0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (124)
  • R250 - R500 (223)
  • R500+ (768)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

Agenda delle password - Agenda degli indirizzi web e delle password di accesso - Copertina cavallo curioso (Italian,... Agenda delle password - Agenda degli indirizzi web e delle password di accesso - Copertina cavallo curioso (Italian, Paperback)
Agende Pratiche
R205 Discovery Miles 2 050 Ships in 18 - 22 working days
Agenda delle password - Agenda degli indirizzi web e delle password di accesso - Copertina cavallo nero (Italian, Paperback):... Agenda delle password - Agenda degli indirizzi web e delle password di accesso - Copertina cavallo nero (Italian, Paperback)
Agende Pratiche
R205 Discovery Miles 2 050 Ships in 18 - 22 working days
Agenda de passwords - Agenda para enderecos electronicos e passwords - Capa gatinho ruivo a relaxar (Portuguese, Paperback):... Agenda de passwords - Agenda para enderecos electronicos e passwords - Capa gatinho ruivo a relaxar (Portuguese, Paperback)
Coisas Realmente Uteis
R205 Discovery Miles 2 050 Ships in 18 - 22 working days
Agenda de Senhas - Agenda para enderecos eletronicos e senhas: Capa gatinho de olhos azuis - Portugues (Brasil) (Portuguese,... Agenda de Senhas - Agenda para enderecos eletronicos e senhas: Capa gatinho de olhos azuis - Portugues (Brasil) (Portuguese, Paperback)
Agendas E Cadernos
R206 Discovery Miles 2 060 Ships in 18 - 22 working days
Agenda de Senhas - Agenda Para Endere os Eletr nicos E Senhas: Capa Gatinho Brincalh o - Portugu s (Brasil) (Portuguese,... Agenda de Senhas - Agenda Para Endere os Eletr nicos E Senhas: Capa Gatinho Brincalh o - Portugu s (Brasil) (Portuguese, Paperback)
Agendas E Cadernos
R165 Discovery Miles 1 650 Ships in 18 - 22 working days
Agenda de Senhas - Agenda para enderecos eletronicos e senhas: Capa gatinho ruivo a relaxar - Portugues (Brasil) (Portuguese,... Agenda de Senhas - Agenda para enderecos eletronicos e senhas: Capa gatinho ruivo a relaxar - Portugues (Brasil) (Portuguese, Paperback)
Agendas E Cadernos
R205 Discovery Miles 2 050 Ships in 18 - 22 working days
Agenda de passwords - Agenda para endere os electr nicos e passwords - Capa p nei pequeno (Portuguese, Paperback): Coisas... Agenda de passwords - Agenda para endere os electr nicos e passwords - Capa p nei pequeno (Portuguese, Paperback)
Coisas Realmente Uteis
R205 Discovery Miles 2 050 Ships in 18 - 22 working days
Agenda de Senhas - Agenda para enderecos eletronicos e senhas: Capa French Mastiff - Portugues (Brasil) (Portuguese,... Agenda de Senhas - Agenda para enderecos eletronicos e senhas: Capa French Mastiff - Portugues (Brasil) (Portuguese, Paperback)
Agendas E Cadernos
R205 Discovery Miles 2 050 Ships in 18 - 22 working days
Agenda de Senhas - Agenda para enderecos eletronicos e senhas: Capa cavalo preto - Portugues (Brasil) (Portuguese, Paperback):... Agenda de Senhas - Agenda para enderecos eletronicos e senhas: Capa cavalo preto - Portugues (Brasil) (Portuguese, Paperback)
Agendas E Cadernos
R206 Discovery Miles 2 060 Ships in 18 - 22 working days
Agenda de Senhas - Agenda para enderecos eletronicos e senhas: Capa Basset - Portugues (Brasil) (Portuguese, Paperback):... Agenda de Senhas - Agenda para enderecos eletronicos e senhas: Capa Basset - Portugues (Brasil) (Portuguese, Paperback)
Agendas E Cadernos
R205 Discovery Miles 2 050 Ships in 18 - 22 working days
Agenda de Senhas - Agenda para enderecos eletronicos e senhas: Capa cachorrinho Golden Retriever - Portugues (Brasil)... Agenda de Senhas - Agenda para enderecos eletronicos e senhas: Capa cachorrinho Golden Retriever - Portugues (Brasil) (Portuguese, Paperback)
Agendas E Cadernos
R206 Discovery Miles 2 060 Ships in 18 - 22 working days
Agenda de Senhas - Agenda Para Endere os Eletr nicos E Senhas: Capa Jack Russell Terrier - Portugu s (Brasil) (Portuguese,... Agenda de Senhas - Agenda Para Endere os Eletr nicos E Senhas: Capa Jack Russell Terrier - Portugu s (Brasil) (Portuguese, Paperback)
Agendas E Cadernos
R205 Discovery Miles 2 050 Ships in 18 - 22 working days
IT-Sicherheit 1.5 - Internetprotokolle, Webprogrammierung, Systemsicherheit (German, Paperback): Gilbert Brands IT-Sicherheit 1.5 - Internetprotokolle, Webprogrammierung, Systemsicherheit (German, Paperback)
Gilbert Brands
R683 Discovery Miles 6 830 Ships in 18 - 22 working days
Bogen om password - Irriterende - men helt nodvendige. En guide til den almindelige it-bruger derhjemme . (Danish, Paperback):... Bogen om password - Irriterende - men helt nodvendige. En guide til den almindelige it-bruger derhjemme . (Danish, Paperback)
John Madum
R420 Discovery Miles 4 200 Ships in 18 - 22 working days
Cybersecurity & Cyber-Information Sharing - Legal & Economic Analyses (Hardcover): Julia M Morgan Cybersecurity & Cyber-Information Sharing - Legal & Economic Analyses (Hardcover)
Julia M Morgan
R4,432 Discovery Miles 44 320 Ships in 10 - 15 working days

