![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection
As the 2020 global lockdown became a universal strategy to control the COVID-19 pandemic, social distancing triggered a massive reliance on online and cyberspace alternatives and switched the world to the digital economy. Despite their effectiveness for remote work and online interactions, cyberspace alternatives ignited several Cybersecurity challenges. Malicious hackers capitalized on global anxiety and launched cyberattacks against unsuspecting victims. Internet fraudsters exploited human and system vulnerabilities and impacted data integrity, privacy, and digital behaviour. Cybersecurity in the COVID-19 Pandemic demystifies Cybersecurity concepts using real-world cybercrime incidents from the pandemic to illustrate how threat actors perpetrated computer fraud against valuable information assets particularly healthcare, financial, commercial, travel, academic, and social networking data. The book simplifies the socio-technical aspects of Cybersecurity and draws valuable lessons from the impacts COVID-19 cyberattacks exerted on computer networks, online portals, and databases. The book also predicts the fusion of Cybersecurity into Artificial Intelligence and Big Data Analytics, the two emerging domains that will potentially dominate and redefine post-pandemic Cybersecurity research and innovations between 2021 and 2025. The book's primary audience is individual and corporate cyberspace consumers across all professions intending to update their Cybersecurity knowledge for detecting, preventing, responding to, and recovering from computer crimes. Cybersecurity in the COVID-19 Pandemic is ideal for information officers, data managers, business and risk administrators, technology scholars, Cybersecurity experts and researchers, and information technology practitioners. Readers will draw lessons for protecting their digital assets from email phishing fraud, social engineering scams, malware campaigns, and website hijacks.
With the advent of the IT revolution, the volume of data produced has increased exponentially and is still showing an upward trend. This data may be abundant and enormous, but it's a precious resource and should be managed properly. Cloud technology plays an important role in data management. Storing data in the cloud rather than on local storage has many benefits, but apart from these benefits, there are privacy concerns in storing sensitive data over third-party servers. These concerns can be addressed by storing data in an encrypted form; however, while encryption solves the problem of privacy, it engenders other serious issues, including the infeasibility of the fundamental search operation and a reduction in flexibility when sharing data with other users, amongst others. The concept of searchable encryption addresses these issues. This book provides every necessary detail required to develop a secure, searchable encryption scheme using both symmetric and asymmetric cryptographic primitives along with the appropriate security models to ensure the minimum security requirements for real-world applications.
The complexity and severity of the Distributed Denial of Service (DDoS) attacks are increasing day-by-day. The Internet has a highly inconsistent structure in terms of resource distribution. Numerous technical solutions are available, but those involving economic aspects have not been given much consideration. The book, DDoS Attacks - Classification, Attacks, Challenges, and Countermeasures, provides an overview of both types of defensive solutions proposed so far, exploring different dimensions that would mitigate the DDoS effectively and show the implications associated with them. Features: Covers topics that describe taxonomies of the DDoS attacks in detail, recent trends and classification of defensive mechanisms on the basis of deployment location, the types of defensive action, and the solutions offering economic incentives. Introduces chapters discussing the various types of DDoS attack associated with different layers of security, an attacker's motivations, and the importance of incentives and liabilities in any defensive solution. Illustrates the role of fair resource-allocation schemes, separate payment mechanisms for attackers and legitimate users, negotiation models on cost and types of resources, and risk assessments and transfer mechanisms. DDoS Attacks - Classification, Attacks, Challenges, and Countermeasures is designed for the readers who have an interest in the cybersecurity domain, including students and researchers who are exploring different dimensions associated with the DDoS attack, developers and security professionals who are focusing on developing defensive schemes and applications for detecting or mitigating the DDoS attacks, and faculty members across different universities.
Trust and Records in an Open Digital Environment explores issues that arise when digital records are entrusted to the cloud and will help professionals to make informed choices in the context of a rapidly changing digital economy. Showing that records need to ensure public trust, especially in the era of alternative truths, this volume argues that reliable resources, which are openly accessible from governmental institutions, e-services, archival institutions, digital repositories, and cloud-based digital archives, are the key to an open digital environment. The book also demonstrates that current established practices need to be reviewed and amended to include the networked nature of the cloud-based records, to investigate the role of new players, like cloud service providers (CSP), and assess the potential for implementing new, disruptive technologies like blockchain. Stancic and the contributors address these challenges by taking three themes - state, citizens, and documentary form - and discussing their interaction in the context of open government, open access, recordkeeping, and digital preservation. Exploring what is needed to enable the establishment of an open digital environment, Trust and Records in an Open Digital Environment should be essential reading for data, information, document, and records management professionals. It will also be a key text for archivists, librarians, professors, and students working in the information sciences and other related fields.
