0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (169)
  • R250 - R500 (198)
  • R500+ (857)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

After the Digital Tornado - Networks, Algorithms, Humanity (Hardcover): Kevin Werbach After the Digital Tornado - Networks, Algorithms, Humanity (Hardcover)
Kevin Werbach
R2,676 Discovery Miles 26 760 Ships in 12 - 17 working days

Networks powered by algorithms are pervasive. Major contemporary technology trends - Internet of Things, Big Data, Digital Platform Power, Blockchain, and the Algorithmic Society - are manifestations of this phenomenon. The internet, which once seemed an unambiguous benefit to society, is now the basis for invasions of privacy, massive concentrations of power, and wide-scale manipulation. The algorithmic networked world poses deep questions about power, freedom, fairness, and human agency. The influential 1997 Federal Communications Commission whitepaper "Digital Tornado" hailed the "endless spiral of connectivity" that would transform society, and today, little remains untouched by digital connectivity. Yet fundamental questions remain unresolved, and even more serious challenges have emerged. This important collection, which offers a reckoning and a foretelling, features leading technology scholars who explain the legal, business, ethical, technical, and public policy challenges of building pervasive networks and algorithms for the benefit of humanity. This title is also available as Open Access on Cambridge Core.

Information Risk Management - A practitioner's guide (Paperback, 2nd edition): David Sutton Information Risk Management - A practitioner's guide (Paperback, 2nd edition)
David Sutton
R1,330 Discovery Miles 13 300 Ships in 9 - 15 working days

Information risk management (IRM) is about identifying, assessing, prioritising and treating risks to keep information secure and available. This accessible book is a practical guide to understanding the principles of IRM and developing a strategic approach to an IRM programme. It is the only textbook for the BCS Practitioner Certificate in Information Risk Management and this new edition reflects recent changes to the syllabus and to the wider discipline.

The Fight for Privacy - Protecting Dignity, Identity and Love in the Digital Age (Hardcover): Danielle Keats Citron The Fight for Privacy - Protecting Dignity, Identity and Love in the Digital Age (Hardcover)
Danielle Keats Citron
R599 R491 Discovery Miles 4 910 Save R108 (18%) Ships in 9 - 15 working days

'Devastating and urgent, this book could not be more timely' Caroline Criado Perez, award-winning and bestselling author of Invisible Women Danielle Citron takes the conversation about technology and privacy out of the boardrooms and op-eds to reach readers where we are - in our bathrooms and bedrooms; with our families and our lovers; in all the parts of our lives we assume are untouchable - and shows us that privacy, as we think we know it, is largely already gone. The boundary that once protected our intimate lives from outside interests is an artefact of the twentieth century. In the twenty-first, we have embraced a vast array of technology that enables constant access and surveillance of the most private aspects of our lives. From non-consensual pornography, to online extortion, to the sale of our data for profit, we are vulnerable to abuse -- and our laws have failed miserably to keep up. With vivid examples drawn from interviews with victims, activists and lawmakers from around the world, The Fight for Privacy reveals the threat we face and argues urgently and forcefully for a reassessment of privacy as a human right. As a legal scholar and expert, Danielle Citron is the perfect person to show us the way to a happier, better protected future.

Handbook of IoT and Blockchain - Methods, Solutions, and Recent Advancements (Hardcover): Brojo Kishore Mishra, Sanjay Kumar... Handbook of IoT and Blockchain - Methods, Solutions, and Recent Advancements (Hardcover)
Brojo Kishore Mishra, Sanjay Kumar Kuanar, Sheng-Lung Peng, Daniel D. Dasig, Jr
R4,739 Discovery Miles 47 390 Ships in 12 - 17 working days

Handbook of IoT and Blockchain: Methods, solutions, and Recent Advancements includes contributions from around the globe on recent advances and findings in the domain of Internet of Things (IoT) and Blockchain. Chapters include theoretical analysis, practical implications, and extensive surveys with analysis on methods, algorithms, and processes for new product development. IoT and Blockchain are the emerging topics in the current manufacturing scenario.This handbook includes recent advances; showcases the work of research around the globe; offers theoretical analysis and practical implications; presents extensive surveys with analysis, new contributions, and proposals on methods, algorithms, and processes; and also covers recent advances from quantitative and qualitative articles, case studies, conceptual works, and theoretical backing. This handbook will be of interest to graduate students, researchers, academicians, institutions, and professionals that are interested in exploring the areas of IoT and Blockchain.

