0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (169)
  • R250 - R500 (199)
  • R500+ (858)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

Blockchain Technology - Exploring Opportunities, Challenges, and Applications (Hardcover): Sonali Vyas, Vinod Kumar Shukla,... Blockchain Technology - Exploring Opportunities, Challenges, and Applications (Hardcover)
Sonali Vyas, Vinod Kumar Shukla, Shaurya Gupta, Ajay Prasad
R4,956 Discovery Miles 49 560 Ships in 9 - 15 working days

This book is for anyone who wants to gain an understanding of Blockchain technology and its potential. The book is research-oriented and covers different verticals of Blockchain technology. It discusses the characteristics and features of Blockchain, includes techniques, challenges, and future trends, along with case studies for deeper understanding. Blockchain Technology: Exploring Opportunities, Challenges, and Applications covers the core concepts related to Blockchain technology starting from scratch. The algorithms, concepts, and application areas are discussed according to current market trends and industry needs. It presents different application areas of industry and academia and discusses the characteristics and features of this technology. It also explores the challenges and future trends and provides an understanding of new opportunities. This book is for anyone at the beginner to intermediate level that wants to learn about the core concepts related to Blockchain technology.

A Guide to Using the Anonymous Web in Libraries and Information Organizations - Enhancing Patron Privacy and Information Access... A Guide to Using the Anonymous Web in Libraries and Information Organizations - Enhancing Patron Privacy and Information Access (Paperback)
Brady D. Lund, Matthew A. Beckstrom
R1,045 Discovery Miles 10 450 Ships in 9 - 15 working days

A Guide to Using the Anonymous Web in Libraries and Information Organizations provides practical guidance to those who are interested in integrating the anonymous web into their services. It will be particularly useful to those seeking to promote enhanced privacy for their patrons. The book begins by explaining, in simple terms, what the anonymous web is, how it works, and its benefits for users. Lund and Beckstrom also explain why they believe access to the anonymous web should be provided in library and information organizations around the world. They describe how to provide access, as well as educate library users on how to utilize the anonymous web and navigate any challenges that might arise during implementation. The authors also encourage the development of library policies that guide appropriate conduct and filter content, where appropriate, in order to deter illegal activity. A Guide to Using the Anonymous Web in Libraries and Information Organizations reminds us that libraries and other information providers have a duty to educate and support their communities, while also preserving privacy. Demonstrating that the anonymous web can help them to fulfil these obligations, this book will be essential reading for library and information professionals working around the world.

Advanced Cybersecurity Technologies (Paperback): Ralph Moseley Advanced Cybersecurity Technologies (Paperback)
Ralph Moseley
R1,530 Discovery Miles 15 300 Ships in 9 - 15 working days

Cybersecurity is an extremely important area which is rapidly evolving, necessarily, to meet current and future threats. Anyone who studies within this domain requires a particular skillset and way of thinking, balancing technical knowledge and human insight. It is vital to recognize both sides of this complex area and integrate the two. This book looks at the technical fields progressively, building up in layers before expanding into more advanced topics. Each area is looked at succinctly, describing the main elements and problems in each area and reinforcing these concepts with practical coding examples, questions and ideas for further research. The book builds on an overview of basic architecture of systems and networks, setting a context for how information is vulnerable. Cryptography is explained in detail with examples, showing the steady progress in this area over time through to the possibilities of quantum encryption. Steganography is also explained, showing how this can be used in a modern-day context through multimedia and even Virtual Reality. A large section of the book is given to the technical side of hacking, how such attacks occur, how they can be avoided and what to do after there has been an intrusion of some description. Cyber countermeasures are explored, along with automated systems of defense, whether created by the programmer or through firewalls and suchlike. The human aspect of cyber security is detailed along with the psychology and motivations for launching attacks. Social engineering is focused on and with the various techniques looked at - revealing how an informed individual, organization or workplace can protect themselves against incursions and breaches. Finally, there is a look the latest developments in the field, and how systems, such as the IoT are being protected. The book is intended for advanced undergraduate and postgraduate courses on cybersecurity but is also useful for those studying IT or Computer Science more generally.