Trust and Records in an Open Digital Environment explores issues that arise when digital records are entrusted to the cloud and will help professionals to make informed choices in the context of a rapidly changing digital economy. Showing that records need to ensure public trust, especially in the era of alternative truths, this volume argues that reliable resources, which are openly accessible from governmental institutions, e-services, archival institutions, digital repositories, and cloud-based digital archives, are the key to an open digital environment. The book also demonstrates that current established practices need to be reviewed and amended to include the networked nature of the cloud-based records, to investigate the role of new players, like cloud service providers (CSP), and assess the potential for implementing new, disruptive technologies like blockchain. Stancic and the contributors address these challenges by taking three themes - state, citizens, and documentary form - and discussing their interaction in the context of open government, open access, recordkeeping, and digital preservation. Exploring what is needed to enable the establishment of an open digital environment, Trust and Records in an Open Digital Environment should be essential reading for data, information, document, and records management professionals. It will also be a key text for archivists, librarians, professors, and students working in the information sciences and other related fields.
IoT is empowered by various technologies used to detect, gather, store, act, process, transmit, oversee, and examine information. The combination of emergent technologies for information processing and distributed security, such as Cloud computing, Artificial intelligence, and Blockchain, brings new challenges in addressing distributed security methods that form the foundation of improved and eventually entirely new products and services. As systems interact with each other, it is essential to have an agreed interoperability standard, which is safe and valid. This book aims at providing an introduction by illustrating state-of-the-art security challenges and threats in IoT and the latest developments in IoT with Cloud, AI, and Blockchain security challenges. Various application case studies from domains such as science, engineering, and healthcare are introduced, along with their architecture and how they leverage various technologies Cloud, AI, and Blockchain. This book provides a comprehensive guide to researchers and students to design IoT integrated AI, Cloud, and Blockchain projects and to have an overview of the next generation challenges that may arise in the coming years.
This book offers an analysis of privacy impacts resulting from and reinforced by technology and discusses fundamental risks and challenges of protecting privacy in the digital age. Privacy is among the most endangered "species" in our networked society: personal information is processed for various purposes beyond our control. Ultimately, this affects the natural interplay between privacy, personal identity and identification. This book investigates that interplay from a systemic, socio-technical perspective by combining research from the social and computer sciences. It sheds light on the basic functions of privacy, their relation to identity, and how they alter with digital identification practices. The analysis reveals a general privacy control dilemma of (digital) identification shaped by several interrelated socio-political, economic and technical factors. Uncontrolled increases in the identification modalities inherent to digital technology reinforce this dilemma and benefit surveillance practices, thereby complicating the detection of privacy risks and the creation of appropriate safeguards. Easing this problem requires a novel approach to privacy impact assessment (PIA), and this book proposes an alternative PIA framework which, at its core, comprises a basic typology of (personally and technically) identifiable information. This approach contributes to the theoretical and practical understanding of privacy impacts and thus, to the development of more effective protection standards. This book will be of much interest to students and scholars of critical security studies, surveillance studies, computer and information science, science and technology studies, and politics.
This book focuses on RFID (Radio Frequency Identification), IoT (Internet of Things), and WSN (Wireless Sensor Network). It includes contributions that discuss the security and privacy issues as well as the opportunities and applications that are tightly linked to sensitive infrastructures and strategic services. This book addresses the complete functional framework and workflow in IoT-enabled RFID systems and explores basic and high-level concepts. It is based on the latest technologies and covers the major challenges, issues, and advances in the field. It presents data acquisition and case studies related to data-intensive technologies in RFID-based IoT and includes WSN-based systems and their security. It can serve as a manual for those in the industry while also helping beginners to understand both the basic and advanced aspects of IoT-based RFID-related issues. This book can be a premier interdisciplinary platform for researchers, practitioners, and educators to present and discuss the most recent innovations, trends, and concerns as well as practical challenges encountered, and find solutions that have been adopted in the fields of IoT and analytics.
