0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (121)
  • R250 - R500 (229)
  • R500+ (763)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

European Data Protection Law - Corporate Compliance and Regulation (Hardcover, 2nd Revised edition): Christopher Kuner European Data Protection Law - Corporate Compliance and Regulation (Hardcover, 2nd Revised edition)
Christopher Kuner
R8,775 Discovery Miles 87 750 Ships in 10 - 15 working days

The new edition of this acclaimed book gives a fully updated overview of European data protection law affecting companies, incorporating the important legal developments which have taken place since the last edition was published. These include the first three cases of the European Court of Justice interpreting the EU Data Protection Directive (95/46), the Commission's first report on the implementation of the Directive, the Data Retention Directive, new developments in international data transfers, conflicts between security requirements and data protection, and the implementation of the Electronic Communications and Privacy Directive 2002/58 in the Member States. It also covers the recent European Court of Justice decision on the controversial export of airline passenger data to the US, and expands its European overview to include the new and acceding Member States. The book contains comprehensive coverage of data protection law, while at the same time providing pragmatic guidance on the typical compliance issues that companies face. As globalization of the world economy continues, an increasing number of business issues with data protection implications have come to the foreground, for example, outsourcing, whistleblower hotlines and records management, all of which are covered in the book. The appendices have been expanded to include most sources which a company will need, such as the texts of relevant directives, the safe harbor principles and FAQs, and charts of implementation in the Member States of specific provisions of interest to business. Thus, the book is a single reference source for companies faced with data protection issues. A Chinese edition of the book was published in 2008, making it the first in-depth treatise on European data protection law published in Chinese.

Net.Wars (Hardcover, New): Wendy Grossman Net.Wars (Hardcover, New)
Wendy Grossman
R2,858 Discovery Miles 28 580 Ships in 18 - 22 working days

Full text online version at www.nyupress.org/netwars.

Who will rule cyberspace? And why should people care? Recently stories have appeared in a variety of news media, from the sensational to the staid, that portray the Internet as full of pornography, pedophilia, recipes for making bombs, lewd and lawless behavior, and copyright violators. And, for politicians eager for votes, or to people who have never strolled the electronic byways, regulating the Net seems as logical and sensible as making your kids wear seat belts. Forget freedom of speech: children can read this stuff.

From the point of view of those on the Net, mass-media's representation of pornography on the Internet grossly overestimates the amount that is actually available, and these stories are based on studies that are at best flawed and at worst fraudulent. To netizens, the panic over the electronic availability of bomb-making recipes and other potentially dangerous material is groundless: the same material is readily available in public libraries. Out on the Net, it seems outrageous that people who have never really experienced it are in a position to regulate it.

How then, should the lines be drawn in the grey area between cyberspace and the physical world? In net.wars, Wendy Grossman, a journalist who has covered the Net since 1992 for major publications such as "Wired, The Guardian," and "The Telegraph," assesses the battles that will define the future of this new venue. From the Church of Scientology's raids on Net users to netizens attempts to overthrow both the Communications Decency Act and the restrictions on the export of strong encryption, net.wars explains the issues and the background behind the headlines. Among the issues covered are net scams, class divisions on the net, privacy issues, the Communications Decency Act, women online, pornography, hackers and the computer underground, net criminals and sociopaths, and more.

Humans and Machines at Work - Monitoring, Surveillance and Automation in Contemporary Capitalism (Hardcover, 1st ed. 2018):... Humans and Machines at Work - Monitoring, Surveillance and Automation in Contemporary Capitalism (Hardcover, 1st ed. 2018)
Phoebe Moore, Martin Upchurch, Xanthe Whittaker
R3,857 Discovery Miles 38 570 Ships in 18 - 22 working days

This edited collection provides a series of accounts of workers' local experiences that reflect the ubiquity of work's digitalisation. Precarious gig economy workers ride bikes and drive taxis in China and Britain; call centre workers in India experience invasive tracking; warehouse workers discover that hidden data has been used for layoffs; and academic researchers see their labour obscured by a 'data foam' that does not benefit them. These cases are couched in historical accounts of identity and selfhood experiments seen in the Hawthorne experiments and the lineage of automation. This book will appeal to scholars in the Sociology of Work and Digital Labour Studies and anyone interested in learning about monitoring and surveillance, automation, the gig economy and the quantified self in the workplace.

