0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (162)
  • R250 - R500 (192)
  • R500+ (821)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

NSA, BND & Co. - Die Moeglichkeiten der Geheimdienste: Technik, Auswertung, Gegenmassnahmen (German, Paperback): Gilbert Brands NSA, BND & Co. - Die Moeglichkeiten der Geheimdienste: Technik, Auswertung, Gegenmassnahmen (German, Paperback)
Gilbert Brands
R481 Discovery Miles 4 810 Ships in 10 - 15 working days
A Simpler Guide to Online Security for Everyone - How to protect yourself and stay safe from fraud, scams and hackers with easy... A Simpler Guide to Online Security for Everyone - How to protect yourself and stay safe from fraud, scams and hackers with easy cyber security tips for your Gmail, Docs and other Google services (Paperback)
Ceri Clark
R253 Discovery Miles 2 530 Ships in 10 - 15 working days
IT-Sicherheit 1.5 - Internetprotokolle, Webprogrammierung, Systemsicherheit (German, Paperback): Gilbert Brands IT-Sicherheit 1.5 - Internetprotokolle, Webprogrammierung, Systemsicherheit (German, Paperback)
Gilbert Brands
R769 Discovery Miles 7 690 Ships in 10 - 15 working days
Mobile Data Loss - Threats and Countermeasures (Paperback): Michael T. Raggo Mobile Data Loss - Threats and Countermeasures (Paperback)
Michael T. Raggo
R974 Discovery Miles 9 740 Ships in 10 - 15 working days

The mobile threat landscape is evolving bringing about new forms of data loss. No longer can organizations rely on security policies designed during the PC era. Mobile is different and therefore requires a revised approach to countermeasures to mitigate data loss. Understanding these differences is fundamental to creating a new defense-in-depth strategy designed for mobile. Mobile Data Loss: Threats & Countermeasures reviews the mobile threat landscape using a hacker mind-set to outline risks and attack vectors that include malware, risky apps, operating system compromises, network attacks, and user behaviours. This provides the basis for then outlining countermeasures for defining a holistic mobile security methodology that encompasses proactive protections, response mechanisms, live monitoring, and incident response. Designing a comprehensive mobile security strategy is key. Mobile Data Loss: Threats & Countermeasures outlines the threats and strategies for protecting devices from a plethora of data loss vectors.

Implementing Digital Forensic Readiness - From Reactive to Proactive Process (Paperback): Jason Sachowski Implementing Digital Forensic Readiness - From Reactive to Proactive Process (Paperback)
Jason Sachowski
R1,963 Discovery Miles 19 630 Ships in 10 - 15 working days

Implementing Digital Forensic Readiness: From Reactive to Proactive Process shows information security and digital forensic professionals how to increase operational efficiencies by implementing a pro-active approach to digital forensics throughout their organization. It demonstrates how digital forensics aligns strategically within an organization's business operations and information security's program. This book illustrates how the proper collection, preservation, and presentation of digital evidence is essential for reducing potential business impact as a result of digital crimes, disputes, and incidents. It also explains how every stage in the digital evidence lifecycle impacts the integrity of data, and how to properly manage digital evidence throughout the entire investigation. Using a digital forensic readiness approach and preparedness as a business goal, the administrative, technical, and physical elements included throughout this book will enhance the relevance and credibility of digital evidence. Learn how to document the available systems and logs as potential digital evidence sources, how gap analysis can be used where digital evidence is not sufficient, and the importance of monitoring data sources in a timely manner. This book offers standard operating procedures to document how an evidence-based presentation should be made, featuring legal resources for reviewing digital evidence.

Hiding Behind the Keyboard - Uncovering Covert Communication Methods with Forensic Analysis (Paperback): Brett Shavers, John... Hiding Behind the Keyboard - Uncovering Covert Communication Methods with Forensic Analysis (Paperback)
Brett Shavers, John Bair
R1,916 Discovery Miles 19 160 Ships in 10 - 15 working days

Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis exposes the latest electronic covert communication techniques used by cybercriminals, along with the needed investigative methods for identifying them. The book shows how to use the Internet for legitimate covert communication, while giving investigators the information they need for detecting cybercriminals who attempt to hide their true identity. Intended for practitioners and investigators, the book offers concrete examples on how to communicate securely, serving as an ideal reference for those who truly need protection, as well as those who investigate cybercriminals.