Attacks against computer systems can cause considerable economic or physical damage. High-quality development of security-critical systems is difficult, mainly because of the conflict between development costs and verifiable correctness. JA1/4rjens presents the UML extension UMLsec for secure systems development. It uses the standard UML extension mechanisms, and can be employed to evaluate UML specifications for vulnerabilities using a formal semantics of a simplified fragment of UML. Established rules of security engineering can be encapsulated and hence made available even to developers who are not specialists in security. As one example, JA1/4rjens uncovers a flaw in the Common Electronic Purse Specification, and proposes and verifies a correction. With a clear separation between the general description of his approach and its mathematical foundations, the book is ideally suited both for researchers and graduate students in UML or formal methods and security, and for advanced professionals writing critical applications.
There is much interest in the use of biometrics for verification, identification, and "screening" applications, collectively called biometric authentication. This interest has been heightened because of the threat of terrorism. Biometric authentication systems offer advantages over systems based on knowledge or possession such as unsupervised (legacy) authentication systems based on password/PIN and supervised (legacy) authentication systems based on driver's licences and passports. The most important advantage is increased security: when a person is authenticated based on a biometric, the probability that this person is the originally enrolled person can be statistically estimated or computed in some other way. When a person is authenticated based on a password or even based on human observation, no such probabilities can be determined. Of course, the mere capability to compute this probability is not sufficient, what is needed is that the probability of correct authentication is high and the error probabilities are low. Achieving this probabilistic linking by introducing biometrics in authentication systems brings along many design choices and may introduce additional security loopholes. "Biometrics" examines the many aspects of biometric applications that are an issue even before a particular biometrics has been selected. In addition, the book further studies many issues that are associated with the currently popular biometric identifiers, namely, finger, face, voice, iris, hand (geometry) and signature.
The growth of data-collecting goods and services, such as ehealth and mhealth apps, smart watches, mobile fitness and dieting apps, electronic skin and ingestible tech, combined with recent technological developments such as increased capacity of data storage, artificial intelligence and smart algorithms, has spawned a big data revolution that has reshaped how we understand and approach health data. Recently the COVID-19 pandemic has foregrounded a variety of data privacy issues. The collection, storage, sharing and analysis of health- related data raises major legal and ethical questions relating to privacy, data protection, profiling, discrimination, surveillance, personal autonomy and dignity. This book examines health privacy questions in light of the General Data Protection Regulation (GDPR) and the general data privacy legal framework of the European Union (EU). The GDPR is a complex and evolving body of law that aims to deal with several technological and societal health data privacy problems, while safeguarding public health interests and addressing its internal gaps and uncertainties. The book answers a diverse range of questions including: What role can the GDPR play in regulating health surveillance and big (health) data analytics? Can it catch up with internet-age developments? Are the solutions to the challenges posed by big health data to be found in the law? Does the GDPR provide adequate tools and mechanisms to ensure public health objectives and the effective protection of privacy? How does the GDPR deal with data that concern children's health and academic research? By analysing a number of diverse questions concerning big health data under the GDPR from various perspectives, this book will appeal to those interested in privacy, data protection, big data, health sciences, information technology, the GDPR, EU and human rights law.
Justice apps - mobile and web-based programmes that can assist individuals with legal tasks - are being produced, improved, and accessed at an unprecedented rate. These technologies have the potential to reshape the justice system, improve access to justice, and demystify legal institutions. Using artificial intelligence techniques, apps can even facilitate the resolution of common legal disputes. However, these opportunities must be assessed in light of the many challenges associated with app use in the justice sector. These include the digital divide and other accessibility issues; the ethical challenges raised by the dehumanisation of legal processes; and various privacy, security, and confidentiality risks. Surveying the landscape of this emergent industry, this book explores the objectives, opportunities, and challenges presented by apps across all areas of the justice sector. Detailed consideration is also given to the use of justice apps in specific legal contexts, including the family law and criminal law sectors. The first book to engage with justice apps, this book will appeal to a wide range of legal scholars, students, practitioners, and policy-makers.
