|
|
Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection
Unique selling point: * Gain practical tools to solve complex data
privacy and security subjects for different business use cases and
types of data. Core audience: * Suited to anyone in a CISOs, CSOs,
CPOs, CDOs, CTOs, auditors, consultants, investors, and other
people interested in data privacy and security. Place in the
market: * Tackles the critical skills needed to succeed in the
evolving landscape of regulations and data breaches.
As information processing continues to move toward an open systems
environment, the advantages of authentication and key distribution
systems over traditional passwords are becoming more and more
evident. In this timely guide for computer scientists, electrical
engineers, and networking specialists, author Rolf Oppliger
explains and compares the various authentication and key
distribution systems available today, including Kerberos, NetSP,
SPX, TESS, and SESAME. The book explores the cryptographic
techniques used for these systems - and shows how to use them to
provide the best security for your network.
This book is for anyone who wants to gain an understanding of
Blockchain technology and its potential. The book is
research-oriented and covers different verticals of Blockchain
technology. It discusses the characteristics and features of
Blockchain, includes techniques, challenges, and future trends,
along with case studies for deeper understanding. Blockchain
Technology: Exploring Opportunities, Challenges, and Applications
covers the core concepts related to Blockchain technology starting
from scratch. The algorithms, concepts, and application areas are
discussed according to current market trends and industry needs. It
presents different application areas of industry and academia and
discusses the characteristics and features of this technology. It
also explores the challenges and future trends and provides an
understanding of new opportunities. This book is for anyone at the
beginner to intermediate level that wants to learn about the core
concepts related to Blockchain technology.
This work aims at understanding behavior around location
information, including why users share such information, why they
protect the data, and what kind of other factors influence the
decision to behave in a certain way. This book explores privacy in
the context of location data, and answers questions such as what
are the privacy related behaviors in this context, and what are the
factors influencing such behaviors. The book gives an overview to
what privacy means for users in terms of understandings, attitudes
and valuations. This book discusses reasons for why research around
this topic is challenging, and presents various methods for diving
into the topic through empirical studies. The work is relevant for
professionals, researchers, and users of technology.
Digital Totalitarianism: Algorithms and Society focuses on
important challenges to democratic values posed by our
computational regimes: policing the freedom of inquiry, risks to
the personal autonomy of thought, NeoLiberal management of human
creativity, and the collapse of critical thinking with the social
media fueled rise of conspiranoia. Digital networks allow for a
granularity and pervasiveness of surveillance by government and
corporate entities. This creates power asymmetries where each
citizen's daily 'data exhaust' can be used for manipulative and
controlling ends by powerful institutional actors. This volume
explores key erosions in our fundamental human values associated
with free societies by covering government surveillance of
library-based activities, cognitive enhancement debates, the
increasing business orientation of art schools, and the
proliferation of conspiracy theories in network media. Scholars and
students from many backgrounds, as well as policy makers,
journalists and the general reading public will find a
multidisciplinary approach to questions of totalitarian tendencies
encompassing research from Communication, Rhetoric, Library
Sciences, Art and New Media.
This book provides a broad overview of the many card systems and
solutions that are in practical use today. This new edition adds
content on RFIDs, embedded security, attacks and countermeasures,
security evaluation, javacards, banking or payment cards, identity
cards and passports, mobile systems security, and security
management. A step-by-step approach educates the reader in card
types, production, operating systems, commercial applications, new
technologies, security design, attacks, application development,
deployment and lifecycle management. By the end of the book the
reader should be able to play an educated role in a smart card
related project, even to programming a card application. This book
is designed as a textbook for graduate level students in computer
science. It is also as an invaluable post-graduate level reference
for professionals and researchers. This volume offers insight into
benefits and pitfalls of diverse industry, government, financial
and logistics aspects while providing a sufficient level of
technical detail to support technologists, information security
specialists, engineers and researchers.