Bogen om password - Irriterende - men helt nodvendige. En guide til den almindelige it-bruger derhjemme . (Danish, Paperback):... Bogen om password - Irriterende - men helt nodvendige. En guide til den almindelige it-bruger derhjemme . (Danish, Paperback)
John Madum
R454 Discovery Miles 4 540 Ships in 10 - 15 working days
Digital Forensics - Threatscape and Best Practices (Paperback): John Sammons Digital Forensics - Threatscape and Best Practices (Paperback)
John Sammons
R1,597 Discovery Miles 15 970 Ships in 10 - 15 working days

Digital Forensics: Threatscape and Best Practices surveys the problems and challenges confronting digital forensic professionals today, including massive data sets and everchanging technology. This book provides a coherent overview of the threatscape in a broad range of topics, providing practitioners and students alike with a comprehensive, coherent overview of the threat landscape and what can be done to manage and prepare for it. Digital Forensics: Threatscape and Best Practices delivers you with incisive analysis and best practices from a panel of expert authors, led by John Sammons, bestselling author of The Basics of Digital Forensics.

Social Security Numbers & ID Theft (Hardcover, New): Felipe D. Sorrells Social Security Numbers & ID Theft (Hardcover, New)
Felipe D. Sorrells
R2,555 Discovery Miles 25 550 Ships in 12 - 19 working days

This book explores the use of Social Security Numbers (SSN) and Identity Theft. The SSN was created in 1936 for the purpose of tracking workers' earnings for benefits purposes. Since that time, however, SSN usage has expanded to encompass a myriad of purposes well beyond the operation of the Social Security system. This book describes how criminals acquire SSNs and how they use them to commit identity theft. How organisations such as financial institutions, insurers, universities, health care entities, government agencies, and innumerable other organisations use this nine-digit sequence as a default identifier is also examined. Furthermore, existing statutes, regulations and private sector efforts designed to protect SSNs are looked at, including data security and data breach notification laws. This book concludes with specific FTC recommendations, which address both the supply and demand aspects of the SSN problem by proposing actions that would make SSNs less available to identify thieves, and would make it more difficult for them to misuse those SSNs they are able to obtain. This is an edited, excerpted and augmented edition of a Federal Trade Commission and GAO publication.

Blackstone's Guide to the Identity Cards Act 2006 (Paperback, New): John Wadham, Caoilfhionn Gallagher, Nicole Chrolavicius Blackstone's Guide to the Identity Cards Act 2006 (Paperback, New)
John Wadham, Caoilfhionn Gallagher, Nicole Chrolavicius
R2,879 Discovery Miles 28 790 Ships in 10 - 15 working days

The Blackstone's Guide Series delivers concise and accessible books covering the latest legislation changes and amendments. Published within weeks of an Act, they offer expert commentary by leading names on the effects, extent and scope of the legislation, plus a full copy of the Act itself. They offer a cost-effective solution to key information needs and are the perfect companion for any practitioner needing to get up to speed with the latest changes. The Identity Cards Act 2006 is a major piece of legislation which will fundamentally change the relationship between the state and the individual for people of all nationalities residing in the UK for more than three months. The Act will affect the operation of much existing legislation, including; the Data Protection Act 1998; the Police and Criminal Evidence Act 1984; the Regulation of Investigatory Powers Act 2000; the Race Relations Act 1976; the Immigration and Asylum Act 1999, and the Asylum and Immigration (Treatment of Claimants) Act 2004. The Act will have an impact on a wide range of legal areas, including; asylum and immigration; data protection and freedom of information; privacy; criminal; human rights; and civil liberties; and will introduce the following; - A complex range of new civil and criminal penalties - a new Commissioner's Office - New ways of working for those providing public services, such as the police, the NHS, the Passport Service, and benefit workers This Guide is written by two experienced practitioners currently based at Liberty, the National Council for Civil Liberties. Structured in a clear and logical way following the parts of the Act, it provides an up-to-date and informative guide, making it an essential purchase for practitioners and organisations working in a number of legal areas.

