0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (122)
  • R250 - R500 (226)
  • R500+ (758)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

Designing for Privacy and its Legal Framework - Data Protection by Design and Default for the Internet of Things (Hardcover,... Designing for Privacy and its Legal Framework - Data Protection by Design and Default for the Internet of Things (Hardcover, 1st ed. 2018)
Aurelia Tamo-Larrieux
R4,039 Discovery Miles 40 390 Ships in 18 - 22 working days

This book discusses the implementation of privacy by design in Europe, a principle that has been codified within the European Data Protection Regulation (GDPR). While privacy by design inspires hope for future privacy-sensitive designs, it also introduces the need for a common understanding of the legal and technical concepts of privacy and data protection. By pursuing an interdisciplinary approach and comparing the problem definitions and objectives of both disciplines, this book bridges the gap between the legal and technical fields in order to enhance the regulatory and academic discourse. The research presented reveals the scope of legal principles and technical tools for privacy protection, and shows that the concept of privacy by design goes beyond the principle of the GDPR. The book presents an analysis of how current regulations delegate the implementation of technical privacy and data protection measures to developers and describes how policy design must evolve in order to implement privacy by design and default principles.

Cyber Denial, Deception and Counter Deception - A Framework for Supporting Active Cyber Defense (Hardcover, 1st ed. 2015):... Cyber Denial, Deception and Counter Deception - A Framework for Supporting Active Cyber Defense (Hardcover, 1st ed. 2015)
Kristin E. Heckman, Frank J Stech, Roshan K. Thomas, Ben Schmoker, Alexander W. Tsow
R3,362 R2,404 Discovery Miles 24 040 Save R958 (28%) Ships in 10 - 15 working days

This book presents the first reference exposition of the Cyber-Deception Chain: a flexible planning and execution framework for creating tactical, operational, or strategic deceptions. This methodology bridges the gap between the current uncoordinated patchwork of tactical denial and deception (D&D) techniques and their orchestration in service of an organization's mission. Concepts for cyber- D&D planning operations and management are detailed within the larger organizational, business, and cyber defense context. It examines the necessity of a comprehensive, active cyber denial scheme. The authors explain the organizational implications of integrating D&D with a legacy cyber strategy, and discuss trade-offs, maturity models, and lifecycle management. Chapters present the primary challenges in using deception as part of a security strategy, and guides users through the steps to overcome common obstacles. Both revealing and concealing fact and fiction have a critical role in securing private information. Detailed case studies are included. Cyber Denial, Deception and Counter Deception is designed as a reference for professionals, researchers and government employees working in cybersecurity. Advanced-level students in computer science focused on security will also find this book useful as a reference or secondary text book.

Port Cybersecurity - Securing Critical Information Infrastructures and Supply Chains (Paperback): Nineta Polemi Port Cybersecurity - Securing Critical Information Infrastructures and Supply Chains (Paperback)
Nineta Polemi
R2,592 R2,417 Discovery Miles 24 170 Save R175 (7%) Ships in 10 - 15 working days

Port Cybersecurity: Securing Critical Information Infrastructures and Supply Chains examines a paradigm shift in the way ports assess cyber risks and vulnerabilities, as well as relevant risk management methodologies, by focusing on initiatives and efforts that attempt to deal with the risks and vulnerabilities of port Critical Information Infrastructures (CII) ecosystems. Modern commercial shipping ports are highly dependent on the operation of complex, dynamic ICT systems and ICT-based maritime supply chains, making these central points in the maritime supply chain vulnerable to cybersecurity threats.

Computer and Network Security Essentials (Hardcover, 1st ed. 2018): Kevin Daimi Computer and Network Security Essentials (Hardcover, 1st ed. 2018)
Kevin Daimi; Contributions by Guillermo Francia, Levent Ertaul, Luis Hernandez Encinas, Eman El-Sheikh
R4,862 Discovery Miles 48 620 Ships in 18 - 22 working days

This book introduces readers to the tools needed to protect IT resources and communicate with security specialists when there is a security problem. The book covers a wide range of security topics including Cryptographic Technologies, Network Security, Security Management, Information Assurance, Security Applications, Computer Security, Hardware Security, and Biometrics and Forensics. It introduces the concepts, techniques, methods, approaches, and trends needed by security specialists to improve their security skills and capabilities. Further, it provides a glimpse into future directions where security techniques, policies, applications, and theories are headed. The book represents a collection of carefully selected and reviewed chapters written by diverse security experts in the listed fields and edited by prominent security researchers. Complementary slides are available for download on the book's website at Springer.com.

