0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (169)
  • R250 - R500 (199)
  • R500+ (860)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

Privacy in Context - Technology, Policy, and the Integrity of Social Life (Hardcover): Helen Nissenbaum Privacy in Context - Technology, Policy, and the Integrity of Social Life (Hardcover)
Helen Nissenbaum
R2,597 Discovery Miles 25 970 Ships in 12 - 17 working days

Privacy is one of the most urgent issues associated with information technology and digital media. This book claims that what people really care about when they complain and protest that privacy has been violated is not the act of sharing information itself--most people understand that this is crucial to social life --but the inappropriate, improper sharing of information.
Arguing that privacy concerns should not be limited solely to concern about control over personal information, Helen Nissenbaum counters that information ought to be distributed and protected according to norms governing distinct social contexts--whether it be workplace, health care, schools, or among family and friends. She warns that basic distinctions between public and private, informing many current privacy policies, in fact obscure more than they clarify. In truth, contemporary information systems should alarm us only when they function without regard for social norms and values, and thereby weaken the fabric of social life.

Cryptography - The Key to Digital Security, How It Works, and Why It Matters (Paperback): Keith Martin Cryptography - The Key to Digital Security, How It Works, and Why It Matters (Paperback)
Keith Martin
R389 Discovery Miles 3 890 Ships in 9 - 15 working days

Though often invisible, cryptography plays a critical role in our everyday lives. Broadly defined as a set of tools for establishing security in cyberspace, cryptography enables us to protect our information and share it securely. It underpins the security of mobile phone calls, card payments, web connections, internet messaging, Bitcoin transactions-in short, everything we do online. Clearly and concisely, Keith Martin reveals the many crucial ways we all rely on cryptographic technology and demystifies its controversial applications and the nuances behind alarming headlines about data breaches or Edward Snowden. Essential reading for anyone with a password, Cryptography offers a profound perspective on personal security, online and off.

Shit I Can't Remember - Keep track of usernames, passwords, web addresses in one easy & organized location (Paperback):... Shit I Can't Remember - Keep track of usernames, passwords, web addresses in one easy & organized location (Paperback)
Family's Books
R180 Discovery Miles 1 800 Ships in 10 - 15 working days
GDPR: A Game of Snakes and Ladders - How Small Businesses Can Win at the Compliance Game (Hardcover): Samantha Alford GDPR: A Game of Snakes and Ladders - How Small Businesses Can Win at the Compliance Game (Hardcover)
Samantha Alford
R969 Discovery Miles 9 690 Ships in 12 - 17 working days

For many small businesses, organisations, clubs, artists, faith groups, voluntary organisations/charities and sole traders, applying the General Data Protection Regulation (GDPR) has been like playing a game of "Snakes and Ladders". As soon as you move along the board and climb a ladder, a snake appears, which takes you right back to where you started. Conflicting advice abounds and there is nowhere for these individuals to go for simple answers all in one place. With the threat of fines seeming around every corner, now more than ever is the time for smaller organisations to get to grips with GDPR so that they can demonstrate their compliance. GDPR: A Game of Snakes and Ladders is an easy to read reference tool, which uses simple language in bite size easily signposted chapters. Adopting a no-nonsense approach, the Regulation is explained so that organisations can comply with the minimum of fuss and deliver this compliance in the shortest timeframe without the need to resort to expensive consultants or additional staff. The book is supported by a variety of easy to follow case studies, example documents and fact sheets. The author signposts warnings and important requirements (snakes) and hints and suggestions (ladders) and also provides a section on staff training and a Game of Snakes and Ladders training slide pack. Additional resources are available on the companion website. This user-friendly book, written by a Data Protection Officer and business management specialist will help you understand the Regulation, where it applies in your organisation and how to achieve compliance (and win at the compliance game).