Privacy & Personality (Paperback): Russell L Ciochon Privacy & Personality (Paperback)
Russell L Ciochon
R1,387 Discovery Miles 13 870 Ships in 12 - 17 working days

Like many concepts, privacy has a commonly accepted core of meaning with an indefinite or variable periphery. Some would wish to enlarge the core. It would be pointless to attempt to establish a definition by way of introduction to a series of essays that themselves provide no single definition. But the themes of freedom, justice, rational choice, and community always seem to appear in any discussion of privacy. "Privacy is a penultimate good. Perhaps, in certain usages--such as autonomy--it is an ultimate good, desirable for its own sake and grounded on nothing more final. Of course, the right of privacy may sometimes be asserted to conceal illegal or immoral acts. When that occurs, it appears to be put to an instrumental use. But, insofar as we justify such claims, it is not because they prevent the detection of immorality or violations of the law. Rather, at least in the case of illegal acts, it is because the means being challenged themselves violate privacy.

The individual control-human dignity foundation for privacy, is closely related to personality. Privacy provides relief from tension and opportunity for the development of intimate relations with others. All of us have standards of behavior that are higher than we can maintain at all times, and these standards are widely shared in the society in which we live. If we do not observe them we are likely to be criticized, or we fear that we shall be, and we suffer also from loss of self-esteem. Whether in some final sense the concept of privacy is culture bound is impossible to establish, in the absence of any known society in which elements of privacy are not to be found.

"J. Roland Pennock" was professor of political science at Swarthmore College for more than twenty-five years, as well as a fellow at the John Simon Guggenheim Memorial Foundation. "John W. Chapman" is professor emeritus of political science at the University of Pittsburgh.

The Practical Guide to HIPAA Privacy and Security Compliance (Paperback, 2nd edition): Rebecca Herold, Kevin Beaver The Practical Guide to HIPAA Privacy and Security Compliance (Paperback, 2nd edition)
Rebecca Herold, Kevin Beaver
R2,105 Discovery Miles 21 050 Ships in 9 - 15 working days

Following in the footsteps of its bestselling predecessor, The Practical Guide to HIPAA Privacy and Security Compliance, Second Edition is a one-stop, up-to-date resource on Health Insurance Portability and Accountability Act (HIPAA) privacy and security, including details on the HITECH Act, the 2013 Omnibus Rule, and the pending rules. Updated and revised with several new sections, this edition defines what HIPAA is, what it requires, and what you need to do to achieve compliance. The book provides an easy-to-understand overview of HIPAA privacy and security rules and compliance tasks. Supplying authoritative insights into real-world HIPAA privacy and security issues, it summarizes the analysis, training, and technology needed to properly plan and implement privacy and security policies, training, and an overall program to manage information risks. Instead of focusing on technical jargon, the book spells out what your organization must do to achieve and maintain compliance requirements on an ongoing basis.

A Beginner's Guide to Internet of Things Security - Attacks, Applications, Authentication, and Fundamentals (Paperback):... A Beginner's Guide to Internet of Things Security - Attacks, Applications, Authentication, and Fundamentals (Paperback)
Aakanksha Tewari, Brij B. Gupta
R631 Discovery Miles 6 310 Ships in 9 - 15 working days

A Beginner's Guide to Internet of Things Security focuses on security issues and developments in the Internet of Things (IoT) environment. The wide-ranging applications of IoT, including home appliances, transportation, logistics, healthcare, and smart cities, necessitate security applications that can be applied to every domain with minimal cost. IoT contains three layers: application layer, middleware layer, and perception layer. The security problems of each layer are analyzed separately to identify solutions, along with the integration and scalability issues with the cross-layer architecture of IoT. The book discusses the state-of-the-art authentication-based security schemes, which can secure radio frequency identification (RFID) tags, along with some security models that are used to verify whether an authentication scheme is secure against any potential security risks. It also looks at existing authentication schemes and security models with their strengths and weaknesses. The book uses statistical and analytical data and explains its impact on the IoT field, as well as an extensive literature survey focusing on trust and privacy problems. The open challenges and future research direction discussed in this book will help to further academic researchers and industry professionals in the domain of security. Dr. Brij B. Gupta is an assistant professor in the Department of Computer Engineering, National Institute of Technology, Kurukshetra, India. Ms. Aakanksha Tewari is a PhD Scholar in the Department of Computer Engineering, National Institute of Technology, Kurukshetra, India.