Cybersecurity and Applied Mathematics (Paperback): Leigh Metcalf, William Casey Cybersecurity and Applied Mathematics (Paperback)
Leigh Metcalf, William Casey
R1,366 Discovery Miles 13 660 Ships in 10 - 15 working days

Cybersecurity and Applied Mathematics explores the mathematical concepts necessary for effective cybersecurity research and practice, taking an applied approach for practitioners and students entering the field. This book covers methods of statistical exploratory data analysis and visualization as a type of model for driving decisions, also discussing key topics, such as graph theory, topological complexes, and persistent homology. Defending the Internet is a complex effort, but applying the right techniques from mathematics can make this task more manageable. This book is essential reading for creating useful and replicable methods for analyzing data.

Information Security - Policy, Processes, and Practices (Paperback): Seymour Goodman, Detmar W Straub, Richard Baskerville Information Security - Policy, Processes, and Practices (Paperback)
Seymour Goodman, Detmar W Straub, Richard Baskerville
R1,787 Discovery Miles 17 870 Ships in 10 - 15 working days

Information security is everyone's concern. The way we live is underwritten by information system infrastructures, most notably the Internet. The functioning of our business organizations, the management of our supply chains, and the operation of our governments depend on the secure flow of information. In an organizational environment information security is a never-ending process of protecting information and the systems that produce it.This volume in the "Advances in Management Information Systems" series covers the managerial landscape of information security. It deals with how organizations and nations organize their information security policies and efforts. The book covers how to strategize and implement security with a special focus on emerging technologies. It highlights the wealth of security technologies, and also indicates that the problem is not a lack of technology but rather its intelligent application.

CDPSE Certified Data Privacy Solutions Engineer All-in-One Exam Guide (Paperback): Peter Gregory CDPSE Certified Data Privacy Solutions Engineer All-in-One Exam Guide (Paperback)
Peter Gregory
R1,009 Discovery Miles 10 090 Ships in 10 - 15 working days

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. This study guide offers 100% coverage of every objective for the Certified Data Privacy Solutions Engineer Exam Take ISACA's rigorous Certified Data Privacy Solutions Engineer exam with confidence using the comprehensive information in this effective self-study guide. Written by a security and privacy expert and experienced author, the book lays out hands-on privacy and security techniques and thoroughly prepares candidates to pass this exam. Beyond exam preparation, the guide also serves as a valuable on-the-job reference. CDPSE (TM) Certified Data Privacy Solutions Engineer All-in-One Exam Guide is based on proven teaching and learning styles and features special elements that teach and reinforce practical privacy and IT security skills. The book contains in-depth practice questions and detailed explanations. You will discover how to effectively design, build, and run information privacy management programs. Contains comprehensive coverage of every topic on the CDPSE exam Online content includes 300 practice questions in the customizable Total Tester exam engine Written by a security and privacy expert, educator, and experienced author

Cybercrime - An Encyclopedia of Digital Crime (Hardcover): Nancy E. Marion, Jason Twede Cybercrime - An Encyclopedia of Digital Crime (Hardcover)
Nancy E. Marion, Jason Twede
R3,226 Discovery Miles 32 260 Ships in 10 - 15 working days

This important reference work is an extensive, up-to-date resource for students who want to investigate the world of cybercrime or for those seeking further knowledge of specific attacks both domestically and internationally. Cybercrime is characterized by criminal acts that take place in the borderless digital realm. It takes on many forms, and its perpetrators and victims are varied. From financial theft, destruction of systems, fraud, corporate espionage, and ransoming of information to the more personal, such as stalking and web-cam spying as well as cyberterrorism, this work covers the full spectrum of crimes committed via cyberspace. This comprehensive encyclopedia covers the most noteworthy attacks while also focusing on the myriad issues that surround cybercrime. It includes entries on such topics as the different types of cyberattacks, cybercrime techniques, specific cybercriminals and cybercrime groups, and cybercrime investigations. While objective in its approach, this book does not shy away from covering such relevant, controversial topics as Julian Assange and Russian interference in the 2016 U.S. presidential election. It also provides detailed information on all of the latest developments in this constantly evolving field. Includes an introductory overview essay that discusses all aspects of cybercrime-how it's defined, how it developed, and its massive expansion in recent years Offers a wide array of entries regarding cybercrime and the many ways it can be committed Explores the largest, most costly cyber attacks on a variety of victims, including corporations, governments, consumers, and individuals Provides up-to-date information on the ever-evolving field of cybercrime

