0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (176)
  • R250 - R500 (204)
  • R500+ (848)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

Threat Forecasting - Leveraging Big Data for Predictive Analysis (Paperback): John Pirc, David DeSanto, Iain Davison, Will... Threat Forecasting - Leveraging Big Data for Predictive Analysis (Paperback)
John Pirc, David DeSanto, Iain Davison, Will Gragido
R988 Discovery Miles 9 880 Ships in 12 - 17 working days

Drawing upon years of practical experience and using numerous examples and illustrative case studies, Threat Forecasting: Leveraging Big Data for Predictive Analysis discusses important topics, including the danger of using historic data as the basis for predicting future breaches, how to use security intelligence as a tool to develop threat forecasting techniques, and how to use threat data visualization techniques and threat simulation tools. Readers will gain valuable security insights into unstructured big data, along with tactics on how to use the data to their advantage to reduce risk.

Practical Deployment of Cisco Identity Services Engine (ISE) - Real-World Examples of AAA Deployments (Paperback): Andy... Practical Deployment of Cisco Identity Services Engine (ISE) - Real-World Examples of AAA Deployments (Paperback)
Andy Richter, Jeremy Wood
R1,510 Discovery Miles 15 100 Ships in 12 - 17 working days

With the proliferation of mobile devices and bring-your-own-devices (BYOD) within enterprise networks, the boundaries of where the network begins and ends have been blurred. Cisco Identity Services Engine (ISE) is the leading security policy management platform that unifies and automates access control to proactively enforce role-based access to enterprise networks. In Practical Deployment of Cisco Identity Services Engine (ISE), Andy Richter and Jeremy Wood share their expertise from dozens of real-world implementations of ISE and the methods they have used for optimizing ISE in a wide range of environments. ISE can be difficult, requiring a team of security and network professionals, with the knowledge of many different specialties. Practical Deployment of Cisco Identity Services Engine (ISE) shows you how to deploy ISE with the necessary integration across multiple different technologies required to make ISE work like a system. Andy Richter and Jeremy Wood explain end-to-end how to make the system work in the real world, giving you the benefit of their ISE expertise, as well as all the required ancillary technologies and configurations to make ISE work.

Data Privacy - Principles and Practice (Hardcover): Nataraj Venkataramanan, Ashwin Shriram Data Privacy - Principles and Practice (Hardcover)
Nataraj Venkataramanan, Ashwin Shriram
R3,625 Discovery Miles 36 250 Ships in 12 - 17 working days

The book covers data privacy in depth with respect to data mining, test data management, synthetic data generation etc. It formalizes principles of data privacy that are essential for good anonymization design based on the data format and discipline. The principles outline best practices and reflect on the conflicting relationship between privacy and utility. From a practice standpoint, it provides practitioners and researchers with a definitive guide to approach anonymization of various data formats, including multidimensional, longitudinal, time-series, transaction, and graph data. In addition to helping CIOs protect confidential data, it also offers a guideline as to how this can be implemented for a wide range of data at the enterprise level.

Radical Secrecy - The Ends of Transparency in Datafied America (Paperback): Clare Birchall Radical Secrecy - The Ends of Transparency in Datafied America (Paperback)
Clare Birchall
R637 Discovery Miles 6 370 Ships in 12 - 17 working days

Reimagining transparency and secrecy in the era of digital data When total data surveillance delimits agency and revelations of political wrongdoing fail to have consequences, is transparency the social panacea liberal democracies purport it to be? This book sets forth the provocative argument that progressive social goals would be better served by a radical form of secrecy, at least while state and corporate forces hold an asymmetrical advantage over the less powerful in data control. Clare Birchall asks: How might transparency actually serve agendas that are far from transparent? Can we imagine a secrecy that could act in the service of, rather than against, a progressive politics? To move beyond atomizing calls for privacy and to interrupt the perennial tension between state security and the public's right to know, Birchall adapts Edouard Glissant's thinking to propose a digital "right to opacity." As a crucial element of radical secrecy, she argues, this would eventually give rise to a "postsecret" society, offering an understanding and experience of the political that is free from the false choice between secrecy and transparency. She grounds her arresting story in case studies including the varied presidential styles of George W. Bush, Barack Obama, and Donald Trump; the Snowden revelations; conspiracy theories espoused or endorsed by Trump; WikiLeaks and guerrilla transparency; and the opening of the state through data portals. Postsecrecy is the necessary condition for imagining, finally, an alternative vision of "the good," of equality, as neither shaped by neoliberal incarnations of transparency nor undermined by secret state surveillance. Not least, postsecrecy reimagines collective resistance in the era of digital data.

