0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (161)
  • R250 - R500 (192)
  • R500+ (819)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

Adaptive Middleware for the Internet of Things - The GAMBAS Approach (Hardcover): Marcus Handte, Pedro Jose Marron, Gregor... Adaptive Middleware for the Internet of Things - The GAMBAS Approach (Hardcover)
Marcus Handte, Pedro Jose Marron, Gregor Schiele, Matoses Manuel Serrano
R2,936 Discovery Miles 29 360 Ships in 12 - 19 working days

Over the past years, a considerable amount of effort has been devoted, both in industry and academia, towards the development of basic technology as well as innovative applications for the Internet of Things. Adaptive Middleware for the Internet of Things introduces a scalable, interoperable and privacy-preserving approach to realize IoT applications and discusses abstractions and mechanisms at the middleware level that simplify the realization of services that can adapt autonomously to the behavior of their users. Technical topics discussed in the book include: - Behavior-driven Autonomous Services - GAMBAS Middleware Architecture - Generic and Efficient Data Acquisition - Interoperable and Scalable Data Processing - Automated Privacy Preservation Adaptive Middleware for the Internet of Things summarizes the results of the GAMBAS research project funded by the European Commission under Framework Programme 7. It provides an in-depth description of the middleware system developed by the project consortium. In addition, the book describes several innovative mobility and monitoring applications that have been built, deployed and operated to evaluate the middleware under realistic conditions with a large number of users. Adaptive Middleware for the Internet of Things is ideal for personnel in the computer and communication industries as well as academic staff and research students in computer science interested in the development of systems and applications for the Internet of Things.

Digital Image Watermarking - Theoretical and Computational Advances (Hardcover): Surekha Borra, Rohit Thanki, Nilanjan Dey Digital Image Watermarking - Theoretical and Computational Advances (Hardcover)
Surekha Borra, Rohit Thanki, Nilanjan Dey
R2,017 Discovery Miles 20 170 Ships in 12 - 19 working days

The Book presents an overview of newly developed watermarking techniques in various independent and hybrid domains Covers the basics of digital watermarking, its types, domain in which it is implemented and the application of machine learning algorithms onto digital watermarking Reviews hardware implementation of watermarking Discusses optimization problems and solutions in watermarking with a special focus on bio-inspired algorithms Includes a case study along with its MATLAB code and simulation results

Net.Wars (Hardcover, New): Wendy Grossman Net.Wars (Hardcover, New)
Wendy Grossman
R3,255 Discovery Miles 32 550 Ships in 10 - 15 working days

Full text online version at www.nyupress.org/netwars.

Who will rule cyberspace? And why should people care? Recently stories have appeared in a variety of news media, from the sensational to the staid, that portray the Internet as full of pornography, pedophilia, recipes for making bombs, lewd and lawless behavior, and copyright violators. And, for politicians eager for votes, or to people who have never strolled the electronic byways, regulating the Net seems as logical and sensible as making your kids wear seat belts. Forget freedom of speech: children can read this stuff.

From the point of view of those on the Net, mass-media's representation of pornography on the Internet grossly overestimates the amount that is actually available, and these stories are based on studies that are at best flawed and at worst fraudulent. To netizens, the panic over the electronic availability of bomb-making recipes and other potentially dangerous material is groundless: the same material is readily available in public libraries. Out on the Net, it seems outrageous that people who have never really experienced it are in a position to regulate it.

How then, should the lines be drawn in the grey area between cyberspace and the physical world? In net.wars, Wendy Grossman, a journalist who has covered the Net since 1992 for major publications such as "Wired, The Guardian," and "The Telegraph," assesses the battles that will define the future of this new venue. From the Church of Scientology's raids on Net users to netizens attempts to overthrow both the Communications Decency Act and the restrictions on the export of strong encryption, net.wars explains the issues and the background behind the headlines. Among the issues covered are net scams, class divisions on the net, privacy issues, the Communications Decency Act, women online, pornography, hackers and the computer underground, net criminals and sociopaths, and more.

