0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (175)
  • R250 - R500 (196)
  • R500+ (804)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

Corporate Cyberwar (Paperback): Dr Michael Teng Corporate Cyberwar (Paperback)
Dr Michael Teng
R484 Discovery Miles 4 840 Ships in 10 - 15 working days

Corporate Cyberwar chronicles the daily battle between technical criminals and law enforcement. As new and advanced ways to cheat and financially ruin companies are discovered, many authorities not only have to figure out ways to stop it, but they also have to create new laws in order to prosecute the perpetrators. This book addresses how businesses/corporations can protect themselves against this increasingly vicious attack. To help convey the importance of protection and awareness, Cyberwar explores two very important cases, WikiLeaks and Stuxnet. Businesses/corporations are given a better understanding of such similar attacks in the future. Corporate Cyberwar does not only focus on problems, it also provides solutions. There is a point by point explanation of how Crimeware, Bot Networks and DDoS (Distributed Denial of Service) take place, which helps businesses/corporations understand exactly what needs to be done in order to prevent the attacks. Cyberwar is not only for those with a moderate understanding of technology, it is also for those with limited understanding of this threat and its devastating effects.

Digital Assassination - Protecting Your Reputation, Brand, or Business Against Online Attacks (Paperback): Richard Torrenzano,... Digital Assassination - Protecting Your Reputation, Brand, or Business Against Online Attacks (Paperback)
Richard Torrenzano, Mark Davis
R606 R525 Discovery Miles 5 250 Save R81 (13%) Ships in 10 - 15 working days

"Two leading reputation experts reveal how the internet is being used to destroy brands, reputations and even lives, and how to fight back.
"From false Wikipedia entries, to fake YouTube videos, to Facebook lynch mobs, everyone from CEOs to fashion models, journalists to politicians, restaurateurs to doctors, is open to character assassination in the burgeoning realm of digital media.
Two top media experts recount vivid tales of character attacks, provide specific advice on how to counter them, and how to turn the tables on the attackers. Having spent decades preparing for and coping with these issues, Richard Torrenzano and Mark Davis share their secrets on dealing with problems at the top of today's news.
Torrenzano and Davis also take a step back to look at how the past might inform our future thinking about character assassination, from the slander wars between Thomas Jefferson and Alexander Hamilton, to predictions on what the end of privacy will mean for civilization.

Cyber Storm III (Paperback): Department of Homeland Security Cyber Storm III (Paperback)
Department of Homeland Security
R303 Discovery Miles 3 030 Ships in 10 - 15 working days
Our Data, Ourselves - A Personal Guide to Digital Privacy (Hardcover): Jacqueline D. Lipton Our Data, Ourselves - A Personal Guide to Digital Privacy (Hardcover)
Jacqueline D. Lipton
R1,874 Discovery Miles 18 740 Ships in 12 - 17 working days

A practical, user-friendly handbook for understanding and protecting our personal data and digital privacy. Our Data, Ourselves addresses a common and crucial question: What can we as private individuals do to protect our personal information in a digital world? In this practical handbook, legal expert Jacqueline D. Lipton guides readers through important issues involving technology, data collection, and digital privacy as they apply to our daily lives. Our Data, Ourselves covers a broad range of everyday privacy concerns with easily digestible, accessible overviews and real-world examples. Lipton explores the ways we can protect our personal data and monitor its use by corporations, the government, and others. She also explains our rights regarding sensitive personal data like health insurance records and credit scores, as well as what information retailers can legally gather, and how. Who actually owns our personal information? Can an employer legally access personal emails? What privacy rights do we have on social media? Answering these questions and more, Our Data, Ourselves provides a strategic approach to assuming control over, and ultimately protecting, our personal information.