Cinderella's Stick - A Fairy Tale for Digital Preservation (Hardcover, 1st ed. 2018): Yannis Tzitzikas, Yannis Marketakis Cinderella's Stick - A Fairy Tale for Digital Preservation (Hardcover, 1st ed. 2018)
Yannis Tzitzikas, Yannis Marketakis
R1,626 R994 Discovery Miles 9 940 Save R632 (39%) Ships in 9 - 15 working days

This book explains the main problems related to digital preservation using examples based on a modern version of the well-known Cinderella fairy tale. Digital preservation is the endeavor to protect digital material against loss, corruption, hardware/software technology changes, and changes in the knowledge of the community. he structure of the book is modular, with each chapter consisting of two parts: the episode and the technical background. The episodes narrate the story in chronological order, exactly as in a fairy tale. In addition to the story itself, each episode is related to one or more digital preservation problems, which are discussed in the technical background section of the chapter. To reveal a more general and abstract formulation of these problems, the notion of pattern is used. Each pattern has a name, a summary of the problem, a narrative describing an attempt to solve the problem, an explanation of what could have been done to avoid or alleviate this problem, some lessons learned, and lastly, links to related patterns discussed in other chapters. The book is intended for anyone wanting to understand the problems related to digital preservation, even if they lack the technical background. It explains the technical details at an introductory level, provides references to the main approaches (or solutions) currently available for tackling related problems, and is rounded out by questions and exercises appropriate for computer engineers and scientists. In addition, the book's website, maintained by the authors, presents the contents of Cinderella's "real USB stick," and includes links to various tools and updates.

The Handbook of Privacy Studies - An Interdisciplinary Introduction (Paperback, 0): Bart Sloot, Aviva Groot The Handbook of Privacy Studies - An Interdisciplinary Introduction (Paperback, 0)
Bart Sloot, Aviva Groot
R1,000 Discovery Miles 10 000 Ships in 12 - 17 working days

The Handbook of Privacy Studies is the first book in the world that brings together several disciplinary perspectives on privacy, such as the legal, ethical, medical, informatics and anthropological perspective. Privacy is in the news almost every day: mass surveillance by intelligence agencies, the use of social media data for commercial profit and political microtargeting, password hacks and identity theft, new data protection regimes, questionable reuse of medical data, and concerns about how algorithms shape the way we think and decide. This book offers interdisciplinary background information about these developments and explains how to understand and properly evaluate them. The book is set up for use in interdisciplinary educational programmes. Each chapter provides a structured analysis of the role of privacy within that discipline, its characteristics, themes and debates, as well as current challenges. Disciplinary approaches are presented in such a way that students and researchers from every scientific background can follow the argumentation and enrich their own understanding of privacy issues.

Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data - 13th IFIP WG 9.2,... Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data - 13th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Vienna, Austria, August 20-24, 2018, Revised Selected Papers (Hardcover, 1st ed. 2019)
Eleni Kosta, Jo Pierson, Daniel Slamanig, Simone Fischer-Hubner, Stephan Krenn
R2,061 R1,240 Discovery Miles 12 400 Save R821 (40%) Ships in 9 - 15 working days

This book contains selected papers presented at the 13th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held in Vienna, Austria, in August 2018. The 10 full papers included in this volume were carefully reviewed and selected from 27 submissions. Also included are reviewed papers summarizing the results of workshops and tutorials that were held at the Summer School as well as papers contributed by several of the invited speakers. The papers combine interdisciplinary approaches to bring together a host of perspectives: technical, legal, regulatory, socio-economic, social, societal, political, ethical, anthropological, philosophical, historical, and psychological.