The Digital Person - Technology and Privacy in the Information Age (Paperback, New Ed): Daniel J. Solove The Digital Person - Technology and Privacy in the Information Age (Paperback, New Ed)
Daniel J. Solove
R911 Discovery Miles 9 110 Ships in 12 - 19 working days

View the Table of Contents.
Read the Introduction.

aThis comprehensive analysis of privacy in the information age challenges traditional assumptions that breeches of privacy through the development of electronic dossiers involve the invasion of oneas private space.a
--"Choice"

"The Digital Person challenges the existing ways in which law and legal theory approach the social, political, and legal implications of the collection and use of personal information in computer databases. Solove's book is ambitious, and represents the most important publication in the field of information privacy law for some years."
--"Georgetown Law Journal"

"Anyone concerned with preserving privacy against technology's growing intrusiveness will find this book enlightening."
--"Publishers Weekly"

"Solove . . . truly understands the intersection of law and technology. This book is a fascinating journey into the almost surreal ways personal information is hoarded, used, and abused in the digital age."
--"The Wall Street Journal"

"Daniel Solove is one of the most energetic and creative scholars writing about privacy today. The Digital Person is an important contribution to the privacy debate, and Solove's discussion of the harms of what he calls 'digital dossiers' is invaluable."
--Jeffrey Rosen, author of "The Unwanted Gaze" and "The Naked Crowd"

"Powerful theme."
--"Privacy Journal"

"This is not only a book you should read, but you should make sure your friends read it."
--"IEEE Review"

"Solove offers a book that is both comprehensive and easy to understand, discussing the changes that technology has brought to our concept of privacy. An excellentstarting point for much needed discussion."
--"Law Technology News"

"An unusually perceptive discussion of one of the most vexing problems of the digital age--our loss of control over our personal information. It's a fascinating journey into the almost surreal ways personal information is hoarded, used, and abused in the digital age. I recommend his book highly."
--Bruce Schneier

"Solove's book is the best exposition thus far about the threat that computer databases containing personal data about millions of Americans poses for information privacy."
--Pamela Samuelson, Chancellor's Professor of Law and Information Management at the University of California, Berkeley

"Solove drives his points home through considerable reconfiguration of the basic argument. Rather than casting blame or urging retreat to a precomputer database era, the solution is seen in informing individuals, challenging data collectors, and bringing the law up-to-date."
--"Choice"

"If you want to find out what a mess the law of privacy is, how it got that way, and whether there is hope for the future, then read this book."
--"Legal Times"

"Solove evaluates the shortcomings of current approaches to privacy as well as some useful and controversial ideas for striking a new balance. Anyone who deals with privacy matters will find a lot ot consider."
--"DM News"

"Solove's treatment of this particular facet is thoughtful, thorough, concise, and occasionally laced with humor. The present volume gives us reason to look forward to his future contributions."
--"The Law and Politics Book Review"

"Solove's book is useful, particularly as an overview on how these private and governmentdatabases grew in sophistication and now interact with one another."
--"Christian Science Monitor"

"A far-reaching examination of how digital dossiers are shaping our lives. Daniel Solove has persuasively reconceptualized privacy for the digital age. A must-read."
--Paul Schwartz, Brooklyn Law School

"The Digital Person is a detailed and approachable resource on privacy issues and the laws that affect them."
--"IT Conversations"

Seven days a week, twenty-four hours a day, electronic databases are compiling information about you. As you surf the Internet, an unprecedented amount of your personal information is being recorded and preserved forever in the digital minds of computers. For each individual, these databases create a profile of activities, interests, and preferences used to investigate backgrounds, check credit, market products, and make a wide variety of decisions affecting our lives. The creation and use of these databases--which Daniel J. Solove calls "digital dossiers"--has thus far gone largely unchecked. In this startling account of new technologies for gathering and using personal data, Solove explains why digital dossiers pose a grave threat to our privacy.

The Digital Person sets forth a new understanding of what privacy is, one that is appropriate for the new challenges of the Information Age. Solove recommends how the law can be reformed to simultaneously protect our privacy and allow us to enjoy the benefits of our increasingly digital world.