Privacy and the Press (Paperback): Joshua Rozenberg Privacy and the Press (Paperback)
Joshua Rozenberg
R1,589 Discovery Miles 15 890 Ships in 10 - 15 working days

Do we need a law of privacy? Should judges be allowed to stop us reading about a footballer's adultery or enjoying pictures of a film star's wedding? Is a super-model's cocaine addiction something that she should be allowed to keep private? And aren't we entitled to walk down the street without having our most intimate activities recorded on security cameras and broadcast to the world? These questions have divided not only the country but also our most senior judges. Drawing a line between justified and unjustified intrusion places great stresses on our legal traditions with some judges favouring an approach which stretches existing laws to grant relief to deserving victims, whilst other judges feel that it would be more honest to simply recognize privacy as a new human right. The latter approach creates further problems: should it be up to Parliament alone to create such a right? And what about free speech? Do the newspapers and the public not have rights too? The issues raised are often highly emotive. Newspapers are not allowed to identify Thompson and Venables, the young men who murdered two-year-old James Bulger, because their lives would be in danger. Nobody may identify Mary Bell, who also killed when she was a child, even though there was no such risk. Will paedophiles be the next to demand lifelong anonymity? Steering a course through this minefield requires a grasp of legal concepts and principles and an understanding of how the law develops. This book explores how the English legal system has had to blend old laws on confidentiality with modern human rights law in order to deal with these problematic issues. Written for non-specialists by one of Britain s best known legal journalists, this book provides a uniquely accessible guide to the legal aspects of this public debate.

Rethinking Public Key Infrastructures and Digital Certificates - Building in Privacy (Paperback): Stefan Brands Rethinking Public Key Infrastructures and Digital Certificates - Building in Privacy (Paperback)
Stefan Brands
R1,334 Discovery Miles 13 340 Ships in 10 - 15 working days

Stefan Brands proposes cryptographic building blocks for the design of digital certificates that preserve privacy without sacrificing security. As paper-based communication and transaction mechanisms are replaced by automated ones, traditional forms of security such as photographs and handwritten signatures are becoming outdated. Most security experts believe that digital certificates offer the best technology for safeguarding electronic communications. They are already widely used for authenticating and encrypting email and software, and eventually will be built into any device or piece of software that must be able to communicate securely. There is a serious problem, however, with this unavoidable trend: unless drastic measures are taken, everyone will be forced to communicate via what will be the most pervasive electronic surveillance tool ever built. There will also be abundant opportunity for misuse of digital certificates by hackers, unscrupulous employees, government agencies, financial institutions, insurance companies, and so on.In this book Stefan Brands proposes cryptographic building blocks for the design of digital certificates that preserve privacy without sacrificing security. Such certificates function in much the same way as cinema tickets or subway tokens: anyone can establish their validity and the data they specify, but no more than that. Furthermore, different actions by the same person cannot be linked. Certificate holders have control over what information is disclosed, and to whom. Subsets of the proposed cryptographic building blocks can be used in combination, allowing a cookbook approach to the design of public key infrastructures. Potential applications include electronic cash, electronic postage, digital rights management, pseudonyms for online chat rooms, health care information storage, electronic voting, and even electronic gambling.

Securing the Internet of Things (Paperback): Shancang Li, Li Da Xu Securing the Internet of Things (Paperback)
Shancang Li, Li Da Xu
R1,885 Discovery Miles 18 850 Ships in 10 - 15 working days

Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge they need to know regarding security in the Internet of Things (IoT). This booming field, moving from strictly research to the marketplace, is advancing rapidly, yet security issues abound. This book explains the fundamental concepts of IoT security, describing practical solutions that account for resource limitations at IoT end-node, hybrid network architecture, communication protocols, and application characteristics. Highlighting the most important potential IoT security risks and threats, the book covers both the general theory and practical implications for people working in security in the Internet of Things.