Security without Obscurity - Frequently Asked Questions (FAQ) (Paperback): Jeff Stapleton Security without Obscurity - Frequently Asked Questions (FAQ) (Paperback)
Jeff Stapleton
R1,182 Discovery Miles 11 820 Ships in 9 - 15 working days

Security without Obscurity: Frequently Asked Questions (FAQ) complements Jeff Stapleton's three other Security without Obscurity books to provide clear information and answers to the most commonly asked questions about information security (IS) solutions that use or rely on cryptography and key management methods. There are good and bad cryptography, bad ways of using good cryptography, and both good and bad key management methods. Consequently, information security solutions often have common but somewhat unique issues. These common and unique issues are expressed as an FAQ organized by related topic areas. The FAQ in this book can be used as a reference guide to help address such issues. Cybersecurity is based on information technology (IT) that is managed using IS controls, but there is information, misinformation, and disinformation. Information reflects things that are accurate about security standards, models, protocols, algorithms, and products. Misinformation includes misnomers, misunderstandings, and lack of knowledge. Disinformation can occur when marketing claims either misuse or abuse terminology, alluding to things that are inaccurate or subjective. This FAQ provides information and distills misinformation and disinformation about cybersecurity. This book will be useful to security professionals, technology professionals, assessors, auditors, managers, and hopefully even senior management who want a quick, straightforward answer to their questions. It will serve as a quick reference to always have ready on an office shelf. As any good security professional knows, no one can know everything.

Secure, Resilient, and Agile Software Development (Paperback): Mark Merkow Secure, Resilient, and Agile Software Development (Paperback)
Mark Merkow
R1,356 Discovery Miles 13 560 Ships in 9 - 15 working days

A collection of best practices and effective implementation recommendations that are proven to work, Secure, Resilient, and Agile Software Development leaves the boring details of software security theory out of the discussion as much as possible to concentrate on practical applied software security for practical people. Written to aid your career as well as your organization, the book shows how to gain skills in secure and resilient software development and related tasks. The book explains how to integrate these development skills into your daily duties, thereby increasing your professional value to your company, your management, your community, and your industry. Secure, Resilient, and Agile Software Development was written for the following professionals: AppSec architects and program managers in information security organizations Enterprise architecture teams with application development focus Scrum teams DevOps teams Product owners and their managers Project managers Application security auditors With a detailed look at Agile and Scrum software development methodologies, this book explains how security controls need to change in light of an entirely new paradigm on how software is developed. It focuses on ways to educate everyone who has a hand in any software development project with appropriate and practical skills to Build Security In. After covering foundational and fundamental principles for secure application design, this book dives into concepts, techniques, and design goals to meet well-understood acceptance criteria on features an application must implement. It also explains how the design sprint is adapted for proper consideration of security as well as defensive programming techniques. The book concludes with a look at white box application analysis and sprint-based activities to improve the security and quality of software under development.

Blockchain Technology - Exploring Opportunities, Challenges, and Applications (Paperback): Sonali Vyas, Vinod Kumar Shukla,... Blockchain Technology - Exploring Opportunities, Challenges, and Applications (Paperback)
Sonali Vyas, Vinod Kumar Shukla, Shaurya Gupta, Ajay Prasad
R1,913 Discovery Miles 19 130 Ships in 9 - 15 working days

This book is for anyone who wants to gain an understanding of Blockchain technology and its potential. The book is research-oriented and covers different verticals of Blockchain technology. It discusses the characteristics and features of Blockchain, includes techniques, challenges, and future trends, along with case studies for deeper understanding. Blockchain Technology: Exploring Opportunities, Challenges, and Applications covers the core concepts related to Blockchain technology starting from scratch. The algorithms, concepts, and application areas are discussed according to current market trends and industry needs. It presents different application areas of industry and academia and discusses the characteristics and features of this technology. It also explores the challenges and future trends and provides an understanding of new opportunities. This book is for anyone at the beginner to intermediate level that wants to learn about the core concepts related to Blockchain technology.