The first volume in the series EX MACHINA: LAW, TECHNOLOGY, AND SOCIETY

PCI Compliance - Understand and Implement Effective PCI Data Security Standard Compliance (Hardcover, 5th edition): Branden... PCI Compliance - Understand and Implement Effective PCI Data Security Standard Compliance (Hardcover, 5th edition)
Branden Williams, James Adamson
R3,204 Discovery Miles 32 040 Ships in 12 - 19 working days

Unique selling point: * Industry standard book for merchants, banks, and consulting firms looking to learn more about PCI DSS compliance. Core audience: * Retailers (both physical and electronic), firms who handle credit or debit cards (such as merchant banks and processors), and firms who deliver PCI DSS products and services. Place in the market: * Currently there are no PCI DSS 4.0 books

Cyber Security and Operations Management for Industry 4.0 (Hardcover): Ahmed A. Elngar, N. Thillaiarasu, Mohamed Elhoseny, K... Cyber Security and Operations Management for Industry 4.0 (Hardcover)
Ahmed A. Elngar, N. Thillaiarasu, Mohamed Elhoseny, K Martin Sagayam
R4,098 Discovery Miles 40 980 Ships in 12 - 19 working days

This book seamlessly connects the topics of Industry 4.0 and cyber security. It discusses the risks and solutions of using cyber security techniques for Industry 4.0. Cyber Security and Operations Management for Industry 4.0 covers the cyber security risks involved in the integration of Industry 4.0 into businesses and highlights the issues and solutions. The book offers the latest theoretical and practical research in the management of cyber security issues common in Industry 4.0 and also discusses the ethical and legal perspectives of incorporating cyber security techniques and applications into the day-to-day functions of an organization. Industrial management topics related to smart factories, operations research, and value chains are also discussed. This book is ideal for industry professionals, researchers, and those in academia who are interested in learning more about how cyber security and Industry 4.0 are related and can work together.

What Every Engineer Should Know About Cyber Security and Digital Forensics (Paperback, 2nd edition): Joanna F Defranco, Bob... What Every Engineer Should Know About Cyber Security and Digital Forensics (Paperback, 2nd edition)
Joanna F Defranco, Bob Maley
R1,556 Discovery Miles 15 560 Ships in 12 - 19 working days

Updates content and introduces topics such as business changes and outsourcing. Addresses new cyber security risks such as IoT and Distributed Networks (i.e., blockchain). Covers strategy based on the OODA loop in the cycle. Demonstrates application of the concepts through short case studies of real-world incidents chronologically delineating related events. Discusses certifications and reference manuals in cyber security and digital forensics. Includes an entire chapter on tools used by professionals in the field.

High Density Data Storage: Principle, Technology, And Materials (Hardcover): Yanlin Song, Daoben Zhu High Density Data Storage: Principle, Technology, And Materials (Hardcover)
Yanlin Song, Daoben Zhu
R2,725 Discovery Miles 27 250 Ships in 12 - 19 working days

The explosive increase in information and the miniaturization of electronic devices demand new recording technologies and materials that combine high density, fast response, long retention time and rewriting capability. As predicted, the current silicon-based computer circuits are reaching their physical limits. Further miniaturization of the electronic components and increase in data storage density are vital for the next generation of IT equipment such as ultra high-speed mobile computing, communication devices and sophisticated sensors. This original book presents a comprehensive introduction to the significant research achievements on high-density data storage from the aspects of recording mechanisms, materials and fabrication technologies, which are promising for overcoming the physical limits of current data storage systems. The book serves as an useful guide for the development of optimized materials, technologies and device structures for future information storage, and will lead readers to the fascinating world of information technology in the future.

Cyberethics - Social and Moral Issues in the Computer Age (Paperback): Robert M. Baird, Reagan M. Ramsower, Stuart E Rosenbaum Cyberethics - Social and Moral Issues in the Computer Age (Paperback)
Robert M. Baird, Reagan M. Ramsower, Stuart E Rosenbaum
R777 R718 Discovery Miles 7 180 Save R59 (8%) Ships in 10 - 15 working days

The amazing transformation of society brought about by the wide dispersion of computers has given rise to new moral dilemmas. With the rapid development of this technology, the impact of computers on privacy, personal identity, intellectual property, and the form and practice of democracy is becoming more apparent every day. Inevitably, this penetration of computer technology into our private and social lives has a moral dimension, which raises questions about our conduct and requires moral reflection and decision-making. The twenty-six groundbreaking essays collected in this insightful anthology define the nature of this new moral landscape and offer thoughtful answers to the ethical questions raised by the interaction of people and computers.
Divided into five sections, the volume begins with a definition of cyberethics. There is general agreement with James H. Moor's basic definition of the field as "the formulation and justification of policies for the ethical use of computers." Next the issues of anonymity and personal identity are considered. Computers provide individuals with a unique opportunity to create personae for the virtual world that are quite distinct from their normal identities. What are the moral dimensions of creating virtual personalities?
Perhaps the most pressing ethical issue is addressed in the next section on privacy. The ability of computers to store vast amounts of information on any individual raises the harrowing specter of a Big Brother society in the not-too-distant future. How should information be used and how might it be abused? What safeguards are needed to protect privacy as information technology becomes ever more sophisticated?
In the fourth section, questions concerning ownership of intellectual property and copyright law are considered. How can the rights of authorship be protected in the context of the internet?
Finally, the fifth section explores the debate now taking place regarding the impact of computers on democracy. Do computers offer new possibilities for enhancing democracy or will this prospect turn out to be a myth?
This is a much needed anthology of thought-provoking articles on the critical moral issues facing our "brave new world."

