0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (121)
  • R250 - R500 (228)
  • R500+ (763)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

Conversations in Cyberspace (Paperback): Giulio D'Agostino Conversations in Cyberspace (Paperback)
Giulio D'Agostino
R588 R532 Discovery Miles 5 320 Save R56 (10%) Ships in 18 - 22 working days

Conversations in Cyberspace is a collection of insights on the current state of security and privacy in the Internet world. The book contains a brief introduction to some of the most used open-source intelligence (OSINT) tools and a selection of interviews with some of the key figures in industrial control systems (ICS), advanced persistent threat (APT) and online/deep web members organizations. It aims to be an introduction to the relationships between security, OSINT and the vast and complex world hiding in the deep web. The information provided will be beneficial to security professionals and system administrators interested in exploring today's concerns in database design, privacy and security-by-design, and deep web members organizations, including Cicada 3301, the Unknowns, Anonymous, and more.

Passwort-Logbuch - Passwort Liste - digitaler Nachlass/Erbe - Erinnerungsbuch - Nachschlagebuch - Notizbuch - Einlogbuch -... Passwort-Logbuch - Passwort Liste - digitaler Nachlass/Erbe - Erinnerungsbuch - Nachschlagebuch - Notizbuch - Einlogbuch - Internet Organizer - ...inkl. Austrennseiten/Nachlassseiten zum Aufbewahren fur Schliessfach, Testament, Anwalt... (German, Paperback)
Renate Sultz, Uwe H Sultz
R226 Discovery Miles 2 260 Ships in 18 - 22 working days
Data Protection and Privacy, Volume 11 - The Internet of Bodies (Hardcover): Ronald Leenes, Rosamunde van Brakel, Serge... Data Protection and Privacy, Volume 11 - The Internet of Bodies (Hardcover)
Ronald Leenes, Rosamunde van Brakel, Serge Gutwirth, Paul De Hert
R2,717 Discovery Miles 27 170 Ships in 18 - 22 working days

The subjects of Privacy and Data Protection are more relevant than ever, and especially since 25 May 2018, when the European General Data Protection Regulation became enforceable. This volume brings together papers that offer conceptual analyses, highlight issues, propose solutions, and discuss practices regarding privacy and data protection. It is one of the results of the eleventh annual International Conference on Computers, Privacy, and Data Protection, CPDP 2018, held in Brussels in January 2018. The book explores the following topics: biometrics and data protection in criminal justice processing, privacy, discrimination and platforms for men who have sex with men, mitigation through data protection instruments of unfair inequalities as a result of machine learning, privacy and human-robot interaction in robotized healthcare, privacy-by-design, personal data protection of deceased data subjects, large-scale face databases and the GDPR, the new Europol regulation, rethinking trust in the Internet of Things, fines under the GDPR, data analytics and the GDPR, and the essence of the right to the protection of personal data. This interdisciplinary book was written while the reality of the General Data Protection Regulation 2016/679 was becoming clear. It discusses open issues and daring and prospective approaches. It will serve as an insightful resource for readers with an interest in computers, privacy and data protection.

Das Peter Hase Passwortbuch / Passwort Logbuch - Passwort, Passwortbuch, Passwort Logbuch, Account, Login, Zugang, Password... Das Peter Hase Passwortbuch / Passwort Logbuch - Passwort, Passwortbuch, Passwort Logbuch, Account, Login, Zugang, Password keeper and Password reminder book, login data, access data, Passwort Akte, Datensafe, PW, Username, User, Logindaten, Zugangsdaten (German, Paperback)
Beatrix Potter, Elizabeth M Potter
R254 Discovery Miles 2 540 Ships in 18 - 22 working days
Reseau Anonyme Tor 101 - Une Introduction a la Partie la Plus Privee de l'Internet (French, Paperback): Steven Gates Reseau Anonyme Tor 101 - Une Introduction a la Partie la Plus Privee de l'Internet (French, Paperback)
Steven Gates
R525 Discovery Miles 5 250 Ships in 18 - 22 working days
Gedanken zur digitalen Entgiftung - Der Blog 2016 - analog (German, Paperback): Jens Glutsch Gedanken zur digitalen Entgiftung - Der Blog 2016 - analog (German, Paperback)
Jens Glutsch
R667 Discovery Miles 6 670 Ships in 18 - 22 working days
Agenda de Senhas - Agenda para enderecos eletronicos e senhas: Capa gato peekaboo - Portugues (Brasil) (Portuguese, Paperback):... Agenda de Senhas - Agenda para enderecos eletronicos e senhas: Capa gato peekaboo - Portugues (Brasil) (Portuguese, Paperback)
Agendas E Cadernos
R166 Discovery Miles 1 660 Ships in 18 - 22 working days
Weg ins Darknet und Im Darknet (German, Paperback): Herr Meier Weg ins Darknet und Im Darknet (German, Paperback)
Herr Meier; Herr Meier
R280 Discovery Miles 2 800 Ships in 18 - 22 working days
berwachungswahn - ...Wie Umgehen (German, Paperback): Herr Meier berwachungswahn - ...Wie Umgehen (German, Paperback)
Herr Meier; Illustrated by Herr Meier
R319 Discovery Miles 3 190 Ships in 18 - 22 working days
Zen oder die Kunst, seine Privatsphare zu schutzen (German, Paperback): Jens Glutsch Zen oder die Kunst, seine Privatsphare zu schutzen (German, Paperback)
Jens Glutsch
R608 Discovery Miles 6 080 Ships in 18 - 22 working days
Agenda de Senhas - Agenda Para Endere os Eletr nicos E Senhas: Capa Gatinho Brincalh o - Portugu s (Brasil) (Portuguese,... Agenda de Senhas - Agenda Para Endere os Eletr nicos E Senhas: Capa Gatinho Brincalh o - Portugu s (Brasil) (Portuguese, Paperback)
Agendas E Cadernos
R165 Discovery Miles 1 650 Ships in 18 - 22 working days
Datenschuul - Datenschutz op Platt (German, Paperback): Birgit Pauls Datenschuul - Datenschutz op Platt (German, Paperback)
Birgit Pauls
R377 Discovery Miles 3 770 Ships in 18 - 22 working days
Cybersecurity & Cyber-Information Sharing - Legal & Economic Analyses (Hardcover): Julia M Morgan Cybersecurity & Cyber-Information Sharing - Legal & Economic Analyses (Hardcover)
Julia M Morgan
R4,432 Discovery Miles 44 320 Ships in 10 - 15 working days