PCI Compliance - Understand and Implement Effective PCI Data Security Standard Compliance (Hardcover, 5th edition): Branden... PCI Compliance - Understand and Implement Effective PCI Data Security Standard Compliance (Hardcover, 5th edition)
Branden Williams, James Adamson
R3,100 Discovery Miles 31 000 Ships in 10 - 15 working days

Unique selling point: * Industry standard book for merchants, banks, and consulting firms looking to learn more about PCI DSS compliance. Core audience: * Retailers (both physical and electronic), firms who handle credit or debit cards (such as merchant banks and processors), and firms who deliver PCI DSS products and services. Place in the market: * Currently there are no PCI DSS 4.0 books

Cyber Security and Operations Management for Industry 4.0 (Hardcover): Ahmed A. Elngar, N. Thillaiarasu, Mohamed Elhoseny, K... Cyber Security and Operations Management for Industry 4.0 (Hardcover)
Ahmed A. Elngar, N. Thillaiarasu, Mohamed Elhoseny, K Martin Sagayam
R4,064 Discovery Miles 40 640 Ships in 10 - 15 working days

This book seamlessly connects the topics of Industry 4.0 and cyber security. It discusses the risks and solutions of using cyber security techniques for Industry 4.0. Cyber Security and Operations Management for Industry 4.0 covers the cyber security risks involved in the integration of Industry 4.0 into businesses and highlights the issues and solutions. The book offers the latest theoretical and practical research in the management of cyber security issues common in Industry 4.0 and also discusses the ethical and legal perspectives of incorporating cyber security techniques and applications into the day-to-day functions of an organization. Industrial management topics related to smart factories, operations research, and value chains are also discussed. This book is ideal for industry professionals, researchers, and those in academia who are interested in learning more about how cyber security and Industry 4.0 are related and can work together.

Cyber-security of SCADA and Other Industrial Control Systems (Hardcover, 1st ed. 2016): Edward J M Colbert, Alexander Kott Cyber-security of SCADA and Other Industrial Control Systems (Hardcover, 1st ed. 2016)
Edward J M Colbert, Alexander Kott
R3,578 R2,725 Discovery Miles 27 250 Save R853 (24%) Ships in 10 - 15 working days

This book provides a comprehensive overview of the fundamental security of Industrial Control Systems (ICSs), including Supervisory Control and Data Acquisition (SCADA) systems and touching on cyber-physical systems in general. Careful attention is given to providing the reader with clear and comprehensive background and reference material for each topic pertinent to ICS security. This book offers answers to such questions as: Which specific operating and security issues may lead to a loss of efficiency and operation? What methods can be used to monitor and protect my system? How can I design my system to reduce threats?This book offers chapters on ICS cyber threats, attacks, metrics, risk, situational awareness, intrusion detection, and security testing, providing an advantageous reference set for current system owners who wish to securely configure and operate their ICSs. This book is appropriate for non-specialists as well. Tutorial information is provided in two initial chapters and in the beginnings of other chapters as needed. The book concludes with advanced topics on ICS governance, responses to attacks on ICS, and future security of the Internet of Things.

What Every Engineer Should Know About Cyber Security and Digital Forensics (Paperback, 2nd edition): Joanna F Defranco, Bob... What Every Engineer Should Know About Cyber Security and Digital Forensics (Paperback, 2nd edition)
Joanna F Defranco, Bob Maley
R1,525 Discovery Miles 15 250 Ships in 10 - 15 working days

Updates content and introduces topics such as business changes and outsourcing. Addresses new cyber security risks such as IoT and Distributed Networks (i.e., blockchain). Covers strategy based on the OODA loop in the cycle. Demonstrates application of the concepts through short case studies of real-world incidents chronologically delineating related events. Discusses certifications and reference manuals in cyber security and digital forensics. Includes an entire chapter on tools used by professionals in the field.

