0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (176)
  • R250 - R500 (204)
  • R500+ (849)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

Research Anthology on Combating Cyber-Aggression and Online Negativity, VOL 3 (Hardcover): Information R Management Association Research Anthology on Combating Cyber-Aggression and Online Negativity, VOL 3 (Hardcover)
Information R Management Association
R13,049 Discovery Miles 130 490 Ships in 10 - 15 working days
Scam! - How to Avoid the Scams That Cost Victims Billions of Dollars Every Year (Paperback): Hope Oje Scam! - How to Avoid the Scams That Cost Victims Billions of Dollars Every Year (Paperback)
Hope Oje
R523 R434 Discovery Miles 4 340 Save R89 (17%) Ships in 10 - 15 working days
Cybersecurity Now (Paperback): George McCracken, Amir Sachs, Fred Hughes Cybersecurity Now (Paperback)
George McCracken, Amir Sachs, Fred Hughes
R386 Discovery Miles 3 860 Ships in 10 - 15 working days
Privacy - Past, Present, and Future (Hardcover): Leslie N. Gruis Privacy - Past, Present, and Future (Hardcover)
Leslie N. Gruis
R3,855 Discovery Miles 38 550 Ships in 10 - 15 working days

Top analyst Leslie Gruis's timely new book argues that privacy is an individual right and democratic value worth preserving, even in a cyberized world. Since the time of the printing press, technology has played a key role in the evolution of individual rights and helped privacy emerge as a formal legal concept. All governments exercise extraordinary powers during national security crises. In the United States, many imminent threats during the twentieth century induced heightened government intrusion into the privacy of Americans. The Privacy Act of 1974 and the Foreign Intelligence Surveillance Act (FISA, 1978) reversed that trend. Other laws protect the private information of individuals held in specific sectors of the commercial world. Risk management practices were extended to computer networks, and standards for information system security began to emerge. The National Institute of Standards and Technology (NIST) incorporated many such standards into its Cybersecurity Framework, and is currently developing a Privacy Framework. These standards all contribute to a patchwork of privacy protection which, so far, falls far short of what the U.S. constitutional promise offers and what our public badly needs. Greater privacy protections for U.S. citizens will come as long as Americans remember how democracy and privacy sustain one another, and demonstrate their commitment to them.

Ethical Hacking - The Complete Beginner's Guide to Learning Ethical Hacking (A Comprehensive Beginner's Guide to... Ethical Hacking - The Complete Beginner's Guide to Learning Ethical Hacking (A Comprehensive Beginner's Guide to Learn and Master Ethical Hacking) (Paperback)
Alice Ybarr
R500 R408 Discovery Miles 4 080 Save R92 (18%) Ships in 10 - 15 working days
Medical Information Processing and Security - Techniques and applications (Hardcover): Amit Kumar Singh, Huiyu Zhou Medical Information Processing and Security - Techniques and applications (Hardcover)
Amit Kumar Singh, Huiyu Zhou
R3,588 R3,096 Discovery Miles 30 960 Save R492 (14%) Ships in 10 - 15 working days

Smart healthcare systems, made up of advanced wearable devices, internet of things (IoT) technologies and mobile internet connectivity, allow significant medical information to be easily and regularly transmitted over public networks. Personal patient information and clinical records are stored on hospitals and healthcare centres and can be accessed remotely by healthcare workers. Due to the widespread increase in the sheer volume of medical data being collected and created all the time, it has never been more important to ensure that such information is collected, stored and processed in a reliable and secure manner. This edited book covers the recent trends in the field of medical information processing, including prediction of complications using machine learning and trends in visualization and image analysis. Further chapters focus on information security and privacy solutions for smart healthcare applications, including encryption of medical information, privacy in smart IoT environments, medical image watermarking and secure communication systems. Medical Information Processing and Security: Techniques and applications can be used as a reference book for practicing engineers, researchers and scientists. It will also be useful for senior undergraduate and graduate students, and practitioners from government and industry as well as healthcare technology professionals working on state-of-the-art security solutions for smart healthcare applications.

