning big health data under the GDPR from various perspectives, this book will appeal to those interested in privacy, data protection, big data, health sciences, information technology, the GDPR, EU and human rights law.

Trust and Records in an Open Digital Environment (Hardcover): Hrvoje Stancic Trust and Records in an Open Digital Environment (Hardcover)
Hrvoje Stancic
R4,152 Discovery Miles 41 520 Ships in 12 - 17 working days

Trust and Records in an Open Digital Environment explores issues that arise when digital records are entrusted to the cloud and will help professionals to make informed choices in the context of a rapidly changing digital economy. Showing that records need to ensure public trust, especially in the era of alternative truths, this volume argues that reliable resources, which are openly accessible from governmental institutions, e-services, archival institutions, digital repositories, and cloud-based digital archives, are the key to an open digital environment. The book also demonstrates that current established practices need to be reviewed and amended to include the networked nature of the cloud-based records, to investigate the role of new players, like cloud service providers (CSP), and assess the potential for implementing new, disruptive technologies like blockchain. Stancic and the contributors address these challenges by taking three themes - state, citizens, and documentary form - and discussing their interaction in the context of open government, open access, recordkeeping, and digital preservation. Exploring what is needed to enable the establishment of an open digital environment, Trust and Records in an Open Digital Environment should be essential reading for data, information, document, and records management professionals. It will also be a key text for archivists, librarians, professors, and students working in the information sciences and other related fields.

Digital Technology and Justice - Justice Apps (Hardcover): Tania Sourdin, Jacqueline Meredith, Bin Li Digital Technology and Justice - Justice Apps (Hardcover)
Tania Sourdin, Jacqueline Meredith, Bin Li
R1,711 Discovery Miles 17 110 Ships in 12 - 17 working days

Justice apps - mobile and web-based programmes that can assist individuals with legal tasks - are being produced, improved, and accessed at an unprecedented rate. These technologies have the potential to reshape the justice system, improve access to justice, and demystify legal institutions. Using artificial intelligence techniques, apps can even facilitate the resolution of common legal disputes. However, these opportunities must be assessed in light of the many challenges associated with app use in the justice sector. These include the digital divide and other accessibility issues; the ethical challenges raised by the dehumanisation of legal processes; and various privacy, security, and confidentiality risks. Surveying the landscape of this emergent industry, this book explores the objectives, opportunities, and challenges presented by apps across all areas of the justice sector. Detailed consideration is also given to the use of justice apps in specific legal contexts, including the family law and criminal law sectors. The first book to engage with justice apps, this book will appeal to a wide range of legal scholars, students, practitioners, and policy-makers.

Digital Privacy, Terrorism and Law Enforcement - The UK's Response to Terrorist Communication (Paperback): Simon Hale-Ross Digital Privacy, Terrorism and Law Enforcement - The UK's Response to Terrorist Communication (Paperback)
Simon Hale-Ross
R1,287 Discovery Miles 12 870 Ships in 12 - 17 working days

This book examines the UK's response to terrorist communication. Its principle question asks, has individual privacy and collective security been successfully managed and balanced? The author begins by assessing several technologically-based problems facing British law enforcement agencies, including use of the Internet; the existence of 'darknet'; untraceable Internet telephone calls and messages; smart encrypted device direct messaging applications; and commercially available encryption software. These problems are then related to the traceability and typecasting of potential terrorists, showing that law enforcement agencies are searching for needles in the ever-expanding haystacks. To this end, the book examines the bulk powers of digital surveillance introduced by the Investigatory Powers Act 2016. The book then moves on to assess whether these new powers and the new legislative safeguards introduced are compatible with international human rights standards. The author creates a 'digital rights criterion' from which to challenge the bulk surveillance powers against human rights norms. Lord Carlile of Berriew CBE QC in recommending this book notes this particular legal advancement, commenting that rightly so the author concludes the UK has fairly balanced individual privacy with collective security. The book further analyses the potential impact on intelligence exchange between the EU and the UK, following Brexit. Using the US as a case study, the book shows that UK laws must remain within the ambit of EU law and the Court of Justice of the European Union's (CJEU's) jurisprudence, to maintain the effectiveness of the exchange. It addresses the topics with regard to terrorism and counterterrorism methods and will be of interest to researchers, academics, professionals, and students researching counterterrorism and digital electronic communications, international human rights, data protection, and international intelligence exchange.