Data Privacy and GDPR Handbook (Hardcover): S. Sharma Data Privacy and GDPR Handbook (Hardcover)
S. Sharma
R1,397 Discovery Miles 13 970 Ships in 12 - 17 working days

The definitive guide for ensuring data privacy and GDPR compliance Privacy regulation is increasingly rigorous around the world and has become a serious concern for senior management of companies regardless of industry, size, scope, and geographic area. The Global Data Protection Regulation (GDPR) imposes complex, elaborate, and stringent requirements for any organization or individuals conducting business in the European Union (EU) and the European Economic Area (EEA)--while also addressing the export of personal data outside of the EU and EEA. This recently-enacted law allows the imposition of fines of up to 5% of global revenue for privacy and data protection violations. Despite the massive potential for steep fines and regulatory penalties, there is a distressing lack of awareness of the GDPR within the business community. A recent survey conducted in the UK suggests that only 40% of firms are even aware of the new law and their responsibilities to maintain compliance. The Data Privacy and GDPR Handbook helps organizations strictly adhere to data privacy laws in the EU, the USA, and governments around the world. This authoritative and comprehensive guide includes the history and foundation of data privacy, the framework for ensuring data privacy across major global jurisdictions, a detailed framework for complying with the GDPR, and perspectives on the future of data collection and privacy practices. Comply with the latest data privacy regulations in the EU, EEA, US, and others Avoid hefty fines, damage to your reputation, and losing your customers Keep pace with the latest privacy policies, guidelines, and legislation Understand the framework necessary to ensure data privacy today and gain insights on future privacy practices The Data Privacy and GDPR Handbook is an indispensable resource for Chief Data Officers, Chief Technology Officers, legal counsel, C-Level Executives, regulators and legislators, data privacy consultants, compliance officers, and audit managers.

Of Privacy and Power - The Transatlantic Struggle over Freedom and Security (Hardcover): Henry Farrell, Abraham L. Newman Of Privacy and Power - The Transatlantic Struggle over Freedom and Security (Hardcover)
Henry Farrell, Abraham L. Newman
R721 Discovery Miles 7 210 Ships in 7 - 13 working days

How disputes over privacy and security have shaped the relationship between the European Union and the United States and what this means for the future We live in an interconnected world, where security problems like terrorism are spilling across borders, and globalized data networks and e-commerce platforms are reshaping the world economy. This means that states' jurisdictions and rule systems clash. How have they negotiated their differences over freedom and security? Of Privacy and Power investigates how the European Union and United States, the two major regulatory systems in world politics, have regulated privacy and security, and how their agreements and disputes have reshaped the transatlantic relationship. The transatlantic struggle over freedom and security has usually been depicted as a clash between a peace-loving European Union and a belligerent United States. Henry Farrell and Abraham Newman demonstrate how this misses the point. The real dispute was between two transnational coalitions-one favoring security, the other liberty-whose struggles have reshaped the politics of surveillance, e-commerce, and privacy rights. Looking at three large security debates in the period since 9/11, involving Passenger Name Record data, the SWIFT financial messaging controversy, and Edward Snowden's revelations, the authors examine how the powers of border-spanning coalitions have waxed and waned. Globalization has enabled new strategies of action, which security agencies, interior ministries, privacy NGOs, bureaucrats, and other actors exploit as circumstances dictate. The first serious study of how the politics of surveillance has been transformed, Of Privacy and Power offers a fresh view of the role of information and power in a world of economic interdependence.

Computers at Risk - Safe Computing in the Information Age (Paperback): System Security Study Committee, Commission on Physical... Computers at Risk - Safe Computing in the Information Age (Paperback)
System Security Study Committee, Commission on Physical Sciences, Mathematics, and Applications, National Research Council, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences
R2,124 Discovery Miles 21 240 Ships in 12 - 17 working days

Computers at Risk presents a comprehensive agenda for developing nationwide policies and practices for computer security. Specific recommendations are provided for industry and for government agencies engaged in computer security activities. The volume also outlines problems and opportunities in computer security research, recommends ways to improve the research infrastructure, and suggests topics for investigators. The book explores the diversity of the field, the need to engineer countermeasures based on speculation of what experts think computer attackers may do next, why the technology community has failed to respond to the need for enhanced security systems, how innovators could be encouraged to bring more options to the marketplace, and balancing the importance of security against the right of privacy.