Research Methods for Cyber Security (Paperback): Thomas Edgar, David Manz Research Methods for Cyber Security (Paperback)
Thomas Edgar, David Manz
R1,940 Discovery Miles 19 400 Ships in 12 - 17 working days

Research Methods for Cyber Security teaches scientific methods for generating impactful knowledge, validating theories, and adding critical rigor to the cyber security field. This book shows how to develop a research plan, beginning by starting research with a question, then offers an introduction to the broad range of useful research methods for cyber security research: observational, mathematical, experimental, and applied. Each research method chapter concludes with recommended outlines and suggested templates for submission to peer reviewed venues. This book concludes with information on cross-cutting issues within cyber security research. Cyber security research contends with numerous unique issues, such as an extremely fast environment evolution, adversarial behavior, and the merging of natural and social science phenomena. Research Methods for Cyber Security addresses these concerns and much more by teaching readers not only the process of science in the context of cyber security research, but providing assistance in execution of research as well.

Federal Cloud Computing - The Definitive Guide for Cloud Service Providers (Paperback, 2nd edition): Matthew Metheny Federal Cloud Computing - The Definitive Guide for Cloud Service Providers (Paperback, 2nd edition)
Matthew Metheny
R1,578 Discovery Miles 15 780 Ships in 12 - 17 working days

Federal Cloud Computing: The Definitive Guide for Cloud Service Providers, Second Edition offers an in-depth look at topics surrounding federal cloud computing within the federal government, including the Federal Cloud Computing Strategy, Cloud Computing Standards, Security and Privacy, and Security Automation. You will learn the basics of the NIST risk management framework (RMF) with a specific focus on cloud computing environments, all aspects of the Federal Risk and Authorization Management Program (FedRAMP) process, and steps for cost-effectively implementing the Assessment and Authorization (A&A) process, as well as strategies for implementing Continuous Monitoring, enabling the Cloud Service Provider to address the FedRAMP requirement on an ongoing basis. This updated edition will cover the latest changes to FedRAMP program, including clarifying guidance on the paths for Cloud Service Providers to achieve FedRAMP compliance, an expanded discussion of the new FedRAMP Security Control, which is based on the NIST SP 800-53 Revision 4, and maintaining FedRAMP compliance through Continuous Monitoring. Further, a new chapter has been added on the FedRAMP requirements for Vulnerability Scanning and Penetration Testing.

Building a Practical Information Security Program (Paperback): Jason Andress, Mark Leary Building a Practical Information Security Program (Paperback)
Jason Andress, Mark Leary
R1,656 R1,406 Discovery Miles 14 060 Save R250 (15%) Ships in 12 - 17 working days

Building a Practical Information Security Program provides users with a strategic view on how to build an information security program that aligns with business objectives. The information provided enables both executive management and IT managers not only to validate existing security programs, but also to build new business-driven security programs. In addition, the subject matter supports aspiring security engineers to forge a career path to successfully manage a security program, thereby adding value and reducing risk to the business. Readers learn how to translate technical challenges into business requirements, understand when to "go big or go home," explore in-depth defense strategies, and review tactics on when to absorb risks. This book explains how to properly plan and implement an infosec program based on business strategy and results.

The Basics of Cyber Safety - Computer and Mobile Device Safety Made Easy (Paperback): John Sammons, Michael Cross The Basics of Cyber Safety - Computer and Mobile Device Safety Made Easy (Paperback)
John Sammons, Michael Cross
R766 Discovery Miles 7 660 Ships in 12 - 17 working days

The Basics of Cyber Safety: Computer and Mobile Device Safety Made Easy presents modern tactics on how to secure computer and mobile devices, including what behaviors are safe while surfing, searching, and interacting with others in the virtual world. The book's author, Professor John Sammons, who teaches information security at Marshall University, introduces readers to the basic concepts of protecting their computer, mobile devices, and data during a time that is described as the most connected in history. This timely resource provides useful information for readers who know very little about the basic principles of keeping the devices they are connected to-or themselves-secure while online. In addition, the text discusses, in a non-technical way, the cost of connectedness to your privacy, and what you can do to it, including how to avoid all kinds of viruses, malware, cybercrime, and identity theft. Final sections provide the latest information on safe computing in the workplace and at school, and give parents steps they can take to keep young kids and teens safe online.

