0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (158)
  • R250 - R500 (194)
  • R500+ (825)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

Enforcing Privacy - Regulatory, Legal and Technological Approaches (Hardcover, 1st ed. 2016): David Wright, Paul De Hert Enforcing Privacy - Regulatory, Legal and Technological Approaches (Hardcover, 1st ed. 2016)
David Wright, Paul De Hert
R6,263 Discovery Miles 62 630 Ships in 12 - 19 working days

This book is about enforcing privacy and data protection. It demonstrates different approaches - regulatory, legal and technological - to enforcing privacy. If regulators do not enforce laws or regulations or codes or do not have the resources, political support or wherewithal to enforce them, they effectively eviscerate and make meaningless such laws or regulations or codes, no matter how laudable or well-intentioned. In some cases, however, the mere existence of such laws or regulations, combined with a credible threat to invoke them, is sufficient for regulatory purposes. But the threat has to be credible. As some of the authors in this book make clear - it is a theme that runs throughout this book - "carrots" and "soft law" need to be backed up by "sticks" and "hard law". The authors of this book view privacy enforcement as an activity that goes beyond regulatory enforcement, however. In some sense, enforcing privacy is a task that befalls to all of us. Privacy advocates and members of the public can play an important role in combatting the continuing intrusions upon privacy by governments, intelligence agencies and big companies. Contributors to this book - including regulators, privacy advocates, academics, SMEs, a Member of the European Parliament, lawyers and a technology researcher - share their views in the one and only book on Enforcing Privacy.

Preserving Privacy Against Side-Channel Leaks - From Data Publishing to Web Applications (Hardcover, 1st ed. 2016): Wen Ming... Preserving Privacy Against Side-Channel Leaks - From Data Publishing to Web Applications (Hardcover, 1st ed. 2016)
Wen Ming Liu, Lingyu Wang
R3,449 Discovery Miles 34 490 Ships in 12 - 19 working days

This book offers a novel approach to data privacy by unifying side-channel attacks within a general conceptual framework. This book then applies the framework in three concrete domains. First, the book examines privacy-preserving data publishing with publicly-known algorithms, studying a generic strategy independent of data utility measures and syntactic privacy properties before discussing an extended approach to improve the efficiency. Next, the book explores privacy-preserving traffic padding in Web applications, first via a model to quantify privacy and cost and then by introducing randomness to provide background knowledge-resistant privacy guarantee. Finally, the book considers privacy-preserving smart metering by proposing a light-weight approach to simultaneously preserving users' privacy and ensuring billing accuracy. Designed for researchers and professionals, this book is also suitable for advanced-level students interested in privacy, algorithms, or web applications.

Improving Information Security Practices through Computational Intelligence (Hardcover): Wasan Shaker Awad, El-Sayed M El-Alfy,... Improving Information Security Practices through Computational Intelligence (Hardcover)
Wasan Shaker Awad, El-Sayed M El-Alfy, Yousif Al-Bastaki
R5,692 Discovery Miles 56 920 Ships in 10 - 15 working days

The recent explosion in complex global networking architectures has spurred a concomitant rise in the need for robust information security. Further, as computing power increases exponentially with every passing year, so do the number of proposed cryptographic schemata for improving and ensuring the encryption integrity of cutting-edge infosec protocols. Improving Information Security Practices through Computation Intelligence presents an overview of the latest and greatest research in the field, touching on such topics as cryptology, stream ciphers, and intrusion detection, and providing new insights to an audience of students, teachers, and entry-level researchers working in computational intelligence, information security, and security engineering.

Data Protection and Confidentiality in Health Informatics (Hardcover): Commission of the European Communities. (CEC) DG for... Data Protection and Confidentiality in Health Informatics (Hardcover)
Commission of the European Communities. (CEC) DG for Energy
R2,434 Discovery Miles 24 340 Ships in 12 - 19 working days

The present situation of data protection in health informatics in Europe can be described as alarming. Notwithstanding the ever increasing use of information technology, a decade has passed since the appearance of the council of Europe Data Protection Convention and the recommendation on Automated Medical Data Banks, without much progress being achieved. To enable the best use of information technology in the health sector, urgent action needs to be taken. The causes for concern stem from two major factors, Firstly, when the question is asked whether the principles of data protection are being respected in the health information sector, it is impossible to give a definite answer. Secondly, the participants at the working conference, from their personal non-systematic observations shared the opinion that in the fast majority of cases the principles and recommendations have not properly been implemented. Experience from the field shows that in the health sector the people involved are often indifferent and in some cases reluctant to ensure the implementation of data protection measure. Both the indifference and possible even some of the reluctance may arise from the general lack of awareness about the issues involved. This makes the implementation of the required organizational measures difficult.