Testing and Securing Web Applications (Paperback): Ravi Das, Greg Johnson Testing and Securing Web Applications (Paperback)
Ravi Das, Greg Johnson
R1,678 Discovery Miles 16 780 Ships in 12 - 17 working days

Web applications occupy a large space within the IT infrastructure of a business or a corporation. They simply just don't touch a front end or a back end; today's web apps impact just about every corner of it. Today's web apps have become complex, which has made them a prime target for sophisticated cyberattacks. As a result, web apps must be literally tested from the inside and out in terms of security before they can be deployed and launched to the public for business transactions to occur. The primary objective of this book is to address those specific areas that require testing before a web app can be considered to be completely secure. The book specifically examines five key areas: Network security: This encompasses the various network components that are involved in order for the end user to access the particular web app from the server where it is stored at to where it is being transmitted to, whether it is a physical computer itself or a wireless device (such as a smartphone). Cryptography: This area includes not only securing the lines of network communications between the server upon which the web app is stored at and from where it is accessed from but also ensuring that all personally identifiable information (PII) that is stored remains in a ciphertext format and that its integrity remains intact while in transmission. Penetration testing: This involves literally breaking apart a Web app from the external environment and going inside of it, in order to discover all weaknesses and vulnerabilities and making sure that they are patched before the actual Web app is launched into a production state of operation. Threat hunting: This uses both skilled analysts and tools on the Web app and supporting infrastructure to continuously monitor the environment to find all security holes and gaps. The Dark Web: This is that part of the Internet that is not openly visible to the public. As its name implies, this is the "sinister" part of the Internet, and in fact, where much of the PII that is hijacked from a web app cyberattack is sold to other cyberattackers in order to launch more covert and damaging threats to a potential victim. Testing and Securing Web Applications breaks down the complexity of web application security testing so this critical part of IT and corporate infrastructure remains safe and in operation.

Testing and Securing Web Applications (Hardcover): Ravi Das, Greg Johnson Testing and Securing Web Applications (Hardcover)
Ravi Das, Greg Johnson
R3,994 Discovery Miles 39 940 Ships in 12 - 17 working days

Web applications occupy a large space within the IT infrastructure of a business or a corporation. They simply just don't touch a front end or a back end; today's web apps impact just about every corner of it. Today's web apps have become complex, which has made them a prime target for sophisticated cyberattacks. As a result, web apps must be literally tested from the inside and out in terms of security before they can be deployed and launched to the public for business transactions to occur. The primary objective of this book is to address those specific areas that require testing before a web app can be considered to be completely secure. The book specifically examines five key areas: Network security: This encompasses the various network components that are involved in order for the end user to access the particular web app from the server where it is stored at to where it is being transmitted to, whether it is a physical computer itself or a wireless device (such as a smartphone). Cryptography: This area includes not only securing the lines of network communications between the server upon which the web app is stored at and from where it is accessed from but also ensuring that all personally identifiable information (PII) that is stored remains in a ciphertext format and that its integrity remains intact while in transmission. Penetration testing: This involves literally breaking apart a Web app from the external environment and going inside of it, in order to discover all weaknesses and vulnerabilities and making sure that they are patched before the actual Web app is launched into a production state of operation. Threat hunting: This uses both skilled analysts and tools on the Web app and supporting infrastructure to continuously monitor the environment to find all security holes and gaps. The Dark Web: This is that part of the Internet that is not openly visible to the public. As its name implies, this is the "sinister" part of the Internet, and in fact, where much of the PII that is hijacked from a web app cyberattack is sold to other cyberattackers in order to launch more covert and damaging threats to a potential victim. Testing and Securing Web Applications breaks down the complexity of web application security testing so this critical part of IT and corporate infrastructure remains safe and in operation.