The Cyber Security Handbook - Prepare For, Respond to and Recover from Cyber Attacks (Paperback): IT Governance The Cyber Security Handbook - Prepare For, Respond to and Recover from Cyber Attacks (Paperback)
IT Governance
R1,393 Discovery Miles 13 930 Ships in 12 - 17 working days

In the world as we know it, you can be attacked both physically and virtually. For today's organisations, which rely so heavily on technology - particularly the Internet - to do business, the latter is the far more threatening of the two. The cyber threat landscape is complex and constantly changing. For every vulnerability fixed, another pops up, ripe for exploitation. This book is a comprehensive cyber security implementation manual which gives practical guidance on the individual activities identified in the IT Governance Cyber Resilience Framework (CRF) that can help organisations become cyber resilient and combat the cyber threat landscape. Suitable for senior directors (CEO, CISO, CIO), compliance managers, privacy managers, IT managers, security analysts and others, the book is divided into six parts: Part 1: Introduction. The world of cyber security and the approach taken in this book. Part 2: Threats and vulnerabilities. A discussion of a range of threats organisations face, organised by threat category, to help you understand what you are defending yourself against before you start thinking about your actual defences. Part 3: The CRF processes. Detailed discussions of each of the 24 CRF processes, explaining a wide range of security areas by process category and offering guidance on how to implement each. Part 4: Eight steps to implementing cyber security. Our eight-step approach to implementing the cyber security processes you need and maintaining them. Part 5: Reference frameworks. An explanation of how standards and frameworks work, along with their benefits. It also presents ten framework options, introducing you to some of the best-known standards and giving you an idea of the range available. Part 6: Conclusion and appendices. The appendices include a glossary of all the acronyms and abbreviations used in this book. Whether you are just starting out on the road to cyber security or looking to enhance and improve your existing cyber resilience programme, it should be clear that cyber security is no longer optional in today's information age; it is an essential component of business success. Make sure you understand the threats and vulnerabilities your organisation faces and how the Cyber Resilience Framework can help you tackle them. Start your journey to cyber security now - buy this book today!

Information Warfare (Paperback): William Hutchinson, Matthew Warren Information Warfare (Paperback)
William Hutchinson, Matthew Warren
R1,681 Discovery Miles 16 810 Ships in 12 - 17 working days

This text introduces the concepts of information warfare from a non-military, organizational perspective. It is designed to stimulate managers to develop policies, strategies, and tactics for the aggressive use and defence of their data and knowledge base. The book covers the full gambit of information warfare subjects from the direct attack on computer systems to the more subtle psychological technique of perception management. It provides the framework needed to build management strategies in this area. The topics covered include the basics of information warfare, corporate intelligence systems, the use of deception, security of systems, modes of attack, a methodology to develop defensive measures, plus specific issues associated with information warfare.
This book will be of interest to executives and managers in any public or private organization. Specifically, managers or staff in the areas of information technology, security, knowledge management, public relations, or marketing should find it directly useful.
Its main purpose is to make readers aware of the new world of information saturation; thus decreasing the chance that they will become victims of those abusing the information age, whilst at the same time increasing their chances of benefiting from the new opportunities produced.
Addresses the issues and implications of cyber warfare and how it directly impacts on companies

CISA - Certified Information Systems Auditor Study Guide - Aligned with the CISA Review Manual 2019 to help you audit, monitor,... CISA - Certified Information Systems Auditor Study Guide - Aligned with the CISA Review Manual 2019 to help you audit, monitor, and assess information systems (Paperback)
Hemang Doshi
R2,089 Discovery Miles 20 890 Ships in 10 - 15 working days

This CISA study guide is for those interested in achieving CISA certification and provides complete coverage of ISACA's latest CISA Review Manual (2019) with practical examples and over 850 exam-oriented practice questions Key Features Gain tactical skills in auditing, control, and security to pass the CISA examination Get up to speed with auditing business IT systems Increase your value to organizations and be at the forefront of an evolving business landscape by achieving CISA certification Book DescriptionAre you looking to prepare for the CISA exam and understand the roles and responsibilities of an information systems (IS) auditor? The CISA - Certified Information Systems Auditor Study Guide is here to help you get started with CISA exam prep. This book covers all the five CISA domains in detail to help you pass the exam. You'll start by getting up and running with the practical aspects of an information systems audit. The book then shows you how to govern and manage IT, before getting you up to speed with acquiring information systems. As you progress, you'll gain knowledge of information systems operations and understand how to maintain business resilience, which will help you tackle various real-world business problems. Finally, you'll be able to assist your organization in effectively protecting and controlling information systems with IT audit standards. By the end of this CISA book, you'll not only have covered the essential concepts and techniques you need to know to pass the CISA certification exam but also have the ability to apply them in the real world. What you will learn Understand the information systems auditing process Get to grips with IT governance and management Gain knowledge of information systems acquisition Assist your organization in protecting and controlling information systems with IT audit standards Understand information systems operations and how to ensure business resilience Evaluate your organization's security policies, standards, and procedures to meet its objectives Who this book is forThis CISA exam study guide is designed for those with a non-technical background who are interested in achieving CISA certification and are currently employed or looking to gain employment in IT audit and security management positions.

