0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (158)
  • R250 - R500 (194)
  • R500+ (825)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

Privacy-Enhanced Business - Adapting to the Online Environment (Hardcover): Curtis D. Frye Privacy-Enhanced Business - Adapting to the Online Environment (Hardcover)
Curtis D. Frye
R2,781 Discovery Miles 27 810 Ships in 10 - 15 working days

With more than 200 million people online and their numbers on the rise, growing also is a perceived threat to personal privacy. A trend toward consumer protective legislation is developing in Europe and shows signs of developing in the U.S. Frye examines the new online environment, the national and international legislative scenarios that could affect the way online business is done, and proposes steps that would allow organizations to determine the policies best for themselves within privacy-enhanced environments. He lays out the privacy interests and concerns of Internet users in the context of privacy laws in Europe, Canada, and the U.S. Then, without demonizing or lionizing them, he looks impartially at how corporations could and might have to function under a variety of likely legislations. Frye's book, among the first to attempt the task, is a timely, much needed advisory-and warning-for top echelon executives in the public and private sectors both, particularly in marketing and sales, areas where privacy activists are concentrating their efforts. It is also an important source of information and thought for academics and their graduate-level students.

Frye introduces the Internet as a social and technological phenomenon by recounting briefly the early days of its predecessor, ARPANet. In the next chapters he fills in the policy background from a legal standpoint, explaining the thrust toward privacy that emerged through Supreme Court and lower court decisions. He then examines Internet economics, and from there turns to Internet-based advertising. He also covers the controversy over cookies and shows what Web users can do to visit Web sites without leaving crumbs. He introduces the infomediary, a type of organization that could allow consumers to maintain anonymity while still granting businesses access to detailed demographic and behavioral information. Frye describes a range of scenarios that could be played out over the next decade and offers specific steps that organizations can take to improve consumer confidence, maintain the flow of information they need, yet still demonstrate their compliance with consumer expectations as well as the law. Two appendices contain the full text of two documents vital to senior managers mapping their own corporate strategies: the European Union Data Directive and an EU Work Paper on the use of contracts to ensure the security of personally identifiable information that is transferred from the EU to other countries, such as the U.S., that lack their own adequate protections.

Cybersecurity for Beginners - How to Get a Job in Cybersecurity (Hardcover): Attila Kovacs Cybersecurity for Beginners - How to Get a Job in Cybersecurity (Hardcover)
Attila Kovacs
R715 R631 Discovery Miles 6 310 Save R84 (12%) Ships in 10 - 15 working days
Storage Management in Data Centers - Understanding, Exploiting, Tuning, and Troubleshooting Veritas Storage Foundation... Storage Management in Data Centers - Understanding, Exploiting, Tuning, and Troubleshooting Veritas Storage Foundation (Hardcover, 2009 ed.)
Volker Herminghaus, Albrecht Scriba
R2,445 R1,785 Discovery Miles 17 850 Save R660 (27%) Ships in 12 - 19 working days

Storage Management in Data Centers helps administrators tackle the complexity of data center mass storage. It shows how to exploit the potential of Veritas Storage Foundation by conveying information about the design concepts of the software as well as its architectural background. Rather than merely showing how to use Storage Foundation, it explains why to use it in a particular way, along with what goes on inside. Chapters are split into three sections: An introductory part for the novice user, a full-featured part for the experienced, and a technical deep dive for the seasoned expert. An extensive troubleshooting section shows how to fix problems with volumes, plexes, disks and disk groups. A snapshot chapter gives detailed instructions on how to use the most advanced point-in-time copies. A tuning chapter will help you speed up and benchmark your volumes. And a special chapter on split data centers discusses latency issues as well as remote mirroring mechanisms and cross-site volume maintenance. All topics are covered with the technical know how gathered from an aggregate thirty years of experience in consulting and training in data centers all over the world.