Convergence of Internet of Things and Blockchain Technologies (Hardcover, 1st ed. 2022): H L Gururaj, V. Ravi Kumar, Sam... Convergence of Internet of Things and Blockchain Technologies (Hardcover, 1st ed. 2022)
H L Gururaj, V. Ravi Kumar, Sam Goundar, Ahmed A. Elngar, B H Swathi
R3,126 Discovery Miles 31 260 Ships in 18 - 22 working days

This book presents chapters from diverse range of authors on different aspects of how Blockchain and IoT are converging and the impacts of these developments. The book provides an extensive cross-sectional and multi-disciplinary look into this trend and how it affects artificial intelligence, cyber-physical systems, and robotics with a look at applications in aerospace, agriculture, automotive, critical infrastructures, healthcare, manufacturing, retail, smart transport systems, smart cities, and smart healthcare. Cases include the impact of Blockchain for IoT Security; decentralized access control systems in IoT; Blockchain architecture for scalable access management in IoT; smart and sustainable IoT applications incorporating Blockchain, and more. The book presents contributions from international academics, researchers, and practitioners from diverse perspectives. Presents how Blockchain and IoT are converging and the impacts of these developments on technology and its application; Discusses IoT and Blockchain from cross-sectional and multi-disciplinary perspectives; Includes contributions from researchers, academics, and professionals from around the world.

Digital Image Watermarking - Theoretical and Computational Advances (Hardcover): Surekha Borra, Rohit Thanki, Nilanjan Dey Digital Image Watermarking - Theoretical and Computational Advances (Hardcover)
Surekha Borra, Rohit Thanki, Nilanjan Dey
R1,978 Discovery Miles 19 780 Ships in 10 - 15 working days

The Book presents an overview of newly developed watermarking techniques in various independent and hybrid domains Covers the basics of digital watermarking, its types, domain in which it is implemented and the application of machine learning algorithms onto digital watermarking Reviews hardware implementation of watermarking Discusses optimization problems and solutions in watermarking with a special focus on bio-inspired algorithms Includes a case study along with its MATLAB code and simulation results

Exploding Data - Reclaiming Our Cyber Security in the Digital Age (Hardcover, Main): Michael Chertoff Exploding Data - Reclaiming Our Cyber Security in the Digital Age (Hardcover, Main)
Michael Chertoff 1
R583 R518 Discovery Miles 5 180 Save R65 (11%) Ships in 10 - 15 working days

A powerful argument for new laws and policies regarding cyber-security, from the former US Secretary of Homeland Security. The most dangerous threat we-individually and as a society-face today is no longer military, but rather the increasingly pervasive exposure of our personal information; nothing undermines our freedom more than losing control of information about ourselves. And yet, as daily events underscore, we are ever more vulnerable to cyber-attack. In this bracing book, Michael Chertoff makes clear that our laws and policies surrounding the protection of personal information, written for an earlier time, need to be completely overhauled in the Internet era. On the one hand, the collection of data-more widespread by business than by government, and impossible to stop-should be facilitated as an ultimate protection for society. On the other, standards under which information can be inspected, analysed or used must be significantly tightened. In offering his compelling call for action, Chertoff argues that what is at stake is not only the simple loss of privacy, which is almost impossible to protect, but also that of individual autonomy-the ability to make personal choices free of manipulation or coercion. Offering colourful stories over many decades that illuminate the three periods of data gathering we have experienced, Chertoff explains the complex legalities surrounding issues of data collection and dissemination today and charts a forceful new strategy that balances the needs of government, business and individuals alike.

New Dimensions of Information Warfare (Hardcover, 1st ed. 2021): Roberto Di Pietro, Simone Raponi, Maurantonio Caprolu, Stefano... New Dimensions of Information Warfare (Hardcover, 1st ed. 2021)
Roberto Di Pietro, Simone Raponi, Maurantonio Caprolu, Stefano Cresci
R4,259 Discovery Miles 42 590 Ships in 18 - 22 working days

