0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (181)
  • R250 - R500 (210)
  • R500+ (794)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

Artificial Intelligence and Cybersecurity - Advances and Innovations (Hardcover): Ishaani Priyadarshini, Rohit Sharma Artificial Intelligence and Cybersecurity - Advances and Innovations (Hardcover)
Ishaani Priyadarshini, Rohit Sharma
R4,805 R4,183 Discovery Miles 41 830 Save R622 (13%) Ships in 5 - 10 working days

Provides advanced system implementation for Smart Cities using Artificial Intelligence Addresses the complete functional framework workflow in Artificial Intelligence Explores basic and high-level concepts, thus servicing as a manual for those in the industry while also helping beginners Based on the latest technologies, and covering the major challenges, issues, and advances in Artificial Intelligence and Cybersecurity Discusses intelligent data management and automated systems through Artificial Intelligence and Cyber Security

A Practical Guide to Security Engineering and Information Assurance (Paperback): Debra S. Herrmann A Practical Guide to Security Engineering and Information Assurance (Paperback)
Debra S. Herrmann
R1,715 Discovery Miles 17 150 Ships in 12 - 17 working days

Today the vast majority of the world's information resides in, is derived from, and is exchanged among multiple automated systems. Critical decisions are made, and critical action is taken based on information from these systems. Therefore, the information must be accurate, correct, and timely, and be manipulated, stored, retrieved, and exchanged safely, reliably, and securely. In a time when information is considered the latest commodity, information security should be top priority. A Practical Guide to Security Engineering and Information Assurance gives you an engineering approach to information security and information assurance (IA). The book examines the impact of accidental and malicious intentional action and inaction on information security and IA. Innovative long-term vendor, technology, and application-independent strategies show you how to protect your critical systems and data from accidental and intentional action and inaction that could lead to system failure or compromise. The author presents step-by-step, in-depth processes for defining information security and assurance goals, performing vulnerability and threat analysis, implementing and verifying the effectiveness of threat control measures, and conducting accident and incident investigations. She explores real-world strategies applicable to all systems, from small systems supporting a home-based business to those of a multinational corporation, government agency, or critical infrastructure system. The information revolution has brought its share of risks. Exploring the synergy between security, safety, and reliability engineering, A Practical Guide to Security Engineering and Information Assurance consolidates and organizes current thinking about information security/IA techniques, approaches, and best practices. As this book will show you, there is considerably more to information security/IA than firewalls, encryption, and virus protection.

Convergence of Internet of Things and Blockchain Technologies (Hardcover, 1st ed. 2022): H L Gururaj, V. Ravi Kumar, Sam... Convergence of Internet of Things and Blockchain Technologies (Hardcover, 1st ed. 2022)
H L Gururaj, V. Ravi Kumar, Sam Goundar, Ahmed A. Elngar, B H Swathi
R3,290 Discovery Miles 32 900 Ships in 10 - 15 working days

This book presents chapters from diverse range of authors on different aspects of how Blockchain and IoT are converging and the impacts of these developments. The book provides an extensive cross-sectional and multi-disciplinary look into this trend and how it affects artificial intelligence, cyber-physical systems, and robotics with a look at applications in aerospace, agriculture, automotive, critical infrastructures, healthcare, manufacturing, retail, smart transport systems, smart cities, and smart healthcare. Cases include the impact of Blockchain for IoT Security; decentralized access control systems in IoT; Blockchain architecture for scalable access management in IoT; smart and sustainable IoT applications incorporating Blockchain, and more. The book presents contributions from international academics, researchers, and practitioners from diverse perspectives. Presents how Blockchain and IoT are converging and the impacts of these developments on technology and its application; Discusses IoT and Blockchain from cross-sectional and multi-disciplinary perspectives; Includes contributions from researchers, academics, and professionals from around the world.