Cyber Security and Operations Management for Industry 4.0 (Hardcover): Ahmed A. Elngar, N. Thillaiarasu, Mohamed Elhoseny, K... Cyber Security and Operations Management for Industry 4.0 (Hardcover)
Ahmed A. Elngar, N. Thillaiarasu, Mohamed Elhoseny, K Martin Sagayam
R3,835 Discovery Miles 38 350 Ships in 12 - 17 working days

This book seamlessly connects the topics of Industry 4.0 and cyber security. It discusses the risks and solutions of using cyber security techniques for Industry 4.0. Cyber Security and Operations Management for Industry 4.0 covers the cyber security risks involved in the integration of Industry 4.0 into businesses and highlights the issues and solutions. The book offers the latest theoretical and practical research in the management of cyber security issues common in Industry 4.0 and also discusses the ethical and legal perspectives of incorporating cyber security techniques and applications into the day-to-day functions of an organization. Industrial management topics related to smart factories, operations research, and value chains are also discussed. This book is ideal for industry professionals, researchers, and those in academia who are interested in learning more about how cyber security and Industry 4.0 are related and can work together.

Data Protection - Ensuring Data Availability (Hardcover, 2nd edition): Preston Deguise Data Protection - Ensuring Data Availability (Hardcover, 2nd edition)
Preston Deguise
R3,724 Discovery Miles 37 240 Ships in 12 - 17 working days

The second edition of Data Protection goes beyond the traditional topics including deduplication, continuous availability, snapshots, replication, backup, and recovery, and explores such additional considerations as legal, privacy, and ethical issues. A new model is presented for understanding and planning the various aspects of data protection, which is essential to developing holistic strategies. The second edition also addresses the cloud and the growing adoption of software and function as a service, as well as effectively planning over the lifespan of a workload: what the best mix of traditional and cloud native data protection services might be. Virtualization continues to present new challenges to data protection, and the impact of containerization is examined. The book takes a holistic, business-based approach to data protection. It explains how data protection is a mix of proactive and reactive planning, technology, and activities that allow for data continuity. There are three essential activities that refer to themselves as data protection; while they all overlap in terms of scope and function, each operates as a reasonably self-contained field with its own specialists and domain nomenclature. These three activities are: * Data protection as a storage and recovery activity * Data protection as a security activity * Data protection as a privacy activity These activities are covered in detail, with a focus on how organizations can use them to leverage their IT investments and optimize costs. The book also explains how data protection is becoming an enabler for new processes around data movement and data processing. This book arms readers with information critical for making decisions on how data can be protected against loss in the cloud, on premises, or in a mix of the two. It explains the changing face of recovery in a highly virtualized datacenter and techniques for dealing with big data. Moreover, it presents a model for where data recovery processes can be integrated with IT governance and management in order to achieve the right focus on recoverability across the business. About the Author Preston de Guise has been working with data recovery products for his entire career-designing, implementing, and supporting solutions for governments, universities, and businesses ranging from SMEs to Fortune 500 companies. This broad exposure to industry verticals and business sizes has enabled Preston to understand not only the technical requirements of data protection and recovery, but the management and procedural aspects too.

Data Protection - Ensuring Data Availability (Paperback, 2nd edition): Preston Deguise Data Protection - Ensuring Data Availability (Paperback, 2nd edition)
Preston Deguise
R1,917 Discovery Miles 19 170 Ships in 12 - 17 working days