Linking Sensitive Data - Methods and Techniques for Practical Privacy-Preserving Information Sharing (Hardcover, 1st ed. 2020):... Linking Sensitive Data - Methods and Techniques for Practical Privacy-Preserving Information Sharing (Hardcover, 1st ed. 2020)
Peter Christen, Thilina Ranbaduge, Rainer Schnell
R4,610 Discovery Miles 46 100 Ships in 12 - 19 working days

This book provides modern technical answers to the legal requirements of pseudonymisation as recommended by privacy legislation. It covers topics such as modern regulatory frameworks for sharing and linking sensitive information, concepts and algorithms for privacy-preserving record linkage and their computational aspects, practical considerations such as dealing with dirty and missing data, as well as privacy, risk, and performance assessment measures. Existing techniques for privacy-preserving record linkage are evaluated empirically and real-world application examples that scale to population sizes are described. The book also includes pointers to freely available software tools, benchmark data sets, and tools to generate synthetic data that can be used to test and evaluate linkage techniques. This book consists of fourteen chapters grouped into four parts, and two appendices. The first part introduces the reader to the topic of linking sensitive data, the second part covers methods and techniques to link such data, the third part discusses aspects of practical importance, and the fourth part provides an outlook of future challenges and open research problems relevant to linking sensitive databases. The appendices provide pointers and describe freely available, open-source software systems that allow the linkage of sensitive data, and provide further details about the evaluations presented. A companion Web site at https://dmm.anu.edu.au/lsdbook2020 provides additional material and Python programs used in the book. This book is mainly written for applied scientists, researchers, and advanced practitioners in governments, industry, and universities who are concerned with developing, implementing, and deploying systems and tools to share sensitive information in administrative, commercial, or medical databases. The Book describes how linkage methods work and how to evaluate their performance. It covers all the major concepts and methods and also discusses practical matters such as computational efficiency, which are critical if the methods are to be used in practice - and it does all this in a highly accessible way!David J. Hand, Imperial College, London

Information Warfare (Paperback): William Hutchinson, Matthew Warren Information Warfare (Paperback)
William Hutchinson, Matthew Warren
R1,826 Discovery Miles 18 260 Ships in 12 - 19 working days

This text introduces the concepts of information warfare from a non-military, organizational perspective. It is designed to stimulate managers to develop policies, strategies, and tactics for the aggressive use and defence of their data and knowledge base. The book covers the full gambit of information warfare subjects from the direct attack on computer systems to the more subtle psychological technique of perception management. It provides the framework needed to build management strategies in this area. The topics covered include the basics of information warfare, corporate intelligence systems, the use of deception, security of systems, modes of attack, a methodology to develop defensive measures, plus specific issues associated with information warfare.
This book will be of interest to executives and managers in any public or private organization. Specifically, managers or staff in the areas of information technology, security, knowledge management, public relations, or marketing should find it directly useful.
Its main purpose is to make readers aware of the new world of information saturation; thus decreasing the chance that they will become victims of those abusing the information age, whilst at the same time increasing their chances of benefiting from the new opportunities produced.
Addresses the issues and implications of cyber warfare and how it directly impacts on companies

Searchable Encryption - From Concepts to Systems (Hardcover, 1st ed. 2023): Kui Ren, Cong Wang Searchable Encryption - From Concepts to Systems (Hardcover, 1st ed. 2023)
Kui Ren, Cong Wang
R3,878 Discovery Miles 38 780 Ships in 12 - 19 working days

This book comprehensively reviews searchable encryption, which represents a series of research developments that directly enable search functionality over encrypted data. The book majorly covers: 1) the design and implementation of encrypted search algorithms, data structures, and systems that facilitate various forms of search over always-encrypted databases; 2) different threat models, assumptions, and the related security guarantees, when using searchable encryption in the real-world settings; and 3) latest efforts in building full-fledged encrypted database systems that draw insights from searchable encryption constructions. The book fits in the timely context, where the necessity of safeguarding important and sensitive data has been globally recognized. Traditional security measures, such as storing data behind network firewalls and layers of access control mechanisms to keep attackers out, are no longer sufficient to cope with the expanding landscape of surging cyber threats. There is an urgent call to keep sensitive data always encrypted to protect the data at rest, in transit, and in use. Doing so guarantees data confidentiality for owners, even if the data is out of their hands, e.g., hosted at in-the-cloud databases. The daunting challenge is how to perform computation over encrypted data. As we unfold in this book, searchable encryption, as a specific line of research in this broadly defined area, has received tremendous advancements over the past decades. This book is majorly oriented toward senior undergraduates, graduate students, and researchers, who want to work in the field and need extensive coverage of encrypted database research. It also targets security practitioners who want to make well-informed deployment choices of the latest advancements in searchable encryption for their targeted applications. Hopefully, this book will be beneficial in both regards.