E-Commerce Law in Europe and the USA (Hardcover, 2002 ed.): Gerald Spindler, Fritjof Boerner E-Commerce Law in Europe and the USA (Hardcover, 2002 ed.)
Gerald Spindler, Fritjof Boerner
R4,758 Discovery Miles 47 580 Ships in 12 - 19 working days

This unique text deals with the most important legal areas for e-commerce related business in most of the member states in Europe as well as the USA. In doing so the text takes into consideration the national law of the following countries: Belgium, France, Germany, Great Britain, Italy, Netherlands, Norway, Spain, Switzerland, and the USA. Topics that are dealt with include: contract law, consumer protection, intellectual property law, unfair competition, antitrust law, liability of providers, money transactions, privacy and data protection. The country-specific contributions follow a questionnaire which can be found in the beginning. The uniform structure of each contribution enables the reader to quickly find an answer to a legal question. All contributions have been written by experts from each member state.

From Anarchy to Power - The Net Comes of Age (Hardcover): Wendy Grossman From Anarchy to Power - The Net Comes of Age (Hardcover)
Wendy Grossman
R1,978 Discovery Miles 19 780 Ships in 10 - 15 working days

"Both newbies (newcomers to the Internet) and Netizens (old-timers) will find challenges and rewards in this witty, knowledgeable, and timely report from the electronic front."
--"Publishers Weekly"

"Vividly describes the virtual realm as a place of interconnecting communities every bitas complicated, exciting, and dangerous as any city."
--"Booklist"

"A pleasant antidote to the breathless rhetoric one finds in many books and magazines devoted to computer culture."
--"Technology Review"

"Grossman brings a wealth of professional and personal experience to the material-and a clarity of style and analysis that is a welcome relief from both the hyperbolic prose of many Net boosters and the overwrought jeremiads of cyberphobes."
--"Reason"

"There is a lot to like about this survey, especially the diligent research and reading the author has invested in it. The endnotes are vast and informative..."From Anarchy to Power" gathers strengh as it goes along."
--"The Christian Century"

"An informative exploration into many of the issues and problems that plague the Net today...From Anarchy to Power is a must read."
-- "ComputerUser.com"

companion website: http: //www.nyupress.org/fap

Yesterday's battles over internet turf were fought on the net itself: today's battles are fought in government committees, in Congress, on the stock exchange, and in the marketplace. What was once an experimental ground for electronic commerce is now the hottest part of our economic infrastructure.

In From Anarchy to Power, Wendy Grossman explores the new dispensation on the net and tackles the questions that trouble every online user: How vulnerable are the internet andworld wide web to malicious cyber hackers? What are the limits of privacy online? How real is internet addiction and to what extent is the news media responsible for this phenomenon? Are women and minorities at a disadvantage in cyberspace? How is the increasing power of big business changing internet culture?

We learn about the political economy of the internet including issues of copyright law, corporate control and cryptography legislation. Throughout the book the emphasis is on the international dimensions of the net, focusing on privacy and censorship in the United States, Europe and Canada and the hitherto ignored contributions of other countries in the development of the net. Entertaining and informative From Anarchy to Power is required reading for anyone who wants to know where the new digital economy is heading.

Privacy and the Commercial Use of Personal Information (Hardcover, 2002 ed.): Paul H. Rubin, Thomas M. Lenard Privacy and the Commercial Use of Personal Information (Hardcover, 2002 ed.)
Paul H. Rubin, Thomas M. Lenard
R2,941 Discovery Miles 29 410 Ships in 10 - 15 working days