This book revises the strategic objectives of Information Warfare, interpreting them according to the modern canons of information age, focusing on the fabric of society, the economy, and critical Infrastructures. The authors build plausible detailed real-world scenarios for each entity, showing the related possible threats from the Information Warfare point of view. In addition, the authors dive into the description of the still open problems, especially when it comes to critical infrastructures, and the countermeasures that can be implemented, possibly inspiring further research in the domain. This book intends to provide a conceptual framework and a methodological guide, enriched with vivid and compelling use cases for the readers (e.g. technologists, academicians, military, government) interested in what Information Warfare really means, when its lenses are applied to current technology. Without sacrificing accuracy, rigor and, most importantly, the big picture of Information Warfare, this book dives into several relevant and up-to-date critical domains. The authors illustrate how finance (an always green target of Information Warfare) is intertwined with Social Media, and how an opponent could exploit these latter ones to reach its objectives. Also, how cryptocurrencies are going to reshape the economy, and the risks involved by this paradigm shift. Even more compelling is how the very fabric of society is going to be reshaped by technology, for instance how our democratic elections are exposed to risks that are even greater than what appears in the current public discussions. Not to mention how our Critical Infrastructure is becoming exposed to a series of novel threats, ranging from state-supported malware to drones. A detailed discussion of possible countermeasures and what the open issues are for each of the highlighted threats complete this book. This book targets a widespread audience that includes researchers and advanced level students studying and working in computer science with a focus on security. Military officers, government officials and professionals working in this field will also find this book useful as a reference.

Designing for Privacy and its Legal Framework - Data Protection by Design and Default for the Internet of Things (Hardcover,... Designing for Privacy and its Legal Framework - Data Protection by Design and Default for the Internet of Things (Hardcover, 1st ed. 2018)
Aurelia Tamo-Larrieux
R4,039 Discovery Miles 40 390 Ships in 18 - 22 working days

This book discusses the implementation of privacy by design in Europe, a principle that has been codified within the European Data Protection Regulation (GDPR). While privacy by design inspires hope for future privacy-sensitive designs, it also introduces the need for a common understanding of the legal and technical concepts of privacy and data protection. By pursuing an interdisciplinary approach and comparing the problem definitions and objectives of both disciplines, this book bridges the gap between the legal and technical fields in order to enhance the regulatory and academic discourse. The research presented reveals the scope of legal principles and technical tools for privacy protection, and shows that the concept of privacy by design goes beyond the principle of the GDPR. The book presents an analysis of how current regulations delegate the implementation of technical privacy and data protection measures to developers and describes how policy design must evolve in order to implement privacy by design and default principles.

Cyber Denial, Deception and Counter Deception - A Framework for Supporting Active Cyber Defense (Hardcover, 1st ed. 2015):... Cyber Denial, Deception and Counter Deception - A Framework for Supporting Active Cyber Defense (Hardcover, 1st ed. 2015)
Kristin E. Heckman, Frank J Stech, Roshan K. Thomas, Ben Schmoker, Alexander W. Tsow
R3,362 R2,404 Discovery Miles 24 040 Save R958 (28%) Ships in 10 - 15 working days

This book presents the first reference exposition of the Cyber-Deception Chain: a flexible planning and execution framework for creating tactical, operational, or strategic deceptions. This methodology bridges the gap between the current uncoordinated patchwork of tactical denial and deception (D&D) techniques and their orchestration in service of an organization's mission. Concepts for cyber- D&D planning operations and management are detailed within the larger organizational, business, and cyber defense context. It examines the necessity of a comprehensive, active cyber denial scheme. The authors explain the organizational implications of integrating D&D with a legacy cyber strategy, and discuss trade-offs, maturity models, and lifecycle management. Chapters present the primary challenges in using deception as part of a security strategy, and guides users through the steps to overcome common obstacles. Both revealing and concealing fact and fiction have a critical role in securing private information. Detailed case studies are included. Cyber Denial, Deception and Counter Deception is designed as a reference for professionals, researchers and government employees working in cybersecurity. Advanced-level students in computer science focused on security will also find this book useful as a reference or secondary text book.

Port Cybersecurity - Securing Critical Information Infrastructures and Supply Chains (Paperback): Nineta Polemi Port Cybersecurity - Securing Critical Information Infrastructures and Supply Chains (Paperback)
Nineta Polemi
R2,592 R2,417 Discovery Miles 24 170 Save R175 (7%) Ships in 10 - 15 working days

Port Cybersecurity: Securing Critical Information Infrastructures and Supply Chains examines a paradigm shift in the way ports assess cyber risks and vulnerabilities, as well as relevant risk management methodologies, by focusing on initiatives and efforts that attempt to deal with the risks and vulnerabilities of port Critical Information Infrastructures (CII) ecosystems. Modern commercial shipping ports are highly dependent on the operation of complex, dynamic ICT systems and ICT-based maritime supply chains, making these central points in the maritime supply chain vulnerable to cybersecurity threats.