Using both a theoretical argumentation and an empirical
investigation, this book rationalizes the view that in order to
understand people's privacy perceptions and behaviors, a
situational perspective needs to be adopted. To this end, the book
is divided into three parts. Part I advances the theory of
situational privacy and self-disclosure by discussing impacts of
new information and communication technologies on traditional
theories of privacy and self-disclosure. Based on five basic
suppositions, it describes three major processes of the theory:
pre-situational privacy regulations processes, situational privacy
perception and self-disclosure processes, and post-situational
evaluation processes. Next, Part II presents the application of the
theory to smartphone-based communication. It first analyses how
people choose certain communication environments on their
smartphones, how they manipulate them, and how these external
factors affect self-disclosure within these environments. It then
details a multi-method study conducted to test the derived
assumptions and discusses the obtained results. Part III reflects
on the overall implications of the theory, summarizes the major
findings and lastly considers possible extensions and perspectives
on future research. Intended mainly for researchers in privacy and
communication studies, the book offers privacy scholars a
systematic review of both classic and contemporary theories of
privacy and self-disclosure. At the same time, communication
scholars benefit from an additional methodological discussion of
the mobile experience sampling method, which provides an invaluable
approach to measuring situational communication processes.
Tools and technologies have long complemented and extended our
physical abilities: from pre-historic spearheads to steam-propelled
ploughs and high-tech prosthetics. While the development of lenses
granted us insights into the micro and macrocosms, new sensors and
technologies increasingly augment our cognitive abilities,
including memory and perception. This book integrates current
research efforts, results, and visions from the fields of computer
science, neuroscience, and psychology. It provides a comprehensive
overview of the state-of-the-art and future applications of how
technologies assist and augment human perception and cognition.
Experts in the field share their research and findings on: Working
memory enhancements Digitization of memories through lifelog
archives The consequences of technology-induced disruptions and
forgetting The creation and utilization of new human senses Ethical
and security concerns that arise with augmentation technologies. As
technology weaves itself ever deeper into our lives, careful
examination of its capabilities, risks and benefits is warranted.
While this book focuses on the complementation and augmentation of
human capabilities, it serves as a foundation for students,
researchers and designers of technologies that push the boundaries
of perception and cognition.
Cybersecurity is an extremely important area which is rapidly
evolving, necessarily, to meet current and future threats. Anyone
who studies within this domain requires a particular skillset and
way of thinking, balancing technical knowledge and human insight.
It is vital to recognize both sides of this complex area and
integrate the two. This book looks at the technical fields
progressively, building up in layers before expanding into more
advanced topics. Each area is looked at succinctly, describing the
main elements and problems in each area and reinforcing these
concepts with practical coding examples, questions and ideas for
further research. The book builds on an overview of basic
architecture of systems and networks, setting a context for how
information is vulnerable. Cryptography is explained in detail with
examples, showing the steady progress in this area over time
through to the possibilities of quantum encryption. Steganography
is also explained, showing how this can be used in a modern-day
context through multimedia and even Virtual Reality. A large
section of the book is given to the technical side of hacking, how
such attacks occur, how they can be avoided and what to do after
there has been an intrusion of some description. Cyber
countermeasures are explored, along with automated systems of
defense, whether created by the programmer or through firewalls and
suchlike. The human aspect of cyber security is detailed along with
the psychology and motivations for launching attacks. Social
engineering is focused on and with the various techniques looked at
- revealing how an informed individual, organization or workplace
can protect themselves against incursions and breaches. Finally,
there is a look the latest developments in the field, and how
systems, such as the IoT are being protected. The book is intended
for advanced undergraduate and postgraduate courses on
cybersecurity but is also useful for those studying IT or Computer
Science more generally.
A must have book on how GDPR is actively working in the privacy,
compliance and technology space. Gain a clear understanding of GDPR
requirements and recognise opportunities to reshape your data
privacy compliance programs. Learn unique techniques to avoid GDPR
non-compliance in the third and fourth industrial revolution era. A
practical guide to providing great insights on data privacy
challenges and compliance with invaluable practical approaches.
Demonstrates data privacy legislation differences and similarities
in multi-jurisdictions and how to man oeuvre the minefield of
privacy successfully.
Cyberspace is changing the face of crime. For criminals it has
become a place for rich collaboration and learning, not just within
one country; and a place where new kinds of crimes can be carried
out, and a vehicle for committing conventional crimes with
unprecedented range, scale, and speed. Law enforcement faces a
challenge in keeping up and dealing with this new environment. The
news is not all bad - collecting and analyzing data about criminals
and their activities can provide new levels of insight into what
they are doing and how they are doing it. However, using data
analytics requires a change of process and new skills that (so far)
many law enforcement organizations have had difficulty leveraging.
