0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (172)
  • R250 - R500 (198)
  • R500+ (808)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

Cyber Warfare and Terrorism - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover): Information Reso Management... Cyber Warfare and Terrorism - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover)
Information Reso Management Association
R11,205 Discovery Miles 112 050 Ships in 10 - 15 working days
Security, Trust, and Regulatory Aspects of Cloud Computing in Business Environments (Hardcover): S. Srinivasan Security, Trust, and Regulatory Aspects of Cloud Computing in Business Environments (Hardcover)
S. Srinivasan
R5,297 Discovery Miles 52 970 Ships in 12 - 17 working days

Emerging as an effective alternative to organization-based information systems, cloud computing has been adopted by many businesses around the world. Despite the increased popularity, there remain concerns about the security of data in the cloud since users have become accustomed to having control over their hardware and software. Security, Trust, and Regulatory Aspects of Cloud Computing in Business Environments compiles the research and views of cloud computing from various individuals around the world. Detailing cloud security, regulatory and industry compliance, and trust building in the cloud, this book is an essential reference source for practitioners, professionals, and researchers worldwide, as well as business managers interested in an assembled collection of solutions provided by a variety of cloud users.

Handbook of Research on Emerging Developments in Data Privacy (Hardcover): Manish Gupta Handbook of Research on Emerging Developments in Data Privacy (Hardcover)
Manish Gupta
R8,757 Discovery Miles 87 570 Ships in 12 - 17 working days

Data collection allows today's businesses to cater to each customer's individual needs and provides a necessary edge in a competitive market. However, any breach in confidentiality can cause serious consequences for both the consumer and the company. The Handbook of Research on Emerging Developments in Data Privacy brings together new ideas on how to deal with potential leaks of valuable customer information. Highlighting the legal aspects of identity protection, trust and security, and detection techniques, this comprehensive work is a valuable resource for any business, legal, or technology professional looking to improve information security within their organization.

Research Anthology on Combating Cyber-Aggression and Online Negativity, VOL 3 (Hardcover): Information R Management Association Research Anthology on Combating Cyber-Aggression and Online Negativity, VOL 3 (Hardcover)
Information R Management Association
R12,920 Discovery Miles 129 200 Ships in 10 - 15 working days
Research Anthology on Combating Cyber-Aggression and Online Negativity, VOL 2 (Hardcover): Information R Management Association Research Anthology on Combating Cyber-Aggression and Online Negativity, VOL 2 (Hardcover)
Information R Management Association
R12,913 Discovery Miles 129 130 Ships in 10 - 15 working days
Large-Scale Data Streaming, Processing, and Blockchain Security (Hardcover): Hemraj Saini, Geetanjali Rathee, Dinesh Kumar Saini Large-Scale Data Streaming, Processing, and Blockchain Security (Hardcover)
Hemraj Saini, Geetanjali Rathee, Dinesh Kumar Saini
R6,685 Discovery Miles 66 850 Ships in 10 - 15 working days

Data has cemented itself as a building block of daily life. However, surrounding oneself with great quantities of information heightens risks to one's personal privacy. Additionally, the presence of massive amounts of information prompts researchers into how best to handle and disseminate it. Research is necessary to understand how to cope with the current technological requirements. Large-Scale Data Streaming, Processing, and Blockchain Security is a collection of innovative research that explores the latest methodologies, modeling, and simulations for coping with the generation and management of large-scale data in both scientific and individual applications. Featuring coverage on a wide range of topics including security models, internet of things, and collaborative filtering, this book is ideally designed for entrepreneurs, security analysts, IT consultants, security professionals, programmers, computer technicians, data scientists, technology developers, engineers, researchers, academicians, and students.

Handbook of Research on Medical Data Security for Bioengineers (Hardcover): Butta Singh, Barjinder Singh Saini, Dilbag Singh,... Handbook of Research on Medical Data Security for Bioengineers (Hardcover)
Butta Singh, Barjinder Singh Saini, Dilbag Singh, Anukul Pandey
R9,781 Discovery Miles 97 810 Ships in 10 - 15 working days

Breaches and identity theft involving medical data are on the rise. Data security has become especially critical to the healthcare industry as patient privacy hinges on legal compliance and secure adoption of electronic health records. As cyber criminals see medical data as an easy way to illegally obtain medical goods and services or sell sensitive information, major security flaws can pose serious threats to the health and safety of patients. The Handbook of Research on Medical Data Security for Bioengineers seeks to provide a cross-disciplinary forum on research in privacy preserving healthcare systems and engineering applications in medical data security. The goal of the book is to instigate discussion on these critical issues since the success of electronic healthcare applications depends directly on patient security and privacy for ethical and legal reasons. While highlighting topics including data privacy, encryption strategies, and smart health, this book is ideally designed for IT experts, computer engineers, biomedical engineer practitioners, professionals, researchers, and post-doctoral and graduate students.