How Healthcare Data Privacy Is Almost Dead ... and What Can Be Done to Revive It! (Hardcover): John J. Trinckes Jr. How Healthcare Data Privacy Is Almost Dead ... and What Can Be Done to Revive It! (Hardcover)
John J. Trinckes Jr.
R4,511 Discovery Miles 45 110 Ships in 10 - 15 working days

The healthcare industry is under privacy attack. The book discusses the issues from the healthcare organization and individual perspectives. Someone hacking into a medical device and changing it is life-threatening. Personal information is available on the black market. And there are increased medical costs, erroneous medical record data that could lead to wrong diagnoses, insurance companies or the government data-mining healthcare information to formulate a medical 'FICO' score that could lead to increased insurance costs or restrictions of insurance. Experts discuss these issues and provide solutions and recommendations so that we can change course before a Healthcare Armageddon occurs.

Computer and Network Security Essentials (Hardcover, 1st ed. 2018): Kevin Daimi Computer and Network Security Essentials (Hardcover, 1st ed. 2018)
Kevin Daimi; Contributions by Guillermo Francia, Levent Ertaul, Luis Hernandez Encinas, Eman El-Sheikh
R4,862 Discovery Miles 48 620 Ships in 18 - 22 working days

This book introduces readers to the tools needed to protect IT resources and communicate with security specialists when there is a security problem. The book covers a wide range of security topics including Cryptographic Technologies, Network Security, Security Management, Information Assurance, Security Applications, Computer Security, Hardware Security, and Biometrics and Forensics. It introduces the concepts, techniques, methods, approaches, and trends needed by security specialists to improve their security skills and capabilities. Further, it provides a glimpse into future directions where security techniques, policies, applications, and theories are headed. The book represents a collection of carefully selected and reviewed chapters written by diverse security experts in the listed fields and edited by prominent security researchers. Complementary slides are available for download on the book's website at Springer.com.

Cybersecurity and Applied Mathematics (Paperback): Leigh Metcalf, William Casey Cybersecurity and Applied Mathematics (Paperback)
Leigh Metcalf, William Casey
R1,366 Discovery Miles 13 660 Ships in 10 - 15 working days

Cybersecurity and Applied Mathematics explores the mathematical concepts necessary for effective cybersecurity research and practice, taking an applied approach for practitioners and students entering the field. This book covers methods of statistical exploratory data analysis and visualization as a type of model for driving decisions, also discussing key topics, such as graph theory, topological complexes, and persistent homology. Defending the Internet is a complex effort, but applying the right techniques from mathematics can make this task more manageable. This book is essential reading for creating useful and replicable methods for analyzing data.

Information Security - Policy, Processes, and Practices (Paperback): Seymour Goodman, Detmar W Straub, Richard Baskerville Information Security - Policy, Processes, and Practices (Paperback)
Seymour Goodman, Detmar W Straub, Richard Baskerville
R1,787 Discovery Miles 17 870 Ships in 10 - 15 working days

Information security is everyone's concern. The way we live is underwritten by information system infrastructures, most notably the Internet. The functioning of our business organizations, the management of our supply chains, and the operation of our governments depend on the secure flow of information. In an organizational environment information security is a never-ending process of protecting information and the systems that produce it.This volume in the "Advances in Management Information Systems" series covers the managerial landscape of information security. It deals with how organizations and nations organize their information security policies and efforts. The book covers how to strategize and implement security with a special focus on emerging technologies. It highlights the wealth of security technologies, and also indicates that the problem is not a lack of technology but rather its intelligent application.

Cybercrime - An Encyclopedia of Digital Crime (Hardcover): Nancy E. Marion, Jason Twede Cybercrime - An Encyclopedia of Digital Crime (Hardcover)
Nancy E. Marion, Jason Twede
R3,537 R3,226 Discovery Miles 32 260 Save R311 (9%) Ships in 10 - 15 working days

