0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (117)
  • R250 - R500 (229)
  • R500+ (824)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

Privacy and Technologies of Identity - A Cross-Disciplinary Conversation (Hardcover, 2006 ed.): Katherine J. Strandburg,... Privacy and Technologies of Identity - A Cross-Disciplinary Conversation (Hardcover, 2006 ed.)
Katherine J. Strandburg, Daniela Stan Raicu
R4,578 Discovery Miles 45 780 Ships in 10 - 15 working days

Privacy and Technologies of Identity: A Cross-Disciplinary Conversation provides an overview of ways in which technological changes raise privacy concerns. It then addresses four major areas of technology: RFID and location tracking technology; biometric technology, data mining; and issues with anonymity and authentication of identity. Many of the chapters are written with the non-specialist in mind, seeking to educate a diverse audience on the "basics" of the technology and the law and to point out the promise and perils of each technology for privacy. The material in this book provides an interface between legal and policy approaches to privacy and technologies that either threaten or enhance privacy.

This book grew out of the Fall 2004 CIPLIT(r) Symposium on Privacy and Identity: The Promise and Perils of a Technological Age, co-sponsored by DePaul University's College of Law and School of Computer Science, Telecommunications and Information Systems. The Symposium brought together leading researchers in advanced technology and leading thinkers from the law and policy arenas, many of whom have contributed chapters to the book. Like the Symposium, the book seeks to contribute to a conversation among technologists, lawyers, and policymakers about how best to handle the challenges to privacy that arise from recent technological advances.

Data Power - Radical Geographies of Control and Resistance (Hardcover): Jim E. Thatcher, Craig M. Dalton Data Power - Radical Geographies of Control and Resistance (Hardcover)
Jim E. Thatcher, Craig M. Dalton
R2,667 Discovery Miles 26 670 Ships in 10 - 15 working days

In recent years, popular media have inundated audiences with sensationalised headlines recounting data breaches, new forms of surveillance and other dangers of our digital age. Despite their regularity, such accounts treat each case as unprecedented and unique. This book proposes a radical rethinking of the history, present and future of our relations with the digital, spatial technologies that increasingly mediate our everyday lives. From smartphones to surveillance cameras, to navigational satellites, these new technologies offer visions of integrated, smooth and efficient societies, even as they directly conflict with the ways users experience them. Recognising the potential for both control and liberation, the authors argue against both acquiescence to and rejection of these technologies. Through intentional use of the very systems that monitor them, activists from Charlottesville to Hong Kong are subverting, resisting and repurposing geographic technologies. Using examples as varied as writings on the first telephones to the experiences of a feminist collective for migrant women in Spain, the authors present a revolution of everyday technologies. In the face of the seemingly inevitable dominance of corporate interests, these technologies allow us to create new spaces of affinity, and a new politics of change.

Hacking with Kali Linux - Penetration Testing Hacking Bible (Hardcover): Alex Wagner Hacking with Kali Linux - Penetration Testing Hacking Bible (Hardcover)
Alex Wagner
R986 R848 Discovery Miles 8 480 Save R138 (14%) Ships in 10 - 15 working days
Cyber-security of SCADA and Other Industrial Control Systems (Hardcover, 1st ed. 2016): Edward J M Colbert, Alexander Kott Cyber-security of SCADA and Other Industrial Control Systems (Hardcover, 1st ed. 2016)
Edward J M Colbert, Alexander Kott
R3,807 R2,894 Discovery Miles 28 940 Save R913 (24%) Ships in 12 - 19 working days

This book provides a comprehensive overview of the fundamental security of Industrial Control Systems (ICSs), including Supervisory Control and Data Acquisition (SCADA) systems and touching on cyber-physical systems in general. Careful attention is given to providing the reader with clear and comprehensive background and reference material for each topic pertinent to ICS security. This book offers answers to such questions as: Which specific operating and security issues may lead to a loss of efficiency and operation? What methods can be used to monitor and protect my system? How can I design my system to reduce threats?This book offers chapters on ICS cyber threats, attacks, metrics, risk, situational awareness, intrusion detection, and security testing, providing an advantageous reference set for current system owners who wish to securely configure and operate their ICSs. This book is appropriate for non-specialists as well. Tutorial information is provided in two initial chapters and in the beginnings of other chapters as needed. The book concludes with advanced topics on ICS governance, responses to attacks on ICS, and future security of the Internet of Things.