Data Science and Big Data Analytics in Smart Environments (Hardcover): Marta Chinnici, Florin Pop, Catalin Negru Data Science and Big Data Analytics in Smart Environments (Hardcover)
Marta Chinnici, Florin Pop, Catalin Negru
R4,847 Discovery Miles 48 470 Ships in 9 - 17 working days

Most applications generate large datasets, like social networking and social influence programs, smart cities applications, smart house environments, Cloud applications, public web sites, scientific experiments and simulations, data warehouse, monitoring platforms, and e-government services. Data grows rapidly, since applications produce continuously increasing volumes of both unstructured and structured data. Large-scale interconnected systems aim to aggregate and efficiently exploit the power of widely distributed resources. In this context, major solutions for scalability, mobility, reliability, fault tolerance and security are required to achieve high performance and to create a smart environment. The impact on data processing, transfer and storage is the need to re-evaluate the approaches and solutions to better answer the user needs. A variety of solutions for specific applications and platforms exist so a thorough and systematic analysis of existing solutions for data science, data analytics, methods and algorithms used in Big Data processing and storage environments is significant in designing and implementing a smart environment. Fundamental issues pertaining to smart environments (smart cities, ambient assisted leaving, smart houses, green houses, cyber physical systems, etc.) are reviewed. Most of the current efforts still do not adequately address the heterogeneity of different distributed systems, the interoperability between them, and the systems resilience. This book will primarily encompass practical approaches that promote research in all aspects of data processing, data analytics, data processing in different type of systems: Cluster Computing, Grid Computing, Peer-to-Peer, Cloud/Edge/Fog Computing, all involving elements of heterogeneity, having a large variety of tools and software to manage them. The main role of resource management techniques in this domain is to create the suitable frameworks for development of applications and deployment in smart environments, with respect to high performance. The book focuses on topics covering algorithms, architectures, management models, high performance computing techniques and large-scale distributed systems.

Social Engineering - The Science of Human Hacking 2e (Paperback, 2nd Edition): C Hadnagy Social Engineering - The Science of Human Hacking 2e (Paperback, 2nd Edition)
C Hadnagy
R865 R644 Discovery Miles 6 440 Save R221 (26%) Ships in 9 - 17 working days

Harden the human firewall against the most current threats Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire--why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly-used techniques that fool even the most robust security personnel, and shows you how these techniques have been used in the past. The way that we make decisions as humans affects everything from our emotions to our security. Hackers, since the beginning of time, have figured out ways to exploit that decision making process and get you to take an action not in your best interest. This new Second Edition has been updated with the most current methods used by sharing stories, examples, and scientific study behind how those decisions are exploited. Networks and systems can be hacked, but they can also be protected; when the "system" in question is a human being, there is no software to fall back on, no hardware upgrade, no code that can lock information down indefinitely. Human nature and emotion is the secret weapon of the malicious social engineering, and this book shows you how to recognize, predict, and prevent this type of manipulation by taking you inside the social engineer's bag of tricks. Examine the most common social engineering tricks used to gain access Discover which popular techniques generally don't work in the real world Examine how our understanding of the science behind emotions and decisions can be used by social engineers Learn how social engineering factors into some of the biggest recent headlines Learn how to use these skills as a professional social engineer and secure your company Adopt effective counter-measures to keep hackers at bay By working from the social engineer's playbook, you gain the advantage of foresight that can help you protect yourself and others from even their best efforts. Social Engineering gives you the inside information you need to mount an unshakeable defense.

