![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection
-a short handbook designed for practical use by business owners to ensure they act in a professional, ethical and informed way around cybersecurity -first resource of its kind for coaches and therapists
This book highlights the state-of-the-art research on data usage, security, and privacy in the scenarios of the Internet of Things (IoT), along with related applications using Machine Learning and Big Data technologies to design and make efficient Internet-compatible IoT systems. ICT and Data Sciences brings together IoT and Machine Learning and provides the careful integration of both, along with many examples and case studies. It illustrates the merging of two technologies while presenting basic to high-level concepts covering different fields and domains such as the Hospitality and Tourism industry, Smart Clothing, Cyber Crime, Programming, Communications, Business Intelligence, all in the context of the Internet of Things. The book is written for researchers and practitioners, working in Information Communication Technology and Computer Science.
Secret sharing schemes form one of the most important topic in Cryptography. These protocols are used in many areas, applied mathematics, computer science, electrical engineering. A secret is divided into several pieces called shares. Each share is given to a user of the system. Each user has no information about the secret, but the secret can be retrieved by certain authorized coalition of users.This book is devoted to such schemes inspired by Coding Theory. The classical schemes of Shamir, Blakley, Massey are recalled. Survey is made of research in Combinatorial Coding Theory they triggered, mostly self-dual codes, and minimal codes. Applications to engineering like image processing, and key management of MANETs are highlighted.
Explains concepts of Internet of Everything problems, research challenge goals, and vision in smart cities Based on the most recent innovations, and covering the major challenges in smart cities, between IoT and Big Data Examines security issues and challenges related to data-intensive advances in IoT Addresses the total information science challenges in Internet of Everything enabled technologies Covers the exploring and creating IoT environment related self-adaptive systems
This book is for anyone who wants to gain an understanding of Blockchain technology and its potential. The book is research-oriented and covers different verticals of Blockchain technology. It discusses the characteristics and features of Blockchain, includes techniques, challenges, and future trends, along with case studies for deeper understanding. Blockchain Technology: Exploring Opportunities, Challenges, and Applications covers the core concepts related to Blockchain technology starting from scratch. The algorithms, concepts, and application areas are discussed according to current market trends and industry needs. It presents different application areas of industry and academia and discusses the characteristics and features of this technology. It also explores the challenges and future trends and provides an understanding of new opportunities. This book is for anyone at the beginner to intermediate level that wants to learn about the core concepts related to Blockchain technology.
This book is for anyone who wants to gain an understanding of Blockchain technology and its potential. The book is research-oriented and covers different verticals of Blockchain technology. It discusses the characteristics and features of Blockchain, includes techniques, challenges, and future trends, along with case studies for deeper understanding. Blockchain Technology: Exploring Opportunities, Challenges, and Applications covers the core concepts related to Blockchain technology starting from scratch. The algorithms, concepts, and application areas are discussed according to current market trends and industry needs. It presents different application areas of industry and academia and discusses the characteristics and features of this technology. It also explores the challenges and future trends and provides an understanding of new opportunities. This book is for anyone at the beginner to intermediate level that wants to learn about the core concepts related to Blockchain technology.
A Guide to Using the Anonymous Web in Libraries and Information Organizations provides practical guidance to those who are interested in integrating the anonymous web into their services. It will be particularly useful to those seeking to promote enhanced privacy for their patrons. The book begins by explaining, in simple terms, what the anonymous web is, how it works, and its benefits for users. Lund and Beckstrom also explain why they believe access to the anonymous web should be provided in library and information organizations around the world. They describe how to provide access, as well as educate library users on how to utilize the anonymous web and navigate any challenges that might arise during implementation. The authors also encourage the development of library policies that guide appropriate conduct and filter content, where appropriate, in order to deter illegal activity. A Guide to Using the Anonymous Web in Libraries and Information Organizations reminds us that libraries and other information providers have a duty to educate and support their communities, while also preserving privacy. Demonstrating that the anonymous web can help them to fulfil these obligations, this book will be essential reading for library and information professionals working around the world.
A Guide to Using the Anonymous Web in Libraries and Information Organizations provides practical guidance to those who are interested in integrating the anonymous web into their services. It will be particularly useful to those seeking to promote enhanced privacy for their patrons. The book begins by explaining, in simple terms, what the anonymous web is, how it works, and its benefits for users. Lund and Beckstrom also explain why they believe access to the anonymous web should be provided in library and information organizations around the world. They describe how to provide access, as well as educate library users on how to utilize the anonymous web and navigate any challenges that might arise during implementation. The authors also encourage the development of library policies that guide appropriate conduct and filter content, where appropriate, in order to deter illegal activity. A Guide to Using the Anonymous Web in Libraries and Information Organizations reminds us that libraries and other information providers have a duty to educate and support their communities, while also preserving privacy. Demonstrating that the anonymous web can help them to fulfil these obligations, this book will be essential reading for library and information professionals working around the world.