Over the course of the last year, a host of cyberattacks has been perpetrated on a number of high profile American companies. The high profile cyberattacks of 2014 and early 2015 appear to be indicative of a broader trend: the frequency and ferocity of cyberattacks are increasing, posing grave threats to the national interests of the United States. While considerable debate exists with regard to the best strategies for protecting America's various cyber-systems and promoting cybersecurity, one point of general agreement amongst cyber-analysts is the perceived need for enhanced and timely exchange of cyber-threat intelligence both within the private sector and between the private sector and the government. This book examines the various legal issues that arise with respect to the sharing of cybersecurity intelligence, with a special focus on two distinct concepts: (1) sharing of cyber information within the government's possession and (2) sharing of cyber-information within the possession of the private sector. Furthermore, the authors analyse the incentives for companies to share information about cybersecurity breaches with other companies and the federal government, and conclude with a discussion on several bills passed on information sharing in cybersecurity.

Privacy, Security and Accountability - Ethics, Law and Policy (Paperback): Adam D Moore Privacy, Security and Accountability - Ethics, Law and Policy (Paperback)
Adam D Moore
R1,640 Discovery Miles 16 400 Ships in 18 - 22 working days

What is the appropriate balance between privacy, security, and accountability? What do we owe each other in terms of information sharing and access? Why is privacy valuable and is it more or less important than other values like security or free speech? Is Edward Snowden a hero or villain? Within democratic societies, privacy, security, and accountability are seen as important values that must be balanced appropriately. If there is too much privacy, then there may be too little accountability - and more alarmingly, too little security. On the other hand, where there is too little privacy, individuals may not have the space to grow, experiment, and engage in practices not generally accepted by the majority. Moreover, allowing overly limited control over access to and uses of private places and information may itself be a threat to security. By clarifying the moral, legal, and social foundations of privacy, security, and accountability, this book helps determine the appropriate balance between these contested values. Twelve specially commissioned essays provide the ideal resource for students and academics in information and applied ethics.

Bogen om password - Irriterende - men helt nodvendige. En guide til den almindelige it-bruger derhjemme . (Danish, Paperback):... Bogen om password - Irriterende - men helt nodvendige. En guide til den almindelige it-bruger derhjemme . (Danish, Paperback)
John Madum
R420 Discovery Miles 4 200 Ships in 18 - 22 working days
NSA, BND & Co. - Die Moeglichkeiten der Geheimdienste: Technik, Auswertung, Gegenmassnahmen (German, Paperback): Gilbert Brands NSA, BND & Co. - Die Moeglichkeiten der Geheimdienste: Technik, Auswertung, Gegenmassnahmen (German, Paperback)
Gilbert Brands
R421 Discovery Miles 4 210 Ships in 18 - 22 working days
Mobile Privacy Disclosures - Recommendations of the Federal Trade Commission (Paperback): Julie C Hartell Mobile Privacy Disclosures - Recommendations of the Federal Trade Commission (Paperback)
Julie C Hartell
R1,635 Discovery Miles 16 350 Ships in 10 - 15 working days

The Federal Trade Commission (FTC) has worked on privacy issues for over forty years, and in 2000 began considering the privacy implications raised by consumers' growing use of mobile devices. More recently, the FTC hosted a mobile privacy panel discussion that focused on transparency. With so many players collecting and using consumer data, who should provide privacy information to consumers? Given the limited screen space of mobile devices, how can this information be conveyed? This book explores and offers suggestions for the major participants in the mobile ecosystem as they work to improve mobile privacy disclosures.