Forensic Computer Crime Investigation (Hardcover, New): Thomas A. Johnson Forensic Computer Crime Investigation (Hardcover, New)
Thomas A. Johnson
R4,608 Discovery Miles 46 080 Ships in 12 - 17 working days

The Digital Age offers many far-reaching opportunities - opportunities that allow for fast global communications, efficient business transactions...and stealthily executed cyber crimes. Featuring contributions from digital forensic experts, the editor of Forensic Computer Crime Investigation presents a vital resource that outlines the latest strategies law enforcement officials can leverage against the perpetrators of cyber crimes. From describing the fundamentals of computer crimes and the scenes left in their wake to detailing how to build an effective forensic investigative force, this book is an essential guide on how to beat cyber criminals at their own game. It takes you into the minds of computer criminals, noting universal characteristics and behaviors; it discusses strategies and techniques common to successful investigations; and it reveals how to overcome challenges that may arise when securing digital forensic evidence. For those intent on making sure that no one is a potential victim, there is a chapter devoted to investigating Internet crimes against children. Additional chapters include information on strategies unique to international forensics and on that emerging wave of computer crime known as cyber terrorism. To make sure that all the angles are covered and that your investigation is carried out efficiently, effectively, and successfully, Forensic Computer Crime Investigation is an invaluable resource to have with you at all times!

Data Privacy for the Smart Grid (Paperback): Rebecca Herold, Christine Hertzog Data Privacy for the Smart Grid (Paperback)
Rebecca Herold, Christine Hertzog
R1,792 Discovery Miles 17 920 Ships in 12 - 17 working days

Many Smart Grid books include "privacy" in their title, but only touch on privacy, with most of the discussion focusing on cybersecurity. Filling this knowledge gap, Data Privacy for the Smart Grid provides a clear description of the Smart Grid ecosystem, presents practical guidance about its privacy risks, and details the actions required to protect data generated by Smart Grid technologies. It addresses privacy in electric, natural gas, and water grids and supplies two different perspectives of the topic-one from a Smart Grid expert and another from a privacy and information security expert.The authors have extensive experience with utilities and leading the U.S. government's National Institute of Standards and Technologies (NIST) Cyber Security Working Group (CSWG)/Smart Grid Interoperability Group (SGIP) Privacy Subgroup. This comprehensive book is understandable for all those involved in the Smart Grid. The authors detail the facts about Smart Grid privacy so readers can separate truth from myth about Smart Grid privacy. While considering privacy in the Smart Grid, the book also examines the data created by Smart Grid technologies and machine-to-machine (M2M) applications and associated legal issues. The text details guidelines based on the Organization for Economic Cooperation and Development Privacy Guidelines and the U.S. Federal Trade Commission Fair Information Practices. It includes privacy training recommendations and references to additional Smart Grid privacy resources. After reading the book, readers will be prepared to develop informed opinions, establish fact-based decisions, make meaningful contributions to Smart Grid legislation and policies, and to build technologies to preserve and protect privacy. Policy makers; Smart Grid and M2M product and service developers; utility customer and privacy resources; and other service providers and resources are primary beneficiaries of the information provided in

The Complete Guide for CPP Examination Preparation (Hardcover, 2nd edition): Anthony V. DiSalvatore (CPP, PSP & PCI) The Complete Guide for CPP Examination Preparation (Hardcover, 2nd edition)
Anthony V. DiSalvatore (CPP, PSP & PCI)
R3,880 Discovery Miles 38 800 Ships in 12 - 17 working days

Originally written by a team of Certified Protection Professionals (CPPs), Anthony DiSalvatore gives valuable updates to The Complete Guide for CPP Examination Preparation. This new edition contains an overview of the fundamental concepts and practices of security management while offering important insights into the CPP exam. Until recently the security profession was regarded as a "necessary evil." This book is a comprehensive guide to a profession that is now considered critical to our well-being in the wake of 9/11. It presents a practical approach drawn from decades of combined experience shared by the authors, prepares the reader for the CPP exam, and walks them through the certification process. This edition gives revised and updated treatment of every subject in the CPP exam, encourages and outlines a three-part program for you to follow, and includes sample questions at the end of each area of study. Although these are not questions that appear on the actual exam, they convey the principles and concepts that the exam emphasizes and are valuable in determining if you have mastered the information. The book also includes a security survey that covers all facets of external and internal security, as well as fire prevention. The Complete Guide for CPP Examination Preparation, Second Edition allows you to move steadily forward along your path to achieving one of the most highly regarded certifications in the security industry.