Over the course of the last year, a host of cyberattacks has been perpetrated on a number of high profile American companies. The high profile cyberattacks of 2014 and early 2015 appear to be indicative of a broader trend: the frequency and ferocity of cyberattacks are increasing, posing grave threats to the national interests of the United States. While considerable debate exists with regard to the best strategies for protecting America's various cyber-systems and promoting cybersecurity, one point of general agreement amongst cyber-analysts is the perceived need for enhanced and timely exchange of cyber-threat intelligence both within the private sector and between the private sector and the government. This book examines the various legal issues that arise with respect to the sharing of cybersecurity intelligence, with a special focus on two distinct concepts: (1) sharing of cyber information within the government's possession and (2) sharing of cyber-information within the possession of the private sector. Furthermore, the authors analyse the incentives for companies to share information about cybersecurity breaches with other companies and the federal government, and conclude with a discussion on several bills passed on information sharing in cybersecurity.

Mobile Data Loss - Threats and Countermeasures (Paperback): Michael T. Raggo Mobile Data Loss - Threats and Countermeasures (Paperback)
Michael T. Raggo
R863 Discovery Miles 8 630 Ships in 18 - 22 working days

The mobile threat landscape is evolving bringing about new forms of data loss. No longer can organizations rely on security policies designed during the PC era. Mobile is different and therefore requires a revised approach to countermeasures to mitigate data loss. Understanding these differences is fundamental to creating a new defense-in-depth strategy designed for mobile. Mobile Data Loss: Threats & Countermeasures reviews the mobile threat landscape using a hacker mind-set to outline risks and attack vectors that include malware, risky apps, operating system compromises, network attacks, and user behaviours. This provides the basis for then outlining countermeasures for defining a holistic mobile security methodology that encompasses proactive protections, response mechanisms, live monitoring, and incident response. Designing a comprehensive mobile security strategy is key. Mobile Data Loss: Threats & Countermeasures outlines the threats and strategies for protecting devices from a plethora of data loss vectors.

Privacy, Security and Accountability - Ethics, Law and Policy (Paperback): Adam D Moore Privacy, Security and Accountability - Ethics, Law and Policy (Paperback)
Adam D Moore
R1,616 Discovery Miles 16 160 Ships in 18 - 22 working days

What is the appropriate balance between privacy, security, and accountability? What do we owe each other in terms of information sharing and access? Why is privacy valuable and is it more or less important than other values like security or free speech? Is Edward Snowden a hero or villain? Within democratic societies, privacy, security, and accountability are seen as important values that must be balanced appropriately. If there is too much privacy, then there may be too little accountability - and more alarmingly, too little security. On the other hand, where there is too little privacy, individuals may not have the space to grow, experiment, and engage in practices not generally accepted by the majority. Moreover, allowing overly limited control over access to and uses of private places and information may itself be a threat to security. By clarifying the moral, legal, and social foundations of privacy, security, and accountability, this book helps determine the appropriate balance between these contested values. Twelve specially commissioned essays provide the ideal resource for students and academics in information and applied ethics.