Steganography & Watermarking (Hardcover): Ching-Nung Yang, Chia-Chen Lin, Chin-Chen Chang Steganography & Watermarking (Hardcover)
Ching-Nung Yang, Chia-Chen Lin, Chin-Chen Chang
R4,737 Discovery Miles 47 370 Ships in 10 - 15 working days

Privacy and Copyright protection is a very important issue in our digital society, where a very large amount of multimedia data are generated and distributed daily using different kinds of consumer electronic devices and very popular communication channels, such as the Web and social networks. This book introduces state-of-the-art technology on data hiding and copyright protection of digital images, and offers a solid basis for future study and research. Steganographic technique overcomes the traditional cryptographic approach, providing new solutions for secure data transmission without raising users' malicious intention. In steganography, some secret information can be inserted into the original data in imperceptible and efficient ways to avoid distortion of the image, and enhance the embedding capacity, respectively. Digital watermarking also adopts data hiding techniques for copyright protection and tampering verification of multimedia data. In watermarking, an illegitimate copy can be recognised by testing the presence of a valid watermark and a dispute on the ownership of the image resolved. Different kinds of steganographic and watermarking techniques, providing different features and diverse characteristics, have been presented in this book. This book provides a reference for theoretical problems as well as practical solutions and applications for steganography and watermarking techniques. In particular, both the academic community (graduate student, post-doc and faculty) in Electrical Engineering, Computer Science, and Applied Mathematics; and the industrial community (engineers, engineering managers, programmers, research lab staff and managers, security managers) will find this book interesting.

Mobile Device Security - Threats & Controls (Paperback): Willliam R O'Connor Mobile Device Security - Threats & Controls (Paperback)
Willliam R O'Connor
R1,636 Discovery Miles 16 360 Ships in 10 - 15 working days

Millions of Americans currently use mobile devices (eg: cellphones, smartphones, and tablet computers) on a daily basis to communicate, obtain internet-based information, and share their own information, photographs, and videos. Given the extent of consumer reliance on mobile interactions, it is increasingly important that these devices be secured from expanding threats to the confidentiality, integrity, and availability of the information they maintain and share. This book explores the current challenge of threats and controls to mobile device security with a focus on cyber threats to mobile devices; wireless device theft; and how to protect the data on your phone.

Data Security Breaches - Notification Laws, Legislation & Identity Theft (Hardcover): Patricia Diaz, William C. Long Data Security Breaches - Notification Laws, Legislation & Identity Theft (Hardcover)
Patricia Diaz, William C. Long
R2,861 R2,680 Discovery Miles 26 800 Save R181 (6%) Ships in 10 - 15 working days

A data security breach occurs when there is a loss or theft of, or other unauthorized access to, sensitive personally identifiable information that could result in the potential compromise of the confidentiality or integrity of data. This book provides an overview of state security breach notification laws applicable to entities that collect, maintain, own, possess, or license personal information. This book describes information security and security breach notification requirements in the Office of Management and Budget's "Breach Notification Policy," the Health Insurance Portability and Accountability Act (HIPAA), the Health Information Technology for Economic and Clinical Health Act (HITECH), and the Gramm-Leach-Bliley Act (GLBA).

Wiretaps & Electronic Eavesdropping - Federal Law & Legal Ethics (Hardcover, New): Laurel Jennings, Richard M. Eastman Wiretaps & Electronic Eavesdropping - Federal Law & Legal Ethics (Hardcover, New)
Laurel Jennings, Richard M. Eastman
R2,868 R2,687 Discovery Miles 26 870 Save R181 (6%) Ships in 10 - 15 working days

It is a federal crime to wiretap or to use a machine to capture the communications of others without court approval, unless one of the parties has given his prior consent. It is likewise a federal crime to use or disclose any information acquired by illegal wiretapping or electronic eavesdropping. Violations can result in imprisonment for not more than five years; fines up to $250,000; in civil liability for damages, attorney's fees and possibly punitive damages; in disciplinary action against any attorneys involved; and in suppression of any derivative evidence. This book provides an overview of federal law governing wiretapping and electronic eavesdropping under the Electronic Communications Privacy Act (ECPA).

