Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. This study guide offers 100% coverage of every objective for the Certified Data Privacy Solutions Engineer Exam Take ISACA's rigorous Certified Data Privacy Solutions Engineer exam with confidence using the comprehensive information in this effective self-study guide. Written by a security and privacy expert and experienced author, the book lays out hands-on privacy and security techniques and thoroughly prepares candidates to pass this exam. Beyond exam preparation, the guide also serves as a valuable on-the-job reference. CDPSE (TM) Certified Data Privacy Solutions Engineer All-in-One Exam Guide is based on proven teaching and learning styles and features special elements that teach and reinforce practical privacy and IT security skills. The book contains in-depth practice questions and detailed explanations. You will discover how to effectively design, build, and run information privacy management programs. Contains comprehensive coverage of every topic on the CDPSE exam Online content includes 300 practice questions in the customizable Total Tester exam engine Written by a security and privacy expert, educator, and experienced author
A practical, user-friendly handbook for understanding and protecting our personal data and digital privacy. Our Data, Ourselves addresses a common and crucial question: What can we as private individuals do to protect our personal information in a digital world? In this practical handbook, legal expert Jacqueline D. Lipton guides readers through important issues involving technology, data collection, and digital privacy as they apply to our daily lives. Our Data, Ourselves covers a broad range of everyday privacy concerns with easily digestible, accessible overviews and real-world examples. Lipton explores the ways we can protect our personal data and monitor its use by corporations, the government, and others. She also explains our rights regarding sensitive personal data like health insurance records and credit scores, as well as what information retailers can legally gather, and how. Who actually owns our personal information? Can an employer legally access personal emails? What privacy rights do we have on social media? Answering these questions and more, Our Data, Ourselves provides a strategic approach to assuming control over, and ultimately protecting, our personal information.
Privacy on the internet is challenged in a wide variety of ways - from large social media companies, whose entire business models are based on privacy invasion, through the developing technologies of facial recognition, to the desire of governments to monitor our every activity online. But the impact these issues have on our daily lives is often underplayed or misunderstood. In this book, Paul Bernal analyses how the internet became what it is today, exploring how the current manifestation of the internet works for people, for companies and even for governments, with reference to the new privacy battlefields of location and health data, the internet of things and the increasingly contentious issue of personal data and political manipulation. The author then proposes what we should do about the problems surrounding internet privacy, such as significant changes in government policy, a reversal of the current 'war' on encryption, being brave enough to take on the internet giants, and challenging the idea that 'real names' would improve the discourse on social networks. ABOUT THE SERIES: The 'What Do We Know and What Should We Do About...?' series offers readers short, up-to-date overviews of key issues often misrepresented, simplified or misunderstood in modern society and the media. Each book is written by a leading social scientist with an established reputation in the relevant subject area. The Series Editor is Professor Chris Grey, Royal Holloway, University of London
The subjects of Privacy and Data Protection are more relevant than ever, and especially since 25 May 2018, when the European General Data Protection Regulation became enforceable. This volume brings together papers that offer conceptual analyses, highlight issues, propose solutions, and discuss practices regarding privacy and data protection. It is one of the results of the eleventh annual International Conference on Computers, Privacy, and Data Protection, CPDP 2018, held in Brussels in January 2018. The book explores the following topics: biometrics and data protection in criminal justice processing, privacy, discrimination and platforms for men who have sex with men, mitigation through data protection instruments of unfair inequalities as a result of machine learning, privacy and human-robot interaction in robotized healthcare, privacy-by-design, personal data protection of deceased data subjects, large-scale face databases and the GDPR, the new Europol regulation, rethinking trust in the Internet of Things, fines under the GDPR, data analytics and the GDPR, and the essence of the right to the protection of personal data. This interdisciplinary book was written while the reality of the General Data Protection Regulation 2016/679 was becoming clear. It discusses open issues and daring and prospective approaches. It will serve as an insightful resource for readers with an interest in computers, privacy and data protection.
Today the vast majority of the world's information resides in, is derived from, and is exchanged among multiple automated systems. Critical decisions are made, and critical action is taken based on information from these systems. Therefore, the information must be accurate, correct, and timely, and be manipulated, stored, retrieved, and exchanged safely, reliably, and securely. In a time when information is considered the latest commodity, information security should be top priority.
As a social space, the web provides researchers both with a tool and an environment to explore the intricacies of everyday life. As a site of mediated interactions and interrelationships, the 'digital' has evolved from being a space of information to a space of creation, thus providing new opportunities regarding how, where and, why to conduct social research. Doing Research In and On the Digital aims to deliver on two fronts: first, by detailing how researchers are devising and applying innovative research methods for and within the digital sphere, and, secondly, by discussing the ethical challenges and issues implied and encountered in such approaches. In two core Parts, this collection explores: content collection: methods for harvesting digital data engaging research informants: digital participatory methods and data stories . With contributions from a diverse range of fields such as anthropology, sociology, education, healthcare and psychology, this volume will particularly appeal to post-graduate students and early career researchers who are navigating through new terrain in their digital-mediated research endeavours.