The path forward to rein in online surveillance, AI, and tech monopolies. Technology is a gift and a curse. The five Big Tech companies―Meta, Apple, Amazon, Microsoft, and Google―have built innovative products that improve many aspects of our lives. But their intrusiveness and our dependence on them have created pressing threats to our civil rights, economy, and democracy. Coming from an extensive background building Silicon Valley-based tech startups, Tom Kemp eloquently and precisely weaves together the threats posed by Big Tech:
This richly detailed book exposes the consequences of Big Tech's digital surveillance, exploitative use of AI, and monopolistic and anticompetitive practices. It offers actionable solutions to these problems and a clear path forward for individuals and policymakers to advocate for change. By containing the excesses of Big Tech, we will ensure our civil rights are respected and preserved, our economy is competitive, and our democracy is protected.
The Security Hippie is Barak Engel's second book. As the originator of the "Virtual CISO" (fractional security chief) concept, he has served as security leader in dozens of notable organizations, such as Mulesoft, Stubhub, Amplitude Analytics, and many others. The Security Hippie follows his previous book, Why CISOs Fail, which became a sleeper hit, earning a spot in the Cybercannon project as a leading text on the topic of information security management. In this new book, Barak looks at security purely through the lens of story-telling, sharing many and varied experiences from his long and accomplished career as organizational and thought leader, and visionary in the information security field. Instead of instructing, this book teaches by example, sharing many real situations in the field and actual events from real companies, as well as Barak's related takes and thought processes. An out-of-the-mainstream, counterculture thinker - Hippie - in the world of information security, Barak's rich background and unusual approach to the field come forth in this book in vivid color and detail, allowing the reader to sit back and enjoy these experiences, and perhaps gain insights when faced with similar issues themselves or within their organizations. The author works hard to avoid technical terms as much as possible, and instead focus on the human and behavioral side of security, finding the humor inherent in every anecdote and using it to demystify the field and connect with the reader. Importantly, these are not the stories that made the news; yet they are the ones that happen all the time. If you've ever wondered about the field of information security, but have been intimidated by it, or simply wished for more shared experiences, then The Security Hippie is the perfect way to open that window by accompanying Barak on some of his many travels into the land of security.
The Security Hippie is Barak Engel's second book. As the originator of the "Virtual CISO" (fractional security chief) concept, he has served as security leader in dozens of notable organizations, such as Mulesoft, Stubhub, Amplitude Analytics, and many others. The Security Hippie follows his previous book, Why CISOs Fail, which became a sleeper hit, earning a spot in the Cybercannon project as a leading text on the topic of information security management. In this new book, Barak looks at security purely through the lens of story-telling, sharing many and varied experiences from his long and accomplished career as organizational and thought leader, and visionary in the information security field. Instead of instructing, this book teaches by example, sharing many real situations in the field and actual events from real companies, as well as Barak's related takes and thought processes. An out-of-the-mainstream, counterculture thinker - Hippie - in the world of information security, Barak's rich background and unusual approach to the field come forth in this book in vivid color and detail, allowing the reader to sit back and enjoy these experiences, and perhaps gain insights when faced with similar issues themselves or within their organizations. The author works hard to avoid technical terms as much as possible, and instead focus on the human and behavioral side of security, finding the humor inherent in every anecdote and using it to demystify the field and connect with the reader. Importantly, these are not the stories that made the news; yet they are the ones that happen all the time. If you've ever wondered about the field of information security, but have been intimidated by it, or simply wished for more shared experiences, then The Security Hippie is the perfect way to open that window by accompanying Barak on some of his many travels into the land of security.
Systemic Bias: Algorithms and Society looks at issues of computational bias in the contexts of cultural works, metaphors of magic and mathematics in tech culture, and workplace psychometrics. The output of computational models is directly tied not only to their inputs but to the relationships and assumptions embedded in their model design, many of which are of a social and cultural, rather than physical and mathematical, nature. How do human biases make their way into these data models, and what new strategies have been proposed to overcome bias in computed products? Scholars and students from many backgrounds, as well as policy makers, journalists, and the general reading public will find a multidisciplinary approach to inquiry into algorithmic bias encompassing research from Communication, Art, and New Media.