The Data Bank Society (Routledge Revivals) - Organizations, Computers and Social Freedom (Hardcover): Malcolm Warner, Mike Stone The Data Bank Society (Routledge Revivals) - Organizations, Computers and Social Freedom (Hardcover)
Malcolm Warner, Mike Stone
R3,498 R1,449 Discovery Miles 14 490 Save R2,049 (59%) Ships in 12 - 19 working days

This study, written in the context of its first publication in 1970, discusses and documents the invasion of privacy by the corporation and the social institution in the search for efficiency in information processing. Discussing areas such as the impact of the computer on administration, privacy and the storage on information, the authors assess the technical and social feasibility of constructing integrated data banks to cover the details of populations. The book was hugely influential both in terms of scholarship and legislation, and the years following saw the introduction of the Data Protection Act of 1984, which was then consolidated by the Act of 1998. The topics under discussion remain of great concern to the public in our increasingly web-based world, ensuring the continued relevance of this title to academics and students with an interest in data protection and public privacy.

Cyber Law, Privacy, and Security - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover): Information Reso... Cyber Law, Privacy, and Security - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover)
Information Reso Management Association
R10,244 Discovery Miles 102 440 Ships in 10 - 15 working days
Throughput Accounting in a Hyperconnected World (Hardcover): Ionica Oncioiu Throughput Accounting in a Hyperconnected World (Hardcover)
Ionica Oncioiu
R5,264 Discovery Miles 52 640 Ships in 10 - 15 working days

As economies globalize, the number and power of transnational companies increases, especially in developing countries. Relevant, reliable, and comparable financial information and a common business language are needed to ensure communication between all users of financial information. Throughput Accounting in a Hyperconnected World provides innovative insights into controversial debates regarding the configuration and use of accounting and finance information both internally within economic entities and through third parties. These debates underline the major responsibility of users when configuring accounting and finance models and thereby in modelling business information. The content within this publication covers risk analysis, social accounting, and entrepreneurial models and is designed for managers, accountants, risk managers, academics, researchers, practitioners, and students.

Algebraic Aspects of Cryptography (Hardcover, 1st ed. 1998. Corr. 3rd printing 2004): Neal Koblitz Algebraic Aspects of Cryptography (Hardcover, 1st ed. 1998. Corr. 3rd printing 2004)
Neal Koblitz; Appendix by A.J. Menezes, Y.-H. Wu, R.J. Zuccherato
R5,209 Discovery Miles 52 090 Ships in 10 - 15 working days

This is a textbook for a course (or self-instruction) in cryptography with emphasis on algebraic methods. The first half of the book is a self-contained informal introduction to areas of algebra, number theory, and computer science that are used in cryptography. Most of the material in the second half - "hidden monomial" systems, combinatorial-algebraic systems, and hyperelliptic systems - has not previously appeared in monograph form. The Appendix by Menezes, Wu, and Zuccherato gives an elementary treatment of hyperelliptic curves. This book is intended for graduate students, advanced undergraduates, and scientists working in various fields of data security.

Healthcare and Big Data - Digital Specters and Phantom Objects (Hardcover, 1st ed. 2016): Mary F.E. Ebeling Healthcare and Big Data - Digital Specters and Phantom Objects (Hardcover, 1st ed. 2016)
Mary F.E. Ebeling
R3,435 Discovery Miles 34 350 Ships in 12 - 19 working days

This highly original book is an ethnographic noir of how Big Data profits from patient private health information. The book follows personal health data as it is collected from inside healthcare and beyond to create patient consumer profiles that are sold to marketers. Primarily told through a first-person noir narrative, Ebeling as a sociologist-hard-boiled-detective, investigates Big Data and the trade in private health information by examining the information networks that patient data traverses. The noir narrative reveals the processes that the data broker industry uses to create data commodities-data phantoms or the marketing profiles of patients that are bought by advertisers to directly market to consumers. Healthcare and Big Data considers the implications these "data phantoms" have for patient privacy as well as the very real harm that they can cause.