CDPSE Certified Data Privacy Solutions Engineer All-in-One Exam Guide (Paperback): Peter Gregory CDPSE Certified Data Privacy Solutions Engineer All-in-One Exam Guide (Paperback)
Peter Gregory
R966 Discovery Miles 9 660 Ships in 12 - 17 working days

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. This study guide offers 100% coverage of every objective for the Certified Data Privacy Solutions Engineer Exam Take ISACA's rigorous Certified Data Privacy Solutions Engineer exam with confidence using the comprehensive information in this effective self-study guide. Written by a security and privacy expert and experienced author, the book lays out hands-on privacy and security techniques and thoroughly prepares candidates to pass this exam. Beyond exam preparation, the guide also serves as a valuable on-the-job reference. CDPSE (TM) Certified Data Privacy Solutions Engineer All-in-One Exam Guide is based on proven teaching and learning styles and features special elements that teach and reinforce practical privacy and IT security skills. The book contains in-depth practice questions and detailed explanations. You will discover how to effectively design, build, and run information privacy management programs. Contains comprehensive coverage of every topic on the CDPSE exam Online content includes 300 practice questions in the customizable Total Tester exam engine Written by a security and privacy expert, educator, and experienced author

Fundamentals of Computer Security (Hardcover, 2003 ed.): Josef Pieprzyk, Thomas Hardjono, Jennifer Seberry Fundamentals of Computer Security (Hardcover, 2003 ed.)
Josef Pieprzyk, Thomas Hardjono, Jennifer Seberry
R2,561 Discovery Miles 25 610 Ships in 12 - 17 working days

This book presents modern concepts of computer security. It introduces the basic mathematical background necessary to follow computer security concepts. Modern developments in cryptography are examined, starting from private-key and public-key encryption, going through hashing, digital signatures, authentication, secret sharing, group-oriented cryptography, pseudorandomness, key establishment protocols, zero-knowledge protocols, and identification, and finishing with an introduction to modern e-bussiness systems based on digital cash. Intrusion detection and access control provide examples of security systems implemented as a part of operating system. Database and network security is also discussed.This textbook is developed out of classes given by the authors at several universities in Australia over a period of a decade, and will serve as a reference book for professionals in computer security. The presentation is selfcontained. Numerous illustrations, examples, exercises, and a comprehensive subject index support the reader in accessing the material.

Cyber Security and Operations Management for Industry 4.0 (Hardcover): Ahmed A. Elngar, N. Thillaiarasu, Mohamed Elhoseny, K... Cyber Security and Operations Management for Industry 4.0 (Hardcover)
Ahmed A. Elngar, N. Thillaiarasu, Mohamed Elhoseny, K Martin Sagayam
R3,597 Discovery Miles 35 970 Ships in 12 - 17 working days

This book seamlessly connects the topics of Industry 4.0 and cyber security. It discusses the risks and solutions of using cyber security techniques for Industry 4.0. Cyber Security and Operations Management for Industry 4.0 covers the cyber security risks involved in the integration of Industry 4.0 into businesses and highlights the issues and solutions. The book offers the latest theoretical and practical research in the management of cyber security issues common in Industry 4.0 and also discusses the ethical and legal perspectives of incorporating cyber security techniques and applications into the day-to-day functions of an organization. Industrial management topics related to smart factories, operations research, and value chains are also discussed. This book is ideal for industry professionals, researchers, and those in academia who are interested in learning more about how cyber security and Industry 4.0 are related and can work together.

PCI Compliance - Understand and Implement Effective PCI Data Security Standard Compliance (Hardcover, 5th edition): Branden... PCI Compliance - Understand and Implement Effective PCI Data Security Standard Compliance (Hardcover, 5th edition)
Branden Williams, James Adamson
R2,837 Discovery Miles 28 370 Ships in 12 - 17 working days

Unique selling point: * Industry standard book for merchants, banks, and consulting firms looking to learn more about PCI DSS compliance. Core audience: * Retailers (both physical and electronic), firms who handle credit or debit cards (such as merchant banks and processors), and firms who deliver PCI DSS products and services. Place in the market: * Currently there are no PCI DSS 4.0 books