Permanent Record (Paperback): Edward Snowden Permanent Record (Paperback)
Edward Snowden 1
R404 Discovery Miles 4 040 Ships in 12 - 17 working days

Edward Snowden, the man who risked everything to expose the US government's system of mass surveillance, reveals for the first time the story of his life, including how he helped to build that system and what motivated him to try to bring it down.

In 2013, twenty-nine-year-old Edward Snowden shocked the world when he broke with the American intelligence establishment and revealed that the United States government was secretly pursuing the means to collect every single phone call, text message, and email. The result would be an unprecedented system of mass surveillance with the ability to pry into the private lives of every person on earth. Six years later, Snowden reveals for the very first time how he helped to build this system and why he was moved to expose it.

Spanning the bucolic Beltway suburbs of his childhood and the clandestine CIA and NSA postings of his adulthood, Permanent Record is the extraordinary account of a bright young man who grew up online - a man who became a spy, a whistleblower, and, in exile, the Internet's conscience. Written with wit, grace, passion, and an unflinching candor, Permanent Record is a crucial memoir of our digital age and destined to be a classic.

Wtf Is My Password - Keep track of usernames, passwords, web addresses in one easy & organized location - Orange Cover... Wtf Is My Password - Keep track of usernames, passwords, web addresses in one easy & organized location - Orange Cover (Paperback)
Norman M Pray
R174 Discovery Miles 1 740 Ships in 10 - 15 working days
The Data Economy - Implications from Singapore (Hardcover): Sree Kumar, See-Kiong Ng, Sin Gee Teo, Warren Chik The Data Economy - Implications from Singapore (Hardcover)
Sree Kumar, See-Kiong Ng, Sin Gee Teo, Warren Chik
R1,677 Discovery Miles 16 770 Ships in 12 - 17 working days

"The data economy" is a term used by many, but properly understood by few. Even more so the concept of "big data". Both terms embody the notion of a digital world in which many transactions and data flows animate a virtual space. This is the unseen world in which technology has become the master, with the hand of the human less visible. In fact, however, it is human interaction in and around technology that makes data so pervasive and important - the ability of the human mind to extract, manipulate and shape data that gives meaning to it. This book outlines the findings and conclusions of a multidisciplinary team of data scientists, lawyers, and economists tasked with studying both the possibilities of exploiting the rich data sets made available from many human-technology interactions and the practical and legal limitations of trying to do so. It revolves around a core case study of Singapore's public transport system, using data from both the private company operating the contactless payment system (EZ-Link) and the government agency responsible for public transport infrastructure (Land Transport Authority). In analysing both the possibilities and the limitations of these data sets, the authors propose policy recommendations in terms of both the uses of large data sets and the legislation necessary to enable these uses while protecting the privacy of users.

Privacy and Identity in a Networked Society - Refining Privacy Impact Assessment (Hardcover): Stefan Strauss Privacy and Identity in a Networked Society - Refining Privacy Impact Assessment (Hardcover)
Stefan Strauss
R3,992 Discovery Miles 39 920 Ships in 12 - 17 working days

This book offers an analysis of privacy impacts resulting from and reinforced by technology and discusses fundamental risks and challenges of protecting privacy in the digital age. Privacy is among the most endangered "species" in our networked society: personal information is processed for various purposes beyond our control. Ultimately, this affects the natural interplay between privacy, personal identity and identification. This book investigates that interplay from a systemic, socio-technical perspective by combining research from the social and computer sciences. It sheds light on the basic functions of privacy, their relation to identity, and how they alter with digital identification practices. The analysis reveals a general privacy control dilemma of (digital) identification shaped by several interrelated socio-political, economic and technical factors. Uncontrolled increases in the identification modalities inherent to digital technology reinforce this dilemma and benefit surveillance practices, thereby complicating the detection of privacy risks and the creation of appropriate safeguards. Easing this problem requires a novel approach to privacy impact assessment (PIA), and this book proposes an alternative PIA framework which, at its core, comprises a basic typology of (personally and technically) identifiable information. This approach contributes to the theoretical and practical understanding of privacy impacts and thus, to the development of more effective protection standards. This book will be of much interest to students and scholars of critical security studies, surveillance studies, computer and information science, science and technology studies, and politics.