IT-Sicherheit 1.5 - Internetprotokolle, Webprogrammierung, Systemsicherheit (German, Paperback): Gilbert Brands IT-Sicherheit 1.5 - Internetprotokolle, Webprogrammierung, Systemsicherheit (German, Paperback)
Gilbert Brands
R683 Discovery Miles 6 830 Ships in 18 - 22 working days
Privacy in America - Interdisciplinary Perspectives (Paperback): William Aspray, Philip Doty Privacy in America - Interdisciplinary Perspectives (Paperback)
William Aspray, Philip Doty
R2,935 Discovery Miles 29 350 Ships in 18 - 22 working days

In this collection of essays that represent original and interdisciplinary work, respected scholars address a number of privacy issues. These include how governmental and private sectors develop and deploy technologies that can pose serious compromises to the privacy of individuals and groups; how information and communication system designs pose threats to privacy; how we manage private concerns (child care, job leave, and identity) as public issues amenable to political action and shared awareness; and the fundamental asymmetry of power that exists between individuals and small groups on the one hand and large governmental and corporate entities on the other. Arranged in three sections law and policy; information technology; and information studies, history, and sociology Privacy in America: Interdisciplinary Perspectives will be useful to scholars, practitioners, and students in a variety of fields, including information science, library science, and information systems.

Privacy - Defending an Illusion (Paperback): Martin Dowding Privacy - Defending an Illusion (Paperback)
Martin Dowding
R2,130 Discovery Miles 21 300 Ships in 18 - 22 working days

Matters of privacy have profoundly changed since electronic storage of information has become the norm. Consequently, policy-makers and legislators are trying to keep up with privacy challenges in the workplace, in healthcare, in surveillance, and on social networking sites. With Privacy: Defending an Illusion, Martin Dowding fills a very important gap in policy analysis and the teaching of privacy issues at the senior undergraduate and early graduate student level. In the first section of this book, Dowding recounts historical interpretations of privacy in a wide variety of socio-cultural circumstances. In the second section, the author addresses how information and communication technologies have changed our conceptions about privacy and redirected our focus from keeping information private to sharing it with many more people than we would have even a few years ago. Dowding also examines a variety of possible options for the future of privacy. The appendixes include seminal readings on relevant topics that should encourage debates about the nature of privacy and its problems. Overall, this book provides a solid background for defining and understanding privacy in a wide variety of contexts.

Protectors of Privacy - Regulating Personal Data in the Global Economy (Hardcover): Abraham L. Newman Protectors of Privacy - Regulating Personal Data in the Global Economy (Hardcover)
Abraham L. Newman
R1,619 Discovery Miles 16 190 Ships in 18 - 22 working days

From credit-card purchases to electronic fingerprints, the amount of personal data available to government and business is growing exponentially. All industrial societies face the problem of how to regulate this vast world of information, but their governments have chosen distinctly different solutions. In Protectors of Privacy, Abraham L. Newman details how and why, in contrast to the United States, the nations of the European Union adopted comprehensive data privacy for both the public and the private sectors, enforceable by independent regulatory agencies known as data privacy authorities. Despite U.S. prominence in data technology, Newman shows, the strict privacy rules of the European Union have been adopted far more broadly across the globe than the self-regulatory approach championed by the United States. This rift has led to a series of trade and security disputes between the United States and the European Union.Based on many interviews with politicians, civil servants, and representatives from business and NGOs, and supplemented with archival sources, statistical analysis, and examples, Protectors of Privacy delineates the two principal types of privacy regimes-comprehensive and limited. The book presents a theory of regulatory development that highlights the role of transgovernmental networks not only in implementing rules but also in actively shaping the political process surrounding policymaking. More broadly, Newman explains how Europe's institutional revolution has created in certain sectors the regulatory capacity that allows it to challenge U.S. dominance in international economic governance.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Machine Vision Beyond Visible Spectrum
Riad Hammoud, Guoliang Fan, … Hardcover R4,031 Discovery Miles 40 310
Handbook of Pediatric Brain Imaging…
Hao Huang, Timothy Roberts Paperback R3,531 Discovery Miles 35 310
3D Future Internet Media
Ahmet Kondoz, Tasos Dagiuklas Hardcover R4,048 Discovery Miles 40 480
Brutalism
Achille Mbembe Paperback R350 R323 Discovery Miles 3 230
Consumer Ethics in a Global Economy…
Daniel K. Finn Paperback R965 Discovery Miles 9 650
Horse Trading in the Age of Cars - Men…
Steven M Gelber Hardcover R1,532 Discovery Miles 15 320
Food Fix Uncensored - Inside The Food…
Mark Hyman Paperback R467 R379 Discovery Miles 3 790
Bridging the Geographic Information…
Jerome Gensel, Didier Josselin, … Hardcover R4,085 Discovery Miles 40 850
Consuming Germany in the Cold War
David F. Crew Hardcover R4,307 Discovery Miles 43 070
Cybersecurity - Learn Information…
Alan Grid Hardcover R783 R683 Discovery Miles 6 830

 

Partners