The second edition of Data Protection goes beyond the traditional topics including deduplication, continuous availability, snapshots, replication, backup, and recovery, and explores such additional considerations as legal, privacy, and ethical issues. A new model is presented for understanding and planning the various aspects of data protection, which is essential to developing holistic strategies. The second edition also addresses the cloud and the growing adoption of software and function as a service, as well as effectively planning over the lifespan of a workload: what the best mix of traditional and cloud native data protection services might be. Virtualization continues to present new challenges to data protection, and the impact of containerization is examined. The book takes a holistic, business-based approach to data protection. It explains how data protection is a mix of proactive and reactive planning, technology, and activities that allow for data continuity. There are three essential activities that refer to themselves as data protection; while they all overlap in terms of scope and function, each operates as a reasonably self-contained field with its own specialists and domain nomenclature. These three activities are: * Data protection as a storage and recovery activity * Data protection as a security activity * Data protection as a privacy activity These activities are covered in detail, with a focus on how organizations can use them to leverage their IT investments and optimize costs. The book also explains how data protection is becoming an enabler for new processes around data movement and data processing. This book arms readers with information critical for making decisions on how data can be protected against loss in the cloud, on premises, or in a mix of the two. It explains the changing face of recovery in a highly virtualized datacenter and techniques for dealing with big data. Moreover, it presents a model for where data recovery processes can be integrated with IT governance and management in order to achieve the right focus on recoverability across the business. About the Author Preston de Guise has been working with data recovery products for his entire career-designing, implementing, and supporting solutions for governments, universities, and businesses ranging from SMEs to Fortune 500 companies. This broad exposure to industry verticals and business sizes has enabled Preston to understand not only the technical requirements of data protection and recovery, but the management and procedural aspects too.

What Every Engineer Should Know About Cyber Security and Digital Forensics (Paperback, 2nd edition): Joanna F Defranco, Bob... What Every Engineer Should Know About Cyber Security and Digital Forensics (Paperback, 2nd edition)
Joanna F Defranco, Bob Maley
R1,412 Discovery Miles 14 120 Ships in 12 - 17 working days

Updates content and introduces topics such as business changes and outsourcing. Addresses new cyber security risks such as IoT and Distributed Networks (i.e., blockchain). Covers strategy based on the OODA loop in the cycle. Demonstrates application of the concepts through short case studies of real-world incidents chronologically delineating related events. Discusses certifications and reference manuals in cyber security and digital forensics. Includes an entire chapter on tools used by professionals in the field.

Cyber Strategy - Risk-Driven Security and Resiliency (Hardcover): Carol A. Siegel, Mark Sweeney Cyber Strategy - Risk-Driven Security and Resiliency (Hardcover)
Carol A. Siegel, Mark Sweeney
R3,087 Discovery Miles 30 870 Ships in 12 - 17 working days

Cyber Strategy: Risk-Driven Security and Resiliency provides a process and roadmap for any company to develop its unified Cybersecurity and Cyber Resiliency strategies. It demonstrates a methodology for companies to combine their disassociated efforts into one corporate plan with buy-in from senior management that will efficiently utilize resources, target high risk threats, and evaluate risk assessment methodologies and the efficacy of resultant risk mitigations. The book discusses all the steps required from conception of the plan from preplanning (mission/vision, principles, strategic objectives, new initiatives derivation), project management directives, cyber threat and vulnerability analysis, cyber risk and controls assessment to reporting and measurement techniques for plan success and overall strategic plan performance. In addition, a methodology is presented to aid in new initiative selection for the following year by identifying all relevant inputs. Tools utilized include: Key Risk Indicators (KRI) and Key Performance Indicators (KPI) National Institute of Standards and Technology (NIST) Cyber Security Framework (CSF) Target State Maturity interval mapping per initiative Comparisons of current and target state business goals and critical success factors A quantitative NIST-based risk assessment of initiative technology components Responsible, Accountable, Consulted, Informed (RACI) diagrams for Cyber Steering Committee tasks and Governance Boards' approval processes Swimlanes, timelines, data flow diagrams (inputs, resources, outputs), progress report templates, and Gantt charts for project management The last chapter provides downloadable checklists, tables, data flow diagrams, figures, and assessment tools to help develop your company's cybersecurity and cyber resiliency strategic plan.