Industry Unbound - The Inside Story of Privacy, Data, and Corporate Power (Hardcover): Ari Ezra Waldman Industry Unbound - The Inside Story of Privacy, Data, and Corporate Power (Hardcover)
Ari Ezra Waldman
R724 Discovery Miles 7 240 Ships in 12 - 19 working days

In Industry Unbound, Ari Ezra Waldman exposes precisely how the tech industry conducts its ongoing crusade to undermine our privacy. With research based on interviews with scores of tech employees and internal documents outlining corporate strategies, Waldman reveals that companies don't just lobby against privacy law; they also manipulate how we think about privacy, how their employees approach their work, and how they weaken the law to make data-extractive products the norm. In contrast to those who claim that privacy law is getting stronger, Waldman shows why recent shifts in privacy law are precisely the kinds of changes that corporations want and how even those who think of themselves as privacy advocates often unwittingly facilitate corporate malfeasance. This powerful account should be read by anyone who wants to understand why privacy laws are not working and how corporations trap us into giving up our personal information.

Human Dimensions of Cybersecurity (Paperback): Terry Bossomaier, Steven D'Alessandro, Roger Bradbury Human Dimensions of Cybersecurity (Paperback)
Terry Bossomaier, Steven D'Alessandro, Roger Bradbury
R797 Discovery Miles 7 970 Ships in 12 - 19 working days

"In Human Dimensions of Cyber Security, Terry Bossomaier, Steven D'Alessandro, and Roger Bradbury have produced a book that ... shows how it is indeed possible to achieve what we all need; a multidisciplinary, rigorously researched and argued, and above all accessible account of cybersecurity - what it is, why it matters, and how to do it." --Professor Paul Cornish, Visiting Professor, LSE IDEAS, London School of Economics Human Dimensions of Cybersecurity explores social science influences on cybersecurity. It demonstrates how social science perspectives can enable the ability to see many hazards in cybersecurity. It emphasizes the need for a multidisciplinary approach, as cybersecurity has become a fundamental issue of risk management for individuals, at work, and with government and nation states. This book explains the issues of cybersecurity with rigor, but also in simple language, so individuals can see how they can address these issues and risks. The book provides simple suggestions, or cybernuggets, that individuals can follow to learn the dos and don'ts of cybersecurity. The book also identifies the most important human and social factors that affect cybersecurity. It illustrates each factor, using case studies, and examines possible solutions from both technical and human acceptability viewpoints.

Information Security - Policy, Processes, and Practices (Paperback): Seymour Goodman, Detmar W Straub, Richard Baskerville Information Security - Policy, Processes, and Practices (Paperback)
Seymour Goodman, Detmar W Straub, Richard Baskerville
R1,840 Discovery Miles 18 400 Ships in 12 - 19 working days

Information security is everyone's concern. The way we live is underwritten by information system infrastructures, most notably the Internet. The functioning of our business organizations, the management of our supply chains, and the operation of our governments depend on the secure flow of information. In an organizational environment information security is a never-ending process of protecting information and the systems that produce it.This volume in the "Advances in Management Information Systems" series covers the managerial landscape of information security. It deals with how organizations and nations organize their information security policies and efforts. The book covers how to strategize and implement security with a special focus on emerging technologies. It highlights the wealth of security technologies, and also indicates that the problem is not a lack of technology but rather its intelligent application.