Student Data Privacy - Building a School Compliance Program (Hardcover): Linnette Attai Student Data Privacy - Building a School Compliance Program (Hardcover)
Linnette Attai
R1,885 Discovery Miles 18 850 Ships in 10 - 15 working days

Protecting the privacy of student data when bringing technology into the classroom is one of the toughest organizational challenges facing schools and districts today. Parent and legislator concerns about how school systems protect the privacy of student data are at an all-time high. School systems must navigate complex federal and state regulations, understand how technology providers collect and protect student data, explain those complexities to parents, and provide the reassurance the community needs that the student information will remain safe. Student Data Privacy: Building a School Compliance Program provides solutions for all of these challenges and more. It is a step-by-step journey through the process of building the policies and practices to protect student data, and shifting the organizational culture to prioritize privacy while still taking advantage of the tremendous benefits that technology has to offer in the modern classroom.

Building Machine Learning Pipelines (Paperback): Hannes Hapke Building Machine Learning Pipelines (Paperback)
Hannes Hapke; Contributions by Catherine Nelson
R1,716 R1,393 Discovery Miles 13 930 Save R323 (19%) Ships in 18 - 22 working days

Companies are spending billions on machine learning projects, but it's money wasted if the models can't be deployed effectively. In this practical guide, Hannes Hapke and Catherine Nelson walk you through the steps of automating a machine learning pipeline using the TensorFlow ecosystem. You'll learn the techniques and tools that will cut deployment time from days to minutes, so that you can focus on developing new models rather than maintaining legacy systems. Data scientists, machine learning engineers, and DevOps engineers will discover how to go beyond model development to successfully productize their data science projects, while managers will better understand the role they play in helping to accelerate these projects. Understand the steps to build a machine learning pipeline Build your pipeline using components from TensorFlow Extended Orchestrate your machine learning pipeline with Apache Beam, Apache Airflow, and Kubeflow Pipelines Work with data using TensorFlow Data Validation and TensorFlow Transform Analyze a model in detail using TensorFlow Model Analysis Examine fairness and bias in your model performance Deploy models with TensorFlow Serving or TensorFlow Lite for mobile devices Learn privacy-preserving machine learning techniques

Healthcare and Big Data - Digital Specters and Phantom Objects (Hardcover, 1st ed. 2016): Mary F.E. Ebeling Healthcare and Big Data - Digital Specters and Phantom Objects (Hardcover, 1st ed. 2016)
Mary F.E. Ebeling
R3,234 Discovery Miles 32 340 Ships in 10 - 15 working days

This highly original book is an ethnographic noir of how Big Data profits from patient private health information. The book follows personal health data as it is collected from inside healthcare and beyond to create patient consumer profiles that are sold to marketers. Primarily told through a first-person noir narrative, Ebeling as a sociologist-hard-boiled-detective, investigates Big Data and the trade in private health information by examining the information networks that patient data traverses. The noir narrative reveals the processes that the data broker industry uses to create data commodities-data phantoms or the marketing profiles of patients that are bought by advertisers to directly market to consumers. Healthcare and Big Data considers the implications these "data phantoms" have for patient privacy as well as the very real harm that they can cause.

The Center for Democracy and Technology and Internet Privacy in the U.S. - Lessons of the First Five Years (Hardcover, New):... The Center for Democracy and Technology and Internet Privacy in the U.S. - Lessons of the First Five Years (Hardcover, New)
Joyce H.-S. Li
R3,012 Discovery Miles 30 120 Ships in 10 - 15 working days

The Internet has become a necessary component of our personal and professional lives, but because the Internet has redefined the boundaries of communication, it has also put our confidential information at risk. The growing concern with online privacy has caused many Internet users to question the security of their Internet transactions. This book answers these questions through an examination of the Center for Democracy and Technology, an organization that advocates for privacy. Li's book introduces the many issues in online privacy and discusses legal ownership of personal data, specifically one's name, address, telephone number, and email. Her in-depth research of the issues confronted by the Center for Democracy and Technology over a five-year period documents its mission and demonstrates its achievements in the crusade to maintain privacy. As we find ourselves using the Internet for more and more transactions, both personal and professional, we must be aware of our privacy rights and the activities of the organizations that fight to protect them-thus, the information in Li's book makes it a necessary reference for all public and university libraries and a useful resource for courses in information technology. Internet Privacy serves as an introduction to the issues of online privacy in the United States and examines what one advocacy group is doing to protect privacy in cyberspace.