Intelligent Cyber-Physical Systems Security for Industry 4.0 - Applications, Challenges and Management (Hardcover): Jyoti... Intelligent Cyber-Physical Systems Security for Industry 4.0 - Applications, Challenges and Management (Hardcover)
Jyoti Sekhar Banerjee, Siddhartha Bhattacharyya, Ahmed J. Obaid, Wei-Chang Yeh
R3,340 Discovery Miles 33 400 Ships in 9 - 15 working days

Intelligent Cyber-Physical Systems Security for Industry 4.0: Applications, Challenges and Management presents new cyber-physical security findings for Industry 4.0 using emerging technologies like artificial intelligence (with machine/deep learning), data mining, applied mathematics. All these are the essential components for processing data, recognizing patterns, modeling new techniques, and improving the advantages of data science. Features * Presents an integrated approach with Cyber-Physical Systems, CPS security, and Industry 4.0 in one place * Exposes the necessity of security initiatives, standards, security policies, and procedures in the context of industry 4.0 * Suggests solutions for enhancing the protection of 5G and the Internet of Things (IoT) security * Promotes how optimization or intelligent techniques envisage the role of artificial intelligence-machine/deep learning (AI-ML/DL) in cyberphysical systems security for industry 4.0 This book is primarily aimed at graduates, researchers and professionals working in the field of security. Executives concerned with security management, knowledge dissemination, information, and policy development for data and network security in different educational, government, and non-government organizations will also find this book useful.

Data Protection - for voluntary organisations (Paperback, 4th New edition): Paul Ticher Data Protection - for voluntary organisations (Paperback, 4th New edition)
Paul Ticher
R860 Discovery Miles 8 600 Ships in 12 - 17 working days

Vital to the effective functioning of voluntary organisations is the trust of people - the beneficiaries, clients, regulators, donors, volunteers and paid staff. Open, fair and well-managed data protection practice is not just desirable in helping to achieve that trust, but essential. Get it wrong and there is reputational damage and costs attached. Data Protection for voluntary organisations will enable you to set a shining example of best practice and also comply with UK data legislation and the General Data Protection Regulation (GDPR) in force since 2018. This book will help you: * Understand the key principles and elements of data protection * Recognise your main responsibilities as a data controller * Distinguish when you can and can't retain data * Appreciate what the rights of the data subject are Who is this book for? A must-read for anyone in the UK voluntary sector who wants to get beyond tick-box data management. Invaluable to data managers or those who handle personal information such as IT, personnel, marketing and fundraising departments. For professional advisers, and academics it will also offers a valuable summary drawing out key data protection points by examining and interpreting the primary legislation.

Artificial Intelligence for Disease Diagnosis and Prognosis in Smart Healthcare (Hardcover): S. M. Riazul Islam, Faisal Tariq,... Artificial Intelligence for Disease Diagnosis and Prognosis in Smart Healthcare (Hardcover)
S. M. Riazul Islam, Faisal Tariq, Ghita Kouadri Mostefaoui
R2,788 Discovery Miles 27 880 Ships in 12 - 17 working days

Features In-depth coverage of the role of AI in smart healthcare. Research guideline for AI and data science researchers/practitioners interested in the healthcare sector. Comprehensive coverage on security and privacy issues for AI in smart healthcare.

Understanding Cybersecurity Technologies - A Guide to Selecting the Right Cybersecurity Tools (Hardcover): Abbas Moallem Understanding Cybersecurity Technologies - A Guide to Selecting the Right Cybersecurity Tools (Hardcover)
Abbas Moallem
R2,592 Discovery Miles 25 920 Ships in 9 - 15 working days

Cyberattacks on enterprises, government institutions, and individuals are exponentially growing. At the same time, the number of companies, both small and large, offering all types of solutions has been increasing too. Since companies rely on technological solutions to protect themselves against cyberattacks, understanding and selecting the right solutions among those offered presents a significant challenge for professionals, company executives, and newcomers to the cybersecurity field. FEATURES Presents descriptions for each type of cybersecurity technology and their specifications Explains applications, usages, and offers case studies to enhance comprehension Offers an easy-to-understand classification of existing cybersecurity technologies Provides an understanding of the technologies without getting lost in technical details Focuses on existing technologies used in different solutions, without focusing on the companies that offer these technologies This book is intended to help all professionals new to cybersecurity, students, and experts to learn or educate their audiences on the foundations of the available solutions.