PCI Compliance - Understand and Implement Effective PCI Data Security Standard Compliance (Paperback, 5th edition): Branden... PCI Compliance - Understand and Implement Effective PCI Data Security Standard Compliance (Paperback, 5th edition)
Branden Williams, James Adamson
R1,389 Discovery Miles 13 890 Ships in 12 - 19 working days

Unique selling point: * Industry standard book for merchants, banks, and consulting firms looking to learn more about PCI DSS compliance. Core audience: * Retailers (both physical and electronic), firms who handle credit or debit cards (such as merchant banks and processors), and firms who deliver PCI DSS products and services. Place in the market: * Currently there are no PCI DSS 4.0 books

Advanced Image-Based Spam Detection and Filtering Techniques (Hardcover): Sunita Vikrant Dhavale Advanced Image-Based Spam Detection and Filtering Techniques (Hardcover)
Sunita Vikrant Dhavale
R4,742 Discovery Miles 47 420 Ships in 10 - 15 working days
The Online World, What You Think You Know and What You Don't - 4 Critical Tools for Raising Kids in the Digital Age... The Online World, What You Think You Know and What You Don't - 4 Critical Tools for Raising Kids in the Digital Age (Hardcover)
Rania Mankarious; Foreword by Laura Berman
R768 Discovery Miles 7 680 Ships in 9 - 17 working days
Electronic Warfare in the Information Age (Hardcover): D.C. Schleher Electronic Warfare in the Information Age (Hardcover)
D.C. Schleher
R4,441 Discovery Miles 44 410 Ships in 10 - 15 working days

This is an advanced practitioner's guide to current concepts and threats associated with modern electronic warfare (EW). It identifies and explains the newest radar communications threats, and provides practical, "how-to" information on designing and implementing ECM and ECCM systems. The aim of the text is to help the reader develop ESM systems designed specifically to exploit the vulnerabilities of modern radar. It also identifies and evaluates ESM receiving equipment, and outlines advanced ECM methods, including monopulse deception, coherent radar jamming, and high-ERP generation. Other sections cover modern ECCM countermeasure techniques, the impact of new stealth technology on ESM and ECM requirements, and jammer upgrading procedures.

Cybersecurity for Beginners (Hardcover, 2nd Revised edition): Raef Meeuwisse Cybersecurity for Beginners (Hardcover, 2nd Revised edition)
Raef Meeuwisse
R718 Discovery Miles 7 180 Ships in 12 - 19 working days
Password Logbook (Black & Gold) - Keep Track of Usernames, Passwords, Web Addresses in One Easy and Organized Location... Password Logbook (Black & Gold) - Keep Track of Usernames, Passwords, Web Addresses in One Easy and Organized Location (Hardcover)
Editors of Rock Point
R176 Discovery Miles 1 760 Ships in 12 - 19 working days

Keep track of your online passwords in this elegant, yet inconspicuous, alphabetically tabbed notebook featuring a modern black-and-gold design. In this 4 x 5.75-inch, 128-page hardcover notebook with removable cover band, record the necessarily complex passwords and user login names required to thwart hackers. You'll find: Internet password safety and naming tips A to Z tabbed pages with space to list website, username, and five passwords for each Dedicated pages to record software license information, with spaces for license number, purchase date, renewal date, and monthly fee Dedicated pages to record network settings and passwords, including for modem, router, WAN, LAN, and wireless A notes section with blank lined pages Just say "no" to piles of sticky notes and scraps of paper with your passwords and logins! This internet password logbook provides an easy way to keep track of website addresses, usernames, and passwords in one discreet and convenient location.