Guide to the De-Identification of Personal Health Information (Hardcover, New): Khaled El Emam Guide to the De-Identification of Personal Health Information (Hardcover, New)
Khaled El Emam
R3,958 Discovery Miles 39 580 Ships in 10 - 15 working days

Offering compelling practical and legal reasons why de-identification should be one of the main approaches to protecting patients' privacy, the Guide to the De-Identification of Personal Health Information outlines a proven, risk-based methodology for the de-identification of sensitive health information. It situates and contextualizes this risk-based methodology and provides a general overview of its steps. The book supplies a detailed case for why de-identification is important as well as best practices to help you pin point when it is necessary to apply de-identification in the disclosure of personal health information. It also: Outlines practical methods for de-identification Describes how to measure re-identification risk Explains how to reduce the risk of re-identification Includes proofs and supporting reference material Focuses only on transformations proven to work on health information-rather than covering all possible approaches, whether they work in practice or not Rated the top systems and software engineering scholar worldwide by The Journal of Systems and Software, Dr. El Emam is one of only a handful of individuals worldwide qualified to de-identify personal health information for secondary use under the HIPAA Privacy Rule Statistical Standard. In this book Dr. El Emam explains how we can make health data more accessible-while protecting patients' privacy and complying with current regulations.

The Perfect Police State - An Undercover Odyssey into China's Terrifying Surveillance Dystopia of the Future (Hardcover):... The Perfect Police State - An Undercover Odyssey into China's Terrifying Surveillance Dystopia of the Future (Hardcover)
Geoffrey Cain
R713 R637 Discovery Miles 6 370 Save R76 (11%) Ships in 9 - 17 working days

An in-depth, on-the ground view of how Chinese officials have co-opted technology, infrastructure and the minds of their people to establish the definitive police state. When blocked from facts and truth, and constantly under surveillance, most citizens cannot discern between enemy and friend and don't have the information they need to challenge the government. Society quickly breaks down. Friends betray each other, bosses snitch on employees, teachers rat on their students, and children turn on their parents. Everyone must turn to their government for protection. even if the government is not their true protector. This is the Perfect Police State, and China has created one. In The Perfect Police State Geoffrey Cain, an Asia-based reporter, recounts his travels and investigations into the multifaceted and comprehensive surveillance network in the Western Chinese province of Xinjiang. Drawing on first-hand testimony, and one citizen's tumultuous life and escape from Xinjiang, Cain describes the emergence of China's tech surveillance giants, and the implications for our global order, in an age of Covid-19 and police brutality protests. What results is a vivid and haunting investigation into how China established an effective and enduring technological dystopia.

200+ Ways to Protect Your Privacy - Simple Ways to Prevent Hacks and Protect Your Privacy--On and Offline (Paperback): Jeni... 200+ Ways to Protect Your Privacy - Simple Ways to Prevent Hacks and Protect Your Privacy--On and Offline (Paperback)
Jeni Rogers 2
R380 R359 Discovery Miles 3 590 Save R21 (6%) Ships in 18 - 22 working days

Discover simple strategies for protecting your personal and confidential information on and offline with this essential and easy-to-understand guide. We all know that the internet can serve as a hotbed for identity theft. But it isn't the only place where your privacy can be breached. In fact, there are lots of ways you can protect your privacy (or diminish it) that have little or nothing to do with access to the internet. Your home, your photos, your trash can, your kids, your favorite restaurant or store-and even you have the ability to unknowingly reveal your private information to everyone from thieves to busybodies. But you don't need to hire a specialist to keep your information safe-you can do it yourself with these 200+ easy-to-implement tactics, some of which include: -Shredding hard copies of bills - Turning off Bluetooth when not in use - Using a firewall - Hiding spare keys in an unusual place Keeping your information secure lies in your hands-make sure you're not putting yourself at risk in your daily habits with this essential guide.