Internet of Things Security - Challenges, Advances, and Analytics (Hardcover): Chintan Patel, Nishant Doshi Internet of Things Security - Challenges, Advances, and Analytics (Hardcover)
Chintan Patel, Nishant Doshi
R4,597 Discovery Miles 45 970 Ships in 12 - 17 working days

Most of the devices in the Internet of Things will be battery powered sensor devices. All the operations done on battery powered devices require minimum computation. Secure algorithms like RSA become useless in the Internet of Things environment. Elliptic curve based cryptography emerges as a best solution for this problem because it provides higher security in smaller key size compare to RSA. This book focuses on the use of Elliptic Curve Cryptography with different authentication architectures and authentication schemes using various security algorithms. It also includes a review of the math required for security and understanding Elliptic Curve Cryptography.

How to Talk to Your Kids About Pornography (Paperback): Educate and Empower Kids, Dina Alexander How to Talk to Your Kids About Pornography (Paperback)
Educate and Empower Kids, Dina Alexander; Illustrated by Jera Mehrdad
R419 R344 Discovery Miles 3 440 Save R75 (18%) Ships in 10 - 15 working days
The Politics of Data Transfer - Transatlantic Conflict and Cooperation over Data Privacy (Hardcover): Yuko Suda The Politics of Data Transfer - Transatlantic Conflict and Cooperation over Data Privacy (Hardcover)
Yuko Suda
R3,976 Discovery Miles 39 760 Ships in 12 - 17 working days

In this book, Yuko Suda examines the Safe Harbor debate, the passenger name record (PNR) dispute, and the Society for Worldwide Interbank Financial Transactions (SWIFT) affair to understand the transfer of personal data from the European Union (EU) to the United States. She argues that the Safe Harbor, PNR, and SWIFT agreements were made to mitigate the potentially negative effects that may arise from the beyond-the-border reach of EU data protection rules or US counterterrorism regulation. A close examination of these high-profile cases would reveal how beyond-the-border reach of one jurisdiction's regulation might affect another jurisdiction's policy and what responses the affected jurisdiction possibly makes to manage the effects of such extraterritorial regulation. The Politics of Data Transfer adds another dimension to the study of transatlantic data conflicts by assuming that the cases exemplify not only the politics of data privacy but also the politics of extraterritorial regulation. A welcome and timely collection uncovering the evolution of and prospects for the politics of data privacy in the digitalized and interconnected world.

Don't Trust Your Gut - Using Data to Get What You Really Want in Life (Paperback): Seth Stephens-Davidowitz Don't Trust Your Gut - Using Data to Get What You Really Want in Life (Paperback)
Seth Stephens-Davidowitz
R500 R377 Discovery Miles 3 770 Save R123 (25%) Ships in 10 - 15 working days
On Secrets (Paperback): Annika Smethurst On Secrets (Paperback)
Annika Smethurst
R219 Discovery Miles 2 190 Ships in 12 - 17 working days

On June 4, Federal Police raided the home of Walkley award-winning journalist Annika Smethurst, changing her life forever. Police claim they were investigating the publication of classified information, her employer called it a 'dangerous act of intimidation', Smethurst believes she was simply doing her job. Smethurst became the accidental poster woman for press freedom as politicians debated the merits of police searching through her underwear drawer. In On Secrets she will discuss the impact this invasion has had on her life, and examine the importance of press freedom.

