0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (123)
  • R250 - R500 (226)
  • R500+ (757)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

Agenda delle password - Agenda degli indirizzi web e delle password di accesso - Copertina Jack Russell Terrier (Italian,... Agenda delle password - Agenda degli indirizzi web e delle password di accesso - Copertina Jack Russell Terrier (Italian, Paperback)
Agende Pratiche
R205 Discovery Miles 2 050 Ships in 18 - 22 working days
Agenda delle password - Agenda degli indirizzi web e delle password di accesso - Copertina cucciolo Golden Retriever (Italian,... Agenda delle password - Agenda degli indirizzi web e delle password di accesso - Copertina cucciolo Golden Retriever (Italian, Paperback)
Agende Pratiche
R205 Discovery Miles 2 050 Ships in 18 - 22 working days
Agenda delle password - Agenda degli indirizzi web e delle password di accesso - Copertina Basset Hound (Italian, Paperback):... Agenda delle password - Agenda degli indirizzi web e delle password di accesso - Copertina Basset Hound (Italian, Paperback)
Agende Pratiche
R205 Discovery Miles 2 050 Ships in 18 - 22 working days
Agenda delle password - Agenda degli indirizzi web e delle password di accesso - Copertina Mastino Francese (Italian,... Agenda delle password - Agenda degli indirizzi web e delle password di accesso - Copertina Mastino Francese (Italian, Paperback)
Agende Pratiche
R205 Discovery Miles 2 050 Ships in 18 - 22 working days
Agenda delle password - Agenda degli indirizzi web e delle password di accesso - Copertina cavallo nero (Italian, Paperback):... Agenda delle password - Agenda degli indirizzi web e delle password di accesso - Copertina cavallo nero (Italian, Paperback)
Agende Pratiche
R205 Discovery Miles 2 050 Ships in 18 - 22 working days
Agenda delle password - Agenda degli indirizzi web e delle password di accesso - Copertina tenero puledro (Italian, Paperback):... Agenda delle password - Agenda degli indirizzi web e delle password di accesso - Copertina tenero puledro (Italian, Paperback)
Agende Pratiche
R205 Discovery Miles 2 050 Ships in 18 - 22 working days
Agenda delle password - Agenda degli indirizzi web e delle password di accesso - Copertina piccolo pony (Italian, Paperback):... Agenda delle password - Agenda degli indirizzi web e delle password di accesso - Copertina piccolo pony (Italian, Paperback)
Agende Pratiche
R205 Discovery Miles 2 050 Ships in 18 - 22 working days
Agenda delle password - Agenda degli indirizzi web e delle password di accesso - Copertina cavallo curioso (Italian,... Agenda delle password - Agenda degli indirizzi web e delle password di accesso - Copertina cavallo curioso (Italian, Paperback)
Agende Pratiche
R205 Discovery Miles 2 050 Ships in 18 - 22 working days
Cybersecurity & Cyber-Information Sharing - Legal & Economic Analyses (Hardcover): Julia M Morgan Cybersecurity & Cyber-Information Sharing - Legal & Economic Analyses (Hardcover)
Julia M Morgan
R4,432 Discovery Miles 44 320 Ships in 10 - 15 working days

Over the course of the last year, a host of cyberattacks has been perpetrated on a number of high profile American companies. The high profile cyberattacks of 2014 and early 2015 appear to be indicative of a broader trend: the frequency and ferocity of cyberattacks are increasing, posing grave threats to the national interests of the United States. While considerable debate exists with regard to the best strategies for protecting America's various cyber-systems and promoting cybersecurity, one point of general agreement amongst cyber-analysts is the perceived need for enhanced and timely exchange of cyber-threat intelligence both within the private sector and between the private sector and the government. This book examines the various legal issues that arise with respect to the sharing of cybersecurity intelligence, with a special focus on two distinct concepts: (1) sharing of cyber information within the government's possession and (2) sharing of cyber-information within the possession of the private sector. Furthermore, the authors analyse the incentives for companies to share information about cybersecurity breaches with other companies and the federal government, and conclude with a discussion on several bills passed on information sharing in cybersecurity.