Student Data Privacy - Building a School Compliance Program (Hardcover): Linnette Attai Student Data Privacy - Building a School Compliance Program (Hardcover)
Linnette Attai
R1,621 Discovery Miles 16 210 Ships in 12 - 19 working days

Protecting the privacy of student data when bringing technology into the classroom is one of the toughest organizational challenges facing schools and districts today. Parent and legislator concerns about how school systems protect the privacy of student data are at an all-time high. School systems must navigate complex federal and state regulations, understand how technology providers collect and protect student data, explain those complexities to parents, and provide the reassurance the community needs that the student information will remain safe. Student Data Privacy: Building a School Compliance Program provides solutions for all of these challenges and more. It is a step-by-step journey through the process of building the policies and practices to protect student data, and shifting the organizational culture to prioritize privacy while still taking advantage of the tremendous benefits that technology has to offer in the modern classroom.

The Perfect Police State - An Undercover Odyssey into China's Terrifying Surveillance Dystopia of the Future (Hardcover):... The Perfect Police State - An Undercover Odyssey into China's Terrifying Surveillance Dystopia of the Future (Hardcover)
Geoffrey Cain
R774 R684 Discovery Miles 6 840 Save R90 (12%) Ships in 9 - 17 working days

An in-depth, on-the ground view of how Chinese officials have co-opted technology, infrastructure and the minds of their people to establish the definitive police state. When blocked from facts and truth, and constantly under surveillance, most citizens cannot discern between enemy and friend and don't have the information they need to challenge the government. Society quickly breaks down. Friends betray each other, bosses snitch on employees, teachers rat on their students, and children turn on their parents. Everyone must turn to their government for protection. even if the government is not their true protector. This is the Perfect Police State, and China has created one. In The Perfect Police State Geoffrey Cain, an Asia-based reporter, recounts his travels and investigations into the multifaceted and comprehensive surveillance network in the Western Chinese province of Xinjiang. Drawing on first-hand testimony, and one citizen's tumultuous life and escape from Xinjiang, Cain describes the emergence of China's tech surveillance giants, and the implications for our global order, in an age of Covid-19 and police brutality protests. What results is a vivid and haunting investigation into how China established an effective and enduring technological dystopia.

IoT - Security and Privacy Paradigm (Paperback): Souvik Pal, Vicente Garcia Diaz, Dac-Nhuong Le IoT - Security and Privacy Paradigm (Paperback)
Souvik Pal, Vicente Garcia Diaz, Dac-Nhuong Le
R1,640 Discovery Miles 16 400 Ships in 12 - 19 working days

IOT: Security and Privacy Paradigm covers the evolution of security and privacy issues in the Internet of Things (IoT). It focuses on bringing all security and privacy related technologies into one source, so that students, researchers, and practitioners can refer to this book for easy understanding of IoT security and privacy issues. This edited book uses Security Engineering and Privacy-by-Design principles to design a secure IoT ecosystem and to implement cyber-security solutions. This book takes the readers on a journey that begins with understanding the security issues in IoT-enabled technologies and how it can be applied in various aspects. It walks readers through engaging with security challenges and builds a safe infrastructure for IoT devices. The book helps readers gain an understand of security architecture through IoT and describes the state of the art of IoT countermeasures. It also differentiates security threats in IoT-enabled infrastructure from traditional ad hoc or infrastructural networks, and provides a comprehensive discussion on the security challenges and solutions in RFID, WSNs, in IoT. This book aims to provide the concepts of related technologies and novel findings of the researchers through its chapter organization. The primary audience includes specialists, researchers, graduate students, designers, experts and engineers who are focused on research and security related issues. Souvik Pal, PhD, has worked as Assistant Professor in Nalanda Institute of Technology, Bhubaneswar, and JIS College of Engineering, Kolkata (NAAC "A" Accredited College). He is the organizing Chair and Plenary Speaker of RICE Conference in Vietnam; and organizing co-convener of ICICIT, Tunisia. He has served in many conferences as chair, keynote speaker, and he also chaired international conference sessions and presented session talks internationally. His research area includes Cloud Computing, Big Data, Wireless Sensor Network (WSN), Internet of Things, and Data Analytics. Vicente Garcia-Diaz, PhD, is an Associate Professor in the Department of Computer Science at the University of Oviedo (Languages and Computer Systems area). He is also the editor of several special issues in prestigious journals such as Scientific Programming and International Journal of Interactive Multimedia and Artificial Intelligence. His research interests include eLearning, machine learning and the use of domain specific languages in different areas. Dac-Nhuong Le, PhD, is Deputy-Head of Faculty of Information Technology, and Vice-Director of Information Technology Apply and Foreign Language Training Center, Haiphong University, Vietnam. His area of research includes: evaluation computing and approximate algorithms, network communication, security and vulnerability, network performance analysis and simulation, cloud computing, IoT and image processing in biomedical. Presently, he is serving on the editorial board of several international journals and has authored nine computer science books published by Springer, Wiley, CRC Press, Lambert Publication, and Scholar Press.