Cyber Security, Privacy and Networking - Proceedings of ICSPN 2021 (Paperback, 1st ed. 2022): Dharma P. Agrawal, Nadia Nedjah,... Cyber Security, Privacy and Networking - Proceedings of ICSPN 2021 (Paperback, 1st ed. 2022)
Dharma P. Agrawal, Nadia Nedjah, Bb Gupta, Gregorio Martinez Perez
R6,128 Discovery Miles 61 280 Ships in 12 - 17 working days

This book covers selected high-quality research papers presented in the International Conference on Cyber Security, Privacy and Networking (ICSPN 2021), organized during 17-19 September 2021 in India in Online mode. The objectives of ICSPN 2021 is to provide a premier international platform for deliberations on strategies, recent trends, innovative approaches, discussions and presentations on the most recent cyber security, privacy and networking challenges and developments from the perspective of providing security awareness and its best practices for the real world. Moreover, the motivation to organize this conference is to promote research by sharing innovative ideas among all levels of the scientific community, and to provide opportunities to develop creative solutions to various security, privacy and networking problems.

Social Security Numbers & ID Theft (Hardcover, New): Felipe D. Sorrells Social Security Numbers & ID Theft (Hardcover, New)
Felipe D. Sorrells
R2,438 Discovery Miles 24 380 Ships in 12 - 17 working days

This book explores the use of Social Security Numbers (SSN) and Identity Theft. The SSN was created in 1936 for the purpose of tracking workers' earnings for benefits purposes. Since that time, however, SSN usage has expanded to encompass a myriad of purposes well beyond the operation of the Social Security system. This book describes how criminals acquire SSNs and how they use them to commit identity theft. How organisations such as financial institutions, insurers, universities, health care entities, government agencies, and innumerable other organisations use this nine-digit sequence as a default identifier is also examined. Furthermore, existing statutes, regulations and private sector efforts designed to protect SSNs are looked at, including data security and data breach notification laws. This book concludes with specific FTC recommendations, which address both the supply and demand aspects of the SSN problem by proposing actions that would make SSNs less available to identify thieves, and would make it more difficult for them to misuse those SSNs they are able to obtain. This is an edited, excerpted and augmented edition of a Federal Trade Commission and GAO publication.

The Data Governance Imperative - A Business Strategy for Corporate Data (Paperback, New): Steve Sarsfield The Data Governance Imperative - A Business Strategy for Corporate Data (Paperback, New)
Steve Sarsfield
R1,157 Discovery Miles 11 570 Ships in 10 - 15 working days

Attention to corporate information has never been more important than now. The ability to generate accurate business intelligence, accurate financial reports and to understand your business relies on better processes and personal commitment to clean data. Every byte of data that resides inside your company, and some that resides outside its walls, has the potential to make you stronger by giving you the agility, speed and intelligence that none of your competitors yet have. Data governance is the term given to changing the hearts and minds of your company to see the value of such information quality. The Data Governance Imperative is a business person's view of data governance. This practical book covers both strategies and tactics around managing a data governance initiative. The author, Steve Sarsfield, works for a major enterprise software company and is a leading expert in data quality and data governance, focusing on the business perspectives that are important to data champions, front-office employees, and executives. Steve runs an award-winning and world-recognized blog called the Data Governance and Data Quality Insider, offering practical wisdom.

Privacy - The Lost Right (Hardcover): Jon L Mills Privacy - The Lost Right (Hardcover)
Jon L Mills
R2,703 Discovery Miles 27 030 Ships in 12 - 17 working days

The disturbing reality of contemporary life is that technology has laid bare the private facts of most people's lives. Email, cell phone calls, and individual purchasing habits are no longer secret. Individuals may be discussed on a blog, victimized by an inaccurate credit report, or have their email read by an employer or government agency without their knowledge. Government policy, mass media, and modern technology pose new challenges to privacy rights, while the law struggles to keep up with the rapid changes.
Privacy: The Lost Right evaluates the status of citizens' right to privacy in today's intrusive world. Mills reviews the history of privacy protections, the general loss of privacy, and the inadequacy of current legal remedies, especially with respect to more recent privacy concerns, such as identity theft, government surveillance, tabloid journalism, and video surveillance in public places. Mills concludes that existing regulations do not adequately protect individual privacy, and he presents options for improving privacy protections.