Iso/Iec 27701:2019: An Introduction to Privacy Information Management (Paperback): IT Governance Iso/Iec 27701:2019: An Introduction to Privacy Information Management (Paperback)
IT Governance
R371 Discovery Miles 3 710 Ships in 12 - 17 working days

ISO/IEC 27701:2019: An introduction to privacy information management offers a concise introduction to the Standard, aiding those organisations looking to improve their privacy information management regime, particularly where ISO/IEC 27701:2019 is involved.

The Usage and Impact of ICTs during the Covid-19 Pandemic (Hardcover): Shengnan Yang, Xiaohua Zhu, Pnina Fichman The Usage and Impact of ICTs during the Covid-19 Pandemic (Hardcover)
Shengnan Yang, Xiaohua Zhu, Pnina Fichman
R3,837 Discovery Miles 38 370 Ships in 12 - 17 working days

This book takes a holistic view of the roles of ICTs during the pandemic through the lens of social informatics, as it is critical to our understanding of the relations between society and technology. Specific attention is given to various stakeholders and social contexts, with analysis at the individual, group, community, and society levels. Pushing the boundaries of information science research with timely and critical research questions, this edited volume showcases information science research in the context of COVID-19, by specifically accentuating sociotechnical practices, activities, and ICT interventions during the pandemic. Its social informatics focus appeals to a broad audience, and its global and international orientation provides a timely, innovative, and much-needed perspective to information science. This book is unique in its interdisciplinary nature as it consists of research studies on the intersections between ICTs and health, culture, social interaction, civic engagement, information dissemination, work, and education. Chapters apply a range of research methods, including questionnaire surveys, content analyses, and case studies from countries in Asia, Europe, and America, as well as global and international comparisons. The book's primary target audience includes scholars and students in information and library science, particularly those interested in the social aspect of the information society. It may be of interest to information professionals, library practitioners, educators, and information policymakers, as well as scholars and students in science and technology studies, cultural studies, political science, public administration, sociology, and communication studies.

Managing IoT and Mobile Technologies with Innovation, Trust, and Sustainable Computing (Paperback): Shuang Geng, Kris M y Law,... Managing IoT and Mobile Technologies with Innovation, Trust, and Sustainable Computing (Paperback)
Shuang Geng, Kris M y Law, Andrew W. H. Ip, Brij B. Gupta
R1,158 Discovery Miles 11 580 Ships in 9 - 15 working days

Focused on the latest mobile technologies, this book addresses specific features (such as IoT) and their adoptions that aim to enable excellence in business in Industry 4.0. Furthermore, this book explores how the adoption of these technologies is related to rising concerns about privacy and trusted communication issues that concern management and leaders of business organizations. Managing IoT and Mobile Technologies with Innovation, Trust, and Sustainable Computing not only targets IT experts and drills down on the technical issues but also provides readers from various groups with a well-linked concept about how the latest trends of mobile technologies are closely related to daily living and the workplace at managerial and even individual levels.

The California Consumer Privacy Act (CCPA) - An implementation guide (Paperback): Preston Bukaty The California Consumer Privacy Act (CCPA) - An implementation guide (Paperback)
Preston Bukaty
R892 Discovery Miles 8 920 Ships in 12 - 17 working days