Digital Image Watermarking - Theoretical and Computational Advances (Hardcover): Surekha Borra, Rohit Thanki, Nilanjan Dey Digital Image Watermarking - Theoretical and Computational Advances (Hardcover)
Surekha Borra, Rohit Thanki, Nilanjan Dey
R1,750 Discovery Miles 17 500 Ships in 12 - 17 working days

The Book presents an overview of newly developed watermarking techniques in various independent and hybrid domains Covers the basics of digital watermarking, its types, domain in which it is implemented and the application of machine learning algorithms onto digital watermarking Reviews hardware implementation of watermarking Discusses optimization problems and solutions in watermarking with a special focus on bio-inspired algorithms Includes a case study along with its MATLAB code and simulation results

Hello World - How  to be Human in the Age of the Machine (Paperback): Hannah Fry Hello World - How to be Human in the Age of the Machine (Paperback)
Hannah Fry 2
R327 R266 Discovery Miles 2 660 Save R61 (19%) Ships in 9 - 15 working days

_______________ 'One of the best books yet written on data and algorithms. . .deserves a place on the bestseller charts.' (The Times) You are accused of a crime. Who would you rather determined your fate - a human or an algorithm? An algorithm is more consistent and less prone to error of judgement. Yet a human can look you in the eye before passing sentence. Welcome to the age of the algorithm, the story of a not-too-distant future where machines rule supreme, making important decisions - in healthcare, transport, finance, security, what we watch, where we go even who we send to prison. So how much should we rely on them? What kind of future do we want? Hannah Fry takes us on a tour of the good, the bad and the downright ugly of the algorithms that surround us. In Hello World she lifts the lid on their inner workings, demonstrates their power, exposes their limitations, and examines whether they really are an improvement on the humans they are replacing. A BBC RADIO 4: BOOK OF THE WEEK SHORTLISTED FOR THE 2018 BAILLIE GIFFORD PRIZE AND 2018 ROYAL SOCIETY SCIENCE BOOK PRIZE

Adaptive Middleware for the Internet of Things - The GAMBAS Approach (Hardcover): Marcus Handte, Pedro Jose Marron, Gregor... Adaptive Middleware for the Internet of Things - The GAMBAS Approach (Hardcover)
Marcus Handte, Pedro Jose Marron, Gregor Schiele, Matoses Manuel Serrano
R2,675 Discovery Miles 26 750 Ships in 12 - 17 working days

Over the past years, a considerable amount of effort has been devoted, both in industry and academia, towards the development of basic technology as well as innovative applications for the Internet of Things. Adaptive Middleware for the Internet of Things introduces a scalable, interoperable and privacy-preserving approach to realize IoT applications and discusses abstractions and mechanisms at the middleware level that simplify the realization of services that can adapt autonomously to the behavior of their users. Technical topics discussed in the book include: - Behavior-driven Autonomous Services - GAMBAS Middleware Architecture - Generic and Efficient Data Acquisition - Interoperable and Scalable Data Processing - Automated Privacy Preservation Adaptive Middleware for the Internet of Things summarizes the results of the GAMBAS research project funded by the European Commission under Framework Programme 7. It provides an in-depth description of the middleware system developed by the project consortium. In addition, the book describes several innovative mobility and monitoring applications that have been built, deployed and operated to evaluate the middleware under realistic conditions with a large number of users. Adaptive Middleware for the Internet of Things is ideal for personnel in the computer and communication industries as well as academic staff and research students in computer science interested in the development of systems and applications for the Internet of Things.

Student Data Privacy - Building a School Compliance Program (Hardcover): Linnette Attai Student Data Privacy - Building a School Compliance Program (Hardcover)
Linnette Attai
R1,418 Discovery Miles 14 180 Ships in 12 - 17 working days

Protecting the privacy of student data when bringing technology into the classroom is one of the toughest organizational challenges facing schools and districts today. Parent and legislator concerns about how school systems protect the privacy of student data are at an all-time high. School systems must navigate complex federal and state regulations, understand how technology providers collect and protect student data, explain those complexities to parents, and provide the reassurance the community needs that the student information will remain safe. Student Data Privacy: Building a School Compliance Program provides solutions for all of these challenges and more. It is a step-by-step journey through the process of building the policies and practices to protect student data, and shifting the organizational culture to prioritize privacy while still taking advantage of the tremendous benefits that technology has to offer in the modern classroom.