This important reference work is an extensive, up-to-date resource for students who want to investigate the world of cybercrime or for those seeking further knowledge of specific attacks both domestically and internationally. Cybercrime is characterized by criminal acts that take place in the borderless digital realm. It takes on many forms, and its perpetrators and victims are varied. From financial theft, destruction of systems, fraud, corporate espionage, and ransoming of information to the more personal, such as stalking and web-cam spying as well as cyberterrorism, this work covers the full spectrum of crimes committed via cyberspace. This comprehensive encyclopedia covers the most noteworthy attacks while also focusing on the myriad issues that surround cybercrime. It includes entries on such topics as the different types of cyberattacks, cybercrime techniques, specific cybercriminals and cybercrime groups, and cybercrime investigations. While objective in its approach, this book does not shy away from covering such relevant, controversial topics as Julian Assange and Russian interference in the 2016 U.S. presidential election. It also provides detailed information on all of the latest developments in this constantly evolving field. Includes an introductory overview essay that discusses all aspects of cybercrime-how it's defined, how it developed, and its massive expansion in recent years Offers a wide array of entries regarding cybercrime and the many ways it can be committed Explores the largest, most costly cyber attacks on a variety of victims, including corporations, governments, consumers, and individuals Provides up-to-date information on the ever-evolving field of cybercrime

PCI Compliance - Understand and Implement Effective PCI Data Security Standard Compliance (Hardcover, 5th edition): Branden... PCI Compliance - Understand and Implement Effective PCI Data Security Standard Compliance (Hardcover, 5th edition)
Branden Williams, James Adamson
R3,100 Discovery Miles 31 000 Ships in 10 - 15 working days

Unique selling point: * Industry standard book for merchants, banks, and consulting firms looking to learn more about PCI DSS compliance. Core audience: * Retailers (both physical and electronic), firms who handle credit or debit cards (such as merchant banks and processors), and firms who deliver PCI DSS products and services. Place in the market: * Currently there are no PCI DSS 4.0 books

Cyber Security and Operations Management for Industry 4.0 (Hardcover): Ahmed A. Elngar, N. Thillaiarasu, Mohamed Elhoseny, K... Cyber Security and Operations Management for Industry 4.0 (Hardcover)
Ahmed A. Elngar, N. Thillaiarasu, Mohamed Elhoseny, K Martin Sagayam
R4,064 Discovery Miles 40 640 Ships in 10 - 15 working days

This book seamlessly connects the topics of Industry 4.0 and cyber security. It discusses the risks and solutions of using cyber security techniques for Industry 4.0. Cyber Security and Operations Management for Industry 4.0 covers the cyber security risks involved in the integration of Industry 4.0 into businesses and highlights the issues and solutions. The book offers the latest theoretical and practical research in the management of cyber security issues common in Industry 4.0 and also discusses the ethical and legal perspectives of incorporating cyber security techniques and applications into the day-to-day functions of an organization. Industrial management topics related to smart factories, operations research, and value chains are also discussed. This book is ideal for industry professionals, researchers, and those in academia who are interested in learning more about how cyber security and Industry 4.0 are related and can work together.

Cyber-security of SCADA and Other Industrial Control Systems (Hardcover, 1st ed. 2016): Edward J M Colbert, Alexander Kott Cyber-security of SCADA and Other Industrial Control Systems (Hardcover, 1st ed. 2016)
Edward J M Colbert, Alexander Kott
R3,578 R2,725 Discovery Miles 27 250 Save R853 (24%) Ships in 10 - 15 working days

This book provides a comprehensive overview of the fundamental security of Industrial Control Systems (ICSs), including Supervisory Control and Data Acquisition (SCADA) systems and touching on cyber-physical systems in general. Careful attention is given to providing the reader with clear and comprehensive background and reference material for each topic pertinent to ICS security. This book offers answers to such questions as: Which specific operating and security issues may lead to a loss of efficiency and operation? What methods can be used to monitor and protect my system? How can I design my system to reduce threats?This book offers chapters on ICS cyber threats, attacks, metrics, risk, situational awareness, intrusion detection, and security testing, providing an advantageous reference set for current system owners who wish to securely configure and operate their ICSs. This book is appropriate for non-specialists as well. Tutorial information is provided in two initial chapters and in the beginnings of other chapters as needed. The book concludes with advanced topics on ICS governance, responses to attacks on ICS, and future security of the Internet of Things.

What Every Engineer Should Know About Cyber Security and Digital Forensics (Paperback, 2nd edition): Joanna F Defranco, Bob... What Every Engineer Should Know About Cyber Security and Digital Forensics (Paperback, 2nd edition)
Joanna F Defranco, Bob Maley
R1,525 Discovery Miles 15 250 Ships in 10 - 15 working days

Updates content and introduces topics such as business changes and outsourcing. Addresses new cyber security risks such as IoT and Distributed Networks (i.e., blockchain). Covers strategy based on the OODA loop in the cycle. Demonstrates application of the concepts through short case studies of real-world incidents chronologically delineating related events. Discusses certifications and reference manuals in cyber security and digital forensics. Includes an entire chapter on tools used by professionals in the field.