Cyber Storm (Hardcover): Leading Cybersecurity Experts Cyber Storm (Hardcover)
Leading Cybersecurity Experts
R683 Discovery Miles 6 830 Ships in 10 - 15 working days
Hands-On Ethical Hacking and Network Defense (Paperback, 3rd edition): Nicholas Antill, Michael Simpson Hands-On Ethical Hacking and Network Defense (Paperback, 3rd edition)
Nicholas Antill, Michael Simpson
R1,289 R1,151 Discovery Miles 11 510 Save R138 (11%) Ships in 10 - 15 working days

Cyber-terrorism and corporate espionage are increasingly common and devastating threats, making trained network security professionals more important than ever. This timely text helps you gain the knowledge and skills to protect networks using the tools and techniques of an ethical hacker. The authors begin by exploring the concept of ethical hacking and its practitioners, explaining their importance in protecting corporate and government data from cyber attacks. The text then provides an in-depth guide to performing security testing against computer networks, covering current tools and penetration testing methodologies. Updated for today's cyber security environment, the Third Edition of this trusted text features new computer security resources, coverage of emerging vulnerabilities and innovative methods to protect networks, a new discussion of mobile security, and information on current federal and state computer crime laws, including penalties for illegal computer hacking.

Privacy Preservation in IoT: Machine Learning Approaches - A Comprehensive Survey and Use Cases (Paperback, 1st ed. 2022):... Privacy Preservation in IoT: Machine Learning Approaches - A Comprehensive Survey and Use Cases (Paperback, 1st ed. 2022)
Youyang Qu, Longxiang Gao, Shui Yu, Yong Xiang
R1,438 Discovery Miles 14 380 Ships in 12 - 17 working days

This book aims to sort out the clear logic of the development of machine learning-driven privacy preservation in IoTs, including the advantages and disadvantages, as well as the future directions in this under-explored domain. In big data era, an increasingly massive volume of data is generated and transmitted in Internet of Things (IoTs), which poses great threats to privacy protection. Motivated by this, an emerging research topic, machine learning-driven privacy preservation, is fast booming to address various and diverse demands of IoTs. However, there is no existing literature discussion on this topic in a systematically manner. The issues of existing privacy protection methods (differential privacy, clustering, anonymity, etc.) for IoTs, such as low data utility, high communication overload, and unbalanced trade-off, are identified to the necessity of machine learning-driven privacy preservation. Besides, the leading and emerging attacks pose further threats to privacy protection in this scenario. To mitigate the negative impact, machine learning-driven privacy preservation methods for IoTs are discussed in detail on both the advantages and flaws, which is followed by potentially promising research directions. Readers may trace timely contributions on machine learning-driven privacy preservation in IoTs. The advances cover different applications, such as cyber-physical systems, fog computing, and location-based services. This book will be of interest to forthcoming scientists, policymakers, researchers, and postgraduates.

Port Cybersecurity - Securing Critical Information Infrastructures and Supply Chains (Paperback): Nineta Polemi Port Cybersecurity - Securing Critical Information Infrastructures and Supply Chains (Paperback)
Nineta Polemi
R2,757 R2,488 Discovery Miles 24 880 Save R269 (10%) Ships in 12 - 17 working days

Port Cybersecurity: Securing Critical Information Infrastructures and Supply Chains examines a paradigm shift in the way ports assess cyber risks and vulnerabilities, as well as relevant risk management methodologies, by focusing on initiatives and efforts that attempt to deal with the risks and vulnerabilities of port Critical Information Infrastructures (CII) ecosystems. Modern commercial shipping ports are highly dependent on the operation of complex, dynamic ICT systems and ICT-based maritime supply chains, making these central points in the maritime supply chain vulnerable to cybersecurity threats.