Privacy, Security and Accountability - Ethics, Law and Policy (Paperback): Adam D Moore Privacy, Security and Accountability - Ethics, Law and Policy (Paperback)
Adam D Moore
R1,640 Discovery Miles 16 400 Ships in 18 - 22 working days

What is the appropriate balance between privacy, security, and accountability? What do we owe each other in terms of information sharing and access? Why is privacy valuable and is it more or less important than other values like security or free speech? Is Edward Snowden a hero or villain? Within democratic societies, privacy, security, and accountability are seen as important values that must be balanced appropriately. If there is too much privacy, then there may be too little accountability - and more alarmingly, too little security. On the other hand, where there is too little privacy, individuals may not have the space to grow, experiment, and engage in practices not generally accepted by the majority. Moreover, allowing overly limited control over access to and uses of private places and information may itself be a threat to security. By clarifying the moral, legal, and social foundations of privacy, security, and accountability, this book helps determine the appropriate balance between these contested values. Twelve specially commissioned essays provide the ideal resource for students and academics in information and applied ethics.

Bogen om password - Irriterende - men helt nodvendige. En guide til den almindelige it-bruger derhjemme . (Danish, Paperback):... Bogen om password - Irriterende - men helt nodvendige. En guide til den almindelige it-bruger derhjemme . (Danish, Paperback)
John Madum
R420 Discovery Miles 4 200 Ships in 18 - 22 working days
Mobile Data Loss - Threats and Countermeasures (Paperback): Michael T. Raggo Mobile Data Loss - Threats and Countermeasures (Paperback)
Michael T. Raggo
R863 Discovery Miles 8 630 Ships in 18 - 22 working days

The mobile threat landscape is evolving bringing about new forms of data loss. No longer can organizations rely on security policies designed during the PC era. Mobile is different and therefore requires a revised approach to countermeasures to mitigate data loss. Understanding these differences is fundamental to creating a new defense-in-depth strategy designed for mobile. Mobile Data Loss: Threats & Countermeasures reviews the mobile threat landscape using a hacker mind-set to outline risks and attack vectors that include malware, risky apps, operating system compromises, network attacks, and user behaviours. This provides the basis for then outlining countermeasures for defining a holistic mobile security methodology that encompasses proactive protections, response mechanisms, live monitoring, and incident response. Designing a comprehensive mobile security strategy is key. Mobile Data Loss: Threats & Countermeasures outlines the threats and strategies for protecting devices from a plethora of data loss vectors.

Mobile Privacy Disclosures - Recommendations of the Federal Trade Commission (Paperback): Julie C Hartell Mobile Privacy Disclosures - Recommendations of the Federal Trade Commission (Paperback)
Julie C Hartell
R1,635 Discovery Miles 16 350 Ships in 10 - 15 working days

The Federal Trade Commission (FTC) has worked on privacy issues for over forty years, and in 2000 began considering the privacy implications raised by consumers' growing use of mobile devices. More recently, the FTC hosted a mobile privacy panel discussion that focused on transparency. With so many players collecting and using consumer data, who should provide privacy information to consumers? Given the limited screen space of mobile devices, how can this information be conveyed? This book explores and offers suggestions for the major participants in the mobile ecosystem as they work to improve mobile privacy disclosures.

NSA, BND & Co. - Die Moeglichkeiten der Geheimdienste: Technik, Auswertung, Gegenmassnahmen (German, Paperback): Gilbert Brands NSA, BND & Co. - Die Moeglichkeiten der Geheimdienste: Technik, Auswertung, Gegenmassnahmen (German, Paperback)
Gilbert Brands
R421 Discovery Miles 4 210 Ships in 18 - 22 working days
Steganography & Watermarking (Hardcover): Ching-Nung Yang, Chia-Chen Lin, Chin-Chen Chang Steganography & Watermarking (Hardcover)
Ching-Nung Yang, Chia-Chen Lin, Chin-Chen Chang
R4,737 Discovery Miles 47 370 Ships in 10 - 15 working days

Privacy and Copyright protection is a very important issue in our digital society, where a very large amount of multimedia data are generated and distributed daily using different kinds of consumer electronic devices and very popular communication channels, such as the Web and social networks. This book introduces state-of-the-art technology on data hiding and copyright protection of digital images, and offers a solid basis for future study and research. Steganographic technique overcomes the traditional cryptographic approach, providing new solutions for secure data transmission without raising users' malicious intention. In steganography, some secret information can be inserted into the original data in imperceptible and efficient ways to avoid distortion of the image, and enhance the embedding capacity, respectively. Digital watermarking also adopts data hiding techniques for copyright protection and tampering verification of multimedia data. In watermarking, an illegitimate copy can be recognised by testing the presence of a valid watermark and a dispute on the ownership of the image resolved. Different kinds of steganographic and watermarking techniques, providing different features and diverse characteristics, have been presented in this book. This book provides a reference for theoretical problems as well as practical solutions and applications for steganography and watermarking techniques. In particular, both the academic community (graduate student, post-doc and faculty) in Electrical Engineering, Computer Science, and Applied Mathematics; and the industrial community (engineers, engineering managers, programmers, research lab staff and managers, security managers) will find this book interesting.