NSA, BND & Co. - Die Moeglichkeiten der Geheimdienste: Technik, Auswertung, Gegenmassnahmen (German, Paperback): Gilbert Brands NSA, BND & Co. - Die Moeglichkeiten der Geheimdienste: Technik, Auswertung, Gegenmassnahmen (German, Paperback)
Gilbert Brands
R421 Discovery Miles 4 210 Ships in 18 - 22 working days
Mobile Privacy Disclosures - Recommendations of the Federal Trade Commission (Paperback): Julie C Hartell Mobile Privacy Disclosures - Recommendations of the Federal Trade Commission (Paperback)
Julie C Hartell
R1,635 Discovery Miles 16 350 Ships in 10 - 15 working days

The Federal Trade Commission (FTC) has worked on privacy issues for over forty years, and in 2000 began considering the privacy implications raised by consumers' growing use of mobile devices. More recently, the FTC hosted a mobile privacy panel discussion that focused on transparency. With so many players collecting and using consumer data, who should provide privacy information to consumers? Given the limited screen space of mobile devices, how can this information be conveyed? This book explores and offers suggestions for the major participants in the mobile ecosystem as they work to improve mobile privacy disclosures.

Steganography & Watermarking (Hardcover): Ching-Nung Yang, Chia-Chen Lin, Chin-Chen Chang Steganography & Watermarking (Hardcover)
Ching-Nung Yang, Chia-Chen Lin, Chin-Chen Chang
R4,737 Discovery Miles 47 370 Ships in 10 - 15 working days

Privacy and Copyright protection is a very important issue in our digital society, where a very large amount of multimedia data are generated and distributed daily using different kinds of consumer electronic devices and very popular communication channels, such as the Web and social networks. This book introduces state-of-the-art technology on data hiding and copyright protection of digital images, and offers a solid basis for future study and research. Steganographic technique overcomes the traditional cryptographic approach, providing new solutions for secure data transmission without raising users' malicious intention. In steganography, some secret information can be inserted into the original data in imperceptible and efficient ways to avoid distortion of the image, and enhance the embedding capacity, respectively. Digital watermarking also adopts data hiding techniques for copyright protection and tampering verification of multimedia data. In watermarking, an illegitimate copy can be recognised by testing the presence of a valid watermark and a dispute on the ownership of the image resolved. Different kinds of steganographic and watermarking techniques, providing different features and diverse characteristics, have been presented in this book. This book provides a reference for theoretical problems as well as practical solutions and applications for steganography and watermarking techniques. In particular, both the academic community (graduate student, post-doc and faculty) in Electrical Engineering, Computer Science, and Applied Mathematics; and the industrial community (engineers, engineering managers, programmers, research lab staff and managers, security managers) will find this book interesting.

Mobile Device Security - Threats & Controls (Paperback): Willliam R O'Connor Mobile Device Security - Threats & Controls (Paperback)
Willliam R O'Connor
R1,636 Discovery Miles 16 360 Ships in 10 - 15 working days

Millions of Americans currently use mobile devices (eg: cellphones, smartphones, and tablet computers) on a daily basis to communicate, obtain internet-based information, and share their own information, photographs, and videos. Given the extent of consumer reliance on mobile interactions, it is increasingly important that these devices be secured from expanding threats to the confidentiality, integrity, and availability of the information they maintain and share. This book explores the current challenge of threats and controls to mobile device security with a focus on cyber threats to mobile devices; wireless device theft; and how to protect the data on your phone.

Data Security Breaches - Notification Laws, Legislation & Identity Theft (Hardcover): Patricia Diaz, William C. Long Data Security Breaches - Notification Laws, Legislation & Identity Theft (Hardcover)
Patricia Diaz, William C. Long
R2,861 R2,680 Discovery Miles 26 800 Save R181 (6%) Ships in 10 - 15 working days

A data security breach occurs when there is a loss or theft of, or other unauthorized access to, sensitive personally identifiable information that could result in the potential compromise of the confidentiality or integrity of data. This book provides an overview of state security breach notification laws applicable to entities that collect, maintain, own, possess, or license personal information. This book describes information security and security breach notification requirements in the Office of Management and Budget's "Breach Notification Policy," the Health Insurance Portability and Accountability Act (HIPAA), the Health Information Technology for Economic and Clinical Health Act (HITECH), and the Gramm-Leach-Bliley Act (GLBA).