This book is about enforcing privacy and data protection. It demonstrates different approaches - regulatory, legal and technological - to enforcing privacy. If regulators do not enforce laws or regulations or codes or do not have the resources, political support or wherewithal to enforce them, they effectively eviscerate and make meaningless such laws or regulations or codes, no matter how laudable or well-intentioned. In some cases, however, the mere existence of such laws or regulations, combined with a credible threat to invoke them, is sufficient for regulatory purposes. But the threat has to be credible. As some of the authors in this book make clear - it is a theme that runs throughout this book - "carrots" and "soft law" need to be backed up by "sticks" and "hard law". The authors of this book view privacy enforcement as an activity that goes beyond regulatory enforcement, however. In some sense, enforcing privacy is a task that befalls to all of us. Privacy advocates and members of the public can play an important role in combatting the continuing intrusions upon privacy by governments, intelligence agencies and big companies. Contributors to this book - including regulators, privacy advocates, academics, SMEs, a Member of the European Parliament, lawyers and a technology researcher - share their views in the one and only book on Enforcing Privacy.
This book examines the UK's response to terrorist communication. Its principle question asks, has individual privacy and collective security been successfully managed and balanced? The author begins by assessing several technologically-based problems facing British law enforcement agencies, including use of the Internet; the existence of 'darknet'; untraceable Internet telephone calls and messages; smart encrypted device direct messaging applications; and commercially available encryption software. These problems are then related to the traceability and typecasting of potential terrorists, showing that law enforcement agencies are searching for needles in the ever-expanding haystacks. To this end, the book examines the bulk powers of digital surveillance introduced by the Investigatory Powers Act 2016. The book then moves on to assess whether these new powers and the new legislative safeguards introduced are compatible with international human rights standards. The author creates a 'digital rights criterion' from which to challenge the bulk surveillance powers against human rights norms. Lord Carlile of Berriew CBE QC in recommending this book notes this particular legal advancement, commenting that rightly so the author concludes the UK has fairly balanced individual privacy with collective security. The book further analyses the potential impact on intelligence exchange between the EU and the UK, following Brexit. Using the US as a case study, the book shows that UK laws must remain within the ambit of EU law and the Court of Justice of the European Union's (CJEU's) jurisprudence, to maintain the effectiveness of the exchange. It addresses the topics with regard to terrorism and counterterrorism methods and will be of interest to researchers, academics, professionals, and students researching counterterrorism and digital electronic communications, international human rights, data protection, and international intelligence exchange.
Web applications occupy a large space within the IT infrastructure of a business or a corporation. They simply just don't touch a front end or a back end; today's web apps impact just about every corner of it. Today's web apps have become complex, which has made them a prime target for sophisticated cyberattacks. As a result, web apps must be literally tested from the inside and out in terms of security before they can be deployed and launched to the public for business transactions to occur. The primary objective of this book is to address those specific areas that require testing before a web app can be considered to be completely secure. The book specifically examines five key areas: Network security: This encompasses the various network components that are involved in order for the end user to access the particular web app from the server where it is stored at to where it is being transmitted to, whether it is a physical computer itself or a wireless device (such as a smartphone). Cryptography: This area includes not only securing the lines of network communications between the server upon which the web app is stored at and from where it is accessed from but also ensuring that all personally identifiable information (PII) that is stored remains in a ciphertext format and that its integrity remains intact while in transmission. Penetration testing: This involves literally breaking apart a Web app from the external environment and going inside of it, in order to discover all weaknesses and vulnerabilities and making sure that they are patched before the actual Web app is launched into a production state of operation. Threat hunting: This uses both skilled analysts and tools on the Web app and supporting infrastructure to continuously monitor the environment to find all security holes and gaps. The Dark Web: This is that part of the Internet that is not openly visible to the public. As its name implies, this is the "sinister" part of the Internet, and in fact, where much of the PII that is hijacked from a web app cyberattack is sold to other cyberattackers in order to launch more covert and damaging threats to a potential victim. Testing and Securing Web Applications breaks down the complexity of web application security testing so this critical part of IT and corporate infrastructure remains safe and in operation.