Recommender Systems in Fashion and Retail - Proceedings of the Third Workshop at the Recommender Systems Conference (2021)... Recommender Systems in Fashion and Retail - Proceedings of the Third Workshop at the Recommender Systems Conference (2021) (Hardcover, 1st ed. 2022)
Nima Dokoohaki, Shatha Jaradat, Humberto Jesus Corona Pampin, Reza Shirvany
R3,083 Discovery Miles 30 830 Ships in 12 - 17 working days

This book includes the proceedings of the third workshop on recommender systems in fashion and retail (2021), and it aims to present a state-of-the-art view of the advancements within the field of recommendation systems with focused application to e-commerce, retail, and fashion by presenting readers with chapters covering contributions from academic as well as industrial researchers active within this emerging new field. Recommender systems are often used to solve different complex problems in this scenario, such as product recommendations, size and fit recommendations, and social media-influenced recommendations (outfits worn by influencers).

Snowflake Access Control - Mastering the Features for Data Privacy and Regulatory Compliance (Paperback, 1st ed.): Jessica... Snowflake Access Control - Mastering the Features for Data Privacy and Regulatory Compliance (Paperback, 1st ed.)
Jessica Megan Larson
R1,487 R1,160 Discovery Miles 11 600 Save R327 (22%) Ships in 10 - 15 working days

Understand the different access control paradigms available in the Snowflake Data Cloud and learn how to implement access control in support of data privacy and compliance with regulations such as GDPR, APPI, CCPA, and SOX. The information in this book will help you and your organization adhere to privacy requirements that are important to consumers and becoming codified in the law. You will learn to protect your valuable data from those who should not see it while making it accessible to the analysts whom you trust to mine the data and create business value for your organization. Snowflake is increasingly the choice for companies looking to move to a data warehousing solution, and security is an increasing concern due to recent high-profile attacks. This book shows how to use Snowflake's wide range of features that support access control, making it easier to protect data access from the data origination point all the way to the presentation and visualization layer. Reading this book helps you embrace the benefits of securing data and provide valuable support for data analysis while also protecting the rights and privacy of the consumers and customers with whom you do business. What You Will Learn Identify data that is sensitive and should be restricted Implement access control in the Snowflake Data Cloud Choose the right access control paradigm for your organization Comply with CCPA, GDPR, SOX, APPI, and similar privacy regulations Take advantage of recognized best practices for role-based access control Prevent upstream and downstream services from subverting your access control Benefit from access control features unique to the Snowflake Data Cloud Who This Book Is For Data engineers, database administrators, and engineering managers who want to improve their access control model; those whose access control model is not meeting privacy and regulatory requirements; those new to Snowflake who want to benefit from access control features that are unique to the platform; technology leaders in organizations that have just gone public and are now required to conform to SOX reporting requirements

Quantum Algorithms for Cryptographically Significant Boolean Functions - An IBMQ Experience (Paperback, 1st ed. 2021):... Quantum Algorithms for Cryptographically Significant Boolean Functions - An IBMQ Experience (Paperback, 1st ed. 2021)
Tharrmashastha SAPV, Debajyoti Bera, Arpita Maitra, Subhamoy Maitra
R1,574 Discovery Miles 15 740 Ships in 12 - 17 working days

This book is a timely report of the state-of-the-art analytical techniques in the domain of quantum algorithms related to Boolean functions. It bridges the gap between recent developments in the area and the hands-on analysis of the spectral properties of Boolean functions from a cryptologic viewpoint. Topics covered in the book include Qubit, Deutsch-Jozsa and Walsh spectrum, Grover's algorithm, Simon's algorithm and autocorrelation spectrum. The book aims at encouraging readers to design and implement practical algorithms related to Boolean functions. Apart from combinatorial techniques, this book considers implementing related programs in a quantum computer. Researchers, practitioners and educators will find this book valuable.