Data Security Breaches - Notification Laws, Legislation & Identity Theft (Hardcover): Patricia Diaz, William C. Long Data Security Breaches - Notification Laws, Legislation & Identity Theft (Hardcover)
Patricia Diaz, William C. Long
R2,861 R2,680 Discovery Miles 26 800 Save R181 (6%) Ships in 10 - 15 working days

A data security breach occurs when there is a loss or theft of, or other unauthorized access to, sensitive personally identifiable information that could result in the potential compromise of the confidentiality or integrity of data. This book provides an overview of state security breach notification laws applicable to entities that collect, maintain, own, possess, or license personal information. This book describes information security and security breach notification requirements in the Office of Management and Budget's "Breach Notification Policy," the Health Insurance Portability and Accountability Act (HIPAA), the Health Information Technology for Economic and Clinical Health Act (HITECH), and the Gramm-Leach-Bliley Act (GLBA).

Wiretaps & Electronic Eavesdropping - Federal Law & Legal Ethics (Hardcover, New): Laurel Jennings, Richard M. Eastman Wiretaps & Electronic Eavesdropping - Federal Law & Legal Ethics (Hardcover, New)
Laurel Jennings, Richard M. Eastman
R2,868 R2,687 Discovery Miles 26 870 Save R181 (6%) Ships in 10 - 15 working days

It is a federal crime to wiretap or to use a machine to capture the communications of others without court approval, unless one of the parties has given his prior consent. It is likewise a federal crime to use or disclose any information acquired by illegal wiretapping or electronic eavesdropping. Violations can result in imprisonment for not more than five years; fines up to $250,000; in civil liability for damages, attorney's fees and possibly punitive damages; in disciplinary action against any attorneys involved; and in suppression of any derivative evidence. This book provides an overview of federal law governing wiretapping and electronic eavesdropping under the Electronic Communications Privacy Act (ECPA).

IT-Sicherheit 1.5 - Internetprotokolle, Webprogrammierung, Systemsicherheit (German, Paperback): Gilbert Brands IT-Sicherheit 1.5 - Internetprotokolle, Webprogrammierung, Systemsicherheit (German, Paperback)
Gilbert Brands
R683 Discovery Miles 6 830 Ships in 18 - 22 working days
Privacy in America - Interdisciplinary Perspectives (Paperback): William Aspray, Philip Doty Privacy in America - Interdisciplinary Perspectives (Paperback)
William Aspray, Philip Doty
R2,935 Discovery Miles 29 350 Ships in 18 - 22 working days

In this collection of essays that represent original and interdisciplinary work, respected scholars address a number of privacy issues. These include how governmental and private sectors develop and deploy technologies that can pose serious compromises to the privacy of individuals and groups; how information and communication system designs pose threats to privacy; how we manage private concerns (child care, job leave, and identity) as public issues amenable to political action and shared awareness; and the fundamental asymmetry of power that exists between individuals and small groups on the one hand and large governmental and corporate entities on the other. Arranged in three sections law and policy; information technology; and information studies, history, and sociology Privacy in America: Interdisciplinary Perspectives will be useful to scholars, practitioners, and students in a variety of fields, including information science, library science, and information systems.

Privacy - Defending an Illusion (Paperback): Martin Dowding Privacy - Defending an Illusion (Paperback)
Martin Dowding
R2,130 Discovery Miles 21 300 Ships in 18 - 22 working days

Matters of privacy have profoundly changed since electronic storage of information has become the norm. Consequently, policy-makers and legislators are trying to keep up with privacy challenges in the workplace, in healthcare, in surveillance, and on social networking sites. With Privacy: Defending an Illusion, Martin Dowding fills a very important gap in policy analysis and the teaching of privacy issues at the senior undergraduate and early graduate student level. In the first section of this book, Dowding recounts historical interpretations of privacy in a wide variety of socio-cultural circumstances. In the second section, the author addresses how information and communication technologies have changed our conceptions about privacy and redirected our focus from keeping information private to sharing it with many more people than we would have even a few years ago. Dowding also examines a variety of possible options for the future of privacy. The appendixes include seminal readings on relevant topics that should encourage debates about the nature of privacy and its problems. Overall, this book provides a solid background for defining and understanding privacy in a wide variety of contexts.