Protectors of Privacy - Regulating Personal Data in the Global Economy (Hardcover): Abraham L. Newman Protectors of Privacy - Regulating Personal Data in the Global Economy (Hardcover)
Abraham L. Newman
R1,634 Discovery Miles 16 340 Ships in 10 - 15 working days

From credit-card purchases to electronic fingerprints, the amount of personal data available to government and business is growing exponentially. All industrial societies face the problem of how to regulate this vast world of information, but their governments have chosen distinctly different solutions. In Protectors of Privacy, Abraham L. Newman details how and why, in contrast to the United States, the nations of the European Union adopted comprehensive data privacy for both the public and the private sectors, enforceable by independent regulatory agencies known as data privacy authorities. Despite U.S. prominence in data technology, Newman shows, the strict privacy rules of the European Union have been adopted far more broadly across the globe than the self-regulatory approach championed by the United States. This rift has led to a series of trade and security disputes between the United States and the European Union.Based on many interviews with politicians, civil servants, and representatives from business and NGOs, and supplemented with archival sources, statistical analysis, and examples, Protectors of Privacy delineates the two principal types of privacy regimes-comprehensive and limited. The book presents a theory of regulatory development that highlights the role of transgovernmental networks not only in implementing rules but also in actively shaping the political process surrounding policymaking. More broadly, Newman explains how Europe's institutional revolution has created in certain sectors the regulatory capacity that allows it to challenge U.S. dominance in international economic governance.

Cybercrime - Secure It or Lose It (Paperback): Denise M Chatam Cybercrime - Secure It or Lose It (Paperback)
Denise M Chatam
R463 R399 Discovery Miles 3 990 Save R64 (14%) Ships in 10 - 15 working days

"Cybercrime: Secure IT or Lose IT" looks at the who, what, why, when, and where of Internet crime from the perspective of businesspeople. Information security and audit personnel will find value in the materials provided in this book to establish and maintain a comprehensive information security program and to aid in satisfying regulatory compliance requirements.

Identity Theft - A Comprehensive Guide (Paperback): Jay Mason Identity Theft - A Comprehensive Guide (Paperback)
Jay Mason
R274 R233 Discovery Miles 2 330 Save R41 (15%) Ships in 10 - 15 working days

"Identity Theft: A Comprehensive Guide," enables readers to understand, prevent and recover from the crime of identity theft. Included in the book are chapters on how to safeguard your computer, how to avoid scams, 40 ways to prevent identity theft, 20 things to do if you are a victim of identity theft, how to order your free credit report and FACTA.

Thorough information is provided on the latest identity theft insurance and what to avoid in purchasing this type of protection. The book includes a library of letters an identity theft victim will need to use and a snapshot of current state laws influencing identity theft.

The Governance of Privacy - Policy Instruments in Global Perspective (Paperback, New Ed): Colin J. Bennett, Charles Raab The Governance of Privacy - Policy Instruments in Global Perspective (Paperback, New Ed)
Colin J. Bennett, Charles Raab
R1,292 Discovery Miles 12 920 Ships in 10 - 15 working days

Analyzes privacy policy instruments available to contemporary industrial states, from government regulations and transnational regimes to self-regulation and privacy enhancing technologies. Privacy protection, according to Colin Bennett and Charles Raab, involves politics and public policy as much as it does law and technology. Moreover, the protection of our personal information in a globalized, borderless world means that privacy-related policies are inextricably interdependent. In this updated paperback edition of The Governance of Privacy, Bennett and Raab analyze a broad range of privacy policy instruments available to contemporary advanced industrial states, from government regulations and transnational regimes to self-regulation and privacy-enhancing technologies. They consider two possible dynamics of privacy regulation-a "race to the bottom," with competitive deregulation by countries eager to attract global investment in information technology, versus "a race to the top," with the progressive establishment of global privacy standards. Bennett and Raab begin by discussing the goals of privacy protection, the liberal and individualist assumptions behind it, and the neglected relationship between privacy and social equity. They describe and evaluate different policy instruments, including the important 1995 Directive on Data Protection from the European Union, as well as the general efficacy of the "top-down" statutory approach and self-regulatory and technological alternatives to it. They evaluate the interrelationships of these policy instruments and their position in a global framework of regulation and policy by state and non-state actors. And finally, they consider whether all of this policy activity at international, national, and corporate levels necessarily means higher levels of privacy protection.