Cyber Guerilla (Paperback): Jelle Van Haaster, Rickey Gevers, Martijn Sprengers Cyber Guerilla (Paperback)
Jelle Van Haaster, Rickey Gevers, Martijn Sprengers
R1,182 R981 Discovery Miles 9 810 Save R201 (17%) Ships in 12 - 17 working days

Much as Che Guevara's book Guerilla Warfare helped define and delineate a new type of warfare in the wake of the Cuban revolution in 1961, Cyber Guerilla will help define the new types of threats and fighters now appearing in the digital landscape. Cyber Guerilla provides valuable insight for infosec professionals and consultants, as well as government, military, and corporate IT strategists who must defend against myriad threats from non-state actors. The authors take readers inside the operations and tactics of cyber guerillas, who are changing the dynamics of cyber warfare and information security through their unconventional strategies and threats. This book draws lessons from the authors' own experiences but also from illustrative hacker groups such as Anonymous, LulzSec and Rebellious Rose.

Implementing Digital Forensic Readiness - From Reactive to Proactive Process (Paperback): Jason Sachowski Implementing Digital Forensic Readiness - From Reactive to Proactive Process (Paperback)
Jason Sachowski
R1,321 Discovery Miles 13 210 Ships in 12 - 17 working days

Implementing Digital Forensic Readiness: From Reactive to Proactive Process shows information security and digital forensic professionals how to increase operational efficiencies by implementing a pro-active approach to digital forensics throughout their organization. It demonstrates how digital forensics aligns strategically within an organization's business operations and information security's program. This book illustrates how the proper collection, preservation, and presentation of digital evidence is essential for reducing potential business impact as a result of digital crimes, disputes, and incidents. It also explains how every stage in the digital evidence lifecycle impacts the integrity of data, and how to properly manage digital evidence throughout the entire investigation. Using a digital forensic readiness approach and preparedness as a business goal, the administrative, technical, and physical elements included throughout this book will enhance the relevance and credibility of digital evidence. Learn how to document the available systems and logs as potential digital evidence sources, how gap analysis can be used where digital evidence is not sufficient, and the importance of monitoring data sources in a timely manner. This book offers standard operating procedures to document how an evidence-based presentation should be made, featuring legal resources for reviewing digital evidence.

Of Privacy and Power - The Transatlantic Struggle over Freedom and Security (Paperback): Henry Farrell, Abraham L. Newman Of Privacy and Power - The Transatlantic Struggle over Freedom and Security (Paperback)
Henry Farrell, Abraham L. Newman
R498 Discovery Miles 4 980 Ships in 12 - 17 working days

How disputes over privacy and security have shaped the relationship between the European Union and the United States and what this means for the future We live in an interconnected world, where security problems like terrorism are spilling across borders, and globalized data networks and e-commerce platforms are reshaping the world economy. This means that states' jurisdictions and rule systems clash. How have they negotiated their differences over freedom and security? Of Privacy and Power investigates how the European Union and United States, the two major regulatory systems in world politics, have regulated privacy and security, and how their agreements and disputes have reshaped the transatlantic relationship. The transatlantic struggle over freedom and security has usually been depicted as a clash between a peace-loving European Union and a belligerent United States. Henry Farrell and Abraham Newman demonstrate how this misses the point. The real dispute was between two transnational coalitions-one favoring security, the other liberty-whose struggles have reshaped the politics of surveillance, e-commerce, and privacy rights. Looking at three large security debates in the period since 9/11, involving Passenger Name Record data, the SWIFT financial messaging controversy, and Edward Snowden's revelations, the authors examine how the powers of border-spanning coalitions have waxed and waned. Globalization has enabled new strategies of action, which security agencies, interior ministries, privacy NGOs, bureaucrats, and other actors exploit as circumstances dictate. The first serious study of how the politics of surveillance has been transformed, Of Privacy and Power offers a fresh view of the role of information and power in a world of economic interdependence.

Digital Forensics - Threatscape and Best Practices (Paperback): John Sammons Digital Forensics - Threatscape and Best Practices (Paperback)
John Sammons
R1,036 Discovery Miles 10 360 Ships in 12 - 17 working days

Digital Forensics: Threatscape and Best Practices surveys the problems and challenges confronting digital forensic professionals today, including massive data sets and everchanging technology. This book provides a coherent overview of the threatscape in a broad range of topics, providing practitioners and students alike with a comprehensive, coherent overview of the threat landscape and what can be done to manage and prepare for it. Digital Forensics: Threatscape and Best Practices delivers you with incisive analysis and best practices from a panel of expert authors, led by John Sammons, bestselling author of The Basics of Digital Forensics.

