![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection
This book extends the work from introduction of ubiquitous computing, to the Internet of things to security and to privacy aspects of ubiquitous computing. The uniqueness of this book is the combination of important fields like the Internet of things and ubiquitous computing. It assumes that the readers' goal is to achieve a complete understanding of IoT, smart computing, security issues, challenges and possible solutions. It is not oriented towards any specific use cases and security issues; privacy threats in ubiquitous computing problems are discussed across various domains. This book is motivating to address privacy threats in new inventions for a wide range of stakeholders like layman to educated users, villages to metros and national to global levels. This book contains numerous examples, case studies, technical descriptions, scenarios, procedures, algorithms and protocols. The main endeavour of this book is threat analysis and activity modelling of attacks in order to give an actual view of the ubiquitous computing applications. The unique approach will help readers for a better understanding.
This handbook presents state-of-the-art research in reinforcement learning, focusing on its applications in the control and game theory of dynamic systems and future directions for related research and technology. The contributions gathered in this book deal with challenges faced when using learning and adaptation methods to solve academic and industrial problems, such as optimization in dynamic environments with single and multiple agents, convergence and performance analysis, and online implementation. They explore means by which these difficulties can be solved, and cover a wide range of related topics including: deep learning; artificial intelligence; applications of game theory; mixed modality learning; and multi-agent reinforcement learning. Practicing engineers and scholars in the field of machine learning, game theory, and autonomous control will find the Handbook of Reinforcement Learning and Control to be thought-provoking, instructive and informative.
A Wall Street Journal Bestseller 'IT SHOULD BE READ BY ANYONE TRYING TO MAKE SENSE OF GEOPOLITICS TODAY' FINANCIAL TIMES Three of our most accomplished and deep thinkers come together to explore Artificial Intelligence (AI) and the way it is transforming human society - and what it means for us all. An AI learned to win chess by making moves human grand masters had never conceived. Another AI discovered a new antibiotic by analysing molecular properties human scientists did not understand. Now, AI-powered jets are defeating experienced human pilots in simulated dogfights. AI is coming online in searching, streaming, medicine, education, and many other fields and, in so doing, transforming how humans are experiencing reality. In The Age of AI, three leading thinkers have come together to consider how AI will change our relationships with knowledge, politics, and the societies in which we live. The Age of AI is an essential roadmap to our present and our future, an era unlike any that has come before.
Understand the CCPA (California Consumer Privacy Act) and how to implement strategies to comply with this privacy regulation. Established in June 2018, the CCPA was created to remedy the lack of comprehensive privacy regulation in the state of California. When it comes into effect on January 1, 2020, the CCPA will give California residents the right to: Learn what personal data a business has collected about them Understand who this data has been disclosed to Find out whether their personal data has been sold to third parties, and who these third parties are Opt-out of such data transactions, or request that the data be deleted. Many organizations that do business in the state of California must align to the provisions of the CCPA. Much like the EU's GDPR (General Data Protection Regulation), businesses that fail to comply with the CCPA will face economic penalties. Prepare your business for CCPA compliance with our implementation guide that: Provides the reader with a comprehensive understanding of the legislation by explaining key terms Explains how a business can implement strategies to comply with the CCPA Discusses potential developments of the CCPA to further aid compliance Your guide to understanding the CCPA and how you can implement a strategy to comply with this legislation - buy this book today to get the guidance you need! About the author Preston Bukaty is an attorney and consultant. He specializes in data privacy GRC projects, from data inventory audits to gap analyses, contract management, and remediation planning. His compliance background and experience operationalizing compliance in a variety of industries give him a strong understanding of the legal issues presented by international regulatory frameworks. Having conducted more than 3,000 data mapping audits, he also understands the practical realities of project management in operationalizing compliance initiatives. Preston's legal experience and enthusiasm for technology make him uniquely suited to understanding the business impact of privacy regulations such as the GDPR and the CCPA. He has advised more than 250 organizations engaged in businesses as varied as SaaS platforms, mobile geolocation applications, GNSS/telematics tools, financial institutions, fleet management software, architectural/engineering design systems, and web hosting. He also teaches certification courses on GDPR compliance and ISO 27001 implementation, and writes on data privacy law topics. Preston lives in Denver, Colorado. Prior to working as a data privacy consultant, he worked for an international GPS software company, advising business areas on compliance issues across 140 countries. Preston holds a juris doctorate from the University of Kansas School of Law, along with a basketball signed by Hall of Fame coach Bill Self.