RSA Security's Official Guide to XML Security (Paperback, Ed): Blake Dournee RSA Security's Official Guide to XML Security (Paperback, Ed)
Blake Dournee
R1,807 R1,458 Discovery Miles 14 580 Save R349 (19%) Ships in 10 - 15 working days

Use this book as both an XML primer and to get up to speed on XML-related security issues. Written by the experts at RSA Security, Inc., you’ll get inside tips on how to prevent denial of service attacks, and how to implement security measures to keep your XML programs protected.

The Digital Person - Technology and Privacy in the Information Age (Hardcover): Daniel J. Solove The Digital Person - Technology and Privacy in the Information Age (Hardcover)
Daniel J. Solove
R2,211 R1,937 Discovery Miles 19 370 Save R274 (12%) Ships in 12 - 17 working days

View the Table of Contents.
Read the Introduction.

aThis comprehensive analysis of privacy in the information age challenges traditional assumptions that breeches of privacy through the development of electronic dossiers involve the invasion of oneas private space.a
--"Choice"

"The Digital Person challenges the existing ways in which law and legal theory approach the social, political, and legal implications of the collection and use of personal information in computer databases. Solove's book is ambitious, and represents the most important publication in the field of information privacy law for some years."
--"Georgetown Law Journal"

"Anyone concerned with preserving privacy against technology's growing intrusiveness will find this book enlightening."
--"Publishers Weekly"

"Solove . . . truly understands the intersection of law and technology. This book is a fascinating journey into the almost surreal ways personal information is hoarded, used, and abused in the digital age."
--"The Wall Street Journal"

"Daniel Solove is one of the most energetic and creative scholars writing about privacy today. The Digital Person is an important contribution to the privacy debate, and Solove's discussion of the harms of what he calls 'digital dossiers' is invaluable."
--Jeffrey Rosen, author of "The Unwanted Gaze" and "The Naked Crowd"

"Powerful theme."
--"Privacy Journal"

"This is not only a book you should read, but you should make sure your friends read it."
--"IEEE Review"

"Solove offers a book that is both comprehensive and easy to understand, discussing the changes that technology has brought to our concept of privacy. An excellentstarting point for much needed discussion."
--"Law Technology News"

"An unusually perceptive discussion of one of the most vexing problems of the digital age--our loss of control over our personal information. It's a fascinating journey into the almost surreal ways personal information is hoarded, used, and abused in the digital age. I recommend his book highly."
--Bruce Schneier

"Solove's book is the best exposition thus far about the threat that computer databases containing personal data about millions of Americans poses for information privacy."
--Pamela Samuelson, Chancellor's Professor of Law and Information Management at the University of California, Berkeley

"Solove drives his points home through considerable reconfiguration of the basic argument. Rather than casting blame or urging retreat to a precomputer database era, the solution is seen in informing individuals, challenging data collectors, and bringing the law up-to-date."
--"Choice"

"If you want to find out what a mess the law of privacy is, how it got that way, and whether there is hope for the future, then read this book."
--"Legal Times"

"Solove evaluates the shortcomings of current approaches to privacy as well as some useful and controversial ideas for striking a new balance. Anyone who deals with privacy matters will find a lot ot consider."
--"DM News"

"Solove's treatment of this particular facet is thoughtful, thorough, concise, and occasionally laced with humor. The present volume gives us reason to look forward to his future contributions."
--"The Law and Politics Book Review"

"Solove's book is useful, particularly as an overview on how these private and governmentdatabases grew in sophistication and now interact with one another."
--"Christian Science Monitor"

"A far-reaching examination of how digital dossiers are shaping our lives. Daniel Solove has persuasively reconceptualized privacy for the digital age. A must-read."
--Paul Schwartz, Brooklyn Law School

"The Digital Person is a detailed and approachable resource on privacy issues and the laws that affect them."
--"IT Conversations"

Seven days a week, twenty-four hours a day, electronic databases are compiling information about you. As you surf the Internet, an unprecedented amount of your personal information is being recorded and preserved forever in the digital minds of computers. For each individual, these databases create a profile of activities, interests, and preferences used to investigate backgrounds, check credit, market products, and make a wide variety of decisions affecting our lives. The creation and use of these databases--which Daniel J. Solove calls "digital dossiers"--has thus far gone largely unchecked. In this startling account of new technologies for gathering and using personal data, Solove explains why digital dossiers pose a grave threat to our privacy.