Data Protection Officer (Paperback): Filip Johnssen, Sofia Edvardsen Data Protection Officer (Paperback)
Filip Johnssen, Sofia Edvardsen; Technical editing by John Potts
R616 Discovery Miles 6 160 Ships in 9 - 15 working days

This book provides a practical guide to the DPO role, encompassing the key activities you'll need to manage to succeed in the role. Coverage includes data protection fundamentals and processes, understanding risk and relevant standards, frameworks and tools, with DPO tips also embedded throughout the book and case studies included to support practice-based learning.

Blockchain Security in Cloud Computing (Paperback, 1st ed. 2022): K.M. Baalamurugan, S Rakesh Kumar, Abhishek Kumar, Vishal... Blockchain Security in Cloud Computing (Paperback, 1st ed. 2022)
K.M. Baalamurugan, S Rakesh Kumar, Abhishek Kumar, Vishal Kumar, Sanjeevikumar Padmanaban
R4,638 Discovery Miles 46 380 Ships in 10 - 15 working days

This book explores the concepts and techniques of cloud security using blockchain. Also discussed is the possibility of applying blockchain to provide security in various domains. The authors discuss how blockchain holds the potential to significantly increase data privacy and security while boosting accuracy and integrity in cloud data. The specific highlight of this book is focused on the application of integrated technologies in enhancing cloud security models, use cases, and its challenges. The contributors, both from academia and industry, present their technical evaluation and comparison with existing technologies. This book pertains to IT professionals, researchers, and academicians towards fourth revolution technologies.

Online Predators, an Internet Insurgency - A Field Manual for Teaching and Parenting in the Digital Arena (Paperback): Jeffrey... Online Predators, an Internet Insurgency - A Field Manual for Teaching and Parenting in the Digital Arena (Paperback)
Jeffrey A. Lee
R739 Discovery Miles 7 390 Ships in 10 - 15 working days

In Online Predators, An Internet Insurgency: A Field Manual for Teaching and Parenting in the Digital Arena Jeffrey A. Lee brings his ten plus years' experience in the fight against online child exploitation to bear in an easy to follow guide for all with a stake in the life of a child. This book equips parents, guardians, extended family, and educational professionals with practical strategies to help keep kids safe in a technology connected world. Instead of focusing on ever changing technology, Lee proposes a key fundamental change in the fight against online predation-to develop an insatiable curiosity about their child's online life, then get in the front lines and stay there.

Cybersecurity Essentials - A No-Nonsense Guide for SMBs (Paperback): David Henderson Cybersecurity Essentials - A No-Nonsense Guide for SMBs (Paperback)
David Henderson
R557 Discovery Miles 5 570 Ships in 10 - 15 working days
Transatlantic Jurisdictional Conflicts in Data Protection Law - Fundamental Rights, Privacy and Extraterritoriality... Transatlantic Jurisdictional Conflicts in Data Protection Law - Fundamental Rights, Privacy and Extraterritoriality (Hardcover)
Mistale Taylor
R2,828 Discovery Miles 28 280 Ships in 9 - 15 working days

This book looks at transatlantic jurisdictional conflicts in data protection law and how the fundamental right to data protection conditions the EU's exercise of extraterritorial jurisdiction. Governments, companies and individuals are handling ever more digitised personal data, so it is increasingly important to ensure this data is protected. Meanwhile, the Internet is changing how territory and jurisdiction are realised online. The EU promotes personal data protection as a fundamental right. Especially since the EU's General Data Protection Regulation started applying in 2018, its data protection laws have had strong effects beyond its territory. In contrast, similar US information privacy laws are rooted in the marketplace and carry less normative heft. This has provoked clashes with the EU when their values, interests and laws conflict. This research uses three case studies to suggest ways to mitigate transatlantic jurisdictional tensions over data protection and security, the free flow of information and trade.

Adapt and Overcome - What Business Owners Need to Do to Keep Employees, Clients and Infrastructure Safe During a Time of Crisis... Adapt and Overcome - What Business Owners Need to Do to Keep Employees, Clients and Infrastructure Safe During a Time of Crisis (Paperback)
Bryan Hornung, Chee Lam, Jeri Morgan
R399 Discovery Miles 3 990 Ships in 10 - 15 working days
What Do We Know and What Should We Do About Internet Privacy? (Hardcover): Paul Bernal What Do We Know and What Should We Do About Internet Privacy? (Hardcover)
Paul Bernal
R1,093 Discovery Miles 10 930 Ships in 12 - 17 working days