This book addresses one of the most overlooked practical, methodological, and moral questions in the journey to secure and handle the massive amount of data being generated from smart devices interactions: the integration of Blockchain with 5G-enabled IoT. After an overview, this book discusses open issues and challenges, which may hinder the growth of Blockchain technology. Then, this book presents a variety of perspectives on the most pressing questions in the field, such as: how IoT can connect billions of objects together; how the access control mechanisms in 5G-enabled industrial environment works; how to address the real-time and quality-of-service requirements for industrial applications; and how to ensure scalability and computing efficiency. Also, it includes a detailed discussions on the complexity of adoption of Blockchain for 5G-Enabled IoT and presents comparative case studies with respect to various performance evaluation metrics such as scalability, data management, standardization, interoperability and regulations, accessibility, human-factors engineering and interfaces, reliability, heterogeneity, and QoS requirements. This book acts as a professional guide for the practitioners in information security and related topics.
This book provides extensive insights on blockchain systems, starting from a historical perspective and moving towards building foundational knowledge, with focus on communication networks. It covers blockchain applications, algorithms, architectures, design and implementation, and security and privacy issues, providing the reader with a comprehensive overview. Further, it discusses blockchain systems and its integration to communication networks. The book includes hands-on, practical tutorials, self-assessment exercises, and review questions; tips and sample programs are also provided throughout. Complementary supporting material for instructors, including open source programming code for practical tutorials and exercises, is also available. The target audience includes graduate students, professionals, and researchers working in the areas of blockchain systems, distributed ledger technology, computer networks and communications, artificial intelligence, and cybersecurity.
This book introduces the state-of-the-art algorithms for data and computation privacy. It mainly focuses on searchable symmetric encryption algorithms and privacy preserving multi-party computation algorithms. This book also introduces algorithms for breaking privacy, and gives intuition on how to design algorithm to counter privacy attacks. Some well-designed differential privacy algorithms are also included in this book. Driven by lower cost, higher reliability, better performance, and faster deployment, data and computing services are increasingly outsourced to clouds. In this computing paradigm, one often has to store privacy sensitive data at parties, that cannot fully trust and perform privacy sensitive computation with parties that again cannot fully trust. For both scenarios, preserving data privacy and computation privacy is extremely important. After the Facebook-Cambridge Analytical data scandal and the implementation of the General Data Protection Regulation by European Union, users are becoming more privacy aware and more concerned with their privacy in this digital world. This book targets database engineers, cloud computing engineers and researchers working in this field. Advanced-level students studying computer science and electrical engineering will also find this book useful as a reference or secondary text.
This book presents high-quality research papers presented at the International Conference on Smart Computing and Cyber Security: Strategic Foresight, Security Challenges and Innovation (SMARTCYBER 2020) held during July 7-8, 2020, in the Department of Smart Computing, Kyungdong University, Global Campus, South Korea. The book includes selected works from academics and industrial experts in the field of computer science, information technology, and electronics and telecommunication. The content addresses challenges of cyber security.
Vital to the effective functioning of voluntary organisations is the trust of people - the beneficiaries, clients, regulators, donors, volunteers and paid staff. Open, fair and well-managed data protection practice is not just desirable in helping to achieve that trust, but essential. Get it wrong and there is reputational damage and costs attached. Data Protection for voluntary organisations will enable you to set a shining example of best practice and also comply with UK data legislation and the General Data Protection Regulation (GDPR) in force since 2018. This book will help you: * Understand the key principles and elements of data protection * Recognise your main responsibilities as a data controller * Distinguish when you can and can't retain data * Appreciate what the rights of the data subject are Who is this book for? A must-read for anyone in the UK voluntary sector who wants to get beyond tick-box data management. Invaluable to data managers or those who handle personal information such as IT, personnel, marketing and fundraising departments. For professional advisers, and academics it will also offers a valuable summary drawing out key data protection points by examining and interpreting the primary legislation.