Privacy-Preserving Machine Learning (Paperback, 1st ed. 2022): Jin Li, Ping Li, Zheli Liu, Xiaofeng Chen, Tong Li Privacy-Preserving Machine Learning (Paperback, 1st ed. 2022)
Jin Li, Ping Li, Zheli Liu, Xiaofeng Chen, Tong Li
R1,461 Discovery Miles 14 610 Ships in 12 - 17 working days

This book provides a thorough overview of the evolution of privacy-preserving machine learning schemes over the last ten years, after discussing the importance of privacy-preserving techniques. In response to the diversity of Internet services, data services based on machine learning are now available for various applications, including risk assessment and image recognition. In light of open access to datasets and not fully trusted environments, machine learning-based applications face enormous security and privacy risks. In turn, it presents studies conducted to address privacy issues and a series of proposed solutions for ensuring privacy protection in machine learning tasks involving multiple parties. In closing, the book reviews state-of-the-art privacy-preserving techniques and examines the security threats they face.

Protecting Your Business From Insider Threats In Seven Effective Steps - How To Identify, Address And Shape The Human Element... Protecting Your Business From Insider Threats In Seven Effective Steps - How To Identify, Address And Shape The Human Element Of The Threat Within Your Business In Seven Successful Practices (Paperback)
Boaz Fischer
R556 Discovery Miles 5 560 Ships in 10 - 15 working days
Federal Cybersecurity - Strategy & Implementation for Research & Development (Paperback): Cory Medina Federal Cybersecurity - Strategy & Implementation for Research & Development (Paperback)
Cory Medina
R4,155 Discovery Miles 41 550 Ships in 12 - 17 working days

Computers and computer networking provide major benefits to modern society, yet the growing costs of malicious cyber activities and cybersecurity itself diminish these benefits. Advances in cybersecurity are urgently needed to preserve the Internets growing social and economic benefits by thwarting adversaries and strengthening public trust of cyber systems. On December 18, 2014 the President signed into law the Cybersecurity Enhancement Act of 2014. This law requires the National Science and Technology Council (NSTC) and the Networking and Information Technology Research and Development (NITRD) Program to develop and maintain a cybersecurity research and development (R&D) strategic plan (the Plan) using an assessment of risk to guide the overall direction of Federally-funded cybersecurity R&D. This plan satisfies that requirement and establishes the direction for the Federal R&D enterprise in cybersecurity science and technology (S&T) to preserve and expand the Internets wide-ranging benefits. This book reviews the strategy and implementation for research and development of federal cybersecurity.

The Art of Deception - Controlling the Human Element of Security (Hardcover): KD Mitnick The Art of Deception - Controlling the Human Element of Security (Hardcover)
KD Mitnick
R1,088 R845 Discovery Miles 8 450 Save R243 (22%) Ships in 12 - 17 working days

The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security
Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide. Now, in The Art of Deception, the world's most notorious hacker gives new meaning to the old adage, "It takes a thief to catch a thief."
Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. With the help of many fascinating true stories of successful attacks on business and government, he illustrates just how susceptible even the most locked-down information systems are to a slick con artist impersonating an IRS agent. Narrating from the points of view of both the attacker and the victims, he explains why each attack was so successful and how it could have been prevented in an engaging and highly readable style reminiscent of a true-crime novel. And, perhaps most importantly, Mitnick offers advice for preventing these types of social engineering hacks through security protocols, training programs, and manuals that address the human element of security.

You: For Sale - Protecting Your Personal Data and Privacy Online (Paperback): Stuart Sumner You: For Sale - Protecting Your Personal Data and Privacy Online (Paperback)
Stuart Sumner
R880 Discovery Miles 8 800 Ships in 12 - 17 working days