Cyberspace, Data Analytics, and Policing surveys the changes that
cyberspace has brought to criminality and to policing with enough
technical content to expose the issues and suggest ways in which
law enforcement organizations can adapt. Key Features: Provides a
non-technical but robust overview of how cyberspace enables new
kinds of crime and changes existing crimes. Describes how criminals
exploit the ability to communicate globally to learn, form groups,
and acquire cybertools. Describes how law enforcement can use the
ability to collect data and apply analytics to better protect
society and to discover and prosecute criminals. Provides examples
from open-source data of how hot spot and intelligence-led policing
can benefit law enforcement. Describes how law enforcement can
exploit the ability to communicate globally to collaborate in
dealing with trans-national crime.
Mobile devices are ubiquitous; therefore, mobile device forensics
is absolutely critical. Whether for civil or criminal
investigations, being able to extract evidence from a mobile device
is essential. This book covers the technical details of mobile
devices and transmissions, as well as forensic methods for
extracting evidence. There are books on specific issues like
Android forensics or iOS forensics, but there is not currently a
book that covers all the topics covered in this book. Furthermore,
it is such a critical skill that mobile device forensics is the
most common topic the Author is asked to teach to law enforcement.
This is a niche that is not being adequately filled with current
titles. An In-Depth Guide to Mobile Device Forensics is aimed
towards undergraduates and graduate students studying cybersecurity
or digital forensics. It covers both technical and legal issues,
and includes exercises, tests/quizzes, case studies, and slides to
aid comprehension.
Many governments around the world are calling for the use of
biometric systems to provide crucial societal functions,
consequently making it an urgent area for action. The current
performance of some biometric systems in terms of their error
rates, robustness, and system security may prove to be inadequate
for large-scale applications to process millions of users at a high
rate of throughput. This book focuses on fusion in biometric
systems. It discusses the present level, the limitations, and
proposed methods to improve performance. It describes the
fundamental concepts, current research, and security-related
issues. The book will present a computational perspective, identify
challenges, and cover new problem-solving strategies, offering
solved problems and case studies to help with reader comprehension
and deep understanding. This book is written for researchers,
practitioners, both undergraduate and post-graduate students, and
those working in various engineering fields such as Systems
Engineering, Computer Science, Information Technology, Electronics,
and Communications.
This open access book aims to set an agenda for research and action
in the field of Digital Humanism through short essays written by
selected thinkers from a variety of disciplines, including computer
science, philosophy, education, law, economics, history,
anthropology, political science, and sociology. This initiative
emerged from the Vienna Manifesto on Digital Humanism and the
associated lecture series. Digital Humanism deals with the complex
relationships between people and machines in digital times. It
acknowledges the potential of information technology. At the same
time, it points to societal threats such as privacy violations and
ethical concerns around artificial intelligence, automation and
loss of jobs, ongoing monopolization on the Web, and sovereignty.
Digital Humanism aims to address these topics with a sense of
urgency but with a constructive mindset. The book argues for a
Digital Humanism that analyses and, most importantly, influences
the complex interplay of technology and humankind toward a better
society and life while fully respecting universal human rights. It
is a call to shaping technologies in accordance with human values
and needs.
Wilson/Simpson/Antill's HANDS-ON ETHICAL HACKING AND NETWORK
DEFENSE, 4th edition, equips you with the knowledge and skills to
protect networks using the tools and techniques of an ethical
hacker. The authors explore the concept of ethical hacking and its
practitioners -- explaining their importance in protecting
corporate and government data -- and then deliver an in-depth guide
to performing security testing. Thoroughly updated, the text covers
new security resources, emerging vulnerabilities and innovative
methods to protect networks, mobile security considerations,
computer crime laws and penalties for illegal computer hacking. A
final project brings concepts together in a penetration testing
exercise and report, while virtual machine labs, auto-graded
quizzes and interactive activities in the online learning platform
help further prepare you for your role as a network security
professional.
This book intends to develop cyber awareness and technical
knowledge in anyone who is interested in technology by looking at
subjects and experiences the average person will have come into
contact with in their life. This book aims to provide a complete
and comprehensive analysis, technological inputs and case studies
for the readers to build their awareness and knowledge, but in a
meaningful way which will stay relevant. There are books available
on the market, but they primarily discuss theory, and no industry
connection or current state-of-the-art technology is presented. By
discussing subjects and experiences that all readers will be
familiar with, this book will aid understanding and comprehension
of how cyber threats can be noticed, avoided and understood in
everyday life. As well as case studies, this book also contains
plentiful illustrations and supplementary videos, which will be
available via YouTube to complement the information. Giri
Govindarajulu is a Chief Information Security officer for Cisco
Asiapac and is a 20-year Cisco veteran. Shyam Sundar Ramaswami is
the Lead Threat Researcher with the Cisco Talos Threat Intelligence
group. Shyam is a two-time TEDx speaker and a teacher of
cybersecurity. Dr. Shriram K. Vasudevan is currently working as
Dean of K. Ramakrishnan College of Technology. He has
authored/co-authored 42 books for reputed publishers across the
globe and 122 research papers in revered international journals,
plus 30 papers for international/national conferences.