Features In-depth coverage of the role of AI in smart healthcare. Research guideline for AI and data science researchers/practitioners interested in the healthcare sector. Comprehensive coverage on security and privacy issues for AI in smart healthcare.
This book takes a holistic view of the roles of ICTs during the pandemic through the lens of social informatics, as it is critical to our understanding of the relations between society and technology. Specific attention is given to various stakeholders and social contexts, with analysis at the individual, group, community, and society levels. Pushing the boundaries of information science research with timely and critical research questions, this edited volume showcases information science research in the context of COVID-19, by specifically accentuating sociotechnical practices, activities, and ICT interventions during the pandemic. Its social informatics focus appeals to a broad audience, and its global and international orientation provides a timely, innovative, and much-needed perspective to information science. This book is unique in its interdisciplinary nature as it consists of research studies on the intersections between ICTs and health, culture, social interaction, civic engagement, information dissemination, work, and education. Chapters apply a range of research methods, including questionnaire surveys, content analyses, and case studies from countries in Asia, Europe, and America, as well as global and international comparisons. The book's primary target audience includes scholars and students in information and library science, particularly those interested in the social aspect of the information society. It may be of interest to information professionals, library practitioners, educators, and information policymakers, as well as scholars and students in science and technology studies, cultural studies, political science, public administration, sociology, and communication studies.
Ubiquitous computing (ubicomp) is about networked microprocessors embedded in everyday objects: not just cellphones and home appliances but also books, bookshelves, bus stops and bathtubs. This future is closer than you might imagine. The insecurity of networked PCs is notorious. If we deployed ubicomp systems as vulnerable as PCs, the risks for society would be catastrophic. How can we do better, and what are the new problems? In a very accessible style, this book provides a coherent framework to make sense of the many issues at stake. Features include:
This book discusses the main legal and economic challenges to the creation and enforcement of security rights in intellectual property and explores possible avenues of reform, such as more specific rules for security in IP rights and better coordination between intellectual property law and secured transactions law. In the context of business financing, intellectual property rights are still only reluctantly used as collateral, and on a small scale. If they are used at all, it is mostly done in the form of a floating charge or some other "all-asset" security right. The only sector in which security rights in intellectual property play a major role, at least in some jurisdictions, is the financing of movies. On the other hand, it is virtually undisputed that security rights in intellectual property could be economically valuable, or even crucial, for small and medium-sized enterprises - especially for start-ups, which are often very innovative and creative, but have limited access to corporate financing and must rely on capital markets (securitization, capital market). Therefore, they need to secure bank loans, yet lack their own traditional collateral, such as land.
Software Security: Concepts & Practices is designed as a textbook and explores fundamental security theories that govern common software security technical issues. It focuses on the practical programming materials that will teach readers how to implement security solutions using the most popular software packages. It's not limited to any specific cybersecurity subtopics and the chapters touch upon a wide range of cybersecurity domains, ranging from malware to biometrics and more. Features The book presents the implementation of a unique socio-technical solution for real-time cybersecurity awareness. It provides comprehensible knowledge about security, risk, protection, estimation, knowledge and governance. Various emerging standards, models, metrics, continuous updates and tools are described to understand security principals and mitigation mechanism for higher security. The book also explores common vulnerabilities plaguing today's web applications. The book is aimed primarily at advanced undergraduates and graduates studying computer science, artificial intelligence and information technology. Researchers and professionals will also find this book useful.
This book addresses privacy in dynamical systems, with applications to smart metering, traffic estimation, and building management. In the first part, the book explores statistical methods for privacy preservation from the areas of differential privacy and information-theoretic privacy (e.g., using privacy metrics motivated by mutual information, relative entropy, and Fisher information) with provable guarantees. In the second part, it investigates the use of homomorphic encryption for the implementation of control laws over encrypted numbers to support the development of fully secure remote estimation and control. Chiefly intended for graduate students and researchers, the book provides an essential overview of the latest developments in privacy-aware design for dynamical systems.