The current debate over privacy presents some of the most complex policy-making challenges we have seen in some time. While data on consumers have long been used for marketing purposes, the Internet has substantially increased the flow of personal information. This has produced great benefits, but it also has raised concerns on the part of individuals about what information is being collected, how it is being used and who has access to it. These concerns, in turn, have led to calls for new government regulation. This study focuses on the market for personal information used for advertising and marketing purposes, which is the market affected by most of the regulatory and legislative proposals now under consideration. Unfortunately, there has been little careful analysis of these proposals and their likely consequences. This book attempts to fill this gap by addressing the following basic questions: Are there failures' in the market for personal information? If market failures exist, how do they adversely affect consumers? Can such failures be remedied by government regulation? Would the benefits of government regulation exceed the costs? A/LISTA The authors find that the commercial market for information appears to be working well and is responding to consumers' privacy concerns. They conclude that regulation imposed on a medium like the Internet that is changing so rapidly would have unpredictable and costly consequences. This study is a product of The Progress & Freedom Foundation's project on Regulating Personal Information: Balancing Benefits and Costs. The Progress & Freedom Foundation studies the impact of the digital revolution and its implications for public policy. It conductsresearch in fields such as electronic commerce, telecommunications and the impact of the Internet on government, society and economic growth. It also studies issues such as the need to reform government regulation, especially in technology-intensive fields such as medical innovation, energy and environmental regulation.

Privacy and the Digital State - Balancing Public Information and Personal Privacy (Hardcover): Alan Charles Raul Privacy and the Digital State - Balancing Public Information and Personal Privacy (Hardcover)
Alan Charles Raul
R1,613 Discovery Miles 16 130 Ships in 10 - 15 working days

Alan Charles Raul The devastating and reprehensible acts of terrorism committed against the 11, 2001 have greatly affected our lives, our United States on September livelihoods, and perhaps our way of living. The system of government embodied in our Constitution and Bill of Rights was designed to inhibit excessively efficient government. By imposing checks and balances against over-reaching governmental power, the Founders intended to promote the rule of laws, not men - and to protect the prerogatives of citizens over and above their rulers. No faction was to become so powerful that the rights and interests of any other groups or individuals could be easily trampled. Specifically, the Framers of our constitutional structure prohibited the government from suppressing speech, inhibiting the right of free association, of people, conducting unreasonable preventing (peaceful) assemblies searches and seizures, or acting without observing the dictates of due process and fair play. After September 11, there is a risk that the philosophical protections of the Constitution could appear more than a trifle "academic. " Indeed, our tradional notions of "fair play" will be sorely tested in the context of our compelling requirements for effective self-defense against brutal, evil killers who hate the very idea of America. Now that we witness the grave physical dangers that confront our families, friends, neighbors, and businesses, our commitment to limited government and robust individual liberties will of our inevitably - and understandably - be challenged.

The Little Black Book of Data and Democracy - From Innocent Tweeting to an Attempted Coup: How social media threatens our very... The Little Black Book of Data and Democracy - From Innocent Tweeting to an Attempted Coup: How social media threatens our very way of life (Paperback)
Kyle Taylor
R302 Discovery Miles 3 020 Ships in 12 - 19 working days
Humans and Machines at Work - Monitoring, Surveillance and Automation in Contemporary Capitalism (Hardcover, 1st ed. 2018):... Humans and Machines at Work - Monitoring, Surveillance and Automation in Contemporary Capitalism (Hardcover, 1st ed. 2018)
Phoebe Moore, Martin Upchurch, Xanthe Whittaker
R4,181 Discovery Miles 41 810 Ships in 10 - 15 working days

This edited collection provides a series of accounts of workers' local experiences that reflect the ubiquity of work's digitalisation. Precarious gig economy workers ride bikes and drive taxis in China and Britain; call centre workers in India experience invasive tracking; warehouse workers discover that hidden data has been used for layoffs; and academic researchers see their labour obscured by a 'data foam' that does not benefit them. These cases are couched in historical accounts of identity and selfhood experiments seen in the Hawthorne experiments and the lineage of automation. This book will appeal to scholars in the Sociology of Work and Digital Labour Studies and anyone interested in learning about monitoring and surveillance, automation, the gig economy and the quantified self in the workplace.

Password Logbook (Black & Gold) - Keep Track of Usernames, Passwords, Web Addresses in One Easy and Organized Location... Password Logbook (Black & Gold) - Keep Track of Usernames, Passwords, Web Addresses in One Easy and Organized Location (Hardcover)
Editors of Rock Point
R199 R176 Discovery Miles 1 760 Save R23 (12%) Ships in 12 - 19 working days

Keep track of your online passwords in this elegant, yet inconspicuous, alphabetically tabbed notebook featuring a modern black-and-gold design. In this 4 x 5.75-inch, 128-page hardcover notebook with removable cover band, record the necessarily complex passwords and user login names required to thwart hackers. You'll find: Internet password safety and naming tips A to Z tabbed pages with space to list website, username, and five passwords for each Dedicated pages to record software license information, with spaces for license number, purchase date, renewal date, and monthly fee Dedicated pages to record network settings and passwords, including for modem, router, WAN, LAN, and wireless A notes section with blank lined pages Just say "no" to piles of sticky notes and scraps of paper with your passwords and logins! This internet password logbook provides an easy way to keep track of website addresses, usernames, and passwords in one discreet and convenient location.