Net.Wars (Hardcover, New): Wendy Grossman Net.Wars (Hardcover, New)
Wendy Grossman
R2,527 Discovery Miles 25 270 Ships in 10 - 15 working days

Full text online version at www.nyupress.org/netwars.

Who will rule cyberspace? And why should people care? Recently stories have appeared in a variety of news media, from the sensational to the staid, that portray the Internet as full of pornography, pedophilia, recipes for making bombs, lewd and lawless behavior, and copyright violators. And, for politicians eager for votes, or to people who have never strolled the electronic byways, regulating the Net seems as logical and sensible as making your kids wear seat belts. Forget freedom of speech: children can read this stuff.

From the point of view of those on the Net, mass-media's representation of pornography on the Internet grossly overestimates the amount that is actually available, and these stories are based on studies that are at best flawed and at worst fraudulent. To netizens, the panic over the electronic availability of bomb-making recipes and other potentially dangerous material is groundless: the same material is readily available in public libraries. Out on the Net, it seems outrageous that people who have never really experienced it are in a position to regulate it.

How then, should the lines be drawn in the grey area between cyberspace and the physical world? In net.wars, Wendy Grossman, a journalist who has covered the Net since 1992 for major publications such as "Wired, The Guardian," and "The Telegraph," assesses the battles that will define the future of this new venue. From the Church of Scientology's raids on Net users to netizens attempts to overthrow both the Communications Decency Act and the restrictions on the export of strong encryption, net.wars explains the issues and the background behind the headlines. Among the issues covered are net scams, class divisions on the net, privacy issues, the Communications Decency Act, women online, pornography, hackers and the computer underground, net criminals and sociopaths, and more.

Human Dimensions of Cybersecurity (Paperback): Terry Bossomaier, Steven D'Alessandro, Roger Bradbury Human Dimensions of Cybersecurity (Paperback)
Terry Bossomaier, Steven D'Alessandro, Roger Bradbury
R662 Discovery Miles 6 620 Ships in 12 - 17 working days

"In Human Dimensions of Cyber Security, Terry Bossomaier, Steven D'Alessandro, and Roger Bradbury have produced a book that ... shows how it is indeed possible to achieve what we all need; a multidisciplinary, rigorously researched and argued, and above all accessible account of cybersecurity - what it is, why it matters, and how to do it." --Professor Paul Cornish, Visiting Professor, LSE IDEAS, London School of Economics Human Dimensions of Cybersecurity explores social science influences on cybersecurity. It demonstrates how social science perspectives can enable the ability to see many hazards in cybersecurity. It emphasizes the need for a multidisciplinary approach, as cybersecurity has become a fundamental issue of risk management for individuals, at work, and with government and nation states. This book explains the issues of cybersecurity with rigor, but also in simple language, so individuals can see how they can address these issues and risks. The book provides simple suggestions, or cybernuggets, that individuals can follow to learn the dos and don'ts of cybersecurity. The book also identifies the most important human and social factors that affect cybersecurity. It illustrates each factor, using case studies, and examines possible solutions from both technical and human acceptability viewpoints.

Strategic Cyber Deterrence - The Active Cyber Defense Option (Hardcover): Scott Jasper Strategic Cyber Deterrence - The Active Cyber Defense Option (Hardcover)
Scott Jasper
R2,480 Discovery Miles 24 800 Ships in 12 - 17 working days