Code Based Secret Sharing Schemes: Applied Combinatorial Coding Theory (Hardcover): Patrick Sole, Selda Calkavur, Alexis... Code Based Secret Sharing Schemes: Applied Combinatorial Coding Theory (Hardcover)
Patrick Sole, Selda Calkavur, Alexis Bonnecaze, Romar Dela Cruz
R2,333 Discovery Miles 23 330 Ships in 10 - 15 working days

Secret sharing schemes form one of the most important topic in Cryptography. These protocols are used in many areas, applied mathematics, computer science, electrical engineering. A secret is divided into several pieces called shares. Each share is given to a user of the system. Each user has no information about the secret, but the secret can be retrieved by certain authorized coalition of users.This book is devoted to such schemes inspired by Coding Theory. The classical schemes of Shamir, Blakley, Massey are recalled. Survey is made of research in Combinatorial Coding Theory they triggered, mostly self-dual codes, and minimal codes. Applications to engineering like image processing, and key management of MANETs are highlighted.

Research Anthology on Combating Cyber-Aggression and Online Negativity, VOL 1 (Hardcover): Information R Management Association Research Anthology on Combating Cyber-Aggression and Online Negativity, VOL 1 (Hardcover)
Information R Management Association
R12,908 Discovery Miles 129 080 Ships in 10 - 15 working days
Exchanging Terrorism Oxygen for Media Airwaves - The Age of Terroredia (Hardcover): Mahmoud Eid Exchanging Terrorism Oxygen for Media Airwaves - The Age of Terroredia (Hardcover)
Mahmoud Eid
R5,309 Discovery Miles 53 090 Ships in 12 - 17 working days

Terroredia is a newly coined term by the editor, Dr. Mahmoud Eid, to explain the phenomenal, yet under-researched relationship between terrorists and media professionals in which acts of terrorism and media coverage are exchanged, influenced, and fueled by one another. Exchanging Terrorism Oxygen for Media Airwaves: The Age of Terroredia provides a timely and thorough discussion on a wide range of issues surrounding terrorism in relation to both traditional and new media. Comprised of insights and research from leading experts in the fields of terrorism and media studies, this publication presents various topics relating to Terroredia: understanding of terrorism and the role of the media, terrorism manifestations and media representations of terrorism, types of terrorism and media stereotypes of terrorism, terrorism tactics and media strategies, the war on terrorism, the function of terrorism and the employment of the media, new terrorism and new media, contemporary cases of terrorist-media interactions, the rationality behind terrorism and counterterrorism, as well as the responsibility of the media. This publication is of interest to government officials, media professionals, researchers, and upper-level students interested in learning more about the complex relationship between terrorism and the media.

Security, Privacy, and Anonymization in Social Networks - Emerging Research and Opportunities (Hardcover): B. K. Tripathy,... Security, Privacy, and Anonymization in Social Networks - Emerging Research and Opportunities (Hardcover)
B. K. Tripathy, Kiran Baktha
R4,151 Discovery Miles 41 510 Ships in 10 - 15 working days

Technology has become profoundly integrated into modern society; however, this increases the risk of vulnerabilities, such as hacking and other system errors, along with other online threats. Security, Privacy, and Anonymization in Social Networks: Emerging Research and Opportunities is a pivotal reference source for the most up-to-date research on edge clustering models and weighted social networks. Presenting widespread coverage across a range of applicable perspectives and topics, such as neighborhood attacks, fast k-degree anonymization (FKDA), and vertex-clustering algorithms, this book is ideally designed for academics, researchers, post-graduates, and practitioners seeking current research on undirected networks and greedy algorithms for social network anonymization.

Social Implications of Data Mining and Information Privacy - Interdisciplinary Frameworks and Solutions (Hardcover): Ephrem Eyob Social Implications of Data Mining and Information Privacy - Interdisciplinary Frameworks and Solutions (Hardcover)
Ephrem Eyob
R5,300 Discovery Miles 53 000 Ships in 12 - 17 working days

As data mining is one of the most rapidly changing disciplines with new technologies and concepts continually under development, academicians, researchers, and professionals of the discipline need access to the most current information about the concepts, issues, trends, and technologies in this emerging field.""Social Implications of Data Mining and Information Privacy: Interdisciplinary Frameworks and Solutions"" serves as a critical source of information related to emerging issues and solutions in data mining and the influence of political and socioeconomic factors. An immense breakthrough, this essential reference provides concise coverage of emerging issues and technological solutions in data mining, and covers problems with applicable laws governing such issues.