Privacy and Data Protection Seals (Hardcover, 1st ed. 2018): Rowena Rodrigues, Vagelis Papakonstantinou Privacy and Data Protection Seals (Hardcover, 1st ed. 2018)
Rowena Rodrigues, Vagelis Papakonstantinou
R2,382 Discovery Miles 23 820 Ships in 10 - 15 working days

The book presents timely and needed contributions on privacy and data protection seals as seen from general, legal, policy, economic, technological, and societal perspectives. It covers data protection certification in the EU (i.e., the possibilities, actors and building blocks); the Schleswig-Holstein Data Protection Seal; the French Privacy Seal Scheme; privacy seals in the USA, Europe, Japan, Canada, India and Australia; controversies, challenges and lessons for privacy seals; the potential for privacy seals in emerging technologies; and an economic analysis. This book is particularly relevant in the EU context, given the General Data Protection Regulation (GDPR) impetus to data protection certification mechanisms and the dedication of specific provisions to certification. Its coverage of practices in jurisdictions outside the EU also makes it relevant globally. This book will appeal to European legislators and policy-makers, privacy and data protection practitioners, certification bodies, international organisations, and academics. Rowena Rodrigues is a Senior Research Analyst with Trilateral Research Ltd. in London and Vagelis Papakonstantinou is a Senior Researcher at the Vrije Universiteit Brussel in Brussels.

New Dimensions of Information Warfare (Hardcover, 1st ed. 2021): Roberto Di Pietro, Simone Raponi, Maurantonio Caprolu, Stefano... New Dimensions of Information Warfare (Hardcover, 1st ed. 2021)
Roberto Di Pietro, Simone Raponi, Maurantonio Caprolu, Stefano Cresci
R4,585 Discovery Miles 45 850 Ships in 12 - 19 working days

This book revises the strategic objectives of Information Warfare, interpreting them according to the modern canons of information age, focusing on the fabric of society, the economy, and critical Infrastructures. The authors build plausible detailed real-world scenarios for each entity, showing the related possible threats from the Information Warfare point of view. In addition, the authors dive into the description of the still open problems, especially when it comes to critical infrastructures, and the countermeasures that can be implemented, possibly inspiring further research in the domain. This book intends to provide a conceptual framework and a methodological guide, enriched with vivid and compelling use cases for the readers (e.g. technologists, academicians, military, government) interested in what Information Warfare really means, when its lenses are applied to current technology. Without sacrificing accuracy, rigor and, most importantly, the big picture of Information Warfare, this book dives into several relevant and up-to-date critical domains. The authors illustrate how finance (an always green target of Information Warfare) is intertwined with Social Media, and how an opponent could exploit these latter ones to reach its objectives. Also, how cryptocurrencies are going to reshape the economy, and the risks involved by this paradigm shift. Even more compelling is how the very fabric of society is going to be reshaped by technology, for instance how our democratic elections are exposed to risks that are even greater than what appears in the current public discussions. Not to mention how our Critical Infrastructure is becoming exposed to a series of novel threats, ranging from state-supported malware to drones. A detailed discussion of possible countermeasures and what the open issues are for each of the highlighted threats complete this book. This book targets a widespread audience that includes researchers and advanced level students studying and working in computer science with a focus on security. Military officers, government officials and professionals working in this field will also find this book useful as a reference.

The Cyber Security Handbook - Prepare for, respond to and recover from cyber attacks with the IT Governance Cyber Resilience... The Cyber Security Handbook - Prepare for, respond to and recover from cyber attacks with the IT Governance Cyber Resilience Framework (CRF) (Hardcover)
Alan Calder
R1,753 Discovery Miles 17 530 Ships in 10 - 15 working days