Understand the CCPA (California Consumer Privacy Act) and how to implement strategies to comply with this privacy regulation. Established in June 2018, the CCPA was created to remedy the lack of comprehensive privacy regulation in the state of California. When it comes into effect on January 1, 2020, the CCPA will give California residents the right to: Learn what personal data a business has collected about them Understand who this data has been disclosed to Find out whether their personal data has been sold to third parties, and who these third parties are Opt-out of such data transactions, or request that the data be deleted. Many organizations that do business in the state of California must align to the provisions of the CCPA. Much like the EU's GDPR (General Data Protection Regulation), businesses that fail to comply with the CCPA will face economic penalties. Prepare your business for CCPA compliance with our implementation guide that: Provides the reader with a comprehensive understanding of the legislation by explaining key terms Explains how a business can implement strategies to comply with the CCPA Discusses potential developments of the CCPA to further aid compliance Your guide to understanding the CCPA and how you can implement a strategy to comply with this legislation - buy this book today to get the guidance you need! About the author Preston Bukaty is an attorney and consultant. He specializes in data privacy GRC projects, from data inventory audits to gap analyses, contract management, and remediation planning. His compliance background and experience operationalizing compliance in a variety of industries give him a strong understanding of the legal issues presented by international regulatory frameworks. Having conducted more than 3,000 data mapping audits, he also understands the practical realities of project management in operationalizing compliance initiatives. Preston's legal experience and enthusiasm for technology make him uniquely suited to understanding the business impact of privacy regulations such as the GDPR and the CCPA. He has advised more than 250 organizations engaged in businesses as varied as SaaS platforms, mobile geolocation applications, GNSS/telematics tools, financial institutions, fleet management software, architectural/engineering design systems, and web hosting. He also teaches certification courses on GDPR compliance and ISO 27001 implementation, and writes on data privacy law topics. Preston lives in Denver, Colorado. Prior to working as a data privacy consultant, he worked for an international GPS software company, advising business areas on compliance issues across 140 countries. Preston holds a juris doctorate from the University of Kansas School of Law, along with a basketball signed by Hall of Fame coach Bill Self.

Ransomware Protection Playbook (Paperback): RA Grimes Ransomware Protection Playbook (Paperback)
RA Grimes
R523 Discovery Miles 5 230 Ships in 12 - 17 working days

Avoid becoming the next ransomware victim by taking practical steps today Colonial Pipeline. CWT Global. Brenntag. Travelex. The list of ransomware victims is long, distinguished, and sophisticated. And it's growing longer every day. In Ransomware Protection Playbook, computer security veteran and expert penetration tester Roger A. Grimes delivers an actionable blueprint for organizations seeking a robust defense against one of the most insidious and destructive IT threats currently in the wild. You'll learn about concrete steps you can take now to protect yourself or your organization from ransomware attacks. In addition to walking you through the necessary technical preventative measures, this critical book will show you how to: Quickly detect an attack, limit the damage, and decide whether to pay the ransom Implement a pre-set game plan in the event of a game-changing security breach to help limit the reputational and financial damage Lay down a secure foundation of cybersecurity insurance and legal protection to mitigate the disruption to your life and business A must-read for cyber and information security professionals, privacy leaders, risk managers, and CTOs, Ransomware Protection Playbook is an irreplaceable and timely resource for anyone concerned about the security of their, or their organization's, data.

What To Do When You Get Hacked - A Practitioner's Guide to Incident Response in the 21st Century (Hardcover): Shimon... What To Do When You Get Hacked - A Practitioner's Guide to Incident Response in the 21st Century (Hardcover)
Shimon Brathwaite
R2,077 Discovery Miles 20 770 Ships in 10 - 15 working days

1) What to do when you get hacked 2) A guide to incident response 3) Incident response and cybersecurity for small businesses

Trust and Records in an Open Digital Environment (Paperback): Hrvoje Stancic Trust and Records in an Open Digital Environment (Paperback)
Hrvoje Stancic
R1,070 Discovery Miles 10 700 Ships in 9 - 15 working days

Trust and Records in an Open Digital Environment explores issues that arise when digital records are entrusted to the cloud and will help professionals to make informed choices in the context of a rapidly changing digital economy. Showing that records need to ensure public trust, especially in the era of alternative truths, this volume argues that reliable resources, which are openly accessible from governmental institutions, e-services, archival institutions, digital repositories, and cloud-based digital archives, are the key to an open digital environment. The book also demonstrates that current established practices need to be reviewed and amended to include the networked nature of the cloud-based records, to investigate the role of new players, like cloud service providers (CSP), and assess the potential for implementing new, disruptive technologies like blockchain. Stancic and the contributors address these challenges by taking three themes - state, citizens, and documentary form - and discussing their interaction in the context of open government, open access, recordkeeping, and digital preservation. Exploring what is needed to enable the establishment of an open digital environment, Trust and Records in an Open Digital Environment should be essential reading for data, information, document, and records management professionals. It will also be a key text for archivists, librarians, professors, and students working in the information sciences and other related fields.