Radical Secrecy - The Ends of Transparency in Datafied America (Hardcover): Clare Birchall Radical Secrecy - The Ends of Transparency in Datafied America (Hardcover)
Clare Birchall
R2,283 Discovery Miles 22 830 Ships in 12 - 19 working days

Reimagining transparency and secrecy in the era of digital data When total data surveillance delimits agency and revelations of political wrongdoing fail to have consequences, is transparency the social panacea liberal democracies purport it to be? This book sets forth the provocative argument that progressive social goals would be better served by a radical form of secrecy, at least while state and corporate forces hold an asymmetrical advantage over the less powerful in data control. Clare Birchall asks: How might transparency actually serve agendas that are far from transparent? Can we imagine a secrecy that could act in the service of, rather than against, a progressive politics? To move beyond atomizing calls for privacy and to interrupt the perennial tension between state security and the public's right to know, Birchall adapts Edouard Glissant's thinking to propose a digital "right to opacity." As a crucial element of radical secrecy, she argues, this would eventually give rise to a "postsecret" society, offering an understanding and experience of the political that is free from the false choice between secrecy and transparency. She grounds her arresting story in case studies including the varied presidential styles of George W. Bush, Barack Obama, and Donald Trump; the Snowden revelations; conspiracy theories espoused or endorsed by Trump; WikiLeaks and guerrilla transparency; and the opening of the state through data portals. Postsecrecy is the necessary condition for imagining, finally, an alternative vision of "the good," of equality, as neither shaped by neoliberal incarnations of transparency nor undermined by secret state surveillance. Not least, postsecrecy reimagines collective resistance in the era of digital data.

Scams, Security and Over-Sharing - Controlling your information and staying safe online (Paperback): Jon White Scams, Security and Over-Sharing - Controlling your information and staying safe online (Paperback)
Jon White
R510 Discovery Miles 5 100 Ships in 12 - 19 working days

This book isn't about cybersecurity, it's about life. Specifically, connected life in the 21st century. It's about the behaviours we need to change and the threats we need to be aware of to ensure that we can keep ourselves and our families as safe as possible in the new connected world. We are the pioneers in connectivity and this world is evolving in a way that none of us has ever seen before. This book will cover elements of 21st century life which will be familiar to all consumers - from social media, to email hacking, to content theft, to connected devices and even connected cars. It will steer clear of just dryly delivering facts but will use true anecdotes to tell stories of the dangers of connectivity to us all, every day, and how we can make simple changes to live our connected lives more safely. * Honest, jargon-free advice on how to keep your data safe in an increasingly complex digital world * Topical and engaging examples from across the consumer, digital and corporate worlds * Covers everything from passwords to talking assistants, phishing to social media

Research Methods for Cyber Security (Paperback): Thomas Edgar, David Manz Research Methods for Cyber Security (Paperback)
Thomas Edgar, David Manz
R2,840 Discovery Miles 28 400 Ships in 10 - 15 working days

Research Methods for Cyber Security teaches scientific methods for generating impactful knowledge, validating theories, and adding critical rigor to the cyber security field. This book shows how to develop a research plan, beginning by starting research with a question, then offers an introduction to the broad range of useful research methods for cyber security research: observational, mathematical, experimental, and applied. Each research method chapter concludes with recommended outlines and suggested templates for submission to peer reviewed venues. This book concludes with information on cross-cutting issues within cyber security research. Cyber security research contends with numerous unique issues, such as an extremely fast environment evolution, adversarial behavior, and the merging of natural and social science phenomena. Research Methods for Cyber Security addresses these concerns and much more by teaching readers not only the process of science in the context of cyber security research, but providing assistance in execution of research as well.