Health Data Privacy under the GDPR - Big Data Challenges and Regulatory Responses (Paperback): Maria Tzanou Health Data Privacy under the GDPR - Big Data Challenges and Regulatory Responses (Paperback)
Maria Tzanou
R1,284 Discovery Miles 12 840 Ships in 9 - 17 working days

The growth of data-collecting goods and services, such as ehealth and mhealth apps, smart watches, mobile fitness and dieting apps, electronic skin and ingestible tech, combined with recent technological developments such as increased capacity of data storage, artificial intelligence and smart algorithms, has spawned a big data revolution that has reshaped how we understand and approach health data. Recently the COVID-19 pandemic has foregrounded a variety of data privacy issues. The collection, storage, sharing and analysis of health- related data raises major legal and ethical questions relating to privacy, data protection, profiling, discrimination, surveillance, personal autonomy and dignity. This book examines health privacy questions in light of the General Data Protection Regulation (GDPR) and the general data privacy legal framework of the European Union (EU). The GDPR is a complex and evolving body of law that aims to deal with several technological and societal health data privacy problems, while safeguarding public health interests and addressing its internal gaps and uncertainties. The book answers a diverse range of questions including: What role can the GDPR play in regulating health surveillance and big (health) data analytics? Can it catch up with internet-age developments? Are the solutions to the challenges posed by big health data to be found in the law? Does the GDPR provide adequate tools and mechanisms to ensure public health objectives and the effective protection of privacy? How does the GDPR deal with data that concern children's health and academic research? By analysing a number of diverse questions concerning big health data under the GDPR from various perspectives, this book will appeal to those interested in privacy, data protection, big data, health sciences, information technology, the GDPR, EU and human rights law.

The Cyber Security Handbook - Prepare For, Respond to and Recover from Cyber Attacks (Paperback): IT Governance The Cyber Security Handbook - Prepare For, Respond to and Recover from Cyber Attacks (Paperback)
IT Governance
R1,479 Discovery Miles 14 790 Ships in 10 - 15 working days

In the world as we know it, you can be attacked both physically and virtually. For today's organisations, which rely so heavily on technology - particularly the Internet - to do business, the latter is the far more threatening of the two. The cyber threat landscape is complex and constantly changing. For every vulnerability fixed, another pops up, ripe for exploitation. This book is a comprehensive cyber security implementation manual which gives practical guidance on the individual activities identified in the IT Governance Cyber Resilience Framework (CRF) that can help organisations become cyber resilient and combat the cyber threat landscape. Suitable for senior directors (CEO, CISO, CIO), compliance managers, privacy managers, IT managers, security analysts and others, the book is divided into six parts: Part 1: Introduction. The world of cyber security and the approach taken in this book. Part 2: Threats and vulnerabilities. A discussion of a range of threats organisations face, organised by threat category, to help you understand what you are defending yourself against before you start thinking about your actual defences. Part 3: The CRF processes. Detailed discussions of each of the 24 CRF processes, explaining a wide range of security areas by process category and offering guidance on how to implement each. Part 4: Eight steps to implementing cyber security. Our eight-step approach to implementing the cyber security processes you need and maintaining them. Part 5: Reference frameworks. An explanation of how standards and frameworks work, along with their benefits. It also presents ten framework options, introducing you to some of the best-known standards and giving you an idea of the range available. Part 6: Conclusion and appendices. The appendices include a glossary of all the acronyms and abbreviations used in this book. Whether you are just starting out on the road to cyber security or looking to enhance and improve your existing cyber resilience programme, it should be clear that cyber security is no longer optional in today's information age; it is an essential component of business success. Make sure you understand the threats and vulnerabilities your organisation faces and how the Cyber Resilience Framework can help you tackle them. Start your journey to cyber security now - buy this book today!