Privacy on the internet is challenged in a wide variety of ways - from large social media companies, whose entire business models are based on privacy invasion, through the developing technologies of facial recognition, to the desire of governments to monitor our every activity online. But the impact these issues have on our daily lives is often underplayed or misunderstood. In this book, Paul Bernal analyses how the internet became what it is today, exploring how the current manifestation of the internet works for people, for companies and even for governments, with reference to the new privacy battlefields of location and health data, the internet of things and the increasingly contentious issue of personal data and political manipulation. The author then proposes what we should do about the problems surrounding internet privacy, such as significant changes in government policy, a reversal of the current 'war' on encryption, being brave enough to take on the internet giants, and challenging the idea that 'real names' would improve the discourse on social networks. ABOUT THE SERIES: The 'What Do We Know and What Should We Do About...?' series offers readers short, up-to-date overviews of key issues often misrepresented, simplified or misunderstood in modern society and the media. Each book is written by a leading social scientist with an established reputation in the relevant subject area. The Series Editor is Professor Chris Grey, Royal Holloway, University of London

Handbook of Reinforcement Learning and Control (Paperback, 1st ed. 2021): Kyriakos G. Vamvoudakis, Yan Wan, Frank L. Lewis,... Handbook of Reinforcement Learning and Control (Paperback, 1st ed. 2021)
Kyriakos G. Vamvoudakis, Yan Wan, Frank L. Lewis, Derya Cansever
R6,538 Discovery Miles 65 380 Ships in 10 - 15 working days

This handbook presents state-of-the-art research in reinforcement learning, focusing on its applications in the control and game theory of dynamic systems and future directions for related research and technology. The contributions gathered in this book deal with challenges faced when using learning and adaptation methods to solve academic and industrial problems, such as optimization in dynamic environments with single and multiple agents, convergence and performance analysis, and online implementation. They explore means by which these difficulties can be solved, and cover a wide range of related topics including: deep learning; artificial intelligence; applications of game theory; mixed modality learning; and multi-agent reinforcement learning. Practicing engineers and scholars in the field of machine learning, game theory, and autonomous control will find the Handbook of Reinforcement Learning and Control to be thought-provoking, instructive and informative.

Near Miss - : 10 Ways Your IT Guy is Failing to Protect You & Putting Your Business at Risk (Paperback): Brent Lacy Near Miss - : 10 Ways Your IT Guy is Failing to Protect You & Putting Your Business at Risk (Paperback)
Brent Lacy
R294 Discovery Miles 2 940 Ships in 10 - 15 working days
Cybersecurity - 3 in 1- Beginner's Guide+ Tips and tricks+ Advanced and Effective measures to secure your Cyber Networks... Cybersecurity - 3 in 1- Beginner's Guide+ Tips and tricks+ Advanced and Effective measures to secure your Cyber Networks (Paperback)
Elijah Lewis
R1,211 Discovery Miles 12 110 Ships in 10 - 15 working days
The Next Floor (Paperback): Pete Hancock The Next Floor (Paperback)
Pete Hancock
R587 Discovery Miles 5 870 Ships in 10 - 15 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Pegasus - The Story Of The World's Most…
Laurent Richard, Sandrine Rigaud Paperback R380 R297 Discovery Miles 2 970
Identified, Tracked, and Profiled - The…
Peter Dauvergne Hardcover R2,222 Discovery Miles 22 220
The Age of AI - And Our Human Future
Henry A. Kissinger, Eric Schmidt, … Paperback R241 Discovery Miles 2 410
EU General Data Protection Regulation…
It Governance Privacy Team Paperback R741 Discovery Miles 7 410
Botnets - Architectures…
Georgios Kambourakis, Marios Anagnostopoulos, … Paperback R1,411 Discovery Miles 14 110
Cybersecurity For Dummies, 2nd Edition
J. Steinberg Paperback R779 R560 Discovery Miles 5 600
Hands-On Ethical Hacking and Network…
Rob Wilson Paperback R1,330 R1,188 Discovery Miles 11 880
Permanent Record
Edward Snowden Paperback R299 R234 Discovery Miles 2 340
Smart-Tech Society - Convenience…
Mark Whitehead, William G.A. Collier Hardcover R2,855 Discovery Miles 28 550
Information And Communications…
Dana van der Merwe Paperback R1,119 R915 Discovery Miles 9 150

 

Partners