Privacy and the Media (Paperback): Andrew McStay Privacy and the Media (Paperback)
Andrew McStay
R1,455 Discovery Miles 14 550 Ships in 10 - 15 working days

Questions of privacy are critical to the study of contemporary media and society. When we're more and more connected to devices and to content, it's increasingly important to understand how information about ourselves is being collected, transmitted, processed, and mediated. Privacy and the Media equips students to do just that, providing a comprehensive overview of both the theory and reality of privacy and the media in the 21st Century. Offering a rich overview of this crucial and topical relationship, Andy McStay: Explores the foundational topics of journalism, the Snowden leaks, and encryption by companies such as Apple Considers commercial applications including behavioural advertising, big data, algorithms, and the role of platforms such as Google and Facebook Introduces the role of the body with discussions of emotion, wearable media, peer-based privacy, and sexting Encourages students to put their understanding to work with suggestions for further research, challenging them to explore how privacy functions in practice. Privacy and the Media is not a polemic on privacy as 'good' or 'bad', but a call to assess the detail and the potential implications of contemporary media technologies and practices. It is essential reading for students and researchers of digital media, social media, digital politics, and the creative and cultural industries. 'Privacy and the Media is a thoughtful survey of the privacy landscape. McStay reviews the intricate tensions and seeming contradictions to offer an accessible book for anyone curious about the contemporary debates in privacy.' - danah boyd, author of It's Complicated and founder of Data & Society 'McStay's great achievement here is to confront many of the pertinent and complex questions about media and privacy in a style that is both authoritative and easy to read... His book will prove an excellent companion for all students of this fascinating and crucial topic.' - Mireille Hildebrandt, Vrije Universiteit Brussel 'Clearly and accessibly written, this book is a great resource for anyone interested in the broad range of ways in which privacy and contemporary media are entangled and in the big picture of privacy/media relations today... I will definitely be assigning it for my students.' - Helen Kennedy, University of Sheffield

Privacy and the Media (Hardcover): Andrew McStay Privacy and the Media (Hardcover)
Andrew McStay
R4,020 Discovery Miles 40 200 Ships in 10 - 15 working days

Questions of privacy are critical to the study of contemporary media and society. When we're more and more connected to devices and to content, it's increasingly important to understand how information about ourselves is being collected, transmitted, processed, and mediated. Privacy and the Media equips students to do just that, providing a comprehensive overview of both the theory and reality of privacy and the media in the 21st Century. Offering a rich overview of this crucial and topical relationship, Andy McStay: Explores the foundational topics of journalism, the Snowden leaks, and encryption by companies such as Apple Considers commercial applications including behavioural advertising, big data, algorithms, and the role of platforms such as Google and Facebook Introduces the role of the body with discussions of emotion, wearable media, peer-based privacy, and sexting Encourages students to put their understanding to work with suggestions for further research, challenging them to explore how privacy functions in practice. Privacy and the Media is not a polemic on privacy as 'good' or 'bad', but a call to assess the detail and the potential implications of contemporary media technologies and practices. It is essential reading for students and researchers of digital media, social media, digital politics, and the creative and cultural industries. 'Privacy and the Media is a thoughtful survey of the privacy landscape. McStay reviews the intricate tensions and seeming contradictions to offer an accessible book for anyone curious about the contemporary debates in privacy.' - danah boyd, author of It's Complicated and founder of Data & Society 'McStay's great achievement here is to confront many of the pertinent and complex questions about media and privacy in a style that is both authoritative and easy to read... His book will prove an excellent companion for all students of this fascinating and crucial topic.' - Mireille Hildebrandt, Vrije Universiteit Brussel 'Clearly and accessibly written, this book is a great resource for anyone interested in the broad range of ways in which privacy and contemporary media are entangled and in the big picture of privacy/media relations today... I will definitely be assigning it for my students.' - Helen Kennedy, University of Sheffield