Web applications occupy a large space within the IT infrastructure of a business or a corporation. They simply just don't touch a front end or a back end; today's web apps impact just about every corner of it. Today's web apps have become complex, which has made them a prime target for sophisticated cyberattacks. As a result, web apps must be literally tested from the inside and out in terms of security before they can be deployed and launched to the public for business transactions to occur. The primary objective of this book is to address those specific areas that require testing before a web app can be considered to be completely secure. The book specifically examines five key areas: Network security: This encompasses the various network components that are involved in order for the end user to access the particular web app from the server where it is stored at to where it is being transmitted to, whether it is a physical computer itself or a wireless device (such as a smartphone). Cryptography: This area includes not only securing the lines of network communications between the server upon which the web app is stored at and from where it is accessed from but also ensuring that all personally identifiable information (PII) that is stored remains in a ciphertext format and that its integrity remains intact while in transmission. Penetration testing: This involves literally breaking apart a Web app from the external environment and going inside of it, in order to discover all weaknesses and vulnerabilities and making sure that they are patched before the actual Web app is launched into a production state of operation. Threat hunting: This uses both skilled analysts and tools on the Web app and supporting infrastructure to continuously monitor the environment to find all security holes and gaps. The Dark Web: This is that part of the Internet that is not openly visible to the public. As its name implies, this is the "sinister" part of the Internet, and in fact, where much of the PII that is hijacked from a web app cyberattack is sold to other cyberattackers in order to launch more covert and damaging threats to a potential victim. Testing and Securing Web Applications breaks down the complexity of web application security testing so this critical part of IT and corporate infrastructure remains safe and in operation.
The mobile threat landscape is evolving bringing about new forms of data loss. No longer can organizations rely on security policies designed during the PC era. Mobile is different and therefore requires a revised approach to countermeasures to mitigate data loss. Understanding these differences is fundamental to creating a new defense-in-depth strategy designed for mobile. Mobile Data Loss: Threats & Countermeasures reviews the mobile threat landscape using a hacker mind-set to outline risks and attack vectors that include malware, risky apps, operating system compromises, network attacks, and user behaviours. This provides the basis for then outlining countermeasures for defining a holistic mobile security methodology that encompasses proactive protections, response mechanisms, live monitoring, and incident response. Designing a comprehensive mobile security strategy is key. Mobile Data Loss: Threats & Countermeasures outlines the threats and strategies for protecting devices from a plethora of data loss vectors.
The second edition of Data Protection goes beyond the traditional topics including deduplication, continuous availability, snapshots, replication, backup, and recovery, and explores such additional considerations as legal, privacy, and ethical issues. A new model is presented for understanding and planning the various aspects of data protection, which is essential to developing holistic strategies. The second edition also addresses the cloud and the growing adoption of software and function as a service, as well as effectively planning over the lifespan of a workload: what the best mix of traditional and cloud native data protection services might be. Virtualization continues to present new challenges to data protection, and the impact of containerization is examined. The book takes a holistic, business-based approach to data protection. It explains how data protection is a mix of proactive and reactive planning, technology, and activities that allow for data continuity. There are three essential activities that refer to themselves as data protection; while they all overlap in terms of scope and function, each operates as a reasonably self-contained field with its own specialists and domain nomenclature. These three activities are: * Data protection as a storage and recovery activity * Data protection as a security activity * Data protection as a privacy activity These activities are covered in detail, with a focus on how organizations can use them to leverage their IT investments and optimize costs. The book also explains how data protection is becoming an enabler for new processes around data movement and data processing. This book arms readers with information critical for making decisions on how data can be protected against loss in the cloud, on premises, or in a mix of the two. It explains the changing face of recovery in a highly virtualized datacenter and techniques for dealing with big data. Moreover, it presents a model for where data recovery processes can be integrated with IT governance and management in order to achieve the right focus on recoverability across the business. About the Author Preston de Guise has been working with data recovery products for his entire career-designing, implementing, and supporting solutions for governments, universities, and businesses ranging from SMEs to Fortune 500 companies. This broad exposure to industry verticals and business sizes has enabled Preston to understand not only the technical requirements of data protection and recovery, but the management and procedural aspects too.