Democratic Frontiers: Algorithms and Society focuses on digital platforms' effects in societies with respect to key areas such as subjectivity and self-reflection, data and measurement for the common good, public health and accessible datasets, activism in social media and the import/export of AI technologies relative to regime type. Digital technologies develop at a much faster pace relative to our systems of governance which are supposed to embody democratic principles that are comparatively timeless, whether rooted in ancient Greek or Enlightenment ideas of freedom, autonomy and citizenship. Algorithms, computing millions of calculations per second, do not pause to reflect on their operations. Developments in the accumulation of vast private datasets that are used to train automated machine learning algorithms pose new challenges for upholding these values. Social media platforms, while the key driver of today's information disorder, also afford new opportunities for organized social activism. The US and China, presumably at opposite ends of an ideological spectrum, are the main exporters of AI technology to both free and totalitarian societies. These are some of the important topics covered by this volume that examines the democratic stakes for societies with the rapid expansion of these technologies. Scholars and students from many backgrounds as well as policy makers, journalists and the general reading public will find a multidisciplinary approach to issues of democratic values and governance encompassing research from Sociology, Digital Humanities, New Media, Psychology, Communication, International Relations and Economics. Chapter 3 of this book is available for free in PDF format as Open Access from the individual product page at www.routledge.com. It has been made available under a Creative Commons Attribution-Non Commercial-No Derivatives 4.0 license
The Web of Things (WoT) is a concept that describes approaches, programming tools and software architectural systems, which interface networks of real-world objects with the World Wide Web. The book is organized into 11 chapters, each focusing on a unique wireless technological aspect of the Web of Things, and it aims to comprehensively cover each of its various applications, including: A strong emphasis on WoT problems and solutions, identifying the main open issues, innovations and latest technologies behind WoT A blend of theoretical and simulation-based problems for better understanding of the concepts behind WoT Various exemplifying applications in which the use of WoT is very attractive and an inspiration for future applications The book will be useful to researchers, software developers and undergraduate and postgraduate students, as well as practitioners.
Legal Data and Information in Practice provides readers with an understanding of how to facilitate the acquisition, management, and use of legal data in organizations such as libraries, courts, governments, universities, and start-ups. Presenting a synthesis of information about legal data that will furnish readers with a thorough understanding of the topic, the book also explains why it is becoming crucial that data analysis be integrated into decision-making in the legal space. Legal organizations are looking at how to develop data-driven insights for a variety of purposes and it is, as Sutherland shows, vital that they have the necessary skills to facilitate this work. This book will assist in this endeavour by providing an international perspective on the issues affecting access to legal data and clearly describing methods of obtaining and evaluating it. Sutherland also incorporates advice about how to critically approach data analysis. Legal Data and Information in Practice will be essential reading for those in the law library community who are based in English-speaking countries with a common law tradition. The book will also be useful to those with a general interest in legal data, including students, academics engaged in the study of information science and law.
Digital Totalitarianism: Algorithms and Society focuses on important challenges to democratic values posed by our computational regimes: policing the freedom of inquiry, risks to the personal autonomy of thought, NeoLiberal management of human creativity, and the collapse of critical thinking with the social media fueled rise of conspiranoia. Digital networks allow for a granularity and pervasiveness of surveillance by government and corporate entities. This creates power asymmetries where each citizen's daily 'data exhaust' can be used for manipulative and controlling ends by powerful institutional actors. This volume explores key erosions in our fundamental human values associated with free societies by covering government surveillance of library-based activities, cognitive enhancement debates, the increasing business orientation of art schools, and the proliferation of conspiracy theories in network media. Scholars and students from many backgrounds, as well as policy makers, journalists and the general reading public will find a multidisciplinary approach to questions of totalitarian tendencies encompassing research from Communication, Rhetoric, Library Sciences, Art and New Media.
Convergence of Blockchain, AI, and IoT: Concepts and Challenges discusses the convergence of three powerful technologies that play into the digital revolution and blur the lines between biological, digital, and physical objects. This book covers novel algorithms, solutions for addressing issues in applications, security, authentication, and privacy. The book provides an overview of the clinical scientific research enabling smart diagnosis equipment through AI. It presents the role these technologies play in augmented reality and blockchain, covers digital currency managed with bitcoin, and discusses deep learning and how it can enhance human thoughts and behaviors. Targeted audiences range from those interested in the technical revolution of blockchain, big data and the Internet of Things, to research scholars and the professional market.