The Future of Open Data (Hardcover): Pamela Robinson, Teresa Scassa The Future of Open Data (Hardcover)
Pamela Robinson, Teresa Scassa
R1,307 Discovery Miles 13 070 Ships in 12 - 19 working days

The Future of Open Data flows from a multi-year Social Sciences and Humanities Research Council (SSHRC) Partnership Grant project that set out to explore open government geospatial data from an interdisciplinary perspective. Researchers on the grant adopted a critical social science perspective grounded in the imperative that the research should be relevant to government and civil society partners in the field. This book builds on the knowledge developed during the course of the grant and asks the question, "What is the future of open data?" The contributors' insights into the future of open data combine observations from five years of research about the Canadian open data community with a critical perspective on what could and should happen as open data efforts evolve. Each of the chapters in this book addresses different issues and each is grounded in distinct disciplinary or interdisciplinary perspectives. The opening chapter reflects on the origins of open data in Canada and how it has progressed to the present date, taking into account how the Indigenous data sovereignty movement intersects with open data. A series of chapters address some of the pitfalls and opportunities of open data and consider how the changing data context may impact sources of open data, limits on open data, and even liability for open data. Another group of chapters considers new landscapes for open data, including open data in the global South, the data priorities of local governments, and the emerging context for rural open data.

Iso/Iec 27001 - 2022: An introduction to information security and the ISMS standard (Paperback, Revised ed.): Steve G. Watkins Iso/Iec 27001 - 2022: An introduction to information security and the ISMS standard (Paperback, Revised ed.)
Steve G. Watkins
R482 Discovery Miles 4 820 Ships in 10 - 15 working days

ISO/IEC 27001:2022 - An introduction to information security and the ISMS standardThe perfect introduction to the principles of information security management and ISO 27001:2022An ideal resource for anyone wanting a clear, concise and easy-to-read primer on information security, this pocket guide will ensure the ISMS (information security management system) you put in place is effective, reliable and auditable. Written by an acknowledged expert on the ISO/IEC 27001 standard, ISO/IEC 27001:2022 - An introduction to information security and the ISMS standard is an ideal primer for anyone implementing an ISMS aligned to ISO 27001:2022. This must-have resource gives a clear, concise and easy-to-read introduction to information security, providing guidance to ensure the management systems you put in place are effective, reliable and auditable. This pocket guide will help you to: Make informed decisions - Enables key employees to make better decisions before embarking on an information security project. Ensure everyone is up to speed - Gives the non-specialists on the project board and in the project team a clearer understanding of what an ISMS involves, reflecting ISO 27001:2022. Raise awareness among staff - Ensures that your staff know what is at stake with regard to information security and understand what is expected of them. Enhance your competitiveness - Gives you confidence to begin your ISO 27001:2022 implementation journey and let your customers know that the information you hold about them is managed and protected appropriately. Get up to speed with the ISO 27001:2022 updates and keep your information secure

Recommender Systems in Fashion and Retail - Proceedings of the Fourth Workshop at the Recommender Systems Conference (2022)... Recommender Systems in Fashion and Retail - Proceedings of the Fourth Workshop at the Recommender Systems Conference (2022) (Hardcover, 1st ed. 2023)
Humberto Jesus Corona Pampin, Reza Shirvany
R3,872 Discovery Miles 38 720 Ships in 12 - 19 working days

This book includes the proceedings of the fourth workshop on recommender systems in fashion and retail (2022), and it aims to present a state-of-the-art view of the advancements within the field of recommendation systems with focused application to e-commerce, retail, and fashion by presenting readers with chapters covering contributions from academic as well as industrial researchers active within this emerging new field. Recommender systems are often used to solve different complex problems in this scenario, such as product recommendations, size and fit recommendations, and social media-influenced recommendations (outfits worn by influencers).

