0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (181)
  • R250 - R500 (209)
  • R500+ (794)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

Net Privacy - How We Can Be Free in an Age of Surveillance (Hardcover): Sacha Molitorisz Net Privacy - How We Can Be Free in an Age of Surveillance (Hardcover)
Sacha Molitorisz
R3,122 R2,834 Discovery Miles 28 340 Save R288 (9%) Ships in 12 - 17 working days

In our digital world, we are confused by privacy - what is public, what is private? We are also challenged by it, the conditions of privacy so uncertain we become unsure about our rights to it. We may choose to share personal information, but often do so on the assumption that it won't be re-shared, sold, or passed on to other parties without our knowing. In the eighteenth century, philosopher Jeremy Bentham wrote about a new model for a prison called a Panopticon, where inmates surrounded the jailers, always under watch. Have we built ourselves a digital Panopticon? Are we the guards or the prisoners, captive or free? Can we be both? When Kim Kardashian makes the minutiae of her life available online, which is she? With great rigour, this important book draws on a Kantian philosophy of ethics and legal frameworks to examine where we are and to suggest steps - conceptual and practical - to ensure the future is not dystopian. Privacy is one of the defining issues of our time; this lively book explains why this is so, and the ways in which we might protect it.

Computer and Information Security Handbook (Hardcover, 3rd edition): John Vacca Computer and Information Security Handbook (Hardcover, 3rd edition)
John Vacca
R3,259 R2,768 Discovery Miles 27 680 Save R491 (15%) Ships in 12 - 17 working days

Computer and Information Security Handbook, Third Edition, provides the most current and complete reference on computer security available in one volume. The book offers deep coverage of an extremely wide range of issues in computer and cybersecurity theory, applications, and best practices, offering the latest insights into established and emerging technologies and advancements. With new parts devoted to such current topics as Cloud Security, Cyber-Physical Security, and Critical Infrastructure Security, the book now has 100 chapters written by leading experts in their fields, as well as 12 updated appendices and an expanded glossary. It continues its successful format of offering problem-solving techniques that use real-life case studies, checklists, hands-on exercises, question and answers, and summaries. Chapters new to this edition include such timely topics as Cyber Warfare, Endpoint Security, Ethical Hacking, Internet of Things Security, Nanoscale Networking and Communications Security, Social Engineering, System Forensics, Wireless Sensor Network Security, Verifying User and Host Identity, Detecting System Intrusions, Insider Threats, Security Certification and Standards Implementation, Metadata Forensics, Hard Drive Imaging, Context-Aware Multi-Factor Authentication, Cloud Security, Protecting Virtual Infrastructure, Penetration Testing, and much more. Online chapters can also be found on the book companion website: https://www.elsevier.com/books-and-journals/book-companion/9780128038437

Cybersecurity Awareness Among Students and Faculty (Hardcover): Abbas Moallem Cybersecurity Awareness Among Students and Faculty (Hardcover)
Abbas Moallem
R1,624 Discovery Miles 16 240 Ships in 12 - 17 working days

Recipient of the SJSU San Jose State University Annual Author & Artist Awards 2019 In modern times, all individuals need to be knowledgeable about cybersecurity. They must have practical skills and abilities to protect themselves in cyberspace. What is the level of awareness among college students and faculty, who represent the most technologically active portion of the population in any society? According to the Federal Trade Commission's 2016 Consumer Sentinel Network report, 19 percent of identity theft complaints came from people under the age of 29. About 74,400 young adults fell victim to identity theft in 2016. This book reports the results of several studies that investigate student and faculty awareness and attitudes toward cybersecurity and the resulting risks. It proposes a plan of action that can help 26,000 higher education institutions worldwide with over 207 million college students, create security policies and educational programs that improve security awareness and protection. Features Offers an understanding of the state of privacy awareness Includes the state of identity theft awareness Covers mobile phone protection Discusses ransomware protection Discloses a plan of action to improve security awareness