Cybersecurity and Applied Mathematics (Paperback): Leigh Metcalf, William Casey Cybersecurity and Applied Mathematics (Paperback)
Leigh Metcalf, William Casey
R1,396 Discovery Miles 13 960 Ships in 12 - 17 working days

Cybersecurity and Applied Mathematics explores the mathematical concepts necessary for effective cybersecurity research and practice, taking an applied approach for practitioners and students entering the field. This book covers methods of statistical exploratory data analysis and visualization as a type of model for driving decisions, also discussing key topics, such as graph theory, topological complexes, and persistent homology. Defending the Internet is a complex effort, but applying the right techniques from mathematics can make this task more manageable. This book is essential reading for creating useful and replicable methods for analyzing data.

Cyber Crime and Cyber Terrorism Investigator's Handbook (Paperback): Babak Akhgar, Andrew Staniforth, Francesca Bosco Cyber Crime and Cyber Terrorism Investigator's Handbook (Paperback)
Babak Akhgar, Andrew Staniforth, Francesca Bosco
R1,131 Discovery Miles 11 310 Ships in 12 - 17 working days

Cyber Crime and Cyber Terrorism Investigator's Handbook is a vital tool in the arsenal of today's computer programmers, students, and investigators. As computer networks become ubiquitous throughout the world, cyber crime, cyber terrorism, and cyber war have become some of the most concerning topics in today's security landscape. News stories about Stuxnet and PRISM have brought these activities into the public eye, and serve to show just how effective, controversial, and worrying these tactics can become. Cyber Crime and Cyber Terrorism Investigator's Handbook describes and analyzes many of the motivations, tools, and tactics behind cyber attacks and the defenses against them. With this book, you will learn about the technological and logistic framework of cyber crime, as well as the social and legal backgrounds of its prosecution and investigation. Whether you are a law enforcement professional, an IT specialist, a researcher, or a student, you will find valuable insight into the world of cyber crime and cyber warfare. Edited by experts in computer security, cyber investigations, and counter-terrorism, and with contributions from computer researchers, legal experts, and law enforcement professionals, Cyber Crime and Cyber Terrorism Investigator's Handbook will serve as your best reference to the modern world of cyber crime.

Google Hacking for Penetration Testers (Paperback, 3rd edition): Johnny Long, Bill Gardner, Justin Brown Google Hacking for Penetration Testers (Paperback, 3rd edition)
Johnny Long, Bill Gardner, Justin Brown
R1,300 Discovery Miles 13 000 Ships in 12 - 17 working days

Google is the most popular search engine ever created, but Google's search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web, including social security numbers, credit card numbers, trade secrets, and federally classified documents. Google Hacking for Penetration Testers, Third Edition, shows you how security professionals and system administratord manipulate Google to find this sensitive information and "self-police" their own organizations. You will learn how Google Maps and Google Earth provide pinpoint military accuracy, see how bad guys can manipulate Google to create super worms, and see how they can "mash up" Google with Facebook, LinkedIn, and more for passive reconnaissance. This third edition includes completely updated content throughout and all new hacks such as Google scripting and using Google hacking with other search engines and APIs. Noted author Johnny Long, founder of Hackers for Charity, gives you all the tools you need to conduct the ultimate open source reconnaissance and penetration testing.

Freedom to Think - The Long Struggle to Liberate Our Minds (Paperback, Export/Airside): Susie Alegre Freedom to Think - The Long Struggle to Liberate Our Minds (Paperback, Export/Airside)
Susie Alegre
R381 Discovery Miles 3 810 Ships in 12 - 17 working days

BOOKS TO LOOK OUT FOR IN 2022, NEW STATESMAN & CITY AM Chosen as one of the Financial Time's Best Summer Books of 2022 Longlisted for the Moore Prize for Human Rights Writing 'Compelling, powerful and necessary.' Shoshana Zuboff, author of The Age of Surveillance Capitalism 'Fascinating' Guardian Without a moment's pause, we share our most intimate thoughts with trillion-dollar tech companies. Their algorithms categorize us and jump to troubling conclusions about who we are. They also shape our everyday thoughts, choices and actions - from who we date to whether we vote. But this is just the latest front in an age-old struggle. Part history and part manifesto, Freedom to Think explores how the powerful have always sought to influence how we think and what we buy. Connecting the dots from Galileo to Alexa, human rights lawyer Susie Alegre charts the history and fragility of our most important human right: freedom of thought. Filled with shocking case-studies across politics, criminal justice, and everyday life, this ground-breaking book shows how our mental freedom is under threat like never before. Bold and radical, Alegre argues that only by recasting our human rights for the digital age can we safeguard our future.