DNS Security - Defending the Domain Name System (Paperback): Allan Liska, Geoffrey Stowe DNS Security - Defending the Domain Name System (Paperback)
Allan Liska, Geoffrey Stowe
R1,620 Discovery Miles 16 200 Ships in 10 - 15 working days

DNS Security: Defending the Domain Name System provides tactics on how to protect a Domain Name System (DNS) framework by exploring common DNS vulnerabilities, studying different attack vectors, and providing necessary information for securing DNS infrastructure. The book is a timely reference as DNS is an integral part of the Internet that is involved in almost every attack against a network. The book focuses entirely on the security aspects of DNS, covering common attacks against DNS servers and the protocol itself, as well as ways to use DNS to turn the tables on the attackers and stop an incident before it even starts.

Cyber Guerilla (Paperback): Jelle Van Haaster, Rickey Gevers, Martijn Sprengers Cyber Guerilla (Paperback)
Jelle Van Haaster, Rickey Gevers, Martijn Sprengers
R1,587 Discovery Miles 15 870 Ships in 10 - 15 working days

Much as Che Guevara's book Guerilla Warfare helped define and delineate a new type of warfare in the wake of the Cuban revolution in 1961, Cyber Guerilla will help define the new types of threats and fighters now appearing in the digital landscape. Cyber Guerilla provides valuable insight for infosec professionals and consultants, as well as government, military, and corporate IT strategists who must defend against myriad threats from non-state actors. The authors take readers inside the operations and tactics of cyber guerillas, who are changing the dynamics of cyber warfare and information security through their unconventional strategies and threats. This book draws lessons from the authors' own experiences but also from illustrative hacker groups such as Anonymous, LulzSec and Rebellious Rose.

Analyzing and Securing Social Networks (Hardcover): Bhavani Thuraisingham, Satyen Abrol, Raymond Heatherly, Murat Kantarcioglu,... Analyzing and Securing Social Networks (Hardcover)
Bhavani Thuraisingham, Satyen Abrol, Raymond Heatherly, Murat Kantarcioglu, Vaibhav Khadilkar, …
R4,012 Discovery Miles 40 120 Ships in 12 - 19 working days

Analyzing and Securing Social Networks focuses on the two major technologies that have been developed for online social networks (OSNs): (i) data mining technologies for analyzing these networks and extracting useful information such as location, demographics, and sentiments of the participants of the network, and (ii) security and privacy technologies that ensure the privacy of the participants of the network as well as provide controlled access to the information posted and exchanged by the participants. The authors explore security and privacy issues for social media systems, analyze such systems, and discuss prototypes they have developed for social media systems whose data are represented using semantic web technologies. These experimental systems have been developed at The University of Texas at Dallas. The material in this book, together with the numerous references listed in each chapter, have been used for a graduate-level course at The University of Texas at Dallas on analyzing and securing social media. Several experimental systems developed by graduate students are also provided. The book is divided into nine main sections: (1) supporting technologies, (2) basics of analyzing and securing social networks, (3) the authors' design and implementation of various social network analytics tools, (4) privacy aspects of social networks, (5) access control and inference control for social networks, (6) experimental systems designed or developed by the authors on analyzing and securing social networks, (7) social media application systems developed by the authors, (8) secure social media systems developed by the authors, and (9) some of the authors' exploratory work and further directions.

Practical Deployment of Cisco Identity Services Engine (ISE) - Real-World Examples of AAA Deployments (Paperback): Andy... Practical Deployment of Cisco Identity Services Engine (ISE) - Real-World Examples of AAA Deployments (Paperback)
Andy Richter, Jeremy Wood
R2,209 Discovery Miles 22 090 Ships in 10 - 15 working days

With the proliferation of mobile devices and bring-your-own-devices (BYOD) within enterprise networks, the boundaries of where the network begins and ends have been blurred. Cisco Identity Services Engine (ISE) is the leading security policy management platform that unifies and automates access control to proactively enforce role-based access to enterprise networks. In Practical Deployment of Cisco Identity Services Engine (ISE), Andy Richter and Jeremy Wood share their expertise from dozens of real-world implementations of ISE and the methods they have used for optimizing ISE in a wide range of environments. ISE can be difficult, requiring a team of security and network professionals, with the knowledge of many different specialties. Practical Deployment of Cisco Identity Services Engine (ISE) shows you how to deploy ISE with the necessary integration across multiple different technologies required to make ISE work like a system. Andy Richter and Jeremy Wood explain end-to-end how to make the system work in the real world, giving you the benefit of their ISE expertise, as well as all the required ancillary technologies and configurations to make ISE work.