Personal Data Privacy and Protection in a Surveillance Era - Technologies and Practices (Hardcover, New): Christina Akrivopoulou Personal Data Privacy and Protection in a Surveillance Era - Technologies and Practices (Hardcover, New)
Christina Akrivopoulou
R4,914 Discovery Miles 49 140 Ships in 12 - 17 working days

Personal Data Privacy and Protection in a Surveillance Era: Technologies and Practices spans a number of interdependent and emerging topics in the area of legal protection of privacy and technology. This book explores the new threats that cyberspace poses to the privacy of individuals, as well as the threats that surveillance technologies generate in public spaces and in digital communication. It examines media practices and privacy frameworks in the fields of copyright, digital management and genetic information. New models of data protection are proposed along with their advantages and disadvantages.

Information Security Management-Global Challenges In The New Millennium (Paperback): Gurpreet Dhillon Information Security Management-Global Challenges In The New Millennium (Paperback)
Gurpreet Dhillon
R1,966 Discovery Miles 19 660 Ships in 12 - 17 working days

Information security is moving much higher up the agenda of corporate concerns. The pitfalls lying in wait of corporate information are legion. If information is our most important asset, then we must fortify ourselves for the task of protecting it properly. This book is a compilation of contributed chapters by researches and practitioners addressing issues, trends and challenges facing the management of information security in this new millennium. Information Security Management: Global Challenges in the New Millennium focuses on aspects of information security planning, evaluation, design and implementation.

Security, Privacy, and Forensics Issues in Big Data (Hardcover): Ramesh C. Joshi, Brij B. Gupta Security, Privacy, and Forensics Issues in Big Data (Hardcover)
Ramesh C. Joshi, Brij B. Gupta
R7,014 Discovery Miles 70 140 Ships in 12 - 17 working days

With the proliferation of devices connected to the internet and connected to each other, the volume of data collected, stored, and processed is increasing every day, which brings new challenges in terms of information security. As big data expands with the help of public clouds, traditional security solutions tailored to private computing infrastructures and confined to a well-defined security perimeter, such as firewalls and demilitarized zones (DMZs), are no longer effective. New security functions are required to work over the heterogenous composition of diverse hardware, operating systems, and network domains. Security, Privacy, and Forensics Issues in Big Data is an essential research book that examines recent advancements in big data and the impact that these advancements have on information security and privacy measures needed for these networks. Highlighting a range of topics including cryptography, data analytics, and threat detection, this is an excellent reference source for students, software developers and engineers, security analysts, IT consultants, academicians, researchers, and professionals.

Security, Rights and Liabilities in e-Commerce (Hardcover): Jeffrey H. Matsuura Security, Rights and Liabilities in e-Commerce (Hardcover)
Jeffrey H. Matsuura
R2,721 Discovery Miles 27 210 Ships in 10 - 15 working days

Geared towards technical professionals, marketing managers, finance/business strategists, law/policy makers, and educators whose work involves e-commerce, this unique book provides a clear overview of the legal and public policy issues associated with computer networks and electronic transaction and security. It identifies various forms of potential legal and commercial liability, and advises what legal claims may be raised, by whom, and the potential impact of these claims. Methods to reduce or eliminate liability are discussed, offering practical, operational guidance to professionals. The book also describes the legal rights of computer system and electronic commerce operators that can be applied to help preserve security and to recover in the event that security is breached.

Discrete Password Logbook - Kitty Cats Edition (Hardcover): Suzeteo Enterprises Discrete Password Logbook - Kitty Cats Edition (Hardcover)
Suzeteo Enterprises
R542 Discovery Miles 5 420 Ships in 10 - 15 working days
Notebook - A cute and discrete password book to keep your log in details safe and close at hand at all times (Large print,... Notebook - A cute and discrete password book to keep your log in details safe and close at hand at all times (Large print, Hardcover, Large type / large print edition)
Faith V Summers
R499 Discovery Miles 4 990 Ships in 12 - 17 working days
Senior Cyber - Best Security Practices for Your Golden Years (Hardcover): Scott N Schober Senior Cyber - Best Security Practices for Your Golden Years (Hardcover)
Scott N Schober; As told to Craig W Schober
R631 Discovery Miles 6 310 Ships in 12 - 17 working days
Innovative Solutions for Access Control Management (Hardcover): Ahmad Kamran Malik, Adeel Anjum, Basit Raza Innovative Solutions for Access Control Management (Hardcover)
Ahmad Kamran Malik, Adeel Anjum, Basit Raza
R5,281 Discovery Miles 52 810 Ships in 12 - 17 working days

Technological innovation and evolution continues to improve personal and professional lifestyles, as well as general organizational and business practices; however, these advancements also create potential issues in the security and privacy of the user's information. Innovative Solutions for Access Control Management features a comprehensive discussion on the trending topics and emergent research in IT security and governance. Highlighting theoretical frameworks and best practices, as well as challenges and solutions within the topic of access control and management, this publication is a pivotal reference source for researchers, practitioners, students, database vendors, and organizations within the information technology and computer science fields.