Updates content and introduces topics such as business changes and outsourcing. Addresses new cyber security risks such as IoT and Distributed Networks (i.e., blockchain). Covers strategy based on the OODA loop in the cycle. Demonstrates application of the concepts through short case studies of real-world incidents chronologically delineating related events. Discusses certifications and reference manuals in cyber security and digital forensics. Includes an entire chapter on tools used by professionals in the field.
** Featured as a Guardian Long Read ** '[A] fast-paced, myth busting expose' Max Blumenthal, author of The Management of Savagery 'Contentious... forceful... salutary' The New Yorker EVERYTHING WE HAVE BEEN TOLD ABOUT THE DEMOCRATIC NATURE OF THE INTERNET IS A MARKETING PLOY. As the Cambridge Analytica scandal has shown, private corporations consider it their right to use our data (and by extension, us) which ever way they see fit. Tempted by their appealing organisational and diagnostic tools, we have allowed private internet corporations access to the most intimate corners of our lives. But the internet was developed, from the outset, as a weapon. Looking at the hidden origins of many internet corporations and platforms, Levine shows that this is a function, not a bug of the online experience. Conceived as a surveillance tool by ARPA to control insurgents in the Vietnam War, the internet is now essential to our lives. This book investigates the troubling and unavoidable truth of its history and the unfathomable power of the corporations who now more or less own it. Without this book, your picture of contemporary society will be missing an essential piece of the puzzle. 'A masterful job of research and reporting about the military origins of the 'world wide web' and how its essential nature has not changed in the years since its creation during the Cold War.' - Tim Shorrock, author of Spies For Hire
Unique selling point: * Gain practical tools to solve complex data privacy and security subjects for different business use cases and types of data. Core audience: * Suited to anyone in a CISOs, CSOs, CPOs, CDOs, CTOs, auditors, consultants, investors, and other people interested in data privacy and security. Place in the market: * Tackles the critical skills needed to succeed in the evolving landscape of regulations and data breaches.
This work aims at understanding behavior around location information, including why users share such information, why they protect the data, and what kind of other factors influence the decision to behave in a certain way. This book explores privacy in the context of location data, and answers questions such as what are the privacy related behaviors in this context, and what are the factors influencing such behaviors. The book gives an overview to what privacy means for users in terms of understandings, attitudes and valuations. This book discusses reasons for why research around this topic is challenging, and presents various methods for diving into the topic through empirical studies. The work is relevant for professionals, researchers, and users of technology.
As information processing continues to move toward an open systems environment, the advantages of authentication and key distribution systems over traditional passwords are becoming more and more evident. In this timely guide for computer scientists, electrical engineers, and networking specialists, author Rolf Oppliger explains and compares the various authentication and key distribution systems available today, including Kerberos, NetSP, SPX, TESS, and SESAME. The book explores the cryptographic techniques used for these systems - and shows how to use them to provide the best security for your network.
This book is for anyone who wants to gain an understanding of Blockchain technology and its potential. The book is research-oriented and covers different verticals of Blockchain technology. It discusses the characteristics and features of Blockchain, includes techniques, challenges, and future trends, along with case studies for deeper understanding. Blockchain Technology: Exploring Opportunities, Challenges, and Applications covers the core concepts related to Blockchain technology starting from scratch. The algorithms, concepts, and application areas are discussed according to current market trends and industry needs. It presents different application areas of industry and academia and discusses the characteristics and features of this technology. It also explores the challenges and future trends and provides an understanding of new opportunities. This book is for anyone at the beginner to intermediate level that wants to learn about the core concepts related to Blockchain technology. |
You may like...
The COVID-19 Pandemic and the…
Floribert Patrick Calvain Endong
Hardcover
R5,848
Discovery Miles 58 480
Cellular Internet of Things - From…
Olof Liberg, Marten Sundberg, …
Paperback
R2,403
Discovery Miles 24 030
Cross-Layer Resource Allocation in…
Ana I. Perez-Neira, Marc Realp Campalans
Hardcover
R1,930
Discovery Miles 19 300
Microwave Wireless Communications - From…
Antonio Raffo, Giovanni Crupi
Hardcover
R2,693
Discovery Miles 26 930
Advances in Analog and RF IC Design for…
Gabriele Manganaro, Domine M. W Leenaerts
Hardcover
R2,347
Discovery Miles 23 470
|