The Digital Person sets forth a new understanding of what privacy is, one that is appropriate for the new challenges of the Information Age. Solove recommends how the law can be reformed to simultaneously protect our privacy and allow us to enjoy the benefits of our increasingly digital world.

The first volume in the series EX MACHINA: LAW, TECHNOLOGY, AND SOCIETY

Bombs and Bandwidth - The Emerging Relationship between it and Society (Hardcover): Robert Latham Bombs and Bandwidth - The Emerging Relationship between it and Society (Hardcover)
Robert Latham
R1,468 R1,192 Discovery Miles 11 920 Save R276 (19%) Ships in 10 - 15 working days

A MULTIDISCIPLINARY VIEW OF INFORMATION TECHNOLOGY AS IT IS USED BY GOVERNMENTS AND CRIMINAL ORGANIZATIONS ALIKE. Information Technology (IT) has become central to the way governments, businesses, social movements and even terrorist and criminal organizations pursue their increasingly globalized objectives. With the emergence of the Internet and new digital technologies, traditional boundaries are increasingly irrelevant, and traditional concepts--from privacy to surveillance, vulnerability, and above all, security--need to be reconsidered. In the post-9/11 era of "homeland security, " the relationship between IT and security has acquired a new and pressing relevance. Bombs and Bandwidth, a project of the Social Science Research Council, assembles leading scholars in a range of disciplines to explore the new nature of IT-related threats, the new power structures emerging around IT, and the ethical and political implications arising from this complex and important field.

mCommerce Security:  A Beginner's Guide (Paperback): Kapil Raina, Anurag Harsh mCommerce Security: A Beginner's Guide (Paperback)
Kapil Raina, Anurag Harsh
R1,303 R1,088 Discovery Miles 10 880 Save R215 (17%) Ships in 10 - 15 working days

Learn to implement a solid mCommerce security plan--from start to finish

Many businesses today recognize mobile commerce--mCommerce--as a way to increase revenue and offer customers a new level of convenience. Mobile phones and PDAs can now be used for online banking, purchasing tickets, messaging, and much more. For any transaction, security is a top priority--and this becomes increasingly complex when wireless and mobile applications are involved. This practical introductory guide clearly explains different mCommerce applications and their associated security risks. Through case studies, you'll learn best practices for implementing specific security methods in key industries--including banking, retail, entertainment, military, travel, and healthcare. The book also contains 8 pages of blueprints that depict secure end-to-end mCommerce architecture as well as identify key vulnerability points.Explore the latest security topics for both business and consumer mCommerce applications Improve services offered to customers through secure mCommerce applications Get details on various types of mobile applications and understand their security risks--including commerce, payments, information, communications, gaming, and military Discover the differences between mobile versus wired security Address mobile security issues in key industries such as banking and finance, travel, manufacturing, entertainment, public services, and defense Recognize the time- and cost-saving benefits of secured mCommerce applications through comprehensive case studies Preview the security of future mobile applications--such as 3G/4G networks and wearable computers

The Personal Internet Security Guidebook - Keeping Hackers and Crackers out of Your Home (Paperback): Tim Speed, Juanita Ellis,... The Personal Internet Security Guidebook - Keeping Hackers and Crackers out of Your Home (Paperback)
Tim Speed, Juanita Ellis, Steffano Korper
R2,485 Discovery Miles 24 850 Ships in 10 - 15 working days

The Personal Internet Security Guidebook is a complete guide to protecting your computer(s) on the Internet. The newest attack point for hackers is home computers on DSL and/or cable modems. This book will show you how to set up a home network and protect it from the "bad dudes." Also covered in this book is how to protect your computer on the road. Many hotels are now offering high-speed Internet access and this book will show you how to keep your computer safe in the hotel room as well as on the hotel network.
This is a how-to guide to keeping your personal computer safe on the Internet. Following the success of The Internet Security Guidebook, the authors have used their expertise to create a book specifically addressing home computers and traveling notebooks. Included in this book is a comprehensive list of vendors and services. Included are these key elements: protecting your PC on the Internet, home firewall software, how to set up a home network, protecting your PC on the road, and protecting your PC via DSL and/or cable modem.
A comprehensive list of vendors and services that you can download or purchase
Key elements such as: protecting your PC on the internet
How to fully utilise home firewall software
How to set-up a home network
Information on protecting you PC on the road
Information on protecting your PC via DSL and cable modems