Social Engineering - The Science of Human Hacking 2e (Paperback, 2nd Edition): C Hadnagy Social Engineering - The Science of Human Hacking 2e (Paperback, 2nd Edition)
C Hadnagy
R865 R644 Discovery Miles 6 440 Save R221 (26%) Ships in 9 - 17 working days

Harden the human firewall against the most current threats Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire--why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly-used techniques that fool even the most robust security personnel, and shows you how these techniques have been used in the past. The way that we make decisions as humans affects everything from our emotions to our security. Hackers, since the beginning of time, have figured out ways to exploit that decision making process and get you to take an action not in your best interest. This new Second Edition has been updated with the most current methods used by sharing stories, examples, and scientific study behind how those decisions are exploited. Networks and systems can be hacked, but they can also be protected; when the "system" in question is a human being, there is no software to fall back on, no hardware upgrade, no code that can lock information down indefinitely. Human nature and emotion is the secret weapon of the malicious social engineering, and this book shows you how to recognize, predict, and prevent this type of manipulation by taking you inside the social engineer's bag of tricks. Examine the most common social engineering tricks used to gain access Discover which popular techniques generally don't work in the real world Examine how our understanding of the science behind emotions and decisions can be used by social engineers Learn how social engineering factors into some of the biggest recent headlines Learn how to use these skills as a professional social engineer and secure your company Adopt effective counter-measures to keep hackers at bay By working from the social engineer's playbook, you gain the advantage of foresight that can help you protect yourself and others from even their best efforts. Social Engineering gives you the inside information you need to mount an unshakeable defense.

Global Challenges for Identity Policies (Hardcover): E. Whitley, G. Hosein Global Challenges for Identity Policies (Hardcover)
E. Whitley, G. Hosein
R1,555 Discovery Miles 15 550 Ships in 10 - 15 working days

The goals of this book are to provide a comprehensive review of identity policies as they are being implemented in various countries around the world, to consider the key arenas where identity policies are developed and to provide intellectual coherence for making sense of these various activities.

The Cyber Security Handbook - Prepare for, respond to and recover from cyber attacks with the IT Governance Cyber Resilience... The Cyber Security Handbook - Prepare for, respond to and recover from cyber attacks with the IT Governance Cyber Resilience Framework (CRF) (Hardcover)
Alan Calder
R1,753 Discovery Miles 17 530 Ships in 10 - 15 working days

In the world as we know it, you can be attacked both physically and virtually. For today's organisations, which rely so heavily on technology - particularly the Internet - to do business, the latter is the far more threatening of the two. The cyber threat landscape is complex and constantly changing. For every vulnerability fixed, another pops up, ripe for exploitation. This book is a comprehensive cyber security implementation manual which gives practical guidance on the individual activities identified in the IT Governance Cyber Resilience Framework (CRF) that can help organisations become cyber resilient and combat the cyber threat landscape. Suitable for senior directors (CEO, CISO, CIO), compliance managers, privacy managers, IT managers, security analysts and others, the book is divided into six parts: Part 1: Introduction. The world of cyber security and the approach taken in this book. Part 2: Threats and vulnerabilities. A discussion of a range of threats organisations face, organised by threat category, to help you understand what you are defending yourself against before you start thinking about your actual defences. Part 3: The CRF processes. Detailed discussions of each of the 24 CRF processes, explaining a wide range of security areas by process category and offering guidance on how to implement each. Part 4: Eight steps to implementing cyber security. Our eight-step approach to implementing the cyber security processes you need and maintaining them. Part 5: Reference frameworks. An explanation of how standards and frameworks work, along with their benefits. It also presents ten framework options, introducing you to some of the best-known standards and giving you an idea of the range available. Part 6: Conclusion and appendices. The appendices include a glossary of all the acronyms and abbreviations used in this book. Whether you are just starting out on the road to cyber security or looking to enhance and improve your existing cyber resilience programme, it should be clear that cyber security is no longer optional in today's information age; it is an essential component of business success. Make sure you understand the threats and vulnerabilities your organisation faces and how the Cyber Resilience Framework can help you tackle them. Start your journey to cyber security now - buy this book today!