Privacy and the Information Age (Paperback): Serge Gutwirth Privacy and the Information Age (Paperback)
Serge Gutwirth; Translated by Raf Casert
R1,265 Discovery Miles 12 650 Ships in 12 - 19 working days

In a time in which new technologies make it easy to gather and process data, the discussion on privacy tends to focus exclusively on the protecting of personal data. To Serge Gutwirth, privacy involves far more. He advances the intriguing thesis that privacy is in fact the safeguard of personal freedom the safeguard of the individual's freedom to decide who she or he is, what she or he does, and who knows about it. Any restriction on privacy thus means an infringement of personal freedom. And it's exactly this freedom that plays an essential role in every democracy.

Multimodal Biometric Systems - Security and Applications (Hardcover): Rashmi Gupta, Manju Khari Multimodal Biometric Systems - Security and Applications (Hardcover)
Rashmi Gupta, Manju Khari
R4,551 Discovery Miles 45 510 Ships in 12 - 19 working days

Many governments around the world are calling for the use of biometric systems to provide crucial societal functions, consequently making it an urgent area for action. The current performance of some biometric systems in terms of their error rates, robustness, and system security may prove to be inadequate for large-scale applications to process millions of users at a high rate of throughput. This book focuses on fusion in biometric systems. It discusses the present level, the limitations, and proposed methods to improve performance. It describes the fundamental concepts, current research, and security-related issues. The book will present a computational perspective, identify challenges, and cover new problem-solving strategies, offering solved problems and case studies to help with reader comprehension and deep understanding. This book is written for researchers, practitioners, both undergraduate and post-graduate students, and those working in various engineering fields such as Systems Engineering, Computer Science, Information Technology, Electronics, and Communications.

The Center for Democracy and Technology and Internet Privacy in the U.S. - Lessons of the First Five Years (Hardcover, New):... The Center for Democracy and Technology and Internet Privacy in the U.S. - Lessons of the First Five Years (Hardcover, New)
Joyce H.-S. Li
R2,585 Discovery Miles 25 850 Ships in 12 - 19 working days

The Internet has become a necessary component of our personal and professional lives, but because the Internet has redefined the boundaries of communication, it has also put our confidential information at risk. The growing concern with online privacy has caused many Internet users to question the security of their Internet transactions. This book answers these questions through an examination of the Center for Democracy and Technology, an organization that advocates for privacy. Li's book introduces the many issues in online privacy and discusses legal ownership of personal data, specifically one's name, address, telephone number, and email. Her in-depth research of the issues confronted by the Center for Democracy and Technology over a five-year period documents its mission and demonstrates its achievements in the crusade to maintain privacy. As we find ourselves using the Internet for more and more transactions, both personal and professional, we must be aware of our privacy rights and the activities of the organizations that fight to protect them-thus, the information in Li's book makes it a necessary reference for all public and university libraries and a useful resource for courses in information technology. Internet Privacy serves as an introduction to the issues of online privacy in the United States and examines what one advocacy group is doing to protect privacy in cyberspace.

Securing Social Networks in Cyberspace (Hardcover): Al-Sakib Khan Pathan Securing Social Networks in Cyberspace (Hardcover)
Al-Sakib Khan Pathan
R2,895 Discovery Miles 28 950 Ships in 12 - 19 working days

This book collates the key security and privacy concerns faced by individuals and organizations who use various social networking sites. This includes activities such as connecting with friends, colleagues, and family; sharing and posting information; managing audio, video, and photos; and all other aspects of using social media sites both professionally and personally. In the setting of the Internet of Things (IoT) that can connect millions of devices at any one time, the security of such actions is paramount. Securing Social Networks in Cyberspace discusses user privacy and trust, location privacy, protecting children, managing multimedia content, cyberbullying, and much more. Current state-of-the-art defense mechanisms that can bring long-term solutions to tackling these threats are considered in the book. This book can be used as a reference for an easy understanding of complex cybersecurity issues in social networking platforms and services. It is beneficial for academicians and graduate-level researchers. General readers may find it beneficial in protecting their social-media-related profiles.