In the world as we know it, you can be attacked both physically and virtually. For today's organisations, which rely so heavily on technology - particularly the Internet - to do business, the latter is the far more threatening of the two. The cyber threat landscape is complex and constantly changing. For every vulnerability fixed, another pops up, ripe for exploitation. This book is a comprehensive cyber security implementation manual which gives practical guidance on the individual activities identified in the IT Governance Cyber Resilience Framework (CRF) that can help organisations become cyber resilient and combat the cyber threat landscape. Suitable for senior directors (CEO, CISO, CIO), compliance managers, privacy managers, IT managers, security analysts and others, the book is divided into six parts: Part 1: Introduction. The world of cyber security and the approach taken in this book. Part 2: Threats and vulnerabilities. A discussion of a range of threats organisations face, organised by threat category, to help you understand what you are defending yourself against before you start thinking about your actual defences. Part 3: The CRF processes. Detailed discussions of each of the 24 CRF processes, explaining a wide range of security areas by process category and offering guidance on how to implement each. Part 4: Eight steps to implementing cyber security. Our eight-step approach to implementing the cyber security processes you need and maintaining them. Part 5: Reference frameworks. An explanation of how standards and frameworks work, along with their benefits. It also presents ten framework options, introducing you to some of the best-known standards and giving you an idea of the range available. Part 6: Conclusion and appendices. The appendices include a glossary of all the acronyms and abbreviations used in this book. Whether you are just starting out on the road to cyber security or looking to enhance and improve your existing cyber resilience programme, it should be clear that cyber security is no longer optional in today's information age; it is an essential component of business success. Make sure you understand the threats and vulnerabilities your organisation faces and how the Cyber Resilience Framework can help you tackle them. Start your journey to cyber security now - buy this book today!

Cyber Security - Everything an Executive Needs to Know (Hardcover): Phillip Ferraro Cyber Security - Everything an Executive Needs to Know (Hardcover)
Phillip Ferraro
R681 R608 Discovery Miles 6 080 Save R73 (11%) Ships in 10 - 15 working days
CIPM Certified Information Privacy Manager All-in-One Exam Guide (Paperback): Peter Gregory CIPM Certified Information Privacy Manager All-in-One Exam Guide (Paperback)
Peter Gregory
R1,054 Discovery Miles 10 540 Ships in 12 - 19 working days

This self-study guide covers every topic on the Certified Information Privacy Manager exam Take IAPP's rigorous Certified Information Privacy Manager (CIPM) exam with complete confidence using the comprehensive information contained in this highly effective study guide. The book enhances candidates' abilities to design, build, and run information privacy management programs. Written by a security and privacy expert and experienced author, CIPM Certified Information Privacy Manager All-in-One Exam Guide is based on proven pedagogy and thoroughly prepares candidates to pass this exam. Beyond exam preparation, the guide also serves as a valuable on-the-job reference. *Provides 100% coverage of all eight objectives for the CIPM exam *Online content includes 300 practice questions in the Total Tester exam engine *Written by a security and privacy expert, educator, and experienced author

Designing for Privacy and its Legal Framework - Data Protection by Design and Default for the Internet of Things (Hardcover,... Designing for Privacy and its Legal Framework - Data Protection by Design and Default for the Internet of Things (Hardcover, 1st ed. 2018)
Aurelia Tamo-Larrieux
R4,378 Discovery Miles 43 780 Ships in 10 - 15 working days

This book discusses the implementation of privacy by design in Europe, a principle that has been codified within the European Data Protection Regulation (GDPR). While privacy by design inspires hope for future privacy-sensitive designs, it also introduces the need for a common understanding of the legal and technical concepts of privacy and data protection. By pursuing an interdisciplinary approach and comparing the problem definitions and objectives of both disciplines, this book bridges the gap between the legal and technical fields in order to enhance the regulatory and academic discourse. The research presented reveals the scope of legal principles and technical tools for privacy protection, and shows that the concept of privacy by design goes beyond the principle of the GDPR. The book presents an analysis of how current regulations delegate the implementation of technical privacy and data protection measures to developers and describes how policy design must evolve in order to implement privacy by design and default principles.