Health Data Privacy under the GDPR - Big Data Challenges and Regulatory Responses (Paperback): Maria Tzanou Health Data Privacy under the GDPR - Big Data Challenges and Regulatory Responses (Paperback)
Maria Tzanou
R1,224 Discovery Miles 12 240 Ships in 12 - 17 working days

The growth of data-collecting goods and services, such as ehealth and mhealth apps, smart watches, mobile fitness and dieting apps, electronic skin and ingestible tech, combined with recent technological developments such as increased capacity of data storage, artificial intelligence and smart algorithms, has spawned a big data revolution that has reshaped how we understand and approach health data. Recently the COVID-19 pandemic has foregrounded a variety of data privacy issues. The collection, storage, sharing and analysis of health- related data raises major legal and ethical questions relating to privacy, data protection, profiling, discrimination, surveillance, personal autonomy and dignity. This book examines health privacy questions in light of the General Data Protection Regulation (GDPR) and the general data privacy legal framework of the European Union (EU). The GDPR is a complex and evolving body of law that aims to deal with several technological and societal health data privacy problems, while safeguarding public health interests and addressing its internal gaps and uncertainties. The book answers a diverse range of questions including: What role can the GDPR play in regulating health surveillance and big (health) data analytics? Can it catch up with internet-age developments? Are the solutions to the challenges posed by big health data to be found in the law? Does the GDPR provide adequate tools and mechanisms to ensure public health objectives and the effective protection of privacy? How does the GDPR deal with data that concern children's health and academic research? By analysing a number of diverse questions concerning big health data under the GDPR from various perspectives, this book will appeal to those interested in privacy, data protection, big data, health sciences, information technology, the GDPR, EU and human rights law.

The Home in the Digital Age (Paperback): Antonio Argandona, Joy Malala, Richard Peatfield The Home in the Digital Age (Paperback)
Antonio Argandona, Joy Malala, Richard Peatfield
R1,229 Discovery Miles 12 290 Ships in 12 - 17 working days

The Home in the Digital Age is a set of multidisciplinary studies exploring the impact of digital technologies in the home, with a shift of emphasis from technology to the people living and using this in their homes. The book covers a wide variety of topics on the design, introduction and use of digital technologies in the home, combining the technological dimension with the cognitive, emotional, cultural and symbolic dimensions of the objects that incorporate digital technologies and project them onto people's lives. It offers a coherent approach, that of the home, which gives unity to the discussion. Scholars of the home, the house and the family will find here the connection with the problems derived from the use of domestic robots and connected devices. Students of artificial intelligence, machine learning, robotics, big data and other branches of digital technologies will find ideas and arguments to apply their disciplines to the home and participate fruitfully in forums where digital technologies are built and negotiated in the home. Experts from various disciplines psychologists and sociologists; philosophers, epistemologists and ethicists; economists; engineers, architects, urban planners and designers and so on and also those interested in developing policies for the home and family will find this book contains well-founded and useful ideas to focus their work.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Identified, Tracked, and Profiled - The…
Peter Dauvergne Hardcover R2,266 Discovery Miles 22 660
What Every Engineer Should Know About…
Joanna F Defranco, Bob Maley Hardcover R3,542 Discovery Miles 35 420
Software Security - Concepts & Practices
Suhel Ahmad Khan, Rajeev Kumar, … Hardcover R3,640 Discovery Miles 36 400
Cybersecurity for Coaches and Therapists…
Alexandra Fouracres Paperback R1,030 Discovery Miles 10 300
The Little Black Book of Data and…
Kyle Taylor Paperback R276 Discovery Miles 2 760
Pandemic Surveillance - Privacy…
Margaret Hu Hardcover R3,053 Discovery Miles 30 530
Broken Code - Inside Facebook And The…
Jeff Horwitz Paperback R420 R328 Discovery Miles 3 280
Cybersecurity For Dummies, 2nd Edition
J. Steinberg Paperback R795 R572 Discovery Miles 5 720
Pegasus - The Story Of The World's Most…
Laurent Richard, Sandrine Rigaud Paperback R380 R297 Discovery Miles 2 970
Security in the Digital World
IT Governance Paperback R490 Discovery Miles 4 900

 

Partners