Wiretaps & Electronic Eavesdropping - Federal Law & Legal Ethics (Hardcover, New): Laurel Jennings, Richard M. Eastman Wiretaps & Electronic Eavesdropping - Federal Law & Legal Ethics (Hardcover, New)
Laurel Jennings, Richard M. Eastman
R2,868 R2,687 Discovery Miles 26 870 Save R181 (6%) Ships in 10 - 15 working days

It is a federal crime to wiretap or to use a machine to capture the communications of others without court approval, unless one of the parties has given his prior consent. It is likewise a federal crime to use or disclose any information acquired by illegal wiretapping or electronic eavesdropping. Violations can result in imprisonment for not more than five years; fines up to $250,000; in civil liability for damages, attorney's fees and possibly punitive damages; in disciplinary action against any attorneys involved; and in suppression of any derivative evidence. This book provides an overview of federal law governing wiretapping and electronic eavesdropping under the Electronic Communications Privacy Act (ECPA).

Smart Meters & the Smart Grid - Privacy & Cybersecurity Considerations (Hardcover): Irwin E. Reid, Hale A. Stevens Smart Meters & the Smart Grid - Privacy & Cybersecurity Considerations (Hardcover)
Irwin E. Reid, Hale A. Stevens
R3,653 Discovery Miles 36 530 Ships in 10 - 15 working days

Electric utilities have accelerated their deployment of smart meters to millions of homes across the United States with help from the Department of Energy's Smart Grid Investment Grant program. As the meters multiply, so do issues concerning the privacy and security of the data collected by the new technology. This Advanced Metering Infrastructure (AMI) promises to increase energy efficiency, bolster electric power grid reliability, and facilitate demand response, among other benefits. However, to fulfil these ends, smart meters must record near-real time data on consumer electricity usage and transmit the data to utilities over great distances via communications networks that serve the smart grid. This book examines the privacy and cybersecurity considerations of smart meters and the smart grid.

Spies & Snitches - Electronic Privacy Protection & Challenges (Hardcover): Anieli Gounaris, Maximus Balli Spies & Snitches - Electronic Privacy Protection & Challenges (Hardcover)
Anieli Gounaris, Maximus Balli
R4,718 Discovery Miles 47 180 Ships in 10 - 15 working days

There is no comprehensive federal privacy statute that protects personal information. Instead, a patchwork of federal laws and regulations govern the collection and disclosure of personal information and has been addressed by Congress on a sector-by-sector basis. Some contend that this patchwork of laws and regulations is insufficient to meet the demands of today's technology. Congress, the Obama Administration, businesses, public interest groups and citizens are all involved in the discussion of privacy solutions. This book examines some of these efforts with respect to the protection of personal information and provides a brief overview of selected recent developments in the area of federal privacy law.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
#Myprivacy #Myright - Protect It While…
Robin M Singh Hardcover R536 Discovery Miles 5 360
Elementary... the Art and Science of…
Miguel Fernandez, Alan Millington, … Hardcover R1,097 Discovery Miles 10 970
Intelligent Data Analysis for e-Learning…
Jorge Miguel, Santi Caballe, … Paperback R2,520 R2,325 Discovery Miles 23 250
Security and Privacy Management…
Yassine Maleh Hardcover R5,124 Discovery Miles 51 240
Cyber Security and Threats - Concepts…
Information Reso Management Association Hardcover R9,416 Discovery Miles 94 160
Large-Scale Data Streaming, Processing…
Hemraj Saini, Geetanjali Rathee, … Hardcover R6,163 Discovery Miles 61 630
Handbook of Research on Intelligent Data…
Stepan Mykolayovych Bilan, Saleem Issa Al-Zoubi Hardcover R9,365 Discovery Miles 93 650
Broken Code - Inside Facebook And The…
Jeff Horwitz Paperback R578 Discovery Miles 5 780
Data Protection and Privacy, Volume 10…
Ronald Leenes, Rosamunde van Brakel, … Hardcover R2,377 Discovery Miles 23 770
EU General Data Protection Regulation…
It Governance Privacy Team Paperback R762 Discovery Miles 7 620

 

Partners