Medical Data Privacy Handbook (Hardcover, 1st ed. 2015): Aris Gkoulalas-Divanis, Grigorios Loukides Medical Data Privacy Handbook (Hardcover, 1st ed. 2015)
Aris Gkoulalas-Divanis, Grigorios Loukides
R8,481 Discovery Miles 84 810 Ships in 10 - 15 working days

This handbook covers Electronic Medical Record (EMR) systems, which enable the storage, management, and sharing of massive amounts of demographic, diagnosis, medication, and genomic information. It presents privacy-preserving methods for medical data, ranging from laboratory test results to doctors' comments. The reuse of EMR data can greatly benefit medical science and practice, but must be performed in a privacy-preserving way according to data sharing policies and regulations. Written by world-renowned leaders in this field, each chapter offers a survey of a research direction or a solution to problems in established and emerging research areas. The authors explore scenarios and techniques for facilitating the anonymization of different types of medical data, as well as various data mining tasks. Other chapters present methods for emerging data privacy applications and medical text de-identification, including detailed surveys of deployed systems. A part of the book is devoted to legislative and policy issues, reporting on the US and EU privacy legislation and the cost of privacy breaches in the healthcare domain. This reference is intended for professionals, researchers and advanced-level students interested in safeguarding medical data.

Cyber Security. Simply. Make it Happen. - Leveraging Digitization Through IT Security (Hardcover, 1st ed. 2017): Ferri... Cyber Security. Simply. Make it Happen. - Leveraging Digitization Through IT Security (Hardcover, 1st ed. 2017)
Ferri Abolhassan
R1,992 R1,513 Discovery Miles 15 130 Save R479 (24%) Ships in 12 - 19 working days

This book provides a practical and strategic perspective on IT and cyber security for corporations and other businesses. Leading experts from industry, politics and research discuss the status quo and future prospects of corporate cyber security. They answer questions such as: How much will IT security cost? Who will provide IT security? Can security even be fun? The book claims that digitization will increasingly pervade all areas of the economy, as well as our daily professional and personal lives. It will produce speed, agility and cost efficiency, but also increasing vulnerability in the context of public, corporate and private life. Consequently, cyber security is destined to become the great facilitator of digitization, providing maximum protection for data, networks, data centres and terminal devices.

Cyber Law, Privacy, and Security - Concepts, Methodologies, Tools, and Applications, VOL 2 (Hardcover): Information Reso... Cyber Law, Privacy, and Security - Concepts, Methodologies, Tools, and Applications, VOL 2 (Hardcover)
Information Reso Management Association
R10,238 Discovery Miles 102 380 Ships in 10 - 15 working days
Cyber Denial, Deception and Counter Deception - A Framework for Supporting Active Cyber Defense (Hardcover, 1st ed. 2015):... Cyber Denial, Deception and Counter Deception - A Framework for Supporting Active Cyber Defense (Hardcover, 1st ed. 2015)
Kristin E. Heckman, Frank J Stech, Roshan K. Thomas, Ben Schmoker, Alexander W. Tsow
R3,576 R2,552 Discovery Miles 25 520 Save R1,024 (29%) Ships in 12 - 19 working days

This book presents the first reference exposition of the Cyber-Deception Chain: a flexible planning and execution framework for creating tactical, operational, or strategic deceptions. This methodology bridges the gap between the current uncoordinated patchwork of tactical denial and deception (D&D) techniques and their orchestration in service of an organization's mission. Concepts for cyber- D&D planning operations and management are detailed within the larger organizational, business, and cyber defense context. It examines the necessity of a comprehensive, active cyber denial scheme. The authors explain the organizational implications of integrating D&D with a legacy cyber strategy, and discuss trade-offs, maturity models, and lifecycle management. Chapters present the primary challenges in using deception as part of a security strategy, and guides users through the steps to overcome common obstacles. Both revealing and concealing fact and fiction have a critical role in securing private information. Detailed case studies are included. Cyber Denial, Deception and Counter Deception is designed as a reference for professionals, researchers and government employees working in cybersecurity. Advanced-level students in computer science focused on security will also find this book useful as a reference or secondary text book.

Information Hiding Techniques for Steganography and Digital Watermarking (Hardcover): Stefan Katzenbeisser, Fabien Peticolas Information Hiding Techniques for Steganography and Digital Watermarking (Hardcover)
Stefan Katzenbeisser, Fabien Peticolas; Fabien Petitcolas, Stefan Katzenbeisser; Edited by F. Petticolas
R2,971 Discovery Miles 29 710 Ships in 10 - 15 working days

Steganography, a means by which two or more parties may communicate using "invisible" or "subliminal" communication, and watermarking, a means of hiding copyright data in images, are becoming necessary components of commercial multimedia applications that are subject to illegal use. This is a comprehensive survey of steganography and watermarking and their application to modern communications and multimedia. It helps the reader to understand steganography, the history of this previously neglected element of cryptography, the hurdles of international law on strong cryptographic techniques, and a description of the methods you can use to hide information in modern media. Included in this discussion is an overview of "steganalysis", methods which can be used to break stenographic communication. This resource also includes an introduction to and survey of watermarking methods, and discusses this method's similarities to and differences from steganography. The reader should gain a working knowledge of watermarking's pros and cons, and learn the legal implications of watermarking and copyright issues on the Internet.