Genetic Testing and the Use of Information (Paperback): Clarisa Long Genetic Testing and the Use of Information (Paperback)
Clarisa Long
R425 R362 Discovery Miles 3 620 Save R63 (15%) Ships in 10 - 15 working days

We are in the early years of a technological revolution arising from our understanding of the genetic meaning of life. Scientists' ability to manipulate and decode genes is advancing at an extraordinary pace - so fast we are often unprepared to handle the many vexing legal, economic, ethical and social issues they raise. The combination of genetic research and information technology raises often chilling questions of privacy and genetic discrimination. Should individuals be allowed personal property rights to their DNA, cells or tissues? How should policymakers regulate the biotechnology industry to maximize safety without stifling innovation? What are the appropriate uses of gene therapy and other genetic manipulations? In "Genetic Testing and the Use of Information", leading scholars grapple with issues of genetic privacy, the regulation of genetic testing and genetic discrimination. They consider such questions as: Who should have access to information derived from a genetic test? Should one be obligated to tell a spouse or a child test results? Should governments ever appropriately mandate individual genetic testing or community-wide genetic screening? Will employers be able to require the release of genetic records as a condition of employment? Will insurance companies be allowed to use genetic information to determine risk? At what point does a genetic condition qualify as a disability under the American with Disabilities Act?

Surviving in the Security Alarm Business (Paperback): Lou Sepulveda Surviving in the Security Alarm Business (Paperback)
Lou Sepulveda
R1,699 Discovery Miles 16 990 Ships in 10 - 15 working days

In the very competitive security alarm business, companies are finding themselves more and more burdened with the responsibility of preparing corporate mission statements, paradigm analyses, and corporate reengineering plans. Surviving in the Security Alarm Business will help explain their importance, how to perform them, and what the expected result will be.

Teaches alarm professionals how to recreate their business "from scratch" for greater selling success
Illustrates how to do business in the future in response to market changes and trends
Suggests techniques for willing recurring revenue rather than single-sale profit

Understanding Digital Signature - Establishing Trust Over the Internet and Other Networks (Paperback): Gail Grant Understanding Digital Signature - Establishing Trust Over the Internet and Other Networks (Paperback)
Gail Grant
R1,053 R877 Discovery Miles 8 770 Save R176 (17%) Ships in 10 - 15 working days

This volume explains the technology behind digital signatures and key infrastructures (PKI). These are the standards that make it absolutely safe to buy, sell, sign documents and exchange sensitive financial data on the Internet.

Data Protection and Privacy, Volume 12 - Data Protection and Democracy (Hardcover): Dara Hallinan, Ronald Leenes, Serge... Data Protection and Privacy, Volume 12 - Data Protection and Democracy (Hardcover)
Dara Hallinan, Ronald Leenes, Serge Gutwirth, Paul De Hert
R2,718 Discovery Miles 27 180 Ships in 10 - 15 working days

The subjects of this volume are more relevant than ever, especially in light of the raft of electoral scandals concerning voter profiling. This volume brings together papers that offer conceptual analyses, highlight issues, propose solutions, and discuss practices regarding privacy and data protection. It is one of the results of the twelfth annual International Conference on Computers, Privacy and Data Protection, CPDP, held in Brussels in January 2019. The book explores the following topics: dataset nutrition labels, lifelogging and privacy by design, data protection iconography, the substance and essence of the right to data protection, public registers and data protection, modelling and verification in data protection impact assessments, examination scripts and data protection law in Cameroon, the protection of children's digital rights in the GDPR, the concept of the scope of risk in the GDPR and the ePrivacy Regulation. This interdisciplinary book has been written at a time when the scale and impact of data processing on society - not only on individuals, but also on social systems - is becoming ever starker. It discusses open issues as well as daring and prospective approaches, and will serve as an insightful resource for readers with an interest in computers, privacy and data protection.