Cybersecurity for Beginners (Paperback, 2nd Revised edition): Raef Meeuwisse Cybersecurity for Beginners (Paperback, 2nd Revised edition)
Raef Meeuwisse
R512 Discovery Miles 5 120 Ships in 9 - 15 working days
Exploding Data - Reclaiming Our Cyber Security in the Digital Age (Hardcover, Main): Michael Chertoff Exploding Data - Reclaiming Our Cyber Security in the Digital Age (Hardcover, Main)
Michael Chertoff 1
R621 R503 Discovery Miles 5 030 Save R118 (19%) Ships in 12 - 17 working days

A powerful argument for new laws and policies regarding cyber-security, from the former US Secretary of Homeland Security. The most dangerous threat we-individually and as a society-face today is no longer military, but rather the increasingly pervasive exposure of our personal information; nothing undermines our freedom more than losing control of information about ourselves. And yet, as daily events underscore, we are ever more vulnerable to cyber-attack. In this bracing book, Michael Chertoff makes clear that our laws and policies surrounding the protection of personal information, written for an earlier time, need to be completely overhauled in the Internet era. On the one hand, the collection of data-more widespread by business than by government, and impossible to stop-should be facilitated as an ultimate protection for society. On the other, standards under which information can be inspected, analysed or used must be significantly tightened. In offering his compelling call for action, Chertoff argues that what is at stake is not only the simple loss of privacy, which is almost impossible to protect, but also that of individual autonomy-the ability to make personal choices free of manipulation or coercion. Offering colourful stories over many decades that illuminate the three periods of data gathering we have experienced, Chertoff explains the complex legalities surrounding issues of data collection and dissemination today and charts a forceful new strategy that balances the needs of government, business and individuals alike.

Research Anthology on Combating Cyber-Aggression and Online Negativity, VOL 1 (Hardcover): Information R Management Association Research Anthology on Combating Cyber-Aggression and Online Negativity, VOL 1 (Hardcover)
Information R Management Association
R13,036 Discovery Miles 130 360 Ships in 10 - 15 working days
Research Anthology on Combating Cyber-Aggression and Online Negativity, VOL 2 (Hardcover): Information R Management Association Research Anthology on Combating Cyber-Aggression and Online Negativity, VOL 2 (Hardcover)
Information R Management Association
R13,041 Discovery Miles 130 410 Ships in 10 - 15 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Research Handbook on Privacy and Data…
Gloria Gonzalez, Rosamunde van Brakel, … Hardcover R6,381 Discovery Miles 63 810
Broken Code - Inside Facebook And The…
Jeff Horwitz Paperback R420 R328 Discovery Miles 3 280
Social Engineering - The Science of…
C Hadnagy Paperback R830 R660 Discovery Miles 6 600
Identified, Tracked, and Profiled - The…
Peter Dauvergne Hardcover R2,222 Discovery Miles 22 220
Smart-Tech Society - Convenience…
Mark Whitehead, William G.A. Collier Hardcover R2,855 Discovery Miles 28 550
Pegasus - The Story Of The World's Most…
Laurent Richard, Sandrine Rigaud Paperback R380 R297 Discovery Miles 2 970
Pandemic Surveillance - Privacy…
Margaret Hu Hardcover R2,995 Discovery Miles 29 950
Cybersecurity For Dummies, 2nd Edition
J. Steinberg Paperback R779 R560 Discovery Miles 5 600
The Age of AI - And Our Human Future
Henry A. Kissinger, Eric Schmidt, … Paperback R241 Discovery Miles 2 410
The Little Black Book of Data and…
Kyle Taylor Paperback R271 Discovery Miles 2 710

 

Partners