A Practical Guide to Security Engineering and Information Assurance (Paperback): Debra S. Herrmann A Practical Guide to Security Engineering and Information Assurance (Paperback)
Debra S. Herrmann
R1,825 Discovery Miles 18 250 Ships in 12 - 17 working days

Today the vast majority of the world's information resides in, is derived from, and is exchanged among multiple automated systems. Critical decisions are made, and critical action is taken based on information from these systems. Therefore, the information must be accurate, correct, and timely, and be manipulated, stored, retrieved, and exchanged safely, reliably, and securely. In a time when information is considered the latest commodity, information security should be top priority. A Practical Guide to Security Engineering and Information Assurance gives you an engineering approach to information security and information assurance (IA). The book examines the impact of accidental and malicious intentional action and inaction on information security and IA. Innovative long-term vendor, technology, and application-independent strategies show you how to protect your critical systems and data from accidental and intentional action and inaction that could lead to system failure or compromise. The author presents step-by-step, in-depth processes for defining information security and assurance goals, performing vulnerability and threat analysis, implementing and verifying the effectiveness of threat control measures, and conducting accident and incident investigations. She explores real-world strategies applicable to all systems, from small systems supporting a home-based business to those of a multinational corporation, government agency, or critical infrastructure system. The information revolution has brought its share of risks. Exploring the synergy between security, safety, and reliability engineering, A Practical Guide to Security Engineering and Information Assurance consolidates and organizes current thinking about information security/IA techniques, approaches, and best practices. As this book will show you, there is considerably more to information security/IA than firewalls, encryption, and virus protection.

Transatlantic Jurisdictional Conflicts in Data Protection Law - Fundamental Rights, Privacy and Extraterritoriality... Transatlantic Jurisdictional Conflicts in Data Protection Law - Fundamental Rights, Privacy and Extraterritoriality (Hardcover)
Mistale Taylor
R2,817 Discovery Miles 28 170 Ships in 12 - 17 working days

This book looks at transatlantic jurisdictional conflicts in data protection law and how the fundamental right to data protection conditions the EU's exercise of extraterritorial jurisdiction. Governments, companies and individuals are handling ever more digitised personal data, so it is increasingly important to ensure this data is protected. Meanwhile, the Internet is changing how territory and jurisdiction are realised online. The EU promotes personal data protection as a fundamental right. Especially since the EU's General Data Protection Regulation started applying in 2018, its data protection laws have had strong effects beyond its territory. In contrast, similar US information privacy laws are rooted in the marketplace and carry less normative heft. This has provoked clashes with the EU when their values, interests and laws conflict. This research uses three case studies to suggest ways to mitigate transatlantic jurisdictional tensions over data protection and security, the free flow of information and trade.

The Fight for Privacy - Protecting Dignity, Identity and Love in the Digital Age (Paperback): Danielle Keats Citron The Fight for Privacy - Protecting Dignity, Identity and Love in the Digital Age (Paperback)
Danielle Keats Citron
R350 R280 Discovery Miles 2 800 Save R70 (20%) Ships in 5 - 10 working days

Danielle Citron takes the conversation about technology and privacy out of the boardrooms and op-eds to reach readers where we are - in our bathrooms and bedrooms; with our families and our lovers; in all the parts of our lives we assume are untouchable - and shows us that privacy, as we think we know it, is largely already gone. The boundary that once protected our intimate lives from outside interests is an artefact of the 20th century. In the 21st, we have embraced a vast array of technology that enables constant access and surveillance of the most private aspects of our lives. From non-consensual pornography, to online extortion, to the sale of our data for profit, we are vulnerable to abuse. As Citron reveals, wherever we live, laws have failed miserably to keep up with corporate or individual violators, letting our privacy wash out with the technological tide. And the erosion of intimate privacy in particular, Citron argues, holds immense toxic power to transform our lives and our societies for the worse (and already has). With vivid examples drawn from interviews with victims, activists and lawmakers from around the world, The Fight for Privacy reveals the threat we face and argues urgently and forcefully for a reassessment of privacy as a human right. And, as a legal scholar and expert, Danielle Citron is the perfect person to show us the way to a happier, better protected future.