According to the FBI, about 4000 ransomware attacks happen every day. In the United States alone, victims lost $209 million to ransomware in the first quarter of 2016. Even worse is the threat to critical infrastructure, as seen by the malware infections at electrical distribution companies in Ukraine that caused outages to 225,000 customers in late 2015. Further, recent reports on the Russian hacks into the Democratic National Committee and subsequent release of emails in a coercive campaign to apparently influence the U.S. Presidential Election have brought national attention to the inadequacy of cyber deterrence. The U.S. government seems incapable of creating an adequate strategy to alter the behavior of the wide variety of malicious actors seeking to inflict harm or damage through cyberspace. This book offers a systematic analysis of the various existing strategic cyber deterrence options and introduces the alternative strategy of active cyber defense. It examines the array of malicious actors operating in the domain, their methods of attack, and their motivations. It also provides answers on what is being done, and what could be done, by the government and industry to convince malicious actors that their attacks will not succeed and that risk of repercussions exists. Traditional deterrence strategies of retaliation, denial and entanglement appear to lack the necessary conditions of capability, credibly, and communications due to these malicious actors' advantages in cyberspace. In response, the book offers the option of adopting a strategy of active cyber defense that combines internal systemic resilience to halt cyber attack progress with external disruption capacities to thwart malicious actors' objectives. It shows how active cyber defense is technically capable and legally viable as an alternative strategy for the deterrence of cyber attacks.

Information Security - Policy, Processes, and Practices (Paperback): Seymour Goodman, Detmar W Straub, Richard Baskerville Information Security - Policy, Processes, and Practices (Paperback)
Seymour Goodman, Detmar W Straub, Richard Baskerville
R1,616 Discovery Miles 16 160 Ships in 12 - 17 working days

Information security is everyone's concern. The way we live is underwritten by information system infrastructures, most notably the Internet. The functioning of our business organizations, the management of our supply chains, and the operation of our governments depend on the secure flow of information. In an organizational environment information security is a never-ending process of protecting information and the systems that produce it.This volume in the "Advances in Management Information Systems" series covers the managerial landscape of information security. It deals with how organizations and nations organize their information security policies and efforts. The book covers how to strategize and implement security with a special focus on emerging technologies. It highlights the wealth of security technologies, and also indicates that the problem is not a lack of technology but rather its intelligent application.

The Perfect Police State - An Undercover Odyssey into China's Terrifying Surveillance Dystopia of the Future (Hardcover):... The Perfect Police State - An Undercover Odyssey into China's Terrifying Surveillance Dystopia of the Future (Hardcover)
Geoffrey Cain
R744 R624 Discovery Miles 6 240 Save R120 (16%) Ships in 9 - 15 working days

An in-depth, on-the ground view of how Chinese officials have co-opted technology, infrastructure and the minds of their people to establish the definitive police state. When blocked from facts and truth, and constantly under surveillance, most citizens cannot discern between enemy and friend and don't have the information they need to challenge the government. Society quickly breaks down. Friends betray each other, bosses snitch on employees, teachers rat on their students, and children turn on their parents. Everyone must turn to their government for protection. even if the government is not their true protector. This is the Perfect Police State, and China has created one. In The Perfect Police State Geoffrey Cain, an Asia-based reporter, recounts his travels and investigations into the multifaceted and comprehensive surveillance network in the Western Chinese province of Xinjiang. Drawing on first-hand testimony, and one citizen's tumultuous life and escape from Xinjiang, Cain describes the emergence of China's tech surveillance giants, and the implications for our global order, in an age of Covid-19 and police brutality protests. What results is a vivid and haunting investigation into how China established an effective and enduring technological dystopia.

Privacy, Security and Accountability - Ethics, Law and Policy (Hardcover): Adam D Moore Privacy, Security and Accountability - Ethics, Law and Policy (Hardcover)
Adam D Moore
R3,435 Discovery Miles 34 350 Ships in 12 - 17 working days

What is the appropriate balance between privacy, security, and accountability? What do we owe each other in terms of information sharing and access? Why is privacy valuable and is it more or less important than other values like security or free speech? Is Edward Snowden a hero or villain? Within democratic societies, privacy, security, and accountability are seen as important values that must be balanced appropriately. If there is too much privacy, then there may be too little accountability - and more alarmingly, too little security. On the other hand, where there is too little privacy, individuals may not have the space to grow, experiment, and engage in practices not generally accepted by the majority. Moreover, allowing overly limited control over access to and uses of private places and information may itself be a threat to security. By clarifying the moral, legal, and social foundations of privacy, security, and accountability, this book helps determine the appropriate balance between these contested values. Twelve specially commissioned essays provide the ideal resource for students and academics in information and applied ethics.