IoT - Security and Privacy Paradigm (Hardcover): Souvik Pal, Vicente Garcia Diaz, Dac-Nhuong Le IoT - Security and Privacy Paradigm (Hardcover)
Souvik Pal, Vicente Garcia Diaz, Dac-Nhuong Le
R4,752 Discovery Miles 47 520 Ships in 12 - 17 working days

IOT: Security and Privacy Paradigm covers the evolution of security and privacy issues in the Internet of Things (IoT). It focuses on bringing all security and privacy related technologies into one source, so that students, researchers, and practitioners can refer to this book for easy understanding of IoT security and privacy issues. This edited book uses Security Engineering and Privacy-by-Design principles to design a secure IoT ecosystem and to implement cyber-security solutions. This book takes the readers on a journey that begins with understanding the security issues in IoT-enabled technologies and how it can be applied in various aspects. It walks readers through engaging with security challenges and builds a safe infrastructure for IoT devices. The book helps readers gain an understand of security architecture through IoT and describes the state of the art of IoT countermeasures. It also differentiates security threats in IoT-enabled infrastructure from traditional ad hoc or infrastructural networks, and provides a comprehensive discussion on the security challenges and solutions in RFID, WSNs, in IoT. This book aims to provide the concepts of related technologies and novel findings of the researchers through its chapter organization. The primary audience includes specialists, researchers, graduate students, designers, experts and engineers who are focused on research and security related issues. Souvik Pal, PhD, has worked as Assistant Professor in Nalanda Institute of Technology, Bhubaneswar, and JIS College of Engineering, Kolkata (NAAC "A" Accredited College). He is the organizing Chair and Plenary Speaker of RICE Conference in Vietnam; and organizing co-convener of ICICIT, Tunisia. He has served in many conferences as chair, keynote speaker, and he also chaired international conference sessions and presented session talks internationally. His research area includes Cloud Computing, Big Data, Wireless Sensor Network (WSN), Internet of Things, and Data Analytics. Vicente Garcia-Diaz, PhD, is an Associate Professor in the Department of Computer Science at the University of Oviedo (Languages and Computer Systems area). He is also the editor of several special issues in prestigious journals such as Scientific Programming and International Journal of Interactive Multimedia and Artificial Intelligence. His research interests include eLearning, machine learning and the use of domain specific languages in different areas. Dac-Nhuong Le, PhD, is Deputy-Head of Faculty of Information Technology, and Vice-Director of Information Technology Apply and Foreign Language Training Center, Haiphong University, Vietnam. His area of research includes: evaluation computing and approximate algorithms, network communication, security and vulnerability, network performance analysis and simulation, cloud computing, IoT and image processing in biomedical. Presently, he is serving on the editorial board of several international journals and has authored nine computer science books published by Springer, Wiley, CRC Press, Lambert Publication, and Scholar Press.

Big Data Analytics and Computing for Digital Forensic Investigations (Hardcover): Suneeta Satpathy, Sachi Mohanty Big Data Analytics and Computing for Digital Forensic Investigations (Hardcover)
Suneeta Satpathy, Sachi Mohanty
R2,440 Discovery Miles 24 400 Ships in 12 - 17 working days

Digital forensics has recently gained a notable development and become the most demanding area in today's information security requirement. This book investigates the areas of digital forensics, digital investigation and data analysis procedures as they apply to computer fraud and cybercrime, with the main objective of describing a variety of digital crimes and retrieving potential digital evidence. Big Data Analytics and Computing for Digital Forensic Investigations gives a contemporary view on the problems of information security. It presents the idea that protective mechanisms and software must be integrated along with forensic capabilities into existing forensic software using big data computing tools and techniques. Features Describes trends of digital forensics served for big data and the challenges of evidence acquisition Enables digital forensic investigators and law enforcement agencies to enhance their digital investigation capabilities with the application of data science analytics, algorithms and fusion technique This book is focused on helping professionals as well as researchers to get ready with next-generation security systems to mount the rising challenges of computer fraud and cybercrimes as well as with digital forensic investigations. Dr Suneeta Satpathy has more than ten years of teaching experience in different subjects of the Computer Science and Engineering discipline. She is currently working as an associate professor in the Department of Computer Science and Engineering, College of Bhubaneswar, affiliated with Biju Patnaik University and Technology, Odisha. Her research interests include computer forensics, cybersecurity, data fusion, data mining, big data analysis and decision mining. Dr Sachi Nandan Mohanty is an associate professor in the Department of Computer Science and Engineering at ICFAI Tech, ICFAI Foundation for Higher Education, Hyderabad, India. His research interests include data mining, big data analysis, cognitive science, fuzzy decision-making, brain-computer interface, cognition and computational intelligence.