Hacking Artificial Intelligence - A Leader's Guide from Deepfakes to Breaking Deep Learning (Hardcover): Davey Gibian Hacking Artificial Intelligence - A Leader's Guide from Deepfakes to Breaking Deep Learning (Hardcover)
Davey Gibian
R1,101 Discovery Miles 11 010 Ships in 18 - 22 working days

Sheds light on the ability to hack AI and the technology industry's lack of effort to secure vulnerabilities. We are accelerating towards the automated future. But this new future brings new risks. It is no surprise that after years of development and recent breakthroughs, artificial intelligence is rapidly transforming businesses, consumer electronics, and the national security landscape. But like all digital technologies, AI can fail and be left vulnerable to hacking. The ability to hack AI and the technology industry's lack of effort to secure it is thought by experts to be the biggest unaddressed technology issue of our time. Hacking Artificial Intelligence sheds light on these hacking risks, explaining them to those who can make a difference. Today, very few people-including those in influential business and government positions-are aware of the new risks that accompany automated systems. While society hurdles ahead with AI, we are also rushing towards a security and safety nightmare. This book is the first-ever layman's guide to the new world of hacking AI and introduces the field to thousands of readers who should be aware of these risks. From a security perspective, AI is today where the internet was 30 years ago. It is wide open and can be exploited. Readers from leaders to AI enthusiasts and practitioners alike are shown how AI hacking is a real risk to organizations and are provided with a framework to assess such risks, before problems arise.

Student Data Privacy - Building a School Compliance Program (Hardcover): Linnette Attai Student Data Privacy - Building a School Compliance Program (Hardcover)
Linnette Attai
R1,885 Discovery Miles 18 850 Ships in 10 - 15 working days

Protecting the privacy of student data when bringing technology into the classroom is one of the toughest organizational challenges facing schools and districts today. Parent and legislator concerns about how school systems protect the privacy of student data are at an all-time high. School systems must navigate complex federal and state regulations, understand how technology providers collect and protect student data, explain those complexities to parents, and provide the reassurance the community needs that the student information will remain safe. Student Data Privacy: Building a School Compliance Program provides solutions for all of these challenges and more. It is a step-by-step journey through the process of building the policies and practices to protect student data, and shifting the organizational culture to prioritize privacy while still taking advantage of the tremendous benefits that technology has to offer in the modern classroom.

Building Machine Learning Pipelines (Paperback): Hannes Hapke Building Machine Learning Pipelines (Paperback)
Hannes Hapke; Contributions by Catherine Nelson
R1,716 R1,393 Discovery Miles 13 930 Save R323 (19%) Ships in 18 - 22 working days

Companies are spending billions on machine learning projects, but it's money wasted if the models can't be deployed effectively. In this practical guide, Hannes Hapke and Catherine Nelson walk you through the steps of automating a machine learning pipeline using the TensorFlow ecosystem. You'll learn the techniques and tools that will cut deployment time from days to minutes, so that you can focus on developing new models rather than maintaining legacy systems. Data scientists, machine learning engineers, and DevOps engineers will discover how to go beyond model development to successfully productize their data science projects, while managers will better understand the role they play in helping to accelerate these projects. Understand the steps to build a machine learning pipeline Build your pipeline using components from TensorFlow Extended Orchestrate your machine learning pipeline with Apache Beam, Apache Airflow, and Kubeflow Pipelines Work with data using TensorFlow Data Validation and TensorFlow Transform Analyze a model in detail using TensorFlow Model Analysis Examine fairness and bias in your model performance Deploy models with TensorFlow Serving or TensorFlow Lite for mobile devices Learn privacy-preserving machine learning techniques

Healthcare and Big Data - Digital Specters and Phantom Objects (Hardcover, 1st ed. 2016): Mary F.E. Ebeling Healthcare and Big Data - Digital Specters and Phantom Objects (Hardcover, 1st ed. 2016)
Mary F.E. Ebeling
R3,234 Discovery Miles 32 340 Ships in 10 - 15 working days

This highly original book is an ethnographic noir of how Big Data profits from patient private health information. The book follows personal health data as it is collected from inside healthcare and beyond to create patient consumer profiles that are sold to marketers. Primarily told through a first-person noir narrative, Ebeling as a sociologist-hard-boiled-detective, investigates Big Data and the trade in private health information by examining the information networks that patient data traverses. The noir narrative reveals the processes that the data broker industry uses to create data commodities-data phantoms or the marketing profiles of patients that are bought by advertisers to directly market to consumers. Healthcare and Big Data considers the implications these "data phantoms" have for patient privacy as well as the very real harm that they can cause.