Privacy, Security and Accountability - Ethics, Law and Policy (Paperback): Adam D Moore Privacy, Security and Accountability - Ethics, Law and Policy (Paperback)
Adam D Moore
R1,218 Discovery Miles 12 180 Ships in 12 - 17 working days

What is the appropriate balance between privacy, security, and accountability? What do we owe each other in terms of information sharing and access? Why is privacy valuable and is it more or less important than other values like security or free speech? Is Edward Snowden a hero or villain? Within democratic societies, privacy, security, and accountability are seen as important values that must be balanced appropriately. If there is too much privacy, then there may be too little accountability - and more alarmingly, too little security. On the other hand, where there is too little privacy, individuals may not have the space to grow, experiment, and engage in practices not generally accepted by the majority. Moreover, allowing overly limited control over access to and uses of private places and information may itself be a threat to security. By clarifying the moral, legal, and social foundations of privacy, security, and accountability, this book helps determine the appropriate balance between these contested values. Twelve specially commissioned essays provide the ideal resource for students and academics in information and applied ethics.

IoT - Security and Privacy Paradigm (Paperback): Souvik Pal, Vicente Garcia Diaz, Dac-Nhuong Le IoT - Security and Privacy Paradigm (Paperback)
Souvik Pal, Vicente Garcia Diaz, Dac-Nhuong Le
R1,406 Discovery Miles 14 060 Ships in 12 - 17 working days

IOT: Security and Privacy Paradigm covers the evolution of security and privacy issues in the Internet of Things (IoT). It focuses on bringing all security and privacy related technologies into one source, so that students, researchers, and practitioners can refer to this book for easy understanding of IoT security and privacy issues. This edited book uses Security Engineering and Privacy-by-Design principles to design a secure IoT ecosystem and to implement cyber-security solutions. This book takes the readers on a journey that begins with understanding the security issues in IoT-enabled technologies and how it can be applied in various aspects. It walks readers through engaging with security challenges and builds a safe infrastructure for IoT devices. The book helps readers gain an understand of security architecture through IoT and describes the state of the art of IoT countermeasures. It also differentiates security threats in IoT-enabled infrastructure from traditional ad hoc or infrastructural networks, and provides a comprehensive discussion on the security challenges and solutions in RFID, WSNs, in IoT. This book aims to provide the concepts of related technologies and novel findings of the researchers through its chapter organization. The primary audience includes specialists, researchers, graduate students, designers, experts and engineers who are focused on research and security related issues. Souvik Pal, PhD, has worked as Assistant Professor in Nalanda Institute of Technology, Bhubaneswar, and JIS College of Engineering, Kolkata (NAAC "A" Accredited College). He is the organizing Chair and Plenary Speaker of RICE Conference in Vietnam; and organizing co-convener of ICICIT, Tunisia. He has served in many conferences as chair, keynote speaker, and he also chaired international conference sessions and presented session talks internationally. His research area includes Cloud Computing, Big Data, Wireless Sensor Network (WSN), Internet of Things, and Data Analytics. Vicente Garcia-Diaz, PhD, is an Associate Professor in the Department of Computer Science at the University of Oviedo (Languages and Computer Systems area). He is also the editor of several special issues in prestigious journals such as Scientific Programming and International Journal of Interactive Multimedia and Artificial Intelligence. His research interests include eLearning, machine learning and the use of domain specific languages in different areas. Dac-Nhuong Le, PhD, is Deputy-Head of Faculty of Information Technology, and Vice-Director of Information Technology Apply and Foreign Language Training Center, Haiphong University, Vietnam. His area of research includes: evaluation computing and approximate algorithms, network communication, security and vulnerability, network performance analysis and simulation, cloud computing, IoT and image processing in biomedical. Presently, he is serving on the editorial board of several international journals and has authored nine computer science books published by Springer, Wiley, CRC Press, Lambert Publication, and Scholar Press.