Ethics in an Age of Surveillance - Personal Information and Virtual Identities (Paperback): Adam Henschke Ethics in an Age of Surveillance - Personal Information and Virtual Identities (Paperback)
Adam Henschke
R845 Discovery Miles 8 450 Ships in 12 - 17 working days

People increasingly live online, sharing publicly what might have once seemed private, but at the same time are enraged by extremes of government surveillance and the corresponding invasion into our private lives. In this enlightening work, Adam Henschke re-examines privacy and property in the age of surveillance in order to understand not only the importance of these social conventions, but also their moral relevance. By analyzing identity and information, and presenting a case for a relation between the two, he explains the moral importance of virtual identities and offers an ethically robust solution to designing surveillance technologies. This book should be read by anyone interested in surveillance technology, new information technology more generally, and social concepts like privacy and property.

Secure Enough? - 20 Questions on Cybersecurity for Business Owners and Executives (Hardcover): Bryce Austin Secure Enough? - 20 Questions on Cybersecurity for Business Owners and Executives (Hardcover)
Bryce Austin
R1,063 Discovery Miles 10 630 Ships in 10 - 15 working days
Nuking the Moon - And Other Intelligence Schemes and Military Plots Best Left on the Drawing Board (Paperback, Main): Vince... Nuking the Moon - And Other Intelligence Schemes and Military Plots Best Left on the Drawing Board (Paperback, Main)
Vince Houghton 1
R336 R254 Discovery Miles 2 540 Save R82 (24%) Ships in 12 - 17 working days

"Compulsively readable laugh out loud history." Mary Roach Bomb-carrying bats. Poisoned flower arrangements. Cigars laced with mind-altering drugs. Listening devices implanted into specially-trained cats. A torpedo-proof aircraft carrier made out of ice and sawdust. And a CIA plan to detonate a nuclear bomb on the moon ... just because. In Nuking the Moon, Vince Houghton, Historian and Curator at the International Spy Museum, collects the most inspired, implausible and downright bizarre military intelligence schemes that never quite made it off the drawing board. From the grandly ambitious to the truly devious, they illuminate a new side of warfare, revealing how a combination of desperation and innovation led not only to daring missions and brilliant technological advances, but to countless plans and experiments that failed spectacularly. Alternatively terrifying and hilarious, and combining archival research with newly-conducted interviews, these twenty-six chapters reveal not only what might have happened, but also what each one tells us about the history and people around it. If 'military intelligence' makes you think of James Bond and ingenious exploding gadgets ... get ready for the true story.

The Future of Open Data (Paperback): Pamela Robinson, Teresa Scassa The Future of Open Data (Paperback)
Pamela Robinson, Teresa Scassa
R679 Discovery Miles 6 790 Ships in 12 - 17 working days

The Future of Open Data flows from a multi-year Social Sciences and Humanities Research Council (SSHRC) Partnership Grant project that set out to explore open government geospatial data from an interdisciplinary perspective. Researchers on the grant adopted a critical social science perspective grounded in the imperative that the research should be relevant to government and civil society partners in the field. This book builds on the knowledge developed during the course of the grant and asks the question, "What is the future of open data?" The contributors' insights into the future of open data combine observations from five years of research about the Canadian open data community with a critical perspective on what could and should happen as open data efforts evolve. Each of the chapters in this book addresses different issues and each is grounded in distinct disciplinary or interdisciplinary perspectives. The opening chapter reflects on the origins of open data in Canada and how it has progressed to the present date, taking into account how the Indigenous data sovereignty movement intersects with open data. A series of chapters address some of the pitfalls and opportunities of open data and consider how the changing data context may impact sources of open data, limits on open data, and even liability for open data. Another group of chapters considers new landscapes for open data, including open data in the global South, the data priorities of local governments, and the emerging context for rural open data.