Unhackable - Your Online Security Playbook: Recreating Cyber Security in an Unsecure World (Hardcover): George Mansour Unhackable - Your Online Security Playbook: Recreating Cyber Security in an Unsecure World (Hardcover)
George Mansour
R670 Discovery Miles 6 700 Ships in 10 - 15 working days
Cyber Security Standards, Practices and Industrial Applications - Systems and Methodologies (Hardcover): Junaid Ahmed Zubairi,... Cyber Security Standards, Practices and Industrial Applications - Systems and Methodologies (Hardcover)
Junaid Ahmed Zubairi, Athar Mahboob
R5,299 Discovery Miles 52 990 Ships in 12 - 17 working days

Cyber security, encompassing both information and network security, is of utmost importance in today s information age. Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies details the latest and most important advances in security standards. First, it introduces the differences between information security (covers the understanding of security requirements, classification of threats, attacks and information protection systems and methodologies) and network security (includes both security protocols as well as systems which create a security perimeter around networks for intrusion detection and avoidance). In addition, the book serves as an essential reference to students, researchers, practitioners and consultants in the area of social media, cyber security and information and communication technologies (ICT).

Cybersecurity Is Everybody's Business - Solve the Security Puzzle for Your Small Business and Home (Hardcover): Scott N... Cybersecurity Is Everybody's Business - Solve the Security Puzzle for Your Small Business and Home (Hardcover)
Scott N Schober, Craig W Schober
R758 R675 Discovery Miles 6 750 Save R83 (11%) Ships in 10 - 15 working days
Containing Big Tech - How To Protect Our Civil Rights, Economy, And Democracy (Hardcover): Tom Kemp Containing Big Tech - How To Protect Our Civil Rights, Economy, And Democracy (Hardcover)
Tom Kemp
R712 R639 Discovery Miles 6 390 Save R73 (10%) In Stock

The path forward to rein in online surveillance, AI, and tech monopolies.

Technology is a gift and a curse. The five Big Tech companies―Meta, Apple, Amazon, Microsoft, and Google―have built innovative products that improve many aspects of our lives. But their intrusiveness and our dependence on them have created pressing threats to our civil rights, economy, and democracy.

Coming from an extensive background building Silicon Valley-based tech startups, Tom Kemp eloquently and precisely weaves together the threats posed by Big Tech:

  • the overcollection and weaponization of our most sensitive data
  • the problematic ways Big Tech uses AI to process and act upon our data
  • the stifling of competition and entrepreneurship due to Big Tech's dominant market position

This richly detailed book exposes the consequences of Big Tech's digital surveillance, exploitative use of AI, and monopolistic and anticompetitive practices. It offers actionable solutions to these problems and a clear path forward for individuals and policymakers to advocate for change. By containing the excesses of Big Tech, we will ensure our civil rights are respected and preserved, our economy is competitive, and our democracy is protected.

Safe Computing is Like Safe Sex - You have to practice it to avoid infection (Hardcover): Richard G Lowe Safe Computing is Like Safe Sex - You have to practice it to avoid infection (Hardcover)
Richard G Lowe
R894 Discovery Miles 8 940 Ships in 12 - 17 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Sermons
Joseph Butler Paperback R580 Discovery Miles 5 800
Teddy Play Dough - Pastel Green (500g)
R62 Discovery Miles 620
Too Late
Colleen Hoover Paperback R295 R264 Discovery Miles 2 640
Tsuk. All-Purpose Ink - Real Black…
R36 Discovery Miles 360
Vrydagaand
Elsa Winckler Paperback R339 Discovery Miles 3 390
Nintendo Switch Lite Console (Coral)
R4,899 Discovery Miles 48 990
PowerSquad AirPod Case - Harry Potter
R279 R195 Discovery Miles 1 950
Cappelletto SB-0 Sketching Clipboard (30…
R708 Discovery Miles 7 080
Morality - Restoring the Common Good in…
Jonathan Sacks Paperback R485 R457 Discovery Miles 4 570
Greenbean School Years - Stethoscope
R250 Discovery Miles 2 500

 

Partners