Data Power - Radical Geographies of Control and Resistance (Paperback): Jim E. Thatcher, Craig M. Dalton Data Power - Radical Geographies of Control and Resistance (Paperback)
Jim E. Thatcher, Craig M. Dalton
R499 Discovery Miles 4 990 Ships in 12 - 17 working days

In recent years, popular media have inundated audiences with sensationalised headlines recounting data breaches, new forms of surveillance and other dangers of our digital age. Despite their regularity, such accounts treat each case as unprecedented and unique. This book proposes a radical rethinking of the history, present and future of our relations with the digital, spatial technologies that increasingly mediate our everyday lives. From smartphones to surveillance cameras, to navigational satellites, these new technologies offer visions of integrated, smooth and efficient societies, even as they directly conflict with the ways users experience them. Recognising the potential for both control and liberation, the authors argue against both acquiescence to and rejection of these technologies. Through intentional use of the very systems that monitor them, activists from Charlottesville to Hong Kong are subverting, resisting and repurposing geographic technologies. Using examples as varied as writings on the first telephones to the experiences of a feminist collective for migrant women in Spain, the authors present a revolution of everyday technologies. In the face of the seemingly inevitable dominance of corporate interests, these technologies allow us to create new spaces of affinity, and a new politics of change.

Securing Social Networks in Cyberspace (Hardcover): Al-Sakib Khan Pathan Securing Social Networks in Cyberspace (Hardcover)
Al-Sakib Khan Pathan
R2,554 Discovery Miles 25 540 Ships in 12 - 17 working days

This book collates the key security and privacy concerns faced by individuals and organizations who use various social networking sites. This includes activities such as connecting with friends, colleagues, and family; sharing and posting information; managing audio, video, and photos; and all other aspects of using social media sites both professionally and personally. In the setting of the Internet of Things (IoT) that can connect millions of devices at any one time, the security of such actions is paramount. Securing Social Networks in Cyberspace discusses user privacy and trust, location privacy, protecting children, managing multimedia content, cyberbullying, and much more. Current state-of-the-art defense mechanisms that can bring long-term solutions to tackling these threats are considered in the book. This book can be used as a reference for an easy understanding of complex cybersecurity issues in social networking platforms and services. It is beneficial for academicians and graduate-level researchers. General readers may find it beneficial in protecting their social-media-related profiles.

Multimodal Biometric Systems - Security and Applications (Hardcover): Rashmi Gupta, Manju Khari Multimodal Biometric Systems - Security and Applications (Hardcover)
Rashmi Gupta, Manju Khari
R3,871 Discovery Miles 38 710 Ships in 12 - 17 working days

Many governments around the world are calling for the use of biometric systems to provide crucial societal functions, consequently making it an urgent area for action. The current performance of some biometric systems in terms of their error rates, robustness, and system security may prove to be inadequate for large-scale applications to process millions of users at a high rate of throughput. This book focuses on fusion in biometric systems. It discusses the present level, the limitations, and proposed methods to improve performance. It describes the fundamental concepts, current research, and security-related issues. The book will present a computational perspective, identify challenges, and cover new problem-solving strategies, offering solved problems and case studies to help with reader comprehension and deep understanding. This book is written for researchers, practitioners, both undergraduate and post-graduate students, and those working in various engineering fields such as Systems Engineering, Computer Science, Information Technology, Electronics, and Communications.

The Center for Democracy and Technology and Internet Privacy in the U.S. - Lessons of the First Five Years (Hardcover, New):... The Center for Democracy and Technology and Internet Privacy in the U.S. - Lessons of the First Five Years (Hardcover, New)
Joyce H.-S. Li
R2,266 Discovery Miles 22 660 Ships in 12 - 17 working days