Everything we do online, and increasingly in the real world, is tracked, logged, analyzed, and often packaged and sold on to the highest bidder. Every time you visit a website, use a credit card, drive on the freeway, or go past a CCTV camera, you are logged and tracked. Every day billions of people choose to share their details on social media, which are then sold to advertisers. The Edward Snowden revelations that governments - including those of the US and UK - have been snooping on their citizens, have rocked the world. But nobody seems to realize that this has already been happening for years, with firms such as Google capturing everything you type into a browser and selling it to the highest bidder. Apps take information about where you go, and your contact book details, harvest them and sell them on - and people just click the EULA without caring. No one is revealing the dirty secret that is the tech firms harvesting customers' personal data and selling it for vast profits - and people are totally unaware of the dangers. You: For Sale is for anyone who is concerned about what corporate and government invasion of privacy means now and down the road. The book sets the scene by spelling out exactly what most users of the Internet and smart phones are exposing themselves to via commonly used sites and apps such as facebook and Google, and then tells you what you can do to protect yourself. The book also covers legal and government issues as well as future trends. With interviews of leading security experts, black market data traders, law enforcement and privacy groups, You: For Sale will help you view your personal data in a new light, and understand both its value, and its danger.

Assessing and Managing Security Risk in IT Systems - A Structured Methodology (Hardcover): John McCumber Assessing and Managing Security Risk in IT Systems - A Structured Methodology (Hardcover)
John McCumber
R2,197 Discovery Miles 21 970 Ships in 12 - 17 working days

Assessing and Managing Security Risk in IT Systems: A Structured Methodology builds upon the original McCumber Cube model to offer proven processes that do not change, even as technology evolves. This book enables you to assess the security attributes of any information system and implement vastly improved security environments. Part I delivers an overview of information systems security, providing historical perspectives and explaining how to determine the value of information. This section offers the basic underpinnings of information security and concludes with an overview of the risk management process. Part II describes the McCumber Cube, providing the original paper from 1991 and detailing ways to accurately map information flow in computer and telecom systems. It also explains how to apply the methodology to individual system components and subsystems. Part III serves as a resource for analysts and security practitioners who want access to more detailed information on technical vulnerabilities and risk assessment analytics. McCumber details how information extracted from this resource can be applied to his assessment processes.

Privacy-Preserving in Edge Computing (Hardcover, 1st ed. 2021): Longxiang Gao, Tom H. Luan, Bruce Gu, Youyang Qu, Yong Xiang Privacy-Preserving in Edge Computing (Hardcover, 1st ed. 2021)
Longxiang Gao, Tom H. Luan, Bruce Gu, Youyang Qu, Yong Xiang
R3,706 Discovery Miles 37 060 Ships in 12 - 17 working days

With the rapid development of big data, it is necessary to transfer the massive data generated by end devices to the cloud under the traditional cloud computing model. However, the delays caused by massive data transmission no longer meet the requirements of various real-time mobile services. Therefore, the emergence of edge computing has been recently developed as a new computing paradigm that can collect and process data at the edge of the network, which brings significant convenience to solving problems such as delay, bandwidth, and off-loading in the traditional cloud computing paradigm. By extending the functions of the cloud to the edge of the network, edge computing provides effective data access control, computation, processing and storage for end devices. Furthermore, edge computing optimizes the seamless connection from the cloud to devices, which is considered the foundation for realizing the interconnection of everything. However, due to the open features of edge computing, such as content awareness, real-time computing and parallel processing, the existing problems of privacy in the edge computing environment have become more prominent. The access to multiple categories and large numbers of devices in edge computing also creates new privacy issues. In this book, we discuss on the research background and current research process of privacy protection in edge computing. In the first chapter, the state-of-the-art research of edge computing are reviewed. The second chapter discusses the data privacy issue and attack models in edge computing. Three categories of privacy preserving schemes will be further introduced in the following chapters. Chapter three introduces the context-aware privacy preserving scheme. Chapter four further introduces a location-aware differential privacy preserving scheme. Chapter five presents a new blockchain based decentralized privacy preserving in edge computing. Chapter six summarize this monograph and propose future research directions. In summary, this book introduces the following techniques in edge computing: 1) describe an MDP-based privacy-preserving model to solve context-aware data privacy in the hierarchical edge computing paradigm; 2) describe a SDN based clustering methods to solve the location-aware privacy problems in edge computing; 3) describe a novel blockchain based decentralized privacy-preserving scheme in edge computing. These techniques enable the rapid development of privacy-preserving in edge computing.