The second edition of Data Protection goes beyond the traditional topics including deduplication, continuous availability, snapshots, replication, backup, and recovery, and explores such additional considerations as legal, privacy, and ethical issues. A new model is presented for understanding and planning the various aspects of data protection, which is essential to developing holistic strategies. The second edition also addresses the cloud and the growing adoption of software and function as a service, as well as effectively planning over the lifespan of a workload: what the best mix of traditional and cloud native data protection services might be. Virtualization continues to present new challenges to data protection, and the impact of containerization is examined. The book takes a holistic, business-based approach to data protection. It explains how data protection is a mix of proactive and reactive planning, technology, and activities that allow for data continuity. There are three essential activities that refer to themselves as data protection; while they all overlap in terms of scope and function, each operates as a reasonably self-contained field with its own specialists and domain nomenclature. These three activities are: * Data protection as a storage and recovery activity * Data protection as a security activity * Data protection as a privacy activity These activities are covered in detail, with a focus on how organizations can use them to leverage their IT investments and optimize costs. The book also explains how data protection is becoming an enabler for new processes around data movement and data processing. This book arms readers with information critical for making decisions on how data can be protected against loss in the cloud, on premises, or in a mix of the two. It explains the changing face of recovery in a highly virtualized datacenter and techniques for dealing with big data. Moreover, it presents a model for where data recovery processes can be integrated with IT governance and management in order to achieve the right focus on recoverability across the business. About the Author Preston de Guise has been working with data recovery products for his entire career-designing, implementing, and supporting solutions for governments, universities, and businesses ranging from SMEs to Fortune 500 companies. This broad exposure to industry verticals and business sizes has enabled Preston to understand not only the technical requirements of data protection and recovery, but the management and procedural aspects too.
Cyber Strategy: Risk-Driven Security and Resiliency provides a process and roadmap for any company to develop its unified Cybersecurity and Cyber Resiliency strategies. It demonstrates a methodology for companies to combine their disassociated efforts into one corporate plan with buy-in from senior management that will efficiently utilize resources, target high risk threats, and evaluate risk assessment methodologies and the efficacy of resultant risk mitigations. The book discusses all the steps required from conception of the plan from preplanning (mission/vision, principles, strategic objectives, new initiatives derivation), project management directives, cyber threat and vulnerability analysis, cyber risk and controls assessment to reporting and measurement techniques for plan success and overall strategic plan performance. In addition, a methodology is presented to aid in new initiative selection for the following year by identifying all relevant inputs. Tools utilized include: Key Risk Indicators (KRI) and Key Performance Indicators (KPI) National Institute of Standards and Technology (NIST) Cyber Security Framework (CSF) Target State Maturity interval mapping per initiative Comparisons of current and target state business goals and critical success factors A quantitative NIST-based risk assessment of initiative technology components Responsible, Accountable, Consulted, Informed (RACI) diagrams for Cyber Steering Committee tasks and Governance Boards' approval processes Swimlanes, timelines, data flow diagrams (inputs, resources, outputs), progress report templates, and Gantt charts for project management The last chapter provides downloadable checklists, tables, data flow diagrams, figures, and assessment tools to help develop your company's cybersecurity and cyber resiliency strategic plan.
This book presents modern concepts of computer security. It introduces the basic mathematical background necessary to follow computer security concepts. Modern developments in cryptography are examined, starting from private-key and public-key encryption, going through hashing, digital signatures, authentication, secret sharing, group-oriented cryptography, pseudorandomness, key establishment protocols, zero-knowledge protocols, and identification, and finishing with an introduction to modern e-bussiness systems based on digital cash. Intrusion detection and access control provide examples of security systems implemented as a part of operating system. Database and network security is also discussed.This textbook is developed out of classes given by the authors at several universities in Australia over a period of a decade, and will serve as a reference book for professionals in computer security. The presentation is selfcontained. Numerous illustrations, examples, exercises, and a comprehensive subject index support the reader in accessing the material.
Today the vast majority of the world's information resides in, is derived from, and is exchanged among multiple automated systems. Critical decisions are made, and critical action is taken based on information from these systems. Therefore, the information must be accurate, correct, and timely, and be manipulated, stored, retrieved, and exchanged safely, reliably, and securely. In a time when information is considered the latest commodity, information security should be top priority. A Practical Guide to Security Engineering and Information Assurance gives you an engineering approach to information security and information assurance (IA). The book examines the impact of accidental and malicious intentional action and inaction on information security and IA. Innovative long-term vendor, technology, and application-independent strategies show you how to protect your critical systems and data from accidental and intentional action and inaction that could lead to system failure or compromise. The author presents step-by-step, in-depth processes for defining information security and assurance goals, performing vulnerability and threat analysis, implementing and verifying the effectiveness of threat control measures, and conducting accident and incident investigations. She explores real-world strategies applicable to all systems, from small systems supporting a home-based business to those of a multinational corporation, government agency, or critical infrastructure system. The information revolution has brought its share of risks. Exploring the synergy between security, safety, and reliability engineering, A Practical Guide to Security Engineering and Information Assurance consolidates and organizes current thinking about information security/IA techniques, approaches, and best practices. As this book will show you, there is considerably more to information security/IA than firewalls, encryption, and virus protection.