Smart Cities: Cyber Situational Awareness to Support Decision Making (Hardcover, 1st ed. 2022): Nataliia Neshenko, Elias... Smart Cities: Cyber Situational Awareness to Support Decision Making (Hardcover, 1st ed. 2022)
Nataliia Neshenko, Elias Bou-Harb, Borko Furht
R4,571 Discovery Miles 45 710 Ships in 12 - 19 working days

This book overviews the drivers behind the smart city vision, describes its dimensions and introduces the reference architecture. It further enumerates and classifies threats targeting the smart city concept, links corresponding attacks, and traces the impact of these threats on operations, society and the environment. This book also introduces analytics-driven situational awareness, provides an overview of the respective solutions and highlights the prevalent limitations of these methods. The research agenda derived from the study emphasizes the demand and challenges for developing holistic approaches to transition these methods to practice equipping the user with extensive knowledge regarding the detected attack instead of a sole indicator of ongoing malicious events. It introduces a cyber-situational awareness framework that can be integrated into smart city operations to provide timely evidence-based insights regarding cyber incidents and respective system responses to assist decision-making. This book targets researchers working in cybersecurity as well as advanced-level computer science students focused on this field. Cybersecurity operators will also find this book useful as a reference guide.

EU General Data Protection Regulation (GDPR) - An implementation and compliance guide (Paperback, 4th ed.): It Governance... EU General Data Protection Regulation (GDPR) - An implementation and compliance guide (Paperback, 4th ed.)
It Governance Privacy Team
R1,340 Discovery Miles 13 400 Ships in 10 - 15 working days

Understand your GDPR obligations and prioritise the steps you need to take to comply The GDPR gives individuals significant rights over how their personal information is collected and processed, and places a range of obligations on organisations to be more accountable for data protection. The Regulation applies to all data controllers and processors that handle EU residents' personal information. It supersedes the 1995 EU Data Protection Directive and all EU member states' national laws that are based on it - including the UK's DPA (Data Protection Act) 1998. Failure to comply with the Regulation could result in fines of up to 20 million or 4% of annual global turnover - whichever is greater. This guide is a perfect companion for anyone managing a GDPR compliance project. It provides a detailed commentary on the Regulation, explains the changes you need to make to your data protection and information security regimes, and tells you exactly what you need to do to avoid severe financial penalties. Clear and comprehensive guidance to simplify your GDPR compliance project Now in its fourth edition, EU General Data Protection Regulation (GDPR) - An implementation and compliance guide provides clear and comprehensive guidance on the GDPR. It explains the Regulation and sets out the obligations of data processors and controllers in terms you can understand. Topics covered include: The DPO (data protection officer) role, including whether you need one and what they should do; Risk management and DPIAs (data protection impact assessments), including how, when and why to conduct one; Data subjects' rights, including consent and the withdrawal of consent, DSARs (data subject access requests) and how to handle them, and data controllers and processors' obligations; Managing personal data internationally, including updated guidance following the Schrems II ruling; How to adjust your data protection processes to comply with the GDPR, and the best way of demonstrating that compliance; and A full index of the Regulation to help you find the articles and stipulations relevant to your organisation. Supplemental material While most of the EU GDPR's requirements are broadly unchanged in the UK GDPR, the context is quite different and will have knock-on effects. You may need to update contracts regarding EU-UK data transfers, incorporate standard contractual clauses into existing agreements, and update your policies, processes and procedural documentation as a result of these changes. We have published a supplement that sets out specific extra or amended information for this pocket guide. Click here to download the supplement. About the authors The IT Governance Privacy Team, led by Alan Calder, has substantial experience in privacy, data protection, compliance and information security. This practical experience, their understanding of the background and drivers for the GDPR, and the input of expert consultants and trainers are combined in this must-have guide to GDPR compliance. Start your compliance journey now and buy this book today.

Cybersecurity - What You Need to Know About Computer and Cyber Security, Social Engineering, The Internet of Things + An... Cybersecurity - What You Need to Know About Computer and Cyber Security, Social Engineering, The Internet of Things + An Essential Guide to Ethical Hacking for Beginners (Hardcover)
Lester Evans
R749 R666 Discovery Miles 6 660 Save R83 (11%) Ships in 10 - 15 working days
CISA - Certified Information Systems Auditor Study Guide - Aligned with the CISA Review Manual 2019 to help you audit, monitor,... CISA - Certified Information Systems Auditor Study Guide - Aligned with the CISA Review Manual 2019 to help you audit, monitor, and assess information systems (Paperback)
Hemang Doshi
R2,925 R1,875 Discovery Miles 18 750 Save R1,050 (36%) Ships in 12 - 19 working days