This book makes the case that traditional security design does not
take the end-user into consideration, and therefore, fails. This
book goes on to explain, using a series of examples, how to rethink
security solutions to take users into consideration. By
understanding the limitations and habits of users - including
malicious users, aiming to corrupt the system - this book
Illustrates how better security technologies are made possible.
Traditional security books focus on one of the following areas:
cryptography, security protocols, or existing standards. They
rarely consider the end user as part of the security equation, and
when they do, it is in passing. This book considers the end user as
the most important design consideration, and then shows how to
build security and privacy technologies that are both secure and
which offer privacy. This reduces the risk for social engineering
and, in general, abuse. Advanced-level students interested in
software engineering, security and HCI (Human Computer Interaction)
will find this book useful as a study guide. Engineers and security
practitioners concerned with abuse and fraud will also benefit from
the methodologies and techniques in this book.
This book outlines the legal powers of a major Western nation -
Australia - to collect and use location information. Mobile service
and social media service providers now have the ability to track,
record and store more precise location information. Unlike 4G, 5G
mobile communications require that cell towers and antennas be in
much closer proximity; as a result, the location data can reveal
more personal and sensitive information about individual citizens.
Despite this aspect, service providers are required to disclose the
data to the authorities, without the need for a judicial warrant.
This book was written from the perspective of big location data
software analytics, a capability that makes it possible to combine
various location data points to create a profile on a given
individual's movements, habits, and political, religious and
ideological orientation. In this regard, privacy is poorly
protected. The rationale used to justify the powers was enforcing
serious crimes - terrorism offences. Location data can now be
retained for at least two years and be collected to investigate
even minor offences. This can be done without the person being
reasonably suspected of a criminal offence - when the individual is
simply determined to be a person of interest. This poses legal
risks to vulnerable communities. And yet, such investigative
techniques are deemed lawful and reasonable. At a time when
national security is so broadly defined to include economic issues,
which in turn overlap with climate change and environmental
protection, these legal powers should be reassessed. The book
clarifies the complex rules that every citizen must know in order
to have agency. Further, it calls upon authorities to reflect and
to self-regulate, by making the conscious decision to surrender
some of their powers to review by the independent judiciary.
Without the requirement for a judicial warrant or judicial review,
the powers are unfairly broad. The book pursues an
interdisciplinary approach to assess the functionality of mobile
telecommunications in direct relation to law enforcement powers and
existing judicial precedents. Further, it offers a unifying
techno-legal perspective on a complex issue touching on modern
privacy law and communications technologies.
This book discusses artificial intelligence (AI) and cybersecurity
from multiple points of view. The diverse chapters reveal modern
trends and challenges related to the use of artificial intelligence
when considering privacy, cyber-attacks and defense as well as
applications from malware detection to radio signal intelligence.
The chapters are contributed by an international team of renown
researchers and professionals in the field of AI and cybersecurity.
During the last few decades the rise of modern AI solutions that
surpass humans in specific tasks has occurred. Moreover, these new
technologies provide new methods of automating cybersecurity tasks.
In addition to the privacy, ethics and cybersecurity concerns, the
readers learn several new cutting edge applications of AI
technologies. Researchers working in AI and cybersecurity as well
as advanced level students studying computer science and electrical
engineering with a focus on AI and Cybersecurity will find this
book useful as a reference. Professionals working within these
related fields will also want to purchase this book as a reference.
Cyber-Security Threats, Actors, and Dynamic Mitigation provides
both a technical and state-of-the-art perspective as well as a
systematic overview of the recent advances in different facets of
cyber-security. It covers the methodologies for modeling attack
strategies used by threat actors targeting devices, systems, and
networks such as smart homes, critical infrastructures, and
industrial IoT. With a comprehensive review of the threat
landscape, the book explores both common and sophisticated threats
to systems and networks. Tools and methodologies are presented for
precise modeling of attack strategies, which can be used both
proactively in risk management and reactively in intrusion
prevention and response systems. Several contemporary techniques
are offered ranging from reconnaissance and penetration testing to
malware detection, analysis, and mitigation. Advanced machine
learning-based approaches are also included in the area of
anomaly-based detection, that are capable of detecting attacks
relying on zero-day vulnerabilities and exploits. Academics,
researchers, and professionals in cyber-security who want an
in-depth look at the contemporary aspects of the field will find
this book of interest. Those wanting a unique reference for various
cyber-security threats and how they are detected, analyzed, and
mitigated will reach for this book often.