Privacy in the Age of Big Data - Recognizing Threats, Defending Your Rights, and Protecting Your Family (Paperback): Theresa... Privacy in the Age of Big Data - Recognizing Threats, Defending Your Rights, and Protecting Your Family (Paperback)
Theresa Payton, Ted Claypoole; Foreword by Howard A. Schmidt
R699 Discovery Miles 6 990 Ships in 10 - 15 working days

Digital data collection and surveillance gets more pervasive and invasive by the day; but the best ways to protect yourself and your data are all steps you can take yourself. The devices we use to get just-in-time coupons, directions when we're lost, and maintain connections with loved ones no matter how far away they are, also invade our privacy in ways we might not even be aware of. Our devices send and collect data about us whenever we use them, but that data is not safeguarded the way we assume it would be. Privacy is complex and personal. Many of us do not know the full extent to which data is collected, stored, aggregated, and used. As recent revelations indicate, we are subject to a level of data collection and surveillance never before imaginable. While some of these methods may, in fact, protect us and provide us with information and services we deem to be helpful and desired, others can turn out to be insidious and over-arching. Privacy in the Age of Big Data highlights the many positive outcomes of digital surveillance and data collection while also outlining those forms of data collection to which we may not consent, and of which we are likely unaware. Payton and Claypoole skillfully introduce readers to the many ways we are 'watched,' and how to adjust our behaviors and activities to recapture our privacy. The authors suggest the tools, behavior changes, and political actions we can take to regain data and identity security. Anyone who uses digital devices will want to read this book for its clear and no-nonsense approach to the world of big data and what it means for all of us.

Security, Privacy and Trust in the Internet of Things (Hardcover): Hannan Xiao Security, Privacy and Trust in the Internet of Things (Hardcover)
Hannan Xiao
R4,324 R4,074 Discovery Miles 40 740 Save R250 (6%) Out of stock
Deterring Cybertrespass and Securing Cyberspace: Lessons from United States Border Control Strategies - Lessons from United... Deterring Cybertrespass and Securing Cyberspace: Lessons from United States Border Control Strategies - Lessons from United States Border Control Strategies (Paperback)
Mary Manjikian
R435 Discovery Miles 4 350 Out of stock
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
A Register of the Presidents, Fellows…
John Rouse Bloxam Paperback R574 Discovery Miles 5 740
Regression Analysis - A Practical…
Jeremy Arkes Paperback R1,429 Discovery Miles 14 290
From Classical Antiquity to the Middle…
Bryan Ward-Perkins Hardcover R5,140 Discovery Miles 51 400
Operations And Supply Chain Management
David Collier, James Evans Hardcover R1,451 R1,320 Discovery Miles 13 200
Writing Spaces - Discourses of…
C. Greig Crysler Hardcover R4,724 Discovery Miles 47 240
Insectopedia - The Secret World of…
Erik Holm Paperback  (3)
R350 R316 Discovery Miles 3 160
History of the Shuey Family in America…
Dennis Boeshore Shuey Paperback R537 Discovery Miles 5 370
Falling Monuments, Reluctant Ruins - The…
Hilton Judin Paperback R395 R356 Discovery Miles 3 560
Bourgs, Talbots, Youngs, Rappolds…
James A Bourg Jr Hardcover R825 R733 Discovery Miles 7 330
One-dimensional Linear Singular Integral…
Israel Gohberg, Naum IA. Krupnick, … Hardcover R2,632 Discovery Miles 26 320

 

Partners