Guide to the De-Identification of Personal Health Information (Hardcover, New): Khaled El Emam Guide to the De-Identification of Personal Health Information (Hardcover, New)
Khaled El Emam
R3,982 Discovery Miles 39 820 Ships in 12 - 19 working days

Offering compelling practical and legal reasons why de-identification should be one of the main approaches to protecting patients' privacy, the Guide to the De-Identification of Personal Health Information outlines a proven, risk-based methodology for the de-identification of sensitive health information. It situates and contextualizes this risk-based methodology and provides a general overview of its steps. The book supplies a detailed case for why de-identification is important as well as best practices to help you pin point when it is necessary to apply de-identification in the disclosure of personal health information. It also: Outlines practical methods for de-identification Describes how to measure re-identification risk Explains how to reduce the risk of re-identification Includes proofs and supporting reference material Focuses only on transformations proven to work on health information-rather than covering all possible approaches, whether they work in practice or not Rated the top systems and software engineering scholar worldwide by The Journal of Systems and Software, Dr. El Emam is one of only a handful of individuals worldwide qualified to de-identify personal health information for secondary use under the HIPAA Privacy Rule Statistical Standard. In this book Dr. El Emam explains how we can make health data more accessible-while protecting patients' privacy and complying with current regulations.

How Things Work - The Computer Science Edition (Paperback): Charles F. Bowman How Things Work - The Computer Science Edition (Paperback)
Charles F. Bowman
R1,619 Discovery Miles 16 190 Ships in 12 - 19 working days

It's axiomatic to state that people fear what they do not understand, and this is especially true when it comes to technology. However, despite their prevalence, computers remain shrouded in mystery, and many users feel apprehensive when interacting with them. Smartphones have only exacerbated the issue. Indeed, most users of these devices leverage only a small fraction of the power they hold in their hands. How Things Work: The Computer Science Edition is a roadmap for readers who want to overcome their technophobia and harness the full power of everyday technology. Beginning with the basics, the book demystifies the mysterious world of computer science, explains its fundamental concepts in simple terms, and answers the questions many users feel too intimidated to ask. By the end of the book, readers will understand how computers and smart devices function and, more important, how they can make these devices work for them. To complete the picture, the book also introduces readers to the darker side of modern technology: security and privacy concerns, identity theft, and threats from the Dark Web.

How Things Work - The Computer Science Edition (Hardcover): Charles F. Bowman How Things Work - The Computer Science Edition (Hardcover)
Charles F. Bowman
R3,959 Discovery Miles 39 590 Ships in 12 - 19 working days

It's axiomatic to state that people fear what they do not understand, and this is especially true when it comes to technology. However, despite their prevalence, computers remain shrouded in mystery, and many users feel apprehensive when interacting with them. Smartphones have only exacerbated the issue. Indeed, most users of these devices leverage only a small fraction of the power they hold in their hands. How Things Work: The Computer Science Edition is a roadmap for readers who want to overcome their technophobia and harness the full power of everyday technology. Beginning with the basics, the book demystifies the mysterious world of computer science, explains its fundamental concepts in simple terms, and answers the questions many users feel too intimidated to ask. By the end of the book, readers will understand how computers and smart devices function and, more important, how they can make these devices work for them. To complete the picture, the book also introduces readers to the darker side of modern technology: security and privacy concerns, identity theft, and threats from the Dark Web.

An In-Depth Guide to Mobile Device Forensics (Paperback): Chuck Easttom An In-Depth Guide to Mobile Device Forensics (Paperback)
Chuck Easttom
R1,585 Discovery Miles 15 850 Ships in 12 - 19 working days

Mobile devices are ubiquitous; therefore, mobile device forensics is absolutely critical. Whether for civil or criminal investigations, being able to extract evidence from a mobile device is essential. This book covers the technical details of mobile devices and transmissions, as well as forensic methods for extracting evidence. There are books on specific issues like Android forensics or iOS forensics, but there is not currently a book that covers all the topics covered in this book. Furthermore, it is such a critical skill that mobile device forensics is the most common topic the Author is asked to teach to law enforcement. This is a niche that is not being adequately filled with current titles. An In-Depth Guide to Mobile Device Forensics is aimed towards undergraduates and graduate students studying cybersecurity or digital forensics. It covers both technical and legal issues, and includes exercises, tests/quizzes, case studies, and slides to aid comprehension.