Why Don't We Defend Better? - Data Breaches, Risk Management, and Public Policy (Hardcover): Richard Warner, Robert Sloan Why Don't We Defend Better? - Data Breaches, Risk Management, and Public Policy (Hardcover)
Richard Warner, Robert Sloan
R1,658 Discovery Miles 16 580 Ships in 12 - 17 working days

The wave of data breaches raises two pressing questions: Why don't we defend our networks better? And, what practical incentives can we create to improve our defenses? Why Don't We Defend Better?: Data Breaches, Risk Management, and Public Policy answers those questions. It distinguishes three technical sources of data breaches corresponding to three types of vulnerabilities: software, human, and network. It discusses two risk management goals: business and consumer. The authors propose mandatory anonymous reporting of information as an essential step toward better defense, as well as a general reporting requirement. They also provide a systematic overview of data breach defense, combining technological and public policy considerations. Features Explains why data breach defense is currently often ineffective Shows how to respond to the increasing frequency of data breaches Combines the issues of technology, business and risk management, and legal liability Discusses the different issues faced by large versus small and medium-sized businesses (SMBs) Provides a practical framework in which public policy issues about data breaches can be effectively addressed

Cyber-security of SCADA and Other Industrial Control Systems (Hardcover, 1st ed. 2016): Edward J M Colbert, Alexander Kott Cyber-security of SCADA and Other Industrial Control Systems (Hardcover, 1st ed. 2016)
Edward J M Colbert, Alexander Kott
R5,850 Discovery Miles 58 500 Ships in 10 - 15 working days

This book provides a comprehensive overview of the fundamental security of Industrial Control Systems (ICSs), including Supervisory Control and Data Acquisition (SCADA) systems and touching on cyber-physical systems in general. Careful attention is given to providing the reader with clear and comprehensive background and reference material for each topic pertinent to ICS security. This book offers answers to such questions as: Which specific operating and security issues may lead to a loss of efficiency and operation? What methods can be used to monitor and protect my system? How can I design my system to reduce threats?This book offers chapters on ICS cyber threats, attacks, metrics, risk, situational awareness, intrusion detection, and security testing, providing an advantageous reference set for current system owners who wish to securely configure and operate their ICSs. This book is appropriate for non-specialists as well. Tutorial information is provided in two initial chapters and in the beginnings of other chapters as needed. The book concludes with advanced topics on ICS governance, responses to attacks on ICS, and future security of the Internet of Things.

My Online Privacy for Seniors (Paperback): Jason Rich My Online Privacy for Seniors (Paperback)
Jason Rich
R644 R587 Discovery Miles 5 870 Save R57 (9%) Ships in 9 - 15 working days

My Online Privacy for Seniors is an exceptionally easy and complete guide to protecting your privacy while you take advantage of the extraordinary resources available to you through the Internet and your mobile devices. It approaches every topic from a senior’s point of view, using meaningful examples, step-by-step tasks, large text, close-up screen shots, and a custom full-color interior designed for comfortable reading. Top beginning technology author Jason R. Rich covers all you need to know to:

•Safely surf the Internet (and gain some control over the ads you’re shown)

•Protect yourself when working with emails

•Securely handle online banking and shopping

•Stay safe on social media, and when sharing photos online

•Safely store data, documents, and files in the cloud

•Secure your entertainment options

•Customize security on your smartphone, tablet, PC, or Mac

•Work with smart appliances and home security tools

•Protect your children and grandchildren online

•Take the right steps immediately if you’re victimized by cybercrime, identity theft, or an online scam

•You don’t have to avoid today’s amazing digital world: you can enrich your life, deepen your connections, and still keep yourself safe.