Digital Image Watermarking - Theoretical and Computational Advances (Hardcover): Surekha Borra, Rohit Thanki, Nilanjan Dey Digital Image Watermarking - Theoretical and Computational Advances (Hardcover)
Surekha Borra, Rohit Thanki, Nilanjan Dey
R1,803 Discovery Miles 18 030 Ships in 12 - 17 working days

The Book presents an overview of newly developed watermarking techniques in various independent and hybrid domains Covers the basics of digital watermarking, its types, domain in which it is implemented and the application of machine learning algorithms onto digital watermarking Reviews hardware implementation of watermarking Discusses optimization problems and solutions in watermarking with a special focus on bio-inspired algorithms Includes a case study along with its MATLAB code and simulation results

Securing Social Networks in Cyberspace (Hardcover): Al-Sakib Khan Pathan Securing Social Networks in Cyberspace (Hardcover)
Al-Sakib Khan Pathan
R2,811 Discovery Miles 28 110 Ships in 12 - 17 working days

This book collates the key security and privacy concerns faced by individuals and organizations who use various social networking sites. This includes activities such as connecting with friends, colleagues, and family; sharing and posting information; managing audio, video, and photos; and all other aspects of using social media sites both professionally and personally. In the setting of the Internet of Things (IoT) that can connect millions of devices at any one time, the security of such actions is paramount. Securing Social Networks in Cyberspace discusses user privacy and trust, location privacy, protecting children, managing multimedia content, cyberbullying, and much more. Current state-of-the-art defense mechanisms that can bring long-term solutions to tackling these threats are considered in the book. This book can be used as a reference for an easy understanding of complex cybersecurity issues in social networking platforms and services. It is beneficial for academicians and graduate-level researchers. General readers may find it beneficial in protecting their social-media-related profiles.

Pegasus - The Story of the World's Most Dangerous Spyware (Hardcover): Laurent Richard, Sandrine Rigaud Pegasus - The Story of the World's Most Dangerous Spyware (Hardcover)
Laurent Richard, Sandrine Rigaud
R630 R515 Discovery Miles 5 150 Save R115 (18%) Ships in 9 - 15 working days

Pegasus is almost certainly the most powerful piece of spyware ever developed. Installed by as little as a missed WhatsApp call, once on your phone it can record your calls, copy your messages, steal your photos and secretly film you. Those that control it can find out your daily movements: exactly where you've been, and who you've met. From a wayward princess who married into the royal family of Dubai, to the president of one of the most powerful and long-standing Republics in Europe and a reporter investigating arms deals being negotiated by the government of Hungarian Prime Minister Viktor Orban and the Trump administration. These three individuals and many more have been targeted by Pegasus - with sometimes deadly consequences. The personal data of the victims is captured by their own governments, foreign governments and even by private criminal enterprises. They have become, in an instant, vulnerable to blackmail, intimidation, false imprisonment and assassination. Some have already suffered these fates. Laurent Richard and Sandrine Rigaud are award-winning journalists who have conducted international investigations for more than twenty years. Pegasus investigates how people's lives and privacy are being threatened as cyber-surveillance occurs with exponentially increasing frequency across the world, at a sweep and scale that astounds - and horrifies.

Adaptive Middleware for the Internet of Things - The GAMBAS Approach (Hardcover): Marcus Handte, Pedro Jose Marron, Gregor... Adaptive Middleware for the Internet of Things - The GAMBAS Approach (Hardcover)
Marcus Handte, Pedro Jose Marron, Gregor Schiele, Matoses Manuel Serrano
R2,791 Discovery Miles 27 910 Ships in 12 - 17 working days