The scarcity of radio spectrum is one of the most urgent issues at the forefront of future network research that is yet to be addressed. To address the problem of spectrum usage efficiency, the cognitive radio (CR) concept was proposed. The challenges of employing CRs include ensuring secure device operations and data transmission with advanced computing techniques. Successful development of CR systems will involve attainment of the following key objectives: Increasing the rate and capacity of CR-based networks How the power is utilized in CR hardware devices with CMOS circuits How the framework is needed in complex networks Vedic multipliers on CR networks Spatial analysis and clustering methods for traffic management To transmit a large volume of data like video compression Swarm optimization algorithms Resource sharing in peer-to-peer networking This book gathers the latest research works focusing on the issues, challenges, and solutions in the field of Cognitive Radio Networks, with various techniques. The chapters in this book will give solutions to the problems that Industry 4.0 faces, and will be an essential resource for scholars in all areas of the field.
Exploring the evolution of the right to be forgotten, its challenges, and impacts on privacy, reputation, and online expression, this book lays out the current state of the law on the right to be forgotten in Canada and in the international context while addressing the broader theoretical tensions at the core of the right to be forgotten.
IOT: Security and Privacy Paradigm covers the evolution of security and privacy issues in the Internet of Things (IoT). It focuses on bringing all security and privacy related technologies into one source, so that students, researchers, and practitioners can refer to this book for easy understanding of IoT security and privacy issues. This edited book uses Security Engineering and Privacy-by-Design principles to design a secure IoT ecosystem and to implement cyber-security solutions. This book takes the readers on a journey that begins with understanding the security issues in IoT-enabled technologies and how it can be applied in various aspects. It walks readers through engaging with security challenges and builds a safe infrastructure for IoT devices. The book helps readers gain an understand of security architecture through IoT and describes the state of the art of IoT countermeasures. It also differentiates security threats in IoT-enabled infrastructure from traditional ad hoc or infrastructural networks, and provides a comprehensive discussion on the security challenges and solutions in RFID, WSNs, in IoT. This book aims to provide the concepts of related technologies and novel findings of the researchers through its chapter organization. The primary audience includes specialists, researchers, graduate students, designers, experts and engineers who are focused on research and security related issues. Souvik Pal, PhD, has worked as Assistant Professor in Nalanda Institute of Technology, Bhubaneswar, and JIS College of Engineering, Kolkata (NAAC "A" Accredited College). He is the organizing Chair and Plenary Speaker of RICE Conference in Vietnam; and organizing co-convener of ICICIT, Tunisia. He has served in many conferences as chair, keynote speaker, and he also chaired international conference sessions and presented session talks internationally. His research area includes Cloud Computing, Big Data, Wireless Sensor Network (WSN), Internet of Things, and Data Analytics. Vicente Garcia-Diaz, PhD, is an Associate Professor in the Department of Computer Science at the University of Oviedo (Languages and Computer Systems area). He is also the editor of several special issues in prestigious journals such as Scientific Programming and International Journal of Interactive Multimedia and Artificial Intelligence. His research interests include eLearning, machine learning and the use of domain specific languages in different areas. Dac-Nhuong Le, PhD, is Deputy-Head of Faculty of Information Technology, and Vice-Director of Information Technology Apply and Foreign Language Training Center, Haiphong University, Vietnam. His area of research includes: evaluation computing and approximate algorithms, network communication, security and vulnerability, network performance analysis and simulation, cloud computing, IoT and image processing in biomedical. Presently, he is serving on the editorial board of several international journals and has authored nine computer science books published by Springer, Wiley, CRC Press, Lambert Publication, and Scholar Press.
Cybersecurity is an extremely important area which is rapidly evolving, necessarily, to meet current and future threats. Anyone who studies within this domain requires a particular skillset and way of thinking, balancing technical knowledge and human insight. It is vital to recognize both sides of this complex area and integrate the two. This book looks at the technical fields progressively, building up in layers before expanding into more advanced topics. Each area is looked at succinctly, describing the main elements and problems in each area and reinforcing these concepts with practical coding examples, questions and ideas for further research. The book builds on an overview of basic architecture of systems and networks, setting a context for how information is vulnerable. Cryptography is explained in detail with examples, showing the steady progress in this area over time through to the possibilities of quantum encryption. Steganography is also explained, showing how this can be used in a modern-day context through multimedia and even Virtual Reality. A large section of the book is given to the technical side of hacking, how such attacks occur, how they can be avoided and what to do after there has been an intrusion of some description. Cyber countermeasures are explored, along with automated systems of defense, whether created by the programmer or through firewalls and suchlike. The human aspect of cyber security is detailed along with the psychology and motivations for launching attacks. Social engineering is focused on and with the various techniques looked at - revealing how an informed individual, organization or workplace can protect themselves against incursions and breaches. Finally, there is a look the latest developments in the field, and how systems, such as the IoT are being protected. The book is intended for advanced undergraduate and postgraduate courses on cybersecurity but is also useful for those studying IT or Computer Science more generally.