Privacy-Enhanced Business - Adapting to the Online Environment (Hardcover): Curtis D. Frye Privacy-Enhanced Business - Adapting to the Online Environment (Hardcover)
Curtis D. Frye
R2,781 Discovery Miles 27 810 Ships in 10 - 15 working days

With more than 200 million people online and their numbers on the rise, growing also is a perceived threat to personal privacy. A trend toward consumer protective legislation is developing in Europe and shows signs of developing in the U.S. Frye examines the new online environment, the national and international legislative scenarios that could affect the way online business is done, and proposes steps that would allow organizations to determine the policies best for themselves within privacy-enhanced environments. He lays out the privacy interests and concerns of Internet users in the context of privacy laws in Europe, Canada, and the U.S. Then, without demonizing or lionizing them, he looks impartially at how corporations could and might have to function under a variety of likely legislations. Frye's book, among the first to attempt the task, is a timely, much needed advisory-and warning-for top echelon executives in the public and private sectors both, particularly in marketing and sales, areas where privacy activists are concentrating their efforts. It is also an important source of information and thought for academics and their graduate-level students.

Frye introduces the Internet as a social and technological phenomenon by recounting briefly the early days of its predecessor, ARPANet. In the next chapters he fills in the policy background from a legal standpoint, explaining the thrust toward privacy that emerged through Supreme Court and lower court decisions. He then examines Internet economics, and from there turns to Internet-based advertising. He also covers the controversy over cookies and shows what Web users can do to visit Web sites without leaving crumbs. He introduces the infomediary, a type of organization that could allow consumers to maintain anonymity while still granting businesses access to detailed demographic and behavioral information. Frye describes a range of scenarios that could be played out over the next decade and offers specific steps that organizations can take to improve consumer confidence, maintain the flow of information they need, yet still demonstrate their compliance with consumer expectations as well as the law. Two appendices contain the full text of two documents vital to senior managers mapping their own corporate strategies: the European Union Data Directive and an EU Work Paper on the use of contracts to ensure the security of personally identifiable information that is transferred from the EU to other countries, such as the U.S., that lack their own adequate protections.

Storage Management in Data Centers - Understanding, Exploiting, Tuning, and Troubleshooting Veritas Storage Foundation... Storage Management in Data Centers - Understanding, Exploiting, Tuning, and Troubleshooting Veritas Storage Foundation (Hardcover, 2009 ed.)
Volker Herminghaus, Albrecht Scriba
R2,445 R1,785 Discovery Miles 17 850 Save R660 (27%) Ships in 12 - 19 working days

Storage Management in Data Centers helps administrators tackle the complexity of data center mass storage. It shows how to exploit the potential of Veritas Storage Foundation by conveying information about the design concepts of the software as well as its architectural background. Rather than merely showing how to use Storage Foundation, it explains why to use it in a particular way, along with what goes on inside. Chapters are split into three sections: An introductory part for the novice user, a full-featured part for the experienced, and a technical deep dive for the seasoned expert. An extensive troubleshooting section shows how to fix problems with volumes, plexes, disks and disk groups. A snapshot chapter gives detailed instructions on how to use the most advanced point-in-time copies. A tuning chapter will help you speed up and benchmark your volumes. And a special chapter on split data centers discusses latency issues as well as remote mirroring mechanisms and cross-site volume maintenance. All topics are covered with the technical know how gathered from an aggregate thirty years of experience in consulting and training in data centers all over the world.