The Internet has become a necessary component of our personal and professional lives, but because the Internet has redefined the boundaries of communication, it has also put our confidential information at risk. The growing concern with online privacy has caused many Internet users to question the security of their Internet transactions. This book answers these questions through an examination of the Center for Democracy and Technology, an organization that advocates for privacy. Li's book introduces the many issues in online privacy and discusses legal ownership of personal data, specifically one's name, address, telephone number, and email. Her in-depth research of the issues confronted by the Center for Democracy and Technology over a five-year period documents its mission and demonstrates its achievements in the crusade to maintain privacy. As we find ourselves using the Internet for more and more transactions, both personal and professional, we must be aware of our privacy rights and the activities of the organizations that fight to protect them-thus, the information in Li's book makes it a necessary reference for all public and university libraries and a useful resource for courses in information technology. Internet Privacy serves as an introduction to the issues of online privacy in the United States and examines what one advocacy group is doing to protect privacy in cyberspace.

How Things Work - The Computer Science Edition (Paperback): Charles F. Bowman How Things Work - The Computer Science Edition (Paperback)
Charles F. Bowman
R1,414 Discovery Miles 14 140 Ships in 12 - 17 working days

It's axiomatic to state that people fear what they do not understand, and this is especially true when it comes to technology. However, despite their prevalence, computers remain shrouded in mystery, and many users feel apprehensive when interacting with them. Smartphones have only exacerbated the issue. Indeed, most users of these devices leverage only a small fraction of the power they hold in their hands. How Things Work: The Computer Science Edition is a roadmap for readers who want to overcome their technophobia and harness the full power of everyday technology. Beginning with the basics, the book demystifies the mysterious world of computer science, explains its fundamental concepts in simple terms, and answers the questions many users feel too intimidated to ask. By the end of the book, readers will understand how computers and smart devices function and, more important, how they can make these devices work for them. To complete the picture, the book also introduces readers to the darker side of modern technology: security and privacy concerns, identity theft, and threats from the Dark Web.

How Things Work - The Computer Science Edition (Hardcover): Charles F. Bowman How Things Work - The Computer Science Edition (Hardcover)
Charles F. Bowman
R3,751 R3,471 Discovery Miles 34 710 Save R280 (7%) Ships in 12 - 17 working days

It's axiomatic to state that people fear what they do not understand, and this is especially true when it comes to technology. However, despite their prevalence, computers remain shrouded in mystery, and many users feel apprehensive when interacting with them. Smartphones have only exacerbated the issue. Indeed, most users of these devices leverage only a small fraction of the power they hold in their hands. How Things Work: The Computer Science Edition is a roadmap for readers who want to overcome their technophobia and harness the full power of everyday technology. Beginning with the basics, the book demystifies the mysterious world of computer science, explains its fundamental concepts in simple terms, and answers the questions many users feel too intimidated to ask. By the end of the book, readers will understand how computers and smart devices function and, more important, how they can make these devices work for them. To complete the picture, the book also introduces readers to the darker side of modern technology: security and privacy concerns, identity theft, and threats from the Dark Web.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Age of AI - And Our Human Future
Henry A. Kissinger, Eric Schmidt, … Paperback R291 R262 Discovery Miles 2 620
Pandemic Surveillance - Privacy…
Margaret Hu Hardcover R2,865 Discovery Miles 28 650
Online Predators, an Internet Insurgency…
Jeffrey A. Lee Paperback R541 Discovery Miles 5 410
#Myprivacy #Myright - Protect It While…
Robin M Singh Hardcover R500 Discovery Miles 5 000
EU General Data Protection Regulation…
It Governance Privacy Team Paperback R738 Discovery Miles 7 380
Information And Communications…
Dana van der Merwe Paperback R1,257 R1,116 Discovery Miles 11 160
Identified, Tracked, and Profiled - The…
Peter Dauvergne Hardcover R2,127 Discovery Miles 21 270
Smart-Tech Society - Convenience…
Mark Whitehead, William G.A. Collier Hardcover R2,732 Discovery Miles 27 320
Containing Big Tech - How To Protect Our…
Tom Kemp Hardcover R712 R603 Discovery Miles 6 030
Research Handbook on Privacy and Data…
Gloria Gonzalez, Rosamunde van Brakel, … Hardcover R6,101 Discovery Miles 61 010

 

Partners