The Politics and Policies of Big Data - Big Data, Big Brother? (Hardcover): Ann Rudinow Saetnan, Ingrid Schneider, Nicola Green The Politics and Policies of Big Data - Big Data, Big Brother? (Hardcover)
Ann Rudinow Saetnan, Ingrid Schneider, Nicola Green
R3,565 Discovery Miles 35 650 Ships in 12 - 17 working days

Big Data, gathered together and re-analysed, can be used to form endless variations of our persons - so-called 'data doubles'. Whilst never a precise portrayal of who we are, they unarguably contain glimpses of details about us that, when deployed into various routines (such as management, policing and advertising) can affect us in many ways. How are we to deal with Big Data? When is it beneficial to us? When is it harmful? How might we regulate it? Offering careful and critical analyses, this timely volume aims to broaden well-informed, unprejudiced discourse, focusing on: the tenets of Big Data, the politics of governance and regulation; and Big Data practices, performance and resistance. An interdisciplinary volume, The Politics of Big Data will appeal to undergraduate and postgraduate students, as well as postdoctoral and senior researchers interested in fields such as Technology, Politics and Surveillance.

The Identity Trade - Selling Privacy and Reputation Online (Paperback): Nora A. Draper The Identity Trade - Selling Privacy and Reputation Online (Paperback)
Nora A. Draper
R594 Discovery Miles 5 940 Ships in 12 - 17 working days

The successes and failures of an industry that claims to protect and promote our online identities What does privacy mean in the digital era? As technology increasingly blurs the boundary between public and private, questions about who controls our data become harder and harder to answer. Our every web view, click, and online purchase can be sold to anyone to store and use as they wish. At the same time, our online reputation has become an important part of our identity-a form of cultural currency. The Identity Trade examines the relationship between online visibility and privacy, and the politics of identity and self-presentation in the digital age. In doing so, Nora Draper looks at the revealing two-decade history of efforts by the consumer privacy industry to give individuals control over their digital image through the sale of privacy protection and reputation management as a service. Through in-depth interviews with industry experts, as well as analysis of media coverage, promotional materials, and government policies, Draper examines how companies have turned the protection and promotion of digital information into a business. Along the way, she also provides insight into how these companies have responded to and shaped the ways we think about image and reputation in the digital age. Tracking the successes and failures of companies claiming to control our digital ephemera, Draper takes us inside an industry that has commodified strategies of information control. This book is a discerning overview of the debate around who controls our data, who buys and sells it, and the consequences of treating privacy as a consumer good.

Intelligent Data Analysis for e-Learning - Enhancing Security and Trustworthiness in Online Learning Systems (Paperback): Jorge... Intelligent Data Analysis for e-Learning - Enhancing Security and Trustworthiness in Online Learning Systems (Paperback)
Jorge Miguel, Santi Caballe, Fatos Xhafa
R2,734 R2,440 Discovery Miles 24 400 Save R294 (11%) Ships in 12 - 17 working days

Intelligent Data Analysis for e-Learning: Enhancing Security and Trustworthiness in Online Learning Systems addresses information security within e-Learning based on trustworthiness assessment and prediction. Over the past decade, many learning management systems have appeared in the education market. Security in these systems is essential for protecting against unfair and dishonest conduct-most notably cheating-however, e-Learning services are often designed and implemented without considering security requirements. This book provides functional approaches of trustworthiness analysis, modeling, assessment, and prediction for stronger security and support in online learning, highlighting the security deficiencies found in most online collaborative learning systems. The book explores trustworthiness methodologies based on collective intelligence than can overcome these deficiencies. It examines trustworthiness analysis that utilizes the large amounts of data-learning activities generate. In addition, as processing this data is costly, the book offers a parallel processing paradigm that can support learning activities in real-time. The book discusses data visualization methods for managing e-Learning, providing the tools needed to analyze the data collected. Using a case-based approach, the book concludes with models and methodologies for evaluating and validating security in e-Learning systems. Indexing: The books of this series are submitted to EI-Compendex and SCOPUS

A Beginner's Guide to Internet of Things Security - Attacks, Applications, Authentication, and Fundamentals (Hardcover):... A Beginner's Guide to Internet of Things Security - Attacks, Applications, Authentication, and Fundamentals (Hardcover)
Aakanksha Tewari, Brij B. Gupta
R1,761 Discovery Miles 17 610 Ships in 9 - 15 working days