Over the past years, a considerable amount of effort has been devoted, both in industry and academia, towards the development of basic technology as well as innovative applications for the Internet of Things. Adaptive Middleware for the Internet of Things introduces a scalable, interoperable and privacy-preserving approach to realize IoT applications and discusses abstractions and mechanisms at the middleware level that simplify the realization of services that can adapt autonomously to the behavior of their users. Technical topics discussed in the book include: - Behavior-driven Autonomous Services - GAMBAS Middleware Architecture - Generic and Efficient Data Acquisition - Interoperable and Scalable Data Processing - Automated Privacy Preservation Adaptive Middleware for the Internet of Things summarizes the results of the GAMBAS research project funded by the European Commission under Framework Programme 7. It provides an in-depth description of the middleware system developed by the project consortium. In addition, the book describes several innovative mobility and monitoring applications that have been built, deployed and operated to evaluate the middleware under realistic conditions with a large number of users. Adaptive Middleware for the Internet of Things is ideal for personnel in the computer and communication industries as well as academic staff and research students in computer science interested in the development of systems and applications for the Internet of Things.
The new edition of this acclaimed book gives a fully updated overview of European data protection law affecting companies, incorporating the important legal developments which have taken place since the last edition was published. These include the first three cases of the European Court of Justice interpreting the EU Data Protection Directive (95/46), the Commission's first report on the implementation of the Directive, the Data Retention Directive, new developments in international data transfers, conflicts between security requirements and data protection, and the implementation of the Electronic Communications and Privacy Directive 2002/58 in the Member States. It also covers the recent European Court of Justice decision on the controversial export of airline passenger data to the US, and expands its European overview to include the new and acceding Member States. The book contains comprehensive coverage of data protection law, while at the same time providing pragmatic guidance on the typical compliance issues that companies face. As globalization of the world economy continues, an increasing number of business issues with data protection implications have come to the foreground, for example, outsourcing, whistleblower hotlines and records management, all of which are covered in the book. The appendices have been expanded to include most sources which a company will need, such as the texts of relevant directives, the safe harbor principles and FAQs, and charts of implementation in the Member States of specific provisions of interest to business. Thus, the book is a single reference source for companies faced with data protection issues. A Chinese edition of the book was published in 2008, making it the first in-depth treatise on European data protection law published in Chinese.
Full text online version at www.nyupress.org/netwars. Who will rule cyberspace? And why should people care? Recently stories have appeared in a variety of news media, from the sensational to the staid, that portray the Internet as full of pornography, pedophilia, recipes for making bombs, lewd and lawless behavior, and copyright violators. And, for politicians eager for votes, or to people who have never strolled the electronic byways, regulating the Net seems as logical and sensible as making your kids wear seat belts. Forget freedom of speech: children can read this stuff. From the point of view of those on the Net, mass-media's representation of pornography on the Internet grossly overestimates the amount that is actually available, and these stories are based on studies that are at best flawed and at worst fraudulent. To netizens, the panic over the electronic availability of bomb-making recipes and other potentially dangerous material is groundless: the same material is readily available in public libraries. Out on the Net, it seems outrageous that people who have never really experienced it are in a position to regulate it. How then, should the lines be drawn in the grey area between cyberspace and the physical world? In net.wars, Wendy Grossman, a journalist who has covered the Net since 1992 for major publications such as "Wired, The Guardian," and "The Telegraph," assesses the battles that will define the future of this new venue. From the Church of Scientology's raids on Net users to netizens attempts to overthrow both the Communications Decency Act and the restrictions on the export of strong encryption, net.wars explains the issues and the background behind the headlines. Among the issues covered are net scams, class divisions on the net, privacy issues, the Communications Decency Act, women online, pornography, hackers and the computer underground, net criminals and sociopaths, and more. |
You may like...
Reversible Logic Synthesis Methodologies…
Saleem Mohammed Ridha Taha
Hardcover
Handbook of Automated Reasoning, Volume…
Alan J.A. Robinson, Andrei Voronkov
Hardcover
R5,054
Discovery Miles 50 540
Acme Quality Painting Guide Book - a…
Acme White Lead and Color Works
Hardcover
R735
Discovery Miles 7 350
|