Cybersecurity is an extremely important area which is rapidly evolving, necessarily, to meet current and future threats. Anyone who studies within this domain requires a particular skillset and way of thinking, balancing technical knowledge and human insight. It is vital to recognize both sides of this complex area and integrate the two. This book looks at the technical fields progressively, building up in layers before expanding into more advanced topics. Each area is looked at succinctly, describing the main elements and problems in each area and reinforcing these concepts with practical coding examples, questions and ideas for further research. The book builds on an overview of basic architecture of systems and networks, setting a context for how information is vulnerable. Cryptography is explained in detail with examples, showing the steady progress in this area over time through to the possibilities of quantum encryption. Steganography is also explained, showing how this can be used in a modern-day context through multimedia and even Virtual Reality. A large section of the book is given to the technical side of hacking, how such attacks occur, how they can be avoided and what to do after there has been an intrusion of some description. Cyber countermeasures are explored, along with automated systems of defense, whether created by the programmer or through firewalls and suchlike. The human aspect of cyber security is detailed along with the psychology and motivations for launching attacks. Social engineering is focused on and with the various techniques looked at - revealing how an informed individual, organization or workplace can protect themselves against incursions and breaches. Finally, there is a look the latest developments in the field, and how systems, such as the IoT are being protected. The book is intended for advanced undergraduate and postgraduate courses on cybersecurity but is also useful for those studying IT or Computer Science more generally.
Nanoelectronic Devices for Hardware and Software Security has comprehensive coverage of the principles, basic concepts, structure, modeling, practices, and circuit applications of nanoelectronics in hardware/software security. It also covers the future research directions in this domain. In this evolving era, nanotechnology is converting semiconductor devices dimensions from micron technology to nanotechnology. Nanoelectronics would be the key enabler for innovation in nanoscale devices, circuits, and systems. The motive for this research book is to provide relevant theoretical frameworks that include device physics, modeling, circuit design, and the latest developments in experimental fabrication in the field of nanotechnology for hardware/software security. There are numerous challenges in the development of models for nanoscale devices (e.g., FinFET, gate-all-around devices, TFET, etc.), short channel effects, fringing effects, high leakage current, and power dissipation, among others. This book will help to identify areas where there are challenges and apply nanodevice and circuit techniques to address hardware/software security issues.
A must have book on how GDPR is actively working in the privacy, compliance and technology space. Gain a clear understanding of GDPR requirements and recognise opportunities to reshape your data privacy compliance programs. Learn unique techniques to avoid GDPR non-compliance in the third and fourth industrial revolution era. A practical guide to providing great insights on data privacy challenges and compliance with invaluable practical approaches. Demonstrates data privacy legislation differences and similarities in multi-jurisdictions and how to man oeuvre the minefield of privacy successfully.
Cyberspace is changing the face of crime. For criminals it has become a place for rich collaboration and learning, not just within one country; and a place where new kinds of crimes can be carried out, and a vehicle for committing conventional crimes with unprecedented range, scale, and speed. Law enforcement faces a challenge in keeping up and dealing with this new environment. The news is not all bad - collecting and analyzing data about criminals and their activities can provide new levels of insight into what they are doing and how they are doing it. However, using data analytics requires a change of process and new skills that (so far) many law enforcement organizations have had difficulty leveraging. Cyberspace, Data Analytics, and Policing surveys the changes that cyberspace has brought to criminality and to policing with enough technical content to expose the issues and suggest ways in which law enforcement organizations can adapt. Key Features: Provides a non-technical but robust overview of how cyberspace enables new kinds of crime and changes existing crimes. Describes how criminals exploit the ability to communicate globally to learn, form groups, and acquire cybertools. Describes how law enforcement can use the ability to collect data and apply analytics to better protect society and to discover and prosecute criminals. Provides examples from open-source data of how hot spot and intelligence-led policing can benefit law enforcement. Describes how law enforcement can exploit the ability to communicate globally to collaborate in dealing with trans-national crime. |
You may like...
Mathematics and Computing - ICMC 2018…
Debdas Ghosh, Debasis Giri, …
Hardcover
R2,732
Discovery Miles 27 320
|