A Beginner's Guide to Internet of Things Security focuses on security issues and developments in the Internet of Things (IoT) environment. The wide-ranging applications of IoT, including home appliances, transportation, logistics, healthcare, and smart cities, necessitate security applications that can be applied to every domain with minimal cost. IoT contains three layers: application layer, middleware layer, and perception layer. The security problems of each layer are analyzed separately to identify solutions, along with the integration and scalability issues with the cross-layer architecture of IoT. The book discusses the state-of-the-art authentication-based security schemes, which can secure radio frequency identification (RFID) tags, along with some security models that are used to verify whether an authentication scheme is secure against any potential security risks. It also looks at existing authentication schemes and security models with their strengths and weaknesses. The book uses statistical and analytical data and explains its impact on the IoT field, as well as an extensive literature survey focusing on trust and privacy problems. The open challenges and future research direction discussed in this book will help to further academic researchers and industry professionals in the domain of security. Dr. Brij B. Gupta is an assistant professor in the Department of Computer Engineering, National Institute of Technology, Kurukshetra, India. Ms. Aakanksha Tewari is a PhD Scholar in the Department of Computer Engineering, National Institute of Technology, Kurukshetra, India.

A Study of Black Hole Attack Solutions - On AODV Routing Protocol in MANET (Paperback): Elahe Fazeldehkordi, I.S. Dr. Amiri,... A Study of Black Hole Attack Solutions - On AODV Routing Protocol in MANET (Paperback)
Elahe Fazeldehkordi, I.S. Dr. Amiri, Oluwatobi Ayodeji Akanbi
R1,426 R1,329 Discovery Miles 13 290 Save R97 (7%) Ships in 12 - 17 working days

Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact that they are dynamic, require no fixed infrastructure, and are scalable. However, MANETs are particularly susceptible to several different types of widely perpetrated cyberattack. One of the most common hacks aimed at MANETs is the Black Hole attack, in which a particular node within the network displays itself as having the shortest path for the node whose packets it wants to intercept. Once the packets are drawn to the Black Hole, they are then dropped instead of relayed, and the communication of the MANET is thereby disrupted, without knowledge of the other nodes in the network. Due to the sophistication of the Black Hole attack, there has been a lot of research conducted on how to detect it and prevent it. The authors of this short format title provide their research results on providing an effective solution to Black Hole attacks, including introduction of new MANET routing protocols that can be implemented in order to improve detection accuracy and network parameters such as total dropped packets, end-to-end delay, packet delivery ratio, and routing request overhead.

DarkMarket - How Hackers Became the New Mafia (Paperback): Misha Glenny DarkMarket - How Hackers Became the New Mafia (Paperback)
Misha Glenny 1
R320 R250 Discovery Miles 2 500 Save R70 (22%) Ships in 5 - 10 working days

We live our lives online - banking, shopping, working, dating - but have we become complacent? Who's got your money? We share our personal details, our thoughts and movements with a faceless screen, with no real idea what lies behind it. Who's got your identity? DarkMarket exposes the shocking truth about what lurks behind our computers: an underground crime network that invades our privacy and threatens our security on a daily basis. Who's got your life? Glenny tracks down the key players - including criminals, national and international security experts, police, crack addicts, the Saudi Royal Family, and most importantly, victims - to reveal the true scale of this new global threat. Shortlisted for the Orwell Prize 2012

Data Privacy for the Smart Grid (Hardcover): Rebecca Herold, Christine Hertzog Data Privacy for the Smart Grid (Hardcover)
Rebecca Herold, Christine Hertzog
R2,204 Discovery Miles 22 040 Ships in 12 - 17 working days

Many Smart Grid books include "privacy" in their title, but only touch on privacy, with most of the discussion focusing on cybersecurity. Filling this knowledge gap, Data Privacy for the Smart Grid provides a clear description of the Smart Grid ecosystem, presents practical guidance about its privacy risks, and details the actions required to protect data generated by Smart Grid technologies. It addresses privacy in electric, natural gas, and water grids and supplies two different perspectives of the topic-one from a Smart Grid expert and another from a privacy and information security expert.The authors have extensive experience with utilities and leading the U.S. government's National Institute of Standards and Technologies (NIST) Cyber Security Working Group (CSWG)/Smart Grid Interoperability Group (SGIP) Privacy Subgroup. This comprehensive book is understandable for all those involved in the Smart Grid. The authors detail the facts about Smart Grid privacy so readers can separate truth from myth about Smart Grid privacy. While considering privacy in the Smart Grid, the book also examines the data created by Smart Grid technologies and machine-to-machine (M2M) applications and associated legal issues. The text details guidelines based on the Organization for Economic Cooperation and Development Privacy Guidelines and the U.S. Federal Trade Commission Fair Information Practices. It includes privacy training recommendations and references to additional Smart Grid privacy resources. After reading the book, readers will be prepared to develop informed opinions, establish fact-based decisions, make meaningful contributions to Smart Grid legislation and policies, and to build technologies to preserve and protect privacy. Policy makers; Smart Grid and M2M product and service developers; utility customer and privacy resources; and other service providers and resources are primary beneficiaries of the information provided in