Cinderella's Stick - A Fairy Tale for Digital Preservation (Hardcover, 1st ed. 2018): Yannis Tzitzikas, Yannis Marketakis Cinderella's Stick - A Fairy Tale for Digital Preservation (Hardcover, 1st ed. 2018)
Yannis Tzitzikas, Yannis Marketakis
R1,529 R598 Discovery Miles 5 980 Save R931 (61%) Ships in 9 - 17 working days

This book explains the main problems related to digital preservation using examples based on a modern version of the well-known Cinderella fairy tale. Digital preservation is the endeavor to protect digital material against loss, corruption, hardware/software technology changes, and changes in the knowledge of the community. he structure of the book is modular, with each chapter consisting of two parts: the episode and the technical background. The episodes narrate the story in chronological order, exactly as in a fairy tale. In addition to the story itself, each episode is related to one or more digital preservation problems, which are discussed in the technical background section of the chapter. To reveal a more general and abstract formulation of these problems, the notion of pattern is used. Each pattern has a name, a summary of the problem, a narrative describing an attempt to solve the problem, an explanation of what could have been done to avoid or alleviate this problem, some lessons learned, and lastly, links to related patterns discussed in other chapters. The book is intended for anyone wanting to understand the problems related to digital preservation, even if they lack the technical background. It explains the technical details at an introductory level, provides references to the main approaches (or solutions) currently available for tackling related problems, and is rounded out by questions and exercises appropriate for computer engineers and scientists. In addition, the book's website, maintained by the authors, presents the contents of Cinderella's "real USB stick," and includes links to various tools and updates.

Mindf*ck - Inside Cambridge Analytica's Plot to Break the World (Paperback): Christopher Wylie Mindf*ck - Inside Cambridge Analytica's Plot to Break the World (Paperback)
Christopher Wylie 1
R330 Discovery Miles 3 300 Ships in 10 - 15 working days

What if you could peer into the minds of an entire population? What if you could target the weakest with rumours that only they saw?

In 2016, an obscure British military contractor turned the world upside down. Funded by a billionaire on a crusade to start his own far-right insurgency, Cambridge Analytica combined psychological research with private Facebook data to make an invisible weapon with the power to change what voters perceived as real.

The firm was created to launch the then unknown Steve Bannon's ideological assault on America. But as it honed its dark arts in elections from Trinidad to Nigeria, 24-year-old research director Christopher Wylie began to see what he and his colleagues were unleashing.

He had heard the disturbing visions of the investors. He saw what CEO Alexander Nix did behind closed doors. When Britain shocked the world by voting to leave the EU, Wylie realised it was time to expose his old associates. The political crime of the century had just taken place - the weapon had been tested - and nobody knew.

Securing Social Networks in Cyberspace (Hardcover): Al-Sakib Khan Pathan Securing Social Networks in Cyberspace (Hardcover)
Al-Sakib Khan Pathan
R2,816 Discovery Miles 28 160 Ships in 10 - 15 working days

This book collates the key security and privacy concerns faced by individuals and organizations who use various social networking sites. This includes activities such as connecting with friends, colleagues, and family; sharing and posting information; managing audio, video, and photos; and all other aspects of using social media sites both professionally and personally. In the setting of the Internet of Things (IoT) that can connect millions of devices at any one time, the security of such actions is paramount. Securing Social Networks in Cyberspace discusses user privacy and trust, location privacy, protecting children, managing multimedia content, cyberbullying, and much more. Current state-of-the-art defense mechanisms that can bring long-term solutions to tackling these threats are considered in the book. This book can be used as a reference for an easy understanding of complex cybersecurity issues in social networking platforms and services. It is beneficial for academicians and graduate-level researchers. General readers may find it beneficial in protecting their social-media-related profiles.