Protectors of Privacy - Regulating Personal Data in the Global Economy (Hardcover): Abraham L. Newman Protectors of Privacy - Regulating Personal Data in the Global Economy (Hardcover)
Abraham L. Newman
R1,619 Discovery Miles 16 190 Ships in 18 - 22 working days

From credit-card purchases to electronic fingerprints, the amount of personal data available to government and business is growing exponentially. All industrial societies face the problem of how to regulate this vast world of information, but their governments have chosen distinctly different solutions. In Protectors of Privacy, Abraham L. Newman details how and why, in contrast to the United States, the nations of the European Union adopted comprehensive data privacy for both the public and the private sectors, enforceable by independent regulatory agencies known as data privacy authorities. Despite U.S. prominence in data technology, Newman shows, the strict privacy rules of the European Union have been adopted far more broadly across the globe than the self-regulatory approach championed by the United States. This rift has led to a series of trade and security disputes between the United States and the European Union.Based on many interviews with politicians, civil servants, and representatives from business and NGOs, and supplemented with archival sources, statistical analysis, and examples, Protectors of Privacy delineates the two principal types of privacy regimes-comprehensive and limited. The book presents a theory of regulatory development that highlights the role of transgovernmental networks not only in implementing rules but also in actively shaping the political process surrounding policymaking. More broadly, Newman explains how Europe's institutional revolution has created in certain sectors the regulatory capacity that allows it to challenge U.S. dominance in international economic governance.

Privacy in the Information Age (Paperback): Fred H Cate Privacy in the Information Age (Paperback)
Fred H Cate
R805 Discovery Miles 8 050 Ships in 18 - 22 working days

Electronic information networks offer extraordinary advantages to business, government, and individuals in terms of power, capacity, speed, accessibility, and cost. But these same capabilities present substantial privacy issues. With an unprecedented amount of data available in digital format--which is easier and less expensive to access, manipulate, and store--others know more about you than ever before.

Consider this: data routinely collected about you includes your health, credit, marital, educational, and employment histories; the times and telephone numbers of every call you make and receive; the magazines you subscribe to and the books your borrow from the library; your cash withdrawals; your purchases by credit card or check; your electronic mail and telephone messages; where you go on the World Wide Web. The ramifications of such a readily accessible storehouse of information are astonishing.

Governments have responded to these new challenges to personal privacy in a wide variety of ways. At one extreme, the European Union in 1995 enacted sweeping regulation to protect personal information; at the other extreme, privacy law in the United States and many other countries is fragmented, inconsistent, and offers little protection for privacy on the internet and other electronic networks.

For all the passion that surrounds discussions about privacy, and the recent attention devoted to electronic privacy, surprisingly little consensus exists about what privacy means, what values are served--or compromised--by extending further legal protection to privacy, what values are affected by existing and proposed measures designed to protect privacy, and what principles should undergird a sensitive balancing of those values.

In this book, Fred Cate addresses these critical issues in the context of computerized information. He provides an overview of the technologies that are provoking the current privacy debate and discusses the range of legal issues that these technologies raise. He examines the central elements that make up the definition of privacy and the values served, and liabilities incurred, by each of those components. Separate chapters address the regulation of privacy in Europe and the United States. The final chapter identifies four sets of principles for protecting information privacy. The principles recognize the significance of individual and collective nongovernmental action, the limited role for privacy laws and government enforcement of those laws, and the ultimate goal of establishing multinational principles for protecting information privacy.

Privacy in the Information Age involves questions that cut across the fields of business, communications, economics, and law. Cate examines the debate in provocative, jargon-free, detail.

Our Data, Ourselves - A Personal Guide to Digital Privacy (Paperback): Jacqueline D. Lipton Our Data, Ourselves - A Personal Guide to Digital Privacy (Paperback)
Jacqueline D. Lipton
R609 Discovery Miles 6 090 Ships in 18 - 22 working days

A practical, user-friendly handbook for understanding and protecting our personal data and digital privacy. Our Data, Ourselves addresses a common and crucial question: What can we as private individuals do to protect our personal information in a digital world? In this practical handbook, legal expert Jacqueline D. Lipton guides readers through important issues involving technology, data collection, and digital privacy as they apply to our daily lives. Our Data, Ourselves covers a broad range of everyday privacy concerns with easily digestible, accessible overviews and real-world examples. Lipton explores the ways we can protect our personal data and monitor its use by corporations, the government, and others. She also explains our rights regarding sensitive personal data like health insurance records and credit scores, as well as what information retailers can legally gather, and how. Who actually owns our personal information? Can an employer legally access personal emails? What privacy rights do we have on social media? Answering these questions and more, Our Data, Ourselves provides a strategic approach to assuming control over, and ultimately protecting, our personal information.