A collection of best practices and effective implementation
recommendations that are proven to work, Secure, Resilient, and
Agile Software Development leaves the boring details of software
security theory out of the discussion as much as possible to
concentrate on practical applied software security for practical
people. Written to aid your career as well as your organization,
the book shows how to gain skills in secure and resilient software
development and related tasks. The book explains how to integrate
these development skills into your daily duties, thereby increasing
your professional value to your company, your management, your
community, and your industry. Secure, Resilient, and Agile Software
Development was written for the following professionals: AppSec
architects and program managers in information security
organizations Enterprise architecture teams with application
development focus Scrum teams DevOps teams Product owners and their
managers Project managers Application security auditors With a
detailed look at Agile and Scrum software development
methodologies, this book explains how security controls need to
change in light of an entirely new paradigm on how software is
developed. It focuses on ways to educate everyone who has a hand in
any software development project with appropriate and practical
skills to Build Security In. After covering foundational and
fundamental principles for secure application design, this book
dives into concepts, techniques, and design goals to meet
well-understood acceptance criteria on features an application must
implement. It also explains how the design sprint is adapted for
proper consideration of security as well as defensive programming
techniques. The book concludes with a look at white box application
analysis and sprint-based activities to improve the security and
quality of software under development.
This handbook provides comprehensive knowledge and includes an
overview of the current state-of-the-art of Big Data Privacy, with
chapters written by international world leaders from academia and
industry working in this field. The first part of this book offers
a review of security challenges in critical infrastructure and
offers methods that utilize acritical intelligence (AI) techniques
to overcome those issues. It then focuses on big data security and
privacy issues in relation to developments in the Industry 4.0.
Internet of Things (IoT) devices are becoming a major source of
security and privacy concern in big data platforms. Multiple
solutions that leverage machine learning for addressing security
and privacy issues in IoT environments are also discussed this
handbook. The second part of this handbook is focused on privacy
and security issues in different layers of big data systems. It
discusses about methods for evaluating security and privacy of big
data systems on network, application and physical layers. This
handbook elaborates on existing methods to use data analytic and AI
techniques at different layers of big data platforms to identify
privacy and security attacks. The final part of this handbook is
focused on analyzing cyber threats applicable to the big data
environments. It offers an in-depth review of attacks applicable to
big data platforms in smart grids, smart farming, FinTech, and
health sectors. Multiple solutions are presented to detect, prevent
and analyze cyber-attacks and assess the impact of malicious
payloads to those environments. This handbook provides information
for security and privacy experts in most areas of big data
including; FinTech, Industry 4.0, Internet of Things, Smart Grids,
Smart Farming and more. Experts working in big data, privacy,
security, forensics, malware analysis, machine learning and data
analysts will find this handbook useful as a reference. Researchers
and advanced-level computer science students focused on computer
systems, Internet of Things, Smart Grid, Smart Farming, Industry
4.0 and network analysts will also find this handbook useful as a
reference.
The Home in the Digital Age is a set of multidisciplinary studies
exploring the impact of digital technologies in the home, with a
shift of emphasis from technology to the people living and using
this in their homes. The book covers a wide variety of topics on
the design, introduction and use of digital technologies in the
home, combining the technological dimension with the cognitive,
emotional, cultural and symbolic dimensions of the objects that
incorporate digital technologies and project them onto people's
lives. It offers a coherent approach, that of the home, which gives
unity to the discussion. Scholars of the home, the house and the
family will find here the connection with the problems derived from
the use of domestic robots and connected devices. Students of
artificial intelligence, machine learning, robotics, big data and
other branches of digital technologies will find ideas and
arguments to apply their disciplines to the home and participate
fruitfully in forums where digital technologies are built and
negotiated in the home. Experts from various disciplines
psychologists and sociologists; philosophers, epistemologists and
ethicists; economists; engineers, architects, urban planners and
designers and so on and also those interested in developing
policies for the home and family will find this book contains
well-founded and useful ideas to focus their work.
|
You may like...
Rooiletterkind
Sandy Schoeman
Paperback
R240
R222
Discovery Miles 2 220
|