Advances In Artificial Intelligence For Privacy Protection And Security (Hardcover): Agusti Solanas, Antoni Martinez-Balleste Advances In Artificial Intelligence For Privacy Protection And Security (Hardcover)
Agusti Solanas, Antoni Martinez-Balleste
R3,492 Discovery Miles 34 920 Ships in 18 - 22 working days

In this book, we aim to collect the most recent advances in artificial intelligence techniques (i.e. neural networks, fuzzy systems, multi-agent systems, genetic algorithms, image analysis, clustering, etc), which are applied to the protection of privacy and security. The symbiosis between these fields leads to a pool of invigorating ideas, which are explored in this book.On the one hand, individual privacy protection is a hot topic and must be addressed in order to guarantee the proper evolution of a modern society. On the other, security can invade individual privacy, especially after the appearance of new forms of terrorism. In this book, we analyze these problems from a new point of view.

High Density Data Storage: Principle, Technology, And Materials (Hardcover): Yanlin Song, Daoben Zhu High Density Data Storage: Principle, Technology, And Materials (Hardcover)
Yanlin Song, Daoben Zhu
R2,485 Discovery Miles 24 850 Ships in 18 - 22 working days

The explosive increase in information and the miniaturization of electronic devices demand new recording technologies and materials that combine high density, fast response, long retention time and rewriting capability. As predicted, the current silicon-based computer circuits are reaching their physical limits. Further miniaturization of the electronic components and increase in data storage density are vital for the next generation of IT equipment such as ultra high-speed mobile computing, communication devices and sophisticated sensors. This original book presents a comprehensive introduction to the significant research achievements on high-density data storage from the aspects of recording mechanisms, materials and fabrication technologies, which are promising for overcoming the physical limits of current data storage systems. The book serves as an useful guide for the development of optimized materials, technologies and device structures for future information storage, and will lead readers to the fascinating world of information technology in the future.

Reinventing Data Protection? (Hardcover, 2009 ed.): Serge Gutwirth, Yves Poullet, Paul De Hert, Cecile de Terwangne, Sjaak Nouwt Reinventing Data Protection? (Hardcover, 2009 ed.)
Serge Gutwirth, Yves Poullet, Paul De Hert, Cecile de Terwangne, Sjaak Nouwt
R5,342 Discovery Miles 53 420 Ships in 18 - 22 working days

data. Furthermore, the European Union established clear basic principles for the collection, storage and use of personal data by governments, businesses and other organizations or individuals in Directive 95/46/EC and Directive 2002/58/EC on Privacy and Electronic communications. Nonetheless, the twenty-?rst century citizen - utilizing the full potential of what ICT-technology has to offer - seems to develop a digital persona that becomes increasingly part of his individual social identity. From this perspective, control over personal information is control over an aspect of the identity one projects in the world. The right to privacy is the freedom from unreasonable constraints on one's own identity. Transactiondata-bothtraf?candlocationdata-deserveourparticularattention. As we make phone calls, send e-mails or SMS messages, data trails are generated within public networks that we use for these communications. While traf?c data are necessary for the provision of communication services, they are also very sensitive data. They can give a complete picture of a person's contacts, habits, interests, act- ities and whereabouts. Location data, especially if very precise, can be used for the provision of services such as route guidance, location of stolen or missing property, tourist information, etc. In case of emergency, they can be helpful in dispatching assistance and rescue teams to the location of a person in distress. However, p- cessing location data in mobile communication networks also creates the possibility of permanent surveillance.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Hauntings
Niq Mhlongo Paperback R280 R259 Discovery Miles 2 590
A Grammar of New Testament Greek, vol 1…
James Hope Moulton, Wilbert Francis Howard, … Hardcover R6,395 Discovery Miles 63 950
Enterprise Java for SAP
Austin Sincock Hardcover R1,360 R1,138 Discovery Miles 11 380
The Boy Who Could Keep A Swan In His…
John Hunt Paperback  (1)
R304 Discovery Miles 3 040
Intensive Intermediate Latin - A Grammar…
Jean-Francois Mondon Paperback R1,557 Discovery Miles 15 570
Language Learning and Forced Migration
Marte Monsen, Guri Bordal Steien Hardcover R6,043 R3,019 Discovery Miles 30 190
An Island
Karen Jennings Paperback  (1)
R325 Discovery Miles 3 250
Iprimary English Activity Book Year 4
Paperback R573 Discovery Miles 5 730
A Hibiscus Coast
Nick Mulgrew Paperback R336 Discovery Miles 3 360
Davidson's Introductory Hebrew Grammar
James D. Martin Hardcover R5,923 Discovery Miles 59 230

 

Partners