Freedom to Think - The Long Struggle to Liberate Our Minds (Hardcover, Main): Susie Alegre Freedom to Think - The Long Struggle to Liberate Our Minds (Hardcover, Main)
Susie Alegre
R545 Discovery Miles 5 450 Ships in 10 - 15 working days

BOOKS TO LOOK OUT FOR IN 2022, NEW STATESMAN & CITY AM Chosen as one of the Financial Time's Best Summer Books of 2022 Longlisted for the Moore Prize for Human Rights Writing 'Compelling, powerful and necessary.' Shoshana Zuboff, author of The Age of Surveillance Capitalism 'Fascinating' Guardian Without a moment's pause, we share our most intimate thoughts with trillion-dollar tech companies. Their algorithms categorize us and jump to troubling conclusions about who we are. They also shape our everyday thoughts, choices and actions - from who we date to whether we vote. But this is just the latest front in an age-old struggle. Part history and part manifesto, Freedom to Think explores how the powerful have always sought to influence how we think and what we buy. Connecting the dots from Galileo to Alexa, human rights lawyer Susie Alegre charts the history and fragility of our most important human right: freedom of thought. Filled with shocking case-studies across politics, criminal justice, and everyday life, this ground-breaking book shows how our mental freedom is under threat like never before. Bold and radical, Alegre argues that only by recasting our human rights for the digital age can we safeguard our future.

How to Disappear - Erase Your Digital Footprint, Leave False Trails, And Vanish Without A Trace (Paperback): Frank Ahearn,... How to Disappear - Erase Your Digital Footprint, Leave False Trails, And Vanish Without A Trace (Paperback)
Frank Ahearn, Eileen Horan
R345 Discovery Miles 3 450 Ships in 18 - 22 working days

For the first time in paperback we bring you the authoritative and comprehensive guide for people who seek to protect their privacy as well as for anyone who's ever entertained the fantasy of disappearing-whether actually dropping out of sight or by eliminating the traceable evidence of their existence. Written by the world's leading experts on finding people and helping people avoid being found, How to Disappear covers everything from tools for disappearing to discovering and eliminating the nearly invisible tracks and clues we tend to leave wherever we go. Learn the three keys to disappearing, all about your electronic footprints, the dangers and opportunities of social networking sites, and how to disappear from a stalker. Frank Ahearn and Eileen Horan provide field-tested methods for maintaining privacy, as well as tactics and strategies for protecting personal information and preventing identity theft. They explain and illustrate key tactics such as misinformation (destroying all the data known about you); disinformation (creating fake trails); and, finally, reformation-the act of getting you from point A to point B without leaving clues. Ahearn illustrates every step with real-life stories of his fascinating career, from undercover work to nab thieving department store employees to a stint as a private investigator; and, later, as a career "skip tracer" who finds people who don't want to be found. In 1997, when news broke of President Bill Clinton's dalliance with a White House intern, Ahearn was hired to find her. When Oscar statuettes were stolen in Beverly Hills, Ahearn pinpointed a principal in the caper to help solve the case. When Russell Crowe threw a telephone at a hotel clerk in 2005, Ahearn located the victim and hid him from the media. An indispensable resource not just for those determined to become utterly anonymous, but also for just about anyone in the brave new world of on-line information, How to Disappear sums up Ahearn's dual philosophy: Don't break the law, but know how to protect yourself.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Governance of Picture Archiving and…
Carrison K.S. Tong, Eric T.T. Wong Hardcover R5,612 Discovery Miles 56 120
Generic Samsung 111S Black Compatible…
 (1)
R490 Discovery Miles 4 900
Informed Watermarking
Joachim Eggers, Bernd Girod Hardcover R2,656 Discovery Miles 26 560
The Schoolhouse
Sophie Ward Paperback R429 R309 Discovery Miles 3 090
P5 Medicine and Justice - Innovation…
Santo Davide Ferrara Hardcover R5,269 Discovery Miles 52 690
Betrayal
Lesley Pearse Paperback R395 R365 Discovery Miles 3 650
The Handbook of Forensic Sexology…
James J. Krivacska, John Money Hardcover R2,918 R2,451 Discovery Miles 24 510
Agenda 2020 - 12 Mesi 2020 Agenda…
Pilvi Tippa Hardcover R579 Discovery Miles 5 790
Handbook of Research on Estimation and…
Vardan Mkrttchian, Alexander Bershadsky, … Hardcover R5,846 Discovery Miles 58 460
Blessed - A Red Hardcover Decorative…
Murre Book Decor Hardcover R855 Discovery Miles 8 550

 

Partners