Secrets and Lies - Digital Security in a Networked World (Paperback, New ed.): Bruce Schneier Secrets and Lies - Digital Security in a Networked World (Paperback, New ed.)
Bruce Schneier
R733 R634 Discovery Miles 6 340 Save R99 (14%) Ships in 10 - 15 working days

" A primer in practical computer security aimed at those shopping, communicating, or doing business online – almost everyone, in other words."
– The Economist

Viruses. Identity theft. Corporate espionage. National secrets compromised. Can anyone promise security in our digital world?

The man who introduced cryptography to the boardroom says no. But in this fascinating read, he shows us how to come closer by developing security measures in terms of context, tools, and strategy. Security is a process, not a product – one that system administrators and corporate executives alike must understand to survive.

" This book is of value to anyone whose business depends on safe use of e-mail, the Web, or other networked communications. If that’ s not yet everybody, it soon will be."
– Stephen H. Wildstrom, BusinessWeek

" It’ s not often that a truly outstanding book is written for both technical users and management. Fortunately, Secrets and Lie pulls off this feat rather well."
– Dustin Puryear, Linux.com

" Schneier . . . peppers the book with lively anecdotes and aphorisms, making it unusually accessible."
– Los Angeles Times

Datenschutzrechtliche Aspekte Und Der Einsatz Biometrischer Systeme in Unternehmen - Eine Exemplarische Betrachtung Von... Datenschutzrechtliche Aspekte Und Der Einsatz Biometrischer Systeme in Unternehmen - Eine Exemplarische Betrachtung Von Systemen Auf Der Grundlage Des Biometrischen Merkmals Tippverhalten (German, Paperback, 1. Aufl. 2010, Nachdruck 2019 ed.)
Florian Dotzler
R909 Discovery Miles 9 090 Ships in 10 - 15 working days
Agenda de Senhas - Agenda para enderecos eletronicos e senhas: Capa gatinho de olhos azuis - Portugues (Brasil) (Portuguese,... Agenda de Senhas - Agenda para enderecos eletronicos e senhas: Capa gatinho de olhos azuis - Portugues (Brasil) (Portuguese, Paperback)
Agendas E Cadernos
R170 Discovery Miles 1 700 Ships in 10 - 15 working days
IT Audit, Control, and Security (Hardcover, 2nd Ed): R Moeller IT Audit, Control, and Security (Hardcover, 2nd Ed)
R Moeller
R2,683 Discovery Miles 26 830 Ships in 10 - 15 working days

When it comes to computer security, the role of auditors today has never been more crucial. Auditors must ensure that all computers, in particular those dealing with e-business, are secure. The only source for information on the combined areas of computer audit, control, and security, the "IT Audit, Control, and Security" describes the types of internal controls, security, and integrity procedures that management must build into its automated systems. This very timely book provides auditors with the guidance they need to ensure that their systems are secure from both internal and external threats.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Pandemic Surveillance - Privacy…
Margaret Hu Hardcover R3,093 Discovery Miles 30 930
Security, Trust, and Regulatory Aspects…
S. Srinivasan Hardcover R5,386 Discovery Miles 53 860
Cyber Security and Threats - Concepts…
Information Reso Management Association Hardcover R10,462 Discovery Miles 104 620
The Future of Open Data
Pamela Robinson, Teresa Scassa Hardcover R1,263 Discovery Miles 12 630
Cyber Security and Threats - Concepts…
Information Reso Management Association Hardcover R10,462 Discovery Miles 104 620
Smart-Tech Society - Convenience…
Mark Whitehead, William G.A. Collier Hardcover R2,952 Discovery Miles 29 520
Broken Code - Inside Facebook And The…
Jeff Horwitz Paperback R420 R328 Discovery Miles 3 280
EU General Data Protection Regulation…
It Governance Privacy Team Paperback R771 Discovery Miles 7 710
Pegasus - The Story Of The World's Most…
Laurent Richard, Sandrine Rigaud Paperback R385 R301 Discovery Miles 3 010
Handbook of Research on Advanced…
Ahmed J. Obaid, Ghassan H Abdul-Majeed, … Hardcover R8,072 Discovery Miles 80 720

 

Partners