Linking Sensitive Data - Methods and Techniques for Practical Privacy-Preserving Information Sharing (Hardcover, 1st ed. 2020):... Linking Sensitive Data - Methods and Techniques for Practical Privacy-Preserving Information Sharing (Hardcover, 1st ed. 2020)
Peter Christen, Thilina Ranbaduge, Rainer Schnell
R4,610 Discovery Miles 46 100 Ships in 12 - 19 working days

This book provides modern technical answers to the legal requirements of pseudonymisation as recommended by privacy legislation. It covers topics such as modern regulatory frameworks for sharing and linking sensitive information, concepts and algorithms for privacy-preserving record linkage and their computational aspects, practical considerations such as dealing with dirty and missing data, as well as privacy, risk, and performance assessment measures. Existing techniques for privacy-preserving record linkage are evaluated empirically and real-world application examples that scale to population sizes are described. The book also includes pointers to freely available software tools, benchmark data sets, and tools to generate synthetic data that can be used to test and evaluate linkage techniques. This book consists of fourteen chapters grouped into four parts, and two appendices. The first part introduces the reader to the topic of linking sensitive data, the second part covers methods and techniques to link such data, the third part discusses aspects of practical importance, and the fourth part provides an outlook of future challenges and open research problems relevant to linking sensitive databases. The appendices provide pointers and describe freely available, open-source software systems that allow the linkage of sensitive data, and provide further details about the evaluations presented. A companion Web site at https://dmm.anu.edu.au/lsdbook2020 provides additional material and Python programs used in the book. This book is mainly written for applied scientists, researchers, and advanced practitioners in governments, industry, and universities who are concerned with developing, implementing, and deploying systems and tools to share sensitive information in administrative, commercial, or medical databases. The Book describes how linkage methods work and how to evaluate their performance. It covers all the major concepts and methods and also discusses practical matters such as computational efficiency, which are critical if the methods are to be used in practice - and it does all this in a highly accessible way!David J. Hand, Imperial College, London

Security and Privacy of Electronic Healthcare Records - Concepts, paradigms and solutions (Hardcover): Sudeep Tanwar, Sudhanshu... Security and Privacy of Electronic Healthcare Records - Concepts, paradigms and solutions (Hardcover)
Sudeep Tanwar, Sudhanshu Tyagi, Neeraj Kumar
R3,731 R3,360 Discovery Miles 33 600 Save R371 (10%) Ships in 10 - 15 working days

Hospitals, medical practices and healthcare organizations are implementing new technologies at breakneck speed. Yet privacy and security considerations are often an afterthought, putting healthcare organizations at risk of data security and privacy issues, fines, damage to their reputations, with serious potential consequences for the patients. Electronic Health Record systems (EHRs) consist of clinical notes, patient listings, lab results, imaging results and screening tests. EHRs are growing in complexity over time and requiring increasing amounts of data storage. With the development of the IoT, the Cloud and Smart Cities frameworks, new privacy and security methods are being pursued to secure healthcare-based systems and platforms. Presenting a detailed framework as well as comparative case studies for security protection, data integrity, privacy preservation, scalability, and healthcare legislation, this edited volume covers state of the art research and addresses privacy and security methods and technologies for EHRs.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
X-Kit Presteer Essensiele Verwysings…
M Peacock, R. Scheepers, … Paperback  (2)
R202 Discovery Miles 2 020
George Du Maurier: Illustrator, Author…
Simon Cooke, Paul Goldman Paperback R1,525 Discovery Miles 15 250
Operator Theory in Different Settings…
Roland Duduchava, Marinus A. Kaashoek, … Hardcover R4,362 Discovery Miles 43 620
XAFS Techniques for Catalysts…
Yasuhiro Iwasawa, Kiyotaka Asakura, … Hardcover R7,695 Discovery Miles 76 950
Engaging Audiences - A Cognitive…
B McConachie Hardcover R1,296 R1,076 Discovery Miles 10 760
Distributed Fuzzy Control of…
Alexander Gegov Hardcover R2,987 Discovery Miles 29 870
The Circle of Our Vision - Dante's…
Ralph Pite Hardcover R1,587 Discovery Miles 15 870
An Introduction to Semiclassical and…
Andre Bach Hardcover R2,630 Discovery Miles 26 300
Ruskin, the Theatre and Victorian Visual…
A. Heinrich, K. Newey, … Hardcover R1,522 Discovery Miles 15 220
Differential Equations with Linear…
Matthew R. Boelkins, Jack L. Goldberg, … Hardcover R3,047 Discovery Miles 30 470

 

Partners