The Center for Democracy and Technology and Internet Privacy in the U.S. - Lessons of the First Five Years (Hardcover, New):... The Center for Democracy and Technology and Internet Privacy in the U.S. - Lessons of the First Five Years (Hardcover, New)
Joyce H.-S. Li
R3,012 Discovery Miles 30 120 Ships in 10 - 15 working days

The Internet has become a necessary component of our personal and professional lives, but because the Internet has redefined the boundaries of communication, it has also put our confidential information at risk. The growing concern with online privacy has caused many Internet users to question the security of their Internet transactions. This book answers these questions through an examination of the Center for Democracy and Technology, an organization that advocates for privacy. Li's book introduces the many issues in online privacy and discusses legal ownership of personal data, specifically one's name, address, telephone number, and email. Her in-depth research of the issues confronted by the Center for Democracy and Technology over a five-year period documents its mission and demonstrates its achievements in the crusade to maintain privacy. As we find ourselves using the Internet for more and more transactions, both personal and professional, we must be aware of our privacy rights and the activities of the organizations that fight to protect them-thus, the information in Li's book makes it a necessary reference for all public and university libraries and a useful resource for courses in information technology. Internet Privacy serves as an introduction to the issues of online privacy in the United States and examines what one advocacy group is doing to protect privacy in cyberspace.

Guide to the De-Identification of Personal Health Information (Hardcover, New): Khaled El Emam Guide to the De-Identification of Personal Health Information (Hardcover, New)
Khaled El Emam
R3,958 Discovery Miles 39 580 Ships in 10 - 15 working days

Offering compelling practical and legal reasons why de-identification should be one of the main approaches to protecting patients' privacy, the Guide to the De-Identification of Personal Health Information outlines a proven, risk-based methodology for the de-identification of sensitive health information. It situates and contextualizes this risk-based methodology and provides a general overview of its steps. The book supplies a detailed case for why de-identification is important as well as best practices to help you pin point when it is necessary to apply de-identification in the disclosure of personal health information. It also: Outlines practical methods for de-identification Describes how to measure re-identification risk Explains how to reduce the risk of re-identification Includes proofs and supporting reference material Focuses only on transformations proven to work on health information-rather than covering all possible approaches, whether they work in practice or not Rated the top systems and software engineering scholar worldwide by The Journal of Systems and Software, Dr. El Emam is one of only a handful of individuals worldwide qualified to de-identify personal health information for secondary use under the HIPAA Privacy Rule Statistical Standard. In this book Dr. El Emam explains how we can make health data more accessible-while protecting patients' privacy and complying with current regulations.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Encyclopedia of Animal Behavior
Jae C. Choe Hardcover R41,233 Discovery Miles 412 330
Maths Progress International Year 9…
Greg Byrd, Keith Gallick, … Paperback R439 Discovery Miles 4 390
Michelangelo
Romain Rolland Paperback R464 Discovery Miles 4 640
Self-Helpless - A Cynic's Search for…
Rebecca Davis Paperback  (4)
R290 R263 Discovery Miles 2 630
Power Maths 2nd Edition Practice Book 4C
Tony Staneff, Josh Lury Paperback R136 R117 Discovery Miles 1 170
Debating Religious Liberty and…
Hardcover R3,280 Discovery Miles 32 800
Human Neuroanatomy
James R. Augustine Hardcover R2,058 Discovery Miles 20 580
Crack the Maths Code Study Guide Grade…
Sedzani Brian Godzwana Paperback R295 R270 Discovery Miles 2 700
What does Medial Frontal Cortex Signal…
Adam Thomas Brockett, Linda M. Amarante, … Hardcover R4,531 Discovery Miles 45 310
Cambridge Checkpoint Lower Secondary…
Frankie Pimentel, Ric Pimentel, … Paperback R417 R378 Discovery Miles 3 780

 

Partners