This CISA study guide is for those interested in achieving CISA certification and provides complete coverage of ISACA's latest CISA Review Manual (2019) with practical examples and over 850 exam-oriented practice questions Key Features Gain tactical skills in auditing, control, and security to pass the CISA examination Get up to speed with auditing business IT systems Increase your value to organizations and be at the forefront of an evolving business landscape by achieving CISA certification Book DescriptionAre you looking to prepare for the CISA exam and understand the roles and responsibilities of an information systems (IS) auditor? The CISA - Certified Information Systems Auditor Study Guide is here to help you get started with CISA exam prep. This book covers all the five CISA domains in detail to help you pass the exam. You'll start by getting up and running with the practical aspects of an information systems audit. The book then shows you how to govern and manage IT, before getting you up to speed with acquiring information systems. As you progress, you'll gain knowledge of information systems operations and understand how to maintain business resilience, which will help you tackle various real-world business problems. Finally, you'll be able to assist your organization in effectively protecting and controlling information systems with IT audit standards. By the end of this CISA book, you'll not only have covered the essential concepts and techniques you need to know to pass the CISA certification exam but also have the ability to apply them in the real world. What you will learn Understand the information systems auditing process Get to grips with IT governance and management Gain knowledge of information systems acquisition Assist your organization in protecting and controlling information systems with IT audit standards Understand information systems operations and how to ensure business resilience Evaluate your organization's security policies, standards, and procedures to meet its objectives Who this book is forThis CISA exam study guide is designed for those with a non-technical background who are interested in achieving CISA certification and are currently employed or looking to gain employment in IT audit and security management positions.

Cybersecurity for Coaches and Therapists - A Practical Guide for Protecting Client Data (Paperback): Alexandra Fouracres Cybersecurity for Coaches and Therapists - A Practical Guide for Protecting Client Data (Paperback)
Alexandra Fouracres
R1,082 Discovery Miles 10 820 Ships in 9 - 17 working days

-a short handbook designed for practical use by business owners to ensure they act in a professional, ethical and informed way around cybersecurity -first resource of its kind for coaches and therapists

Iso/Iec 27701:2019: An Introduction to Privacy Information Management (Paperback): IT Governance Iso/Iec 27701:2019: An Introduction to Privacy Information Management (Paperback)
IT Governance
R418 Discovery Miles 4 180 Ships in 12 - 19 working days

ISO/IEC 27701:2019: An introduction to privacy information management offers a concise introduction to the Standard, aiding those organisations looking to improve their privacy information management regime, particularly where ISO/IEC 27701:2019 is involved.

Internet of Everything and Big Data - Major Challenges in Smart Cities (Hardcover): Salahddine Krit, Mohamed Elhoseny,... Internet of Everything and Big Data - Major Challenges in Smart Cities (Hardcover)
Salahddine Krit, Mohamed Elhoseny, Valentina Emilia Balas, Rachid Benlamri, Marius M. Balas
R4,636 R4,237 Discovery Miles 42 370 Save R399 (9%) Ships in 9 - 17 working days

Explains concepts of Internet of Everything problems, research challenge goals, and vision in smart cities Based on the most recent innovations, and covering the major challenges in smart cities, between IoT and Big Data Examines security issues and challenges related to data-intensive advances in IoT Addresses the total information science challenges in Internet of Everything enabled technologies Covers the exploring and creating IoT environment related self-adaptive systems

Handbook of Research on Cyber Crime and Information Privacy, VOL 2 (Hardcover): Maria Manuela Cruz Cunha, Nuno Ricardo... Handbook of Research on Cyber Crime and Information Privacy, VOL 2 (Hardcover)
Maria Manuela Cruz Cunha, Nuno Ricardo Mateus-Coelho
R7,687 Discovery Miles 76 870 Ships in 10 - 15 working days
Blockchain Systems and Communication Networks: From Concepts to Implementation (Hardcover, 1st ed. 2021): Mubashir Husain... Blockchain Systems and Communication Networks: From Concepts to Implementation (Hardcover, 1st ed. 2021)
Mubashir Husain Rehmani
R2,346 Discovery Miles 23 460 Ships in 12 - 19 working days