Security and Privacy in Social Networks (Hardcover, 2013 ed.): Yaniv Altshuler, Yuval Elovici, Armin B. Cremers, Nadav Aharony,... Security and Privacy in Social Networks (Hardcover, 2013 ed.)
Yaniv Altshuler, Yuval Elovici, Armin B. Cremers, Nadav Aharony, Alex Pentland
R2,894 Discovery Miles 28 940 Ships in 10 - 15 working days

"Security and Privacy in Social Networks" brings to the forefront innovative approaches for analyzing and enhancing the security and privacy dimensions in online social networks, and is the first comprehensive attempt dedicated entirely to this field. In order to facilitate the transition of such methods from theory to mechanisms designed and deployed in existing online social networking services, the book aspires to create a common language between the researchers and practitioners of this new area- spanning from the theory of computational social sciences to conventional security and network engineering.

Computer and Network Security Essentials (Hardcover, 1st ed. 2018): Kevin Daimi Computer and Network Security Essentials (Hardcover, 1st ed. 2018)
Kevin Daimi; Contributions by Guillermo Francia, Levent Ertaul, Luis Hernandez Encinas, Eman El-Sheikh
R5,272 Discovery Miles 52 720 Ships in 10 - 15 working days

This book introduces readers to the tools needed to protect IT resources and communicate with security specialists when there is a security problem. The book covers a wide range of security topics including Cryptographic Technologies, Network Security, Security Management, Information Assurance, Security Applications, Computer Security, Hardware Security, and Biometrics and Forensics. It introduces the concepts, techniques, methods, approaches, and trends needed by security specialists to improve their security skills and capabilities. Further, it provides a glimpse into future directions where security techniques, policies, applications, and theories are headed. The book represents a collection of carefully selected and reviewed chapters written by diverse security experts in the listed fields and edited by prominent security researchers. Complementary slides are available for download on the book's website at Springer.com.

The Data Bank Society (Routledge Revivals) - Organizations, Computers and Social Freedom (Paperback): Malcolm Warner, Mike Stone The Data Bank Society (Routledge Revivals) - Organizations, Computers and Social Freedom (Paperback)
Malcolm Warner, Mike Stone
R686 Discovery Miles 6 860 Ships in 12 - 19 working days

This study, written in the context of its first publication in 1970, discusses and documents the invasion of privacy by the corporation and the social institution in the search for efficiency in information processing. Discussing areas such as the impact of the computer on administration, privacy and the storage on information, the authors assess the technical and social feasibility of constructing integrated data banks to cover the details of populations. The book was hugely influential both in terms of scholarship and legislation, and the years following saw the Data Protection Act of 1984, which was then consolidated by the Act of 1998. The topics under discussion remain of great concern to the public in our increasingly web-based world, ensuring the continued relevance of this title to academics and students with an interest in data protection and public privacy.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Panel Data Econometrics
Manuel Arellano Hardcover R4,751 Discovery Miles 47 510
Practical Grammar of Modern Chinese I…
Liu Yuehua, Pan Wenyu, … Paperback R1,417 Discovery Miles 14 170
Cancer: A Love Story - Memoir Of A…
Lauren Segal Paperback  (1)
R360 Discovery Miles 3 600
Quantitative Analysis and IBM (R) SPSS…
Abdulkader Aljandali Hardcover R1,541 Discovery Miles 15 410
The Dictionary of Obscure Sorrows
John Koenig Hardcover  (1)
R453 R411 Discovery Miles 4 110
Reversing Abrasion - Deficiencies The…
Health Central Paperback R499 Discovery Miles 4 990
Productivity - Concepts, Measurement…
Bert M. Balk Hardcover R3,411 Discovery Miles 34 110
Reversing Deep Vein Thrombosis (DVT…
Health Central Paperback R504 Discovery Miles 5 040
The Manual of Strategic Economic…
Jeff Grover Hardcover R2,742 Discovery Miles 27 420
Old Chinese - A New Reconstruction
William H. Baxter, Laurent Sagart Hardcover R3,067 Discovery Miles 30 670

 

Partners