Advances in health information technology (health IT) have the potential to improve the quality of healthcare, to increase the availability of health information for treatment, and to implement safeguards that cannot be applied easily or cost-effectively to paper-based health records. However, the digitization of health information is also raising new privacy risks and concerns. Sensitive health information in digital form is more easily aggregated, used, and shared. In addition, the rising cost of healthcare and the search for efficiency may create incentives to use the information in new ways. Research has consistently shown that while the public sees the potential value of health information exchange and technological advancements, it remains gravely concerned about the privacy of their sensitive health information. As a result, it is becoming increasingly clear that ensuring public trust will be critical to the successful implementation of nationwide health information exchange. The purpose of this second edition is two-fold: 1) to educate readers about privacy concepts and 2) highlight key privacy issues facing the nation and the healthcare community as it moves towards electronic health records and health information exchange. The first three chapters are descriptive in nature, defining privacy and distinguishing it from security, defining the complex legal landscape for health information privacy, and setting the stage for the following chapters by describing the current landscape of the evolving healthcare environment. The following chapters discuss specific privacy issues and challenges in detail. The book concludes with a chapter providing a view to the future of healthcare and the association privacy implications. This is an updated version of one of HIMSS' best-selling books on information privacy.
A collection of best practices and effective implementation recommendations that are proven to work, Secure, Resilient, and Agile Software Development leaves the boring details of software security theory out of the discussion as much as possible to concentrate on practical applied software security for practical people. Written to aid your career as well as your organization, the book shows how to gain skills in secure and resilient software development and related tasks. The book explains how to integrate these development skills into your daily duties, thereby increasing your professional value to your company, your management, your community, and your industry. Secure, Resilient, and Agile Software Development was written for the following professionals: AppSec architects and program managers in information security organizations Enterprise architecture teams with application development focus Scrum teams DevOps teams Product owners and their managers Project managers Application security auditors With a detailed look at Agile and Scrum software development methodologies, this book explains how security controls need to change in light of an entirely new paradigm on how software is developed. It focuses on ways to educate everyone who has a hand in any software development project with appropriate and practical skills to Build Security In. After covering foundational and fundamental principles for secure application design, this book dives into concepts, techniques, and design goals to meet well-understood acceptance criteria on features an application must implement. It also explains how the design sprint is adapted for proper consideration of security as well as defensive programming techniques. The book concludes with a look at white box application analysis and sprint-based activities to improve the security and quality of software under development.
Research on cybercrime has been largely bifurcated, with social science and computer science researchers working with different research agendas. These fields have produced parallel scholarship to understand cybercrime offending and victimization, as well as techniques to harden systems from compromise and understand the tools used by cybercriminals. The literature developed from these two fields is diverse and informative, but until now there has been minimal interdisciplinary scholarship combining their insights in order to create a more informed and robust body of knowledge. This book offers an interdisciplinary approach to research on cybercrime and lays out frameworks for collaboration between the fields. Bringing together international experts, this book explores a range of issues from malicious software and hacking to victimization and fraud. This work also provides direction for policy changes to both cybersecurity and criminal justice practice based on the enhanced understanding of cybercrime that can be derived from integrated research from both the technical and social sciences. The authors demonstrate the breadth of contemporary scholarship as well as identifying key questions that could be addressed in the future or unique methods that could benefit the wider research community. This edited collection will be key reading for academics, researchers, and practitioners in both computer security and law enforcement. This book is also a comprehensive resource for postgraduate and advanced undergraduate students undertaking courses in social and technical studies.
The EU's General Data Protection Regulation created the position of corporate Data Protection Officer (DPO), who is empowered to ensure the organization is compliant with all aspects of the new data protection regime. Organizations must now appoint and designate a DPO. The specific definitions and building blocks of the data protection regime are enhanced by the new General Data Protection Regulation and therefore the DPO will be very active in passing the message and requirements of the new data protection regime throughout the organization. This book explains the roles and responsiblies of the DPO, as well as highlights the potential cost of getting data protection wrong.