This book provides extensive insights on blockchain systems, starting from a historical perspective and moving towards building foundational knowledge, with focus on communication networks. It covers blockchain applications, algorithms, architectures, design and implementation, and security and privacy issues, providing the reader with a comprehensive overview. Further, it discusses blockchain systems and its integration to communication networks. The book includes hands-on, practical tutorials, self-assessment exercises, and review questions; tips and sample programs are also provided throughout. Complementary supporting material for instructors, including open source programming code for practical tutorials and exercises, is also available. The target audience includes graduate students, professionals, and researchers working in the areas of blockchain systems, distributed ledger technology, computer networks and communications, artificial intelligence, and cybersecurity.

The California Consumer Privacy Act (CCPA) - An implementation guide (Paperback): Preston Bukaty The California Consumer Privacy Act (CCPA) - An implementation guide (Paperback)
Preston Bukaty
R840 Discovery Miles 8 400 Ships in 10 - 15 working days

Understand the CCPA (California Consumer Privacy Act) and how to implement strategies to comply with this privacy regulation. Established in June 2018, the CCPA was created to remedy the lack of comprehensive privacy regulation in the state of California. When it comes into effect on January 1, 2020, the CCPA will give California residents the right to: Learn what personal data a business has collected about them Understand who this data has been disclosed to Find out whether their personal data has been sold to third parties, and who these third parties are Opt-out of such data transactions, or request that the data be deleted. Many organizations that do business in the state of California must align to the provisions of the CCPA. Much like the EU's GDPR (General Data Protection Regulation), businesses that fail to comply with the CCPA will face economic penalties. Prepare your business for CCPA compliance with our implementation guide that: Provides the reader with a comprehensive understanding of the legislation by explaining key terms Explains how a business can implement strategies to comply with the CCPA Discusses potential developments of the CCPA to further aid compliance Your guide to understanding the CCPA and how you can implement a strategy to comply with this legislation - buy this book today to get the guidance you need! About the author Preston Bukaty is an attorney and consultant. He specializes in data privacy GRC projects, from data inventory audits to gap analyses, contract management, and remediation planning. His compliance background and experience operationalizing compliance in a variety of industries give him a strong understanding of the legal issues presented by international regulatory frameworks. Having conducted more than 3,000 data mapping audits, he also understands the practical realities of project management in operationalizing compliance initiatives. Preston's legal experience and enthusiasm for technology make him uniquely suited to understanding the business impact of privacy regulations such as the GDPR and the CCPA. He has advised more than 250 organizations engaged in businesses as varied as SaaS platforms, mobile geolocation applications, GNSS/telematics tools, financial institutions, fleet management software, architectural/engineering design systems, and web hosting. He also teaches certification courses on GDPR compliance and ISO 27001 implementation, and writes on data privacy law topics. Preston lives in Denver, Colorado. Prior to working as a data privacy consultant, he worked for an international GPS software company, advising business areas on compliance issues across 140 countries. Preston holds a juris doctorate from the University of Kansas School of Law, along with a basketball signed by Hall of Fame coach Bill Self.

Green Computing in Network Security - Energy Efficient Solutions for Business and Home (Hardcover): Deepak Kumar Sharma, Koyel... Green Computing in Network Security - Energy Efficient Solutions for Business and Home (Hardcover)
Deepak Kumar Sharma, Koyel Datta Gupta, Rinky Dwivedi
R3,505 Discovery Miles 35 050 Ships in 9 - 17 working days

This book focuses on green computing-based network security techniques and addresses the challenges involved in practical implementation. It also explores the idea of energy-efficient computing for network and data security and covers the security threats involved in social networks, data centers, IoT, and biomedical applications. Green Computing in Network Security: Energy Efficient Solutions for Business and Home includes analysis of green-security mechanisms and explores the role of green computing for secured modern internet applications. It discusses green computing-based distributed learning approaches for security and emphasizes the development of green computing-based security systems for IoT devices. Written with researchers, academic libraries, and professionals in mind so they can get up to speed on network security, the challenges, and implementation processes.