Nuking the Moon - And Other Intelligence Schemes and Military Plots Best Left on the Drawing Board (Paperback, Main): Vince... Nuking the Moon - And Other Intelligence Schemes and Military Plots Best Left on the Drawing Board (Paperback, Main)
Vince Houghton 1
R336 R308 Discovery Miles 3 080 Save R28 (8%) Ships in 12 - 19 working days

"Compulsively readable laugh out loud history." Mary Roach Bomb-carrying bats. Poisoned flower arrangements. Cigars laced with mind-altering drugs. Listening devices implanted into specially-trained cats. A torpedo-proof aircraft carrier made out of ice and sawdust. And a CIA plan to detonate a nuclear bomb on the moon ... just because. In Nuking the Moon, Vince Houghton, Historian and Curator at the International Spy Museum, collects the most inspired, implausible and downright bizarre military intelligence schemes that never quite made it off the drawing board. From the grandly ambitious to the truly devious, they illuminate a new side of warfare, revealing how a combination of desperation and innovation led not only to daring missions and brilliant technological advances, but to countless plans and experiments that failed spectacularly. Alternatively terrifying and hilarious, and combining archival research with newly-conducted interviews, these twenty-six chapters reveal not only what might have happened, but also what each one tells us about the history and people around it. If 'military intelligence' makes you think of James Bond and ingenious exploding gadgets ... get ready for the true story.

Cyber-Security Threats, Actors, and Dynamic Mitigation (Hardcover): Nicholas Kolokotronis, Stavros Shiaeles Cyber-Security Threats, Actors, and Dynamic Mitigation (Hardcover)
Nicholas Kolokotronis, Stavros Shiaeles
R3,811 Discovery Miles 38 110 Ships in 12 - 19 working days

Cyber-Security Threats, Actors, and Dynamic Mitigation provides both a technical and state-of-the-art perspective as well as a systematic overview of the recent advances in different facets of cyber-security. It covers the methodologies for modeling attack strategies used by threat actors targeting devices, systems, and networks such as smart homes, critical infrastructures, and industrial IoT. With a comprehensive review of the threat landscape, the book explores both common and sophisticated threats to systems and networks. Tools and methodologies are presented for precise modeling of attack strategies, which can be used both proactively in risk management and reactively in intrusion prevention and response systems. Several contemporary techniques are offered ranging from reconnaissance and penetration testing to malware detection, analysis, and mitigation. Advanced machine learning-based approaches are also included in the area of anomaly-based detection, that are capable of detecting attacks relying on zero-day vulnerabilities and exploits. Academics, researchers, and professionals in cyber-security who want an in-depth look at the contemporary aspects of the field will find this book of interest. Those wanting a unique reference for various cyber-security threats and how they are detected, analyzed, and mitigated will reach for this book often.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Advances in Dynamic Games and…
Tamer Basar, Alain Haurie Hardcover R4,766 Discovery Miles 47 660
State-Space Approaches for Modelling and…
Gerasimos G. Rigatos Hardcover R4,900 R3,731 Discovery Miles 37 310
Compressive Sensing Based Algorithms for…
Amit Kumar Mishra, Ryno Strauss Verster Hardcover R4,263 Discovery Miles 42 630
Networks in the Global World V…
Artem Antonyuk, Nikita Basov Hardcover R4,631 Discovery Miles 46 310
Materials Phase Change PDE Control…
Shumon Koga, Miroslav Krstic Hardcover R3,592 Discovery Miles 35 920
Recent Advances in Sliding Modes: From…
Xing Huo Yu, Mehmet OEnder Efe Hardcover R5,059 R3,890 Discovery Miles 38 900
Possibility Theory and the Risk
Irina Georgescu Hardcover R3,006 Discovery Miles 30 060
Closing The Gap - The Fourth Industrial…
Tshilidzi Marwala Paperback R627 Discovery Miles 6 270
Models and Methods for Interval-Valued…
Deng-Feng LI Hardcover R3,166 Discovery Miles 31 660
Air Traffic Control Automated Systems
Bestugin A.R., Eshenko A.A., … Hardcover R3,569 Discovery Miles 35 690

 

Partners