Click Here to Kill Everybody - Security and Survival in a Hyper-connected World (Paperback): Bruce Schneier Click Here to Kill Everybody - Security and Survival in a Hyper-connected World (Paperback)
Bruce Schneier
R451 Discovery Miles 4 510 Ships in 12 - 17 working days

We have created the ultimate hive-mind robot: an Internet of interconnected devices that senses, thinks and acts. Bruce Schneier calls it the "World-Sized Web". It includes everything from driverless cars to smart thermostats, from billboards that respond to specific people to drones equipped with their own behavioural algorithms. While the World-Sized Web carries enormous potential, Schneier argues that we are unprepared for the vulnerabilities it brings. Cutting-edge digital attackers can now crash your car, pacemaker and home security system and everyone else's. Click Here to Kill Everybody explores the risks and security implications of the World-Sized Web and lays out common-sense policies that will allow us to enjoy the benefits of this new omnipotent age without surrendering ourselves entirely to our creation.

The State Of Open Data - Histories And Horizons (Paperback): Tim Davies, Stephen B Walker, Mor Rubinstein The State Of Open Data - Histories And Horizons (Paperback)
Tim Davies, Stephen B Walker, Mor Rubinstein
R300 R234 Discovery Miles 2 340 Save R66 (22%) Ships in 5 - 10 working days

It’s been ten years since open data first broke onto the global stage. Over the past decade, thousands of programmes and projects around the world have worked to open data and use it to address a myriad of social and economic challenges. Meanwhile, issues related to data rights and privacy have moved to the centre of public and political discourse.

As the open data movement enters a new phase in its evolution, shifting to target real-world problems and embed open data thinking into other existing or emerging communities of practice, big questions still remain. How will open data initiatives respond to new concerns about privacy, inclusion, and artificial intelligence? And what can we learn from the last decade in order to deliver impact where it is most needed?

The State of Open Data brings together over 60 authors from around the world to address these questions and to take stock of the real progress made to date across sectors and around the world, uncovering the issues that will shape the future of open data in the years to come.

The Basics of Digital Privacy - Simple Tools to Protect Your Personal Information and Your Identity Online (Paperback): Denny... The Basics of Digital Privacy - Simple Tools to Protect Your Personal Information and Your Identity Online (Paperback)
Denny Cherry
R626 Discovery Miles 6 260 Ships in 12 - 17 working days

Who s watching you online? These days, it s hard to be sure. But the recent Edward Snowden revelations of NSA data mining and the constant threat of identity theft from criminals mean your privacy is in jeopardy.

"The Basics of Digital Privacy" teaches you how to protect the privacy of your data and your identity while surfing, searching, and interacting with others in a virtual world. Author Denny Cherry teaches professionals how to keep huge databases secure, and he will introduce you to the basic concepts of protecting your identity, your financial data, and your personal information from prying eyes while using your computer and smartphone. You ll learn how to stay connected and conduct business online, while protecting your privacy with every keystroke and click.

"The Basics of Digital Privacy" gives you clear, non-technical explanations of how to safely store personal information online, create secure usernames and passwords for websites, and participate in social media without compromising your privacy. Learn how to find out who s watching you online, and what the law has to say about your privacy rights. A great resource for anyone who ventures into the online world on a daily basis
The most straightforward and up-to-date guide to privacy for anyone who goes online for work, school, or personal useReal-world examples show you how cyber criminals commit their crimes, and what you can do to keep your identity and your data safeWritten by author Denny Cherry, who teaches top security professionals how to protect huge databases of informationLearn the best ways to create secure passwords, chat, text, email and conduct business online without compromising your identity and your personal data"

Big Data, Surveillance and Crisis Management (Paperback): Kees Boersma, Chiara Fonio Big Data, Surveillance and Crisis Management (Paperback)
Kees Boersma, Chiara Fonio
R1,293 Discovery Miles 12 930 Ships in 12 - 17 working days