Analyzing and Securing Social Networks (Hardcover): Bhavani Thuraisingham, Satyen Abrol, Raymond Heatherly, Murat Kantarcioglu,... Analyzing and Securing Social Networks (Hardcover)
Bhavani Thuraisingham, Satyen Abrol, Raymond Heatherly, Murat Kantarcioglu, Vaibhav Khadilkar, …
R3,522 Discovery Miles 35 220 Ships in 12 - 17 working days

Analyzing and Securing Social Networks focuses on the two major technologies that have been developed for online social networks (OSNs): (i) data mining technologies for analyzing these networks and extracting useful information such as location, demographics, and sentiments of the participants of the network, and (ii) security and privacy technologies that ensure the privacy of the participants of the network as well as provide controlled access to the information posted and exchanged by the participants. The authors explore security and privacy issues for social media systems, analyze such systems, and discuss prototypes they have developed for social media systems whose data are represented using semantic web technologies. These experimental systems have been developed at The University of Texas at Dallas. The material in this book, together with the numerous references listed in each chapter, have been used for a graduate-level course at The University of Texas at Dallas on analyzing and securing social media. Several experimental systems developed by graduate students are also provided. The book is divided into nine main sections: (1) supporting technologies, (2) basics of analyzing and securing social networks, (3) the authors' design and implementation of various social network analytics tools, (4) privacy aspects of social networks, (5) access control and inference control for social networks, (6) experimental systems designed or developed by the authors on analyzing and securing social networks, (7) social media application systems developed by the authors, (8) secure social media systems developed by the authors, and (9) some of the authors' exploratory work and further directions.

This Machine Kills Secrets - Julian Assange, the Cypherpunks, and Their Fight to Empower Whistleblowers (Paperback): Andy... This Machine Kills Secrets - Julian Assange, the Cypherpunks, and Their Fight to Empower Whistleblowers (Paperback)
Andy Greenberg
R430 R383 Discovery Miles 3 830 Save R47 (11%) Ships in 10 - 15 working days

Who Are The Cypherpunks?
This is the unauthorized telling of the revolutionary cryptography story behind the motion picture "The Fifth Estate "in theatres this October, and "We Steal Secrets: The Story of Wikileaks," a documentary out now.
WikiLeaks brought to light a new form of whistleblowing, using powerful cryptographic code to hide leakers' identities while they spill the private data of government agencies and corporations. But that technology has been evolving for decades in the hands of hackers and radical activists, from the libertarian enclaves of Northern California to Berlin to the Balkans. And the secret-killing machine continues to evolve beyond WikiLeaks, as a movement of hacktivists aims to obliterate the world's institutional secrecy.
"Forbes "journalist Andy Greenberg has traced its shadowy history from the cryptography revolution of the 1970s to Wikileaks founding hacker Julian Assange, Anonymous, and beyond.
This is the story of the code and the characters--idealists, anarchists, extremists--who are transforming the next generation's notion of what activism can be.
With unrivaled access to such major players as Julian Assange, Daniel Domscheit-Berg, and WikiLeaks' shadowy engineer known as the Architect, never before interviewed, Greenberg unveils the world of politically-motivated hackers--who they are and how they operate.

Computer Misuse - Response, Regulation and the Law (Hardcover, New): Stefan Fafinski Computer Misuse - Response, Regulation and the Law (Hardcover, New)
Stefan Fafinski
R3,898 Discovery Miles 38 980 Ships in 12 - 17 working days

This book is concerned with the nature of computer misuse and the legal and extra-legal responses to it. It explores what is meant by the term 'computer misuse' and charts its emergence as a problem as well as its expansion in parallel with the continued progression in computing power, networking, reach and accessibility. In doing so, it surveys the attempts of the domestic criminal law to deal with some early manifestations of computer misuse and the consequent legislative passage of the Computer Misuse Act 1990.