Discusses the evolution of WHOIS and how policy changes will affect WHOIS place in IT today and in the future This book provides a comprehensive overview of WHOIS. The text begins with an introduction to WHOIS and an in-depth coverage of its forty-year history. Afterwards it examines how to use WHOIS and how WHOIS fits in the overall structure of the Domain Name System (DNS). Other technical topics covered include WHOIS query code and WHOIS server details. The book also discusses current policy developments and implementations, reviews critical policy documents, and explains how they will affect the future of the Internet and WHOIS. Additional resources and content updates will be provided through a supplementary website. * Includes an appendix with information on current and authoritative WHOIS services around the world * Provides illustrations of actual WHOIS records and screenshots of web-based WHOIS query interfaces with instructions for navigating them * Explains network dependencies and processes related to WHOIS utilizing flowcharts * Contains advanced coding for programmers * Visit the book's companion website http://whois.knujon.com for technical and policy documents concerning WHOIS, WHOIS code examples, internet locations for WHOIS databases and more. WHOIS Running the Internet: Protocol, Policy, and Privacy is written primarily for internet developers, policy developers, industry professionals in law enforcement, digital forensic investigators, and intellectual property attorneys. Garth O. Bruen is an Internet policy and security researcher whose work has been published in the Wall Street Journal and the Washington Post. Since 2012 Garth Bruen has served as the North American At-Large Chair to the Internet Corporation of Assigned Names and Numbers (ICANN). In 2003 Bruen created KnujOn.com with his late father, Dr. Robert Bruen, to process and investigate Internet abuse complaints (SPAM) from consumers. Bruen has trained and advised law enforcement at the federal and local levels on malicious use of the Domain Name System in the way it relates to the WHOIS record system. He has presented multiple times to the High Technology Crime Investigation Association (HTCIA) as well as other cybercrime venues including the Anti-Phishing Working Group (APWG) and the National Center for Justice and the Rule of Law at The University of Mississippi School of Law. Bruen also teaches the Fisher College Criminal Justice School in Boston where he develops new approaches to digital crime.
We live in times of increasing inscrutability. Our news feeds are filled with unverified, unverifiable speculation, much of it automatically generated by anonymous software. As a result, we no longer understand what is happening around us. Underlying all of these trends is a single idea: the belief that quantitative data can provide a coherent model of the world, and the efficacy of computable information to provide us with ways of acting within it. Yet the sheer volume of information available to us today reveals less than we hope. Rather, it heralds a new Dark Age: a world of ever-increasing incomprehension. In his brilliant new work, leading artist and writer James Bridle offers us a warning against the future in which the contemporary promise of a new technologically assisted Enlightenment may just deliver its opposite: an age of complex uncertainty, predictive algorithms, surveillance, and the hollowing out of empathy. Surveying the history of art, technology and information systems he reveals the dark clouds that gather over discussions of the digital sublime.
BOOKS TO LOOK OUT FOR IN 2022, NEW STATESMAN & CITY AM Chosen as one of the Financial Time's Best Summer Books of 2022 Longlisted for the Moore Prize for Human Rights Writing 'Compelling, powerful and necessary.' Shoshana Zuboff, author of The Age of Surveillance Capitalism 'Fascinating' Guardian Without a moment's pause, we share our most intimate thoughts with trillion-dollar tech companies. Their algorithms categorize us and jump to troubling conclusions about who we are. They also shape our everyday thoughts, choices and actions - from who we date to whether we vote. But this is just the latest front in an age-old struggle. Part history and part manifesto, Freedom to Think explores how the powerful have always sought to influence how we think and what we buy. Connecting the dots from Galileo to Alexa, human rights lawyer Susie Alegre charts the history and fragility of our most important human right: freedom of thought. Filled with shocking case-studies across politics, criminal justice, and everyday life, this ground-breaking book shows how our mental freedom is under threat like never before. Bold and radical, Alegre argues that only by recasting our human rights for the digital age can we safeguard our future.
This popular text introduces the reader to all aspects of psychometric assessment, including its history, the construction and administration of traditional tests, and the latest techniques for psychometric assessment online. Rust, Kosinski, and Stillwell begin with a comprehensive introduction to the increased sophistication in psychometric methods and regulation that took place during the 20th century, including the many benefits to governments, businesses, and customers. In this new edition, the authors explore the increasing influence of the internet, wherein everything we do on the internet is available for psychometric analysis, often by AI systems operating at scale and in real time. The intended and unintended consequences of this paradigm shift are examined in detail, and key controversies, such as privacy and the psychographic microtargeting of online messages, are addressed. Furthermore, this new edition includes brand-new chapters on item response theory, computer adaptive testing, and the psychometric analysis of the digital traces we all leave online. Modern Psychometrics combines an up-to-date scientific approach with full consideration of the political and ethical issues involved in the implementation of psychometric testing in today's society. It will be invaluable to both undergraduate and postgraduate students, as well as practitioners who are seeking an introduction to modern psychometric methods.
Web Privacy with P3P explains the P3P protocol and shows web site developers how to configure their sites for P3P compliance. Full of examples and case studies, the book delivers practical advice and insider tips. Software developers, privacy consultants, corporate decision-makers, lawyers, public policy-makers, and any individual interested in online privacy issues will find this book a necessary reference.