Over the past years, a considerable amount of effort has been devoted, both in industry and academia, towards the development of basic technology as well as innovative applications for the Internet of Things. Adaptive Middleware for the Internet of Things introduces a scalable, interoperable and privacy-preserving approach to realize IoT applications and discusses abstractions and mechanisms at the middleware level that simplify the realization of services that can adapt autonomously to the behavior of their users. Technical topics discussed in the book include: - Behavior-driven Autonomous Services - GAMBAS Middleware Architecture - Generic and Efficient Data Acquisition - Interoperable and Scalable Data Processing - Automated Privacy Preservation Adaptive Middleware for the Internet of Things summarizes the results of the GAMBAS research project funded by the European Commission under Framework Programme 7. It provides an in-depth description of the middleware system developed by the project consortium. In addition, the book describes several innovative mobility and monitoring applications that have been built, deployed and operated to evaluate the middleware under realistic conditions with a large number of users. Adaptive Middleware for the Internet of Things is ideal for personnel in the computer and communication industries as well as academic staff and research students in computer science interested in the development of systems and applications for the Internet of Things.

Multimodal Biometric Systems - Security and Applications (Hardcover): Rashmi Gupta, Manju Khari Multimodal Biometric Systems - Security and Applications (Hardcover)
Rashmi Gupta, Manju Khari
R3,979 Discovery Miles 39 790 Ships in 12 - 17 working days

Many governments around the world are calling for the use of biometric systems to provide crucial societal functions, consequently making it an urgent area for action. The current performance of some biometric systems in terms of their error rates, robustness, and system security may prove to be inadequate for large-scale applications to process millions of users at a high rate of throughput. This book focuses on fusion in biometric systems. It discusses the present level, the limitations, and proposed methods to improve performance. It describes the fundamental concepts, current research, and security-related issues. The book will present a computational perspective, identify challenges, and cover new problem-solving strategies, offering solved problems and case studies to help with reader comprehension and deep understanding. This book is written for researchers, practitioners, both undergraduate and post-graduate students, and those working in various engineering fields such as Systems Engineering, Computer Science, Information Technology, Electronics, and Communications.

The Art of Deception - Controlling the Human Element of Security (Paperback, New ed): KD Mitnick The Art of Deception - Controlling the Human Element of Security (Paperback, New ed)
KD Mitnick
R378 R259 Discovery Miles 2 590 Save R119 (31%) Ships in 12 - 17 working days

The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security
Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide. Now, in The Art of Deception, the world's most notorious hacker gives new meaning to the old adage, "It takes a thief to catch a thief."
Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. With the help of many fascinating true stories of successful attacks on business and government, he illustrates just how susceptible even the most locked-down information systems are to a slick con artist impersonating an IRS agent. Narrating from the points of view of both the attacker and the victims, he explains why each attack was so successful and how it could have been prevented in an engaging and highly readable style reminiscent of a true-crime novel. And, perhaps most importantly, Mitnick offers advice for preventing these types of social engineering hacks through security protocols, training programs, and manuals that address the human element of security.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Permanent Record
Edward Snowden Paperback R299 R234 Discovery Miles 2 340
Broken Code - Inside Facebook And The…
Jeff Horwitz Paperback R420 R328 Discovery Miles 3 280
The Practical Guide to HIPAA Privacy and…
Rebecca Herold, Kevin Beaver Paperback R2,105 Discovery Miles 21 050
Pegasus - The Story Of The World's Most…
Laurent Richard, Sandrine Rigaud Paperback R380 R297 Discovery Miles 2 970
EU General Data Protection Regulation…
It Governance Privacy Team Paperback R754 Discovery Miles 7 540
Botnets - Architectures…
Georgios Kambourakis, Marios Anagnostopoulos, … Paperback R1,438 Discovery Miles 14 380
Password Logbook (Black & Gold) - Keep…
Editors of Rock Point Hardcover R161 Discovery Miles 1 610
Hands-On Ethical Hacking and Network…
Rob Wilson Paperback R1,357 R1,210 Discovery Miles 12 100
Cybersecurity For Dummies, 2nd Edition
J. Steinberg Paperback R795 R572 Discovery Miles 5 720
Smart-Tech Society - Convenience…
Mark Whitehead, William G.A. Collier Hardcover R2,911 Discovery Miles 29 110

 

Partners