The Ethics of Cybersecurity (Hardcover, 1st ed. 2020): Markus Christen, Bert Gordijn, Michele Loi The Ethics of Cybersecurity (Hardcover, 1st ed. 2020)
Markus Christen, Bert Gordijn, Michele Loi
R3,427 Discovery Miles 34 270 Ships in 10 - 15 working days

This open access book provides the first comprehensive collection of papers that provide an integrative view on cybersecurity. It discusses theories, problems and solutions on the relevant ethical issues involved. This work is sorely needed in a world where cybersecurity has become indispensable to protect trust and confidence in the digital infrastructure whilst respecting fundamental values like equality, fairness, freedom, or privacy. The book has a strong practical focus as it includes case studies outlining ethical issues in cybersecurity and presenting guidelines and other measures to tackle those issues. It is thus not only relevant for academics but also for practitioners in cybersecurity such as providers of security software, governmental CERTs or Chief Security Officers in companies.

Data Protection - for voluntary organisations (Paperback, 4th New edition): Paul Ticher Data Protection - for voluntary organisations (Paperback, 4th New edition)
Paul Ticher
R882 Discovery Miles 8 820 Ships in 12 - 19 working days

Vital to the effective functioning of voluntary organisations is the trust of people - the beneficiaries, clients, regulators, donors, volunteers and paid staff. Open, fair and well-managed data protection practice is not just desirable in helping to achieve that trust, but essential. Get it wrong and there is reputational damage and costs attached. Data Protection for voluntary organisations will enable you to set a shining example of best practice and also comply with UK data legislation and the General Data Protection Regulation (GDPR) in force since 2018. This book will help you: * Understand the key principles and elements of data protection * Recognise your main responsibilities as a data controller * Distinguish when you can and can't retain data * Appreciate what the rights of the data subject are Who is this book for? A must-read for anyone in the UK voluntary sector who wants to get beyond tick-box data management. Invaluable to data managers or those who handle personal information such as IT, personnel, marketing and fundraising departments. For professional advisers, and academics it will also offers a valuable summary drawing out key data protection points by examining and interpreting the primary legislation.

Cybersecurity for Beginners - What You Must Know about Cybersecurity (Hardcover): Attila Kovacs Cybersecurity for Beginners - What You Must Know about Cybersecurity (Hardcover)
Attila Kovacs
R718 R635 Discovery Miles 6 350 Save R83 (12%) Ships in 10 - 15 working days
Cyber Warfare and Terrorism - Concepts, Methodologies, Tools, and Applications, VOL 2 (Hardcover): Information Reso Management... Cyber Warfare and Terrorism - Concepts, Methodologies, Tools, and Applications, VOL 2 (Hardcover)
Information Reso Management Association
R11,207 Discovery Miles 112 070 Ships in 10 - 15 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Cyber Security and Threats - Concepts…
Information Reso Management Association Hardcover R10,216 Discovery Miles 102 160
Handbook of Research on Advanced…
Ahmed J. Obaid, Ghassan H Abdul-Majeed, … Hardcover R7,930 Discovery Miles 79 300
Pegasus - The Story Of The World's Most…
Laurent Richard, Sandrine Rigaud Paperback R385 R349 Discovery Miles 3 490
Deaver on Cybersecurity - An irreverent…
Frederic Scott Deaver Hardcover R1,918 Discovery Miles 19 180
Research Handbook on Privacy and Data…
Gloria Gonzalez, Rosamunde van Brakel, … Hardcover R6,731 Discovery Miles 67 310
Privacy and Security Policies in Big…
Sharvari Tamane, Vijender Kumar Solanki, … Hardcover R5,744 Discovery Miles 57 440
Identified, Tracked, and Profiled - The…
Peter Dauvergne Hardcover R2,354 Discovery Miles 23 540
Smart-Tech Society - Convenience…
Mark Whitehead, William G.A. Collier Hardcover R3,031 Discovery Miles 30 310
Using Computational Intelligence for the…
Romil Rawat, Upinder Kaur, … Hardcover R6,738 Discovery Miles 67 380
Hacking - 17 Must Tools every Hacker…
Alex Wagner Hardcover R1,020 R871 Discovery Miles 8 710

 

Partners