This popular text introduces the reader to all aspects of psychometric assessment, including its history, the construction and administration of traditional tests, and the latest techniques for psychometric assessment online. Rust, Kosinski, and Stillwell begin with a comprehensive introduction to the increased sophistication in psychometric methods and regulation that took place during the 20th century, including the many benefits to governments, businesses, and customers. In this new edition, the authors explore the increasing influence of the internet, wherein everything we do on the internet is available for psychometric analysis, often by AI systems operating at scale and in real time. The intended and unintended consequences of this paradigm shift are examined in detail, and key controversies, such as privacy and the psychographic microtargeting of online messages, are addressed. Furthermore, this new edition includes brand-new chapters on item response theory, computer adaptive testing, and the psychometric analysis of the digital traces we all leave online. Modern Psychometrics combines an up-to-date scientific approach with full consideration of the political and ethical issues involved in the implementation of psychometric testing in today's society. It will be invaluable to both undergraduate and postgraduate students, as well as practitioners who are seeking an introduction to modern psychometric methods.
Privacy is one of the most urgent issues associated with
information technology and digital media. This book claims that
what people really care about when they complain and protest that
privacy has been violated is not the act of sharing information
itself--most people understand that this is crucial to social life
--but the inappropriate, improper sharing of information.
Though often invisible, cryptography plays a critical role in our everyday lives. Broadly defined as a set of tools for establishing security in cyberspace, cryptography enables us to protect our information and share it securely. It underpins the security of mobile phone calls, card payments, web connections, internet messaging, Bitcoin transactions-in short, everything we do online. Clearly and concisely, Keith Martin reveals the many crucial ways we all rely on cryptographic technology and demystifies its controversial applications and the nuances behind alarming headlines about data breaches or Edward Snowden. Essential reading for anyone with a password, Cryptography offers a profound perspective on personal security, online and off.
For many small businesses, organisations, clubs, artists, faith groups, voluntary organisations/charities and sole traders, applying the General Data Protection Regulation (GDPR) has been like playing a game of "Snakes and Ladders". As soon as you move along the board and climb a ladder, a snake appears, which takes you right back to where you started. Conflicting advice abounds and there is nowhere for these individuals to go for simple answers all in one place. With the threat of fines seeming around every corner, now more than ever is the time for smaller organisations to get to grips with GDPR so that they can demonstrate their compliance. GDPR: A Game of Snakes and Ladders is an easy to read reference tool, which uses simple language in bite size easily signposted chapters. Adopting a no-nonsense approach, the Regulation is explained so that organisations can comply with the minimum of fuss and deliver this compliance in the shortest timeframe without the need to resort to expensive consultants or additional staff. The book is supported by a variety of easy to follow case studies, example documents and fact sheets. The author signposts warnings and important requirements (snakes) and hints and suggestions (ladders) and also provides a section on staff training and a Game of Snakes and Ladders training slide pack. Additional resources are available on the companion website. This user-friendly book, written by a Data Protection Officer and business management specialist will help you understand the Regulation, where it applies in your organisation and how to achieve compliance (and win at the compliance game).
The Digital Age offers many far-reaching opportunities - opportunities that allow for fast global communications, efficient business transactions...and stealthily executed cyber crimes. Featuring contributions from digital forensic experts, the editor of Forensic Computer Crime Investigation presents a vital resource that outlines the latest strategies law enforcement officials can leverage against the perpetrators of cyber crimes. From describing the fundamentals of computer crimes and the scenes left in their wake to detailing how to build an effective forensic investigative force, this book is an essential guide on how to beat cyber criminals at their own game. It takes you into the minds of computer criminals, noting universal characteristics and behaviors; it discusses strategies and techniques common to successful investigations; and it reveals how to overcome challenges that may arise when securing digital forensic evidence. For those intent on making sure that no one is a potential victim, there is a chapter devoted to investigating Internet crimes against children. Additional chapters include information on strategies unique to international forensics and on that emerging wave of computer crime known as cyber terrorism. To make sure that all the angles are covered and that your investigation is carried out efficiently, effectively, and successfully, Forensic Computer Crime Investigation is an invaluable resource to have with you at all times! |
You may like...
The Practical Guide to HIPAA Privacy and…
Rebecca Herold, Kevin Beaver
Paperback
R2,065
Discovery Miles 20 650
EU General Data Protection Regulation…
It Governance Privacy Team
Paperback
R741
Discovery Miles 7 410
Smart-Tech Society - Convenience…
Mark Whitehead, William G.A. Collier
Hardcover
R2,855
Discovery Miles 28 550
Pegasus - The Story Of The World's Most…
Laurent Richard, Sandrine Rigaud
Paperback
The Age of AI - And Our Human Future
Henry A. Kissinger, Eric Schmidt, …
Paperback
R241
Discovery Miles 2 410
|