Metrics and Methods for Security Risk Management (Paperback): Carl Young Metrics and Methods for Security Risk Management (Paperback)
Carl Young
R856 Discovery Miles 8 560 Ships in 12 - 17 working days

Not only are corporations and other organizations sometimes targeted by competitors in order to steal their information, they are also targets of political and/or religious groups who understand their economic and symbolic importance. However, a realistic security strategy requires a big-picture approach. At the same time, budgets are decreasing while security departments are dealing with threats that demand greater vigilance. In the wake of the 2008-2009 global economic meltdown, corporate executives are asking difficult questions about effectiveness and efficiency. The need for both information security and physical security is greater today than ever before, and not only to address more complex and dangerous crisis situations, but also to ensure that the methods deployed are proportionate to the risk.

The notion of risk is the lens from which all such problems must be viewed. This book identifies and explains these foundational principles, and shows how they directly relate to an assessment of physical security risk. This book provides the modern security professional with a useful reference that facilitates both rigorous thinking and sensible decisions about key strategic choices.

* Offers an integrated approach to assessing security risk * Addresses homeland security as well as IT and physical security issues * Describes vital safeguards for ensuring true business continuity

Security for Ubiquitous Computing (Hardcover, Annotated Ed): F. Stajano Security for Ubiquitous Computing (Hardcover, Annotated Ed)
F. Stajano
R2,832 Discovery Miles 28 320 Ships in 12 - 17 working days

Ubiquitous computing (ubicomp) is about networked microprocessors embedded in everyday objects: not just cellphones and home appliances but also books, bookshelves, bus stops and bathtubs. This future is closer than you might imagine.

The insecurity of networked PCs is notorious. If we deployed ubicomp systems as vulnerable as PCs, the risks for society would be catastrophic. How can we do better, and what are the new problems? In a very accessible style, this book provides a coherent framework to make sense of the many issues at stake.

Features include:

  • An introduction to the state of the art in ubicomp research.
  • A readable primer on security and cryptology.
  • An up-to-date technical treatment of ubicomp security, including a sceptical look at Bluetooth and 802.11.
  • "Peer-to-peer" and ad-hoc networking.
  • An in-depth discussion of specific, cutting-edge solutions.
  • An extensively annotated bibliography.
Security for Ubiquitous Computing combines clarity, brevity and authority. It will appeal to developers and researchers in ubiquitous computing, wireless and ad-hoc networking, wearable computing and related areas. Because it is readable and self-contained, it will also prove valuable to managers, analysts, technology watchers and end users who want to understand the new opportunities and risks of ubicomp.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Little Black Book of Data and…
Kyle Taylor Paperback R276 Discovery Miles 2 760
Pandemic Surveillance - Privacy…
Margaret Hu Hardcover R3,053 Discovery Miles 30 530
Broken Code - Inside Facebook And The…
Jeff Horwitz Paperback R420 R328 Discovery Miles 3 280
EU General Data Protection Regulation…
It Governance Privacy Team Paperback R754 Discovery Miles 7 540
Smart-Tech Society - Convenience…
Mark Whitehead, William G.A. Collier Hardcover R2,911 Discovery Miles 29 110
The Age of AI - And Our Human Future
Henry A. Kissinger, Eric Schmidt, … Paperback R241 Discovery Miles 2 410
Identified, Tracked, and Profiled - The…
Peter Dauvergne Hardcover R2,266 Discovery Miles 22 660
Permanent Record
Edward Snowden Paperback R299 R234 Discovery Miles 2 340
Research Handbook on Privacy and Data…
Gloria Gonzalez, Rosamunde van Brakel, … Hardcover R6,507 Discovery Miles 65 070
Social Engineering - The Science of…
C Hadnagy Paperback R936 R674 Discovery Miles 6 740

 

Partners