This book will be of interest to students of IT law as well as to sociologists and criminologists, and those who have a professional concern with preventing computer misuse and fraud.

Comptia Security+ Sy0-501 Pearson Ucertify Course and Labs and Textbook Bundle (Hardcover, 2nd ed.): David L. Prowse, uCertify Comptia Security+ Sy0-501 Pearson Ucertify Course and Labs and Textbook Bundle (Hardcover, 2nd ed.)
David L. Prowse, uCertify
R4,335 Discovery Miles 43 350 Out of stock
Deterring Cybertrespass and Securing Cyberspace: Lessons from United States Border Control Strategies - Lessons from United... Deterring Cybertrespass and Securing Cyberspace: Lessons from United States Border Control Strategies - Lessons from United States Border Control Strategies (Paperback)
Mary Manjikian
R371 Discovery Miles 3 710 Out of stock
Private Lives and Public Policies - Confidentiality and Accessibility of Government Statistics (Paperback): National Research... Private Lives and Public Policies - Confidentiality and Accessibility of Government Statistics (Paperback)
National Research Council, Division of Behavioral and Social Sciences and Education, Commission on Behavioral and Social Sciences and Education, Panel on Confidentiality and Data Access; Edited by Virginia A De Wolf, …
R1,732 R1,347 Discovery Miles 13 470 Save R385 (22%) Out of stock

Americans are increasingly concerned about the privacy of personal data?yet we demand more and more information for public decision making. This volume explores the seeming conflicts between privacy and data access, an issue of concern to federal statistical agencies collecting the data, research organizations using the data, and individuals providing the data. A panel of experts offers principles and specific recommendations for managing data and improving the balance between needed government use of data and the privacy of respondents. The volume examines factors such as the growth of computer technology, that are making confidentiality an increasingly critical problem. The volume explores how data collectors communicate with data providers, with a focus on informed consent to use data, and describes the legal and ethical obligations data users have toward individual subjects as well as toward the agencies providing the data. In the context of historical practices in the United States, Canada, and Sweden, statistical techniques for protecting individuals' identities are evaluated in detail. Legislative and regulatory restraints on access to data are examined, including a discussion about their effects on research. This volume will be an important and thought-provoking guide for policymakers and agencies working with statistics as well as researchers and concerned individuals. Table of Contents Front Matter Executive Summary 1 Principles and Problems 2 The Framework of Study 3 Data Subjects 4 Data Users 5 Legislation 6 Technical and Administrative Procedures 7 Statistical Data on Organizations 8 Managing Confidentiality and Data Access Functions Recommendations References Appendix A: Study Procedures Appendix B: Biographical Sketches Index

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Privacy-Preserving in Edge Computing
Longxiang Gao, Tom H. Luan, … Hardcover R3,937 Discovery Miles 39 370
Your Safety and Privacy Online - The CIA…
Siggi Bjarnason Hardcover R564 R479 Discovery Miles 4 790
Pandemic Surveillance - Privacy…
Margaret Hu Hardcover R2,865 Discovery Miles 28 650
Pegasus - The Story Of The World's Most…
Laurent Richard, Sandrine Rigaud Paperback R385 R301 Discovery Miles 3 010
Research Handbook on Privacy and Data…
Gloria Gonzalez, Rosamunde van Brakel, … Hardcover R6,101 Discovery Miles 61 010
EU General Data Protection Regulation…
It Governance Privacy Team Paperback R738 Discovery Miles 7 380
#Myprivacy #Myright - Protect It While…
Robin M Singh Hardcover R500 Discovery Miles 5 000
Identified, Tracked, and Profiled - The…
Peter Dauvergne Hardcover R2,127 Discovery Miles 21 270
Permanent Record
Edward Snowden Paperback R299 R234 Discovery Miles 2 340
Smart-Tech Society - Convenience…
Mark Whitehead, William G.A. Collier Hardcover R2,732 Discovery Miles 27 320

 

Partners