Big data, surveillance, crisis management. Three largely different and richly researched fields, however, the interplay amongst these three domains is rarely addressed. In this enlightening title, the link between these three fields is explored in a consequential order through a variety of contributions and series of unique and international case studies. Indeed, whilst considering crisis management as an "umbrella term" that covers a number of crises and ways of managing them, the reader will also explore the collection of "big data" by governmental crisis organisations. However, this volume also addresses the unintended consequences of using such data. In particular, through the lens of surveillance, one will also investigate how the use and abuse of big data can easily lead to monitoring and controlling the behaviour of people affected by crises. Thus, the reader will ultimately join the authors in their debate of how big data in crisis management needs to be examined as a political process involving questions of power and transparency. An enlightening and highly topical volume, Big Data, Surveillance and Crisis Management will appeal to postgraduate students and postdoctoral researchers interested in fields including Sociology and Surveillance Studies, Disaster and Crisis Management, Media Studies, Governmentality, Organisation Theory and Information Society Studies.

Practical Anonymity - Hiding in Plain Sight Online (Paperback): Pete Loshin Practical Anonymity - Hiding in Plain Sight Online (Paperback)
Pete Loshin
R633 Discovery Miles 6 330 Ships in 12 - 17 working days

For those with legitimate reason to use the Internet anonymously--diplomats, military and other government agencies, journalists, political activists, IT professionals, law enforcement personnel, political refugees and others--anonymous networking provides an invaluable tool, and many good reasons that anonymity can serve a very important purpose. Anonymous use of the Internet is made difficult by the many websites that know everything about us, by the cookies and ad networks, IP-logging ISPs, even nosy officials may get involved. It is no longer possible to turn off browser cookies to be left alone in your online life. "Practical Anonymity: Hiding in Plain Sight Online "shows you how to use the most effective and widely-used anonymity tools--the ones that protect diplomats, military and other government agencies to become invisible online. This "practical "guide skips the theoretical and technical details and focuses on getting from zero to anonymous as fast as possible.

For many, using any of the open-source, peer-reviewed tools for connecting to the Internet via an anonymous network may be (or seem to be) too difficult becausemost of the information about these tools is burdened with discussions of how they work and how to maximize security. Even tech-savvy users may find the burden too great--but actually using the tools can be pretty simple.

The primary market for this book consists of IT professionals who need/want tools for anonymity to test/work around corporate firewalls and router filtering as well as provide anonymity tools to their customers.

Simple, step-by-step instructions for configuring and using anonymous networking software Simple, step-by-step instructions for configuring and using anonymous networking software Use of open source, time-proven and peer-reviewed tools for anonymity Plain-language discussion of actual threats and concrete suggestions for appropriate responses Easy-to-follow tips for safer computing
Simple, step-by-step instructions for configuring and using anonymous networking software Use of open source, time-proven and peer-reviewed tools for anonymity Plain-language discussion of actual threats, and concrete suggestions for appropriate responses Easy to follow tips for safer computing. "

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Broken Code - Inside Facebook And The…
Jeff Horwitz Paperback R420 R328 Discovery Miles 3 280
Smart-Tech Society - Convenience…
Mark Whitehead, William G.A. Collier Hardcover R2,911 Discovery Miles 29 110
Information And Communications…
Dana van der Merwe Paperback R1,119 R1,000 Discovery Miles 10 000
The Age of AI - And Our Human Future
Henry A. Kissinger, Eric Schmidt, … Paperback R241 Discovery Miles 2 410
Identified, Tracked, and Profiled - The…
Peter Dauvergne Hardcover R2,266 Discovery Miles 22 660
A Beginner's Guide to Internet of Things…
Aakanksha Tewari, Brij B. Gupta Paperback R631 Discovery Miles 6 310
Permanent Record - A Memoir of a…
Edward Snowden Hardcover  (1)
R631 R517 Discovery Miles 5 170
Pandemic Surveillance - Privacy…
Margaret Hu Hardcover R3,053 Discovery Miles 30 530
EU General Data Protection Regulation…
It Governance Privacy Team Paperback R754 Discovery Miles 7 540
Research Handbook on Privacy and Data…
Gloria Gonzalez, Rosamunde van Brakel, … Hardcover R6,507 Discovery Miles 65 070

 

Partners