0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (181)
  • R250 - R500 (210)
  • R500+ (794)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

Cyberethics - Social and Moral Issues in the Computer Age (Paperback): Robert M. Baird, Reagan M. Ramsower, Stuart E Rosenbaum Cyberethics - Social and Moral Issues in the Computer Age (Paperback)
Robert M. Baird, Reagan M. Ramsower, Stuart E Rosenbaum
R586 Discovery Miles 5 860 Ships in 12 - 17 working days

The amazing transformation of society brought about by the wide dispersion of computers has given rise to new moral dilemmas. With the rapid development of this technology, the impact of computers on privacy, personal identity, intellectual property, and the form and practice of democracy is becoming more apparent every day. Inevitably, this penetration of computer technology into our private and social lives has a moral dimension, which raises questions about our conduct and requires moral reflection and decision-making. The twenty-six groundbreaking essays collected in this insightful anthology define the nature of this new moral landscape and offer thoughtful answers to the ethical questions raised by the interaction of people and computers.
Divided into five sections, the volume begins with a definition of cyberethics. There is general agreement with James H. Moor's basic definition of the field as "the formulation and justification of policies for the ethical use of computers." Next the issues of anonymity and personal identity are considered. Computers provide individuals with a unique opportunity to create personae for the virtual world that are quite distinct from their normal identities. What are the moral dimensions of creating virtual personalities?
Perhaps the most pressing ethical issue is addressed in the next section on privacy. The ability of computers to store vast amounts of information on any individual raises the harrowing specter of a Big Brother society in the not-too-distant future. How should information be used and how might it be abused? What safeguards are needed to protect privacy as information technology becomes ever more sophisticated?
In the fourth section, questions concerning ownership of intellectual property and copyright law are considered. How can the rights of authorship be protected in the context of the internet?
Finally, the fifth section explores the debate now taking place regarding the impact of computers on democracy. Do computers offer new possibilities for enhancing democracy or will this prospect turn out to be a myth?
This is a much needed anthology of thought-provoking articles on the critical moral issues facing our "brave new world."

SSFIPS Securing Cisco Networks with Sourcefire Intrusion Prevention System Study Guide - Exam 500-285 (Paperback): T Lammle SSFIPS Securing Cisco Networks with Sourcefire Intrusion Prevention System Study Guide - Exam 500-285 (Paperback)
T Lammle
R1,595 R1,140 Discovery Miles 11 400 Save R455 (29%) Ships in 12 - 17 working days

Up the ante on your FirePOWER with Advanced FireSIGHT Administration exam prep Securing Cisco Networks with Sourcefire IPS Study Guide, Exam 500-285, provides 100% coverage of the FirePOWER with Advanced FireSIGHT Administration exam objectives. With clear and concise information regarding crucial next-generation network security topics, this comprehensive guide includes practical examples and insights drawn from real-world experience, exam highlights, and end of chapter reviews. Learn key exam topics and powerful features of the Cisco FirePOWER Services, including FireSIGHT Management Center, in-depth event analysis, IPS tuning and configuration, and snort rules language. Gain access to Sybex's superior online learning environment that includes practice questions, flashcards, and interactive glossary of terms. * Use and configure next-generation Cisco FirePOWER services, including application control, firewall, and routing and switching capabilities * Understand how to accurately tune your systems to improve performance and network intelligence while leveraging powerful tools for more efficient event analysis * Complete hands-on labs to reinforce key concepts and prepare you for the practical applications portion of the examination * Access Sybex's online interactive learning environment and test bank, which includes an assessment test, chapter tests, bonus practice exam questions, electronic flashcards, and a searchable glossary Securing Cisco Networks with Sourcefire IPS Study Guide, Exam 500-285 provides you with the information you need to prepare for the FirePOWER with Advanced FireSIGHT Administration examination.

The International Handbook of Computer Security (Hardcover): Jae Shim, Anique A. Qureshi, Joel G Siegel The International Handbook of Computer Security (Hardcover)
Jae Shim, Anique A. Qureshi, Joel G Siegel
R4,313 Discovery Miles 43 130 Ships in 12 - 17 working days

"The International Handbook of Computer Security" is designed to help information systems/computer professionals as well as business executives protect computer systems and data from a myriad of internal and external threats. The book addresses a wide range of computer security issues. It is intended to provide practical and thorough guidance in what often seems a quagmire of computers, technology, networks, and software.
Major topics discussed are: security policies; physical security procedures; data preservation and protection; hardware and software protection and security; personnel management and security; network security, internal and external systems; contingency planning; legal and auditing planning and control.

Digital Privacy, Terrorism and Law Enforcement - The UK's Response to Terrorist Communication (Hardcover): Simon Hale-Ross Digital Privacy, Terrorism and Law Enforcement - The UK's Response to Terrorist Communication (Hardcover)
Simon Hale-Ross
R3,878 Discovery Miles 38 780 Ships in 12 - 17 working days

This book examines the UK's response to terrorist communication. Its principle question asks, has individual privacy and collective security been successfully managed and balanced? The author begins by assessing several technologically-based problems facing British law enforcement agencies, including use of the Internet; the existence of 'darknet'; untraceable Internet telephone calls and messages; smart encrypted device direct messaging applications; and commercially available encryption software. These problems are then related to the traceability and typecasting of potential terrorists, showing that law enforcement agencies are searching for needles in the ever-expanding haystacks. To this end, the book examines the bulk powers of digital surveillance introduced by the Investigatory Powers Act 2016. The book then moves on to assess whether these new powers and the new legislative safeguards introduced are compatible with international human rights standards. The author creates a 'digital rights criterion' from which to challenge the bulk surveillance powers against human rights norms. Lord Carlile of Berriew CBE QC in recommending this book notes this particular legal advancement, commenting that rightly so the author concludes the UK has fairly balanced individual privacy with collective security. The book further analyses the potential impact on intelligence exchange between the EU and the UK, following Brexit. Using the US as a case study, the book shows that UK laws must remain within the ambit of EU law and the Court of Justice of the European Union's (CJEU's) jurisprudence, to maintain the effectiveness of the exchange. It addresses the topics with regard to terrorism and counterterrorism methods and will be of interest to researchers, academics, professionals, and students researching counterterrorism and digital electronic communications, international human rights, data protection, and international intelligence exchange.

Privacy in the Information Age (Paperback): Fred H Cate Privacy in the Information Age (Paperback)
Fred H Cate
R556 Discovery Miles 5 560 Ships in 12 - 17 working days

Electronic information networks offer extraordinary advantages to business, government, and individuals in terms of power, capacity, speed, accessibility, and cost. But these same capabilities present substantial privacy issues. With an unprecedented amount of data available in digital format--which is easier and less expensive to access, manipulate, and store--others know more about you than ever before.

Consider this: data routinely collected about you includes your health, credit, marital, educational, and employment histories; the times and telephone numbers of every call you make and receive; the magazines you subscribe to and the books your borrow from the library; your cash withdrawals; your purchases by credit card or check; your electronic mail and telephone messages; where you go on the World Wide Web. The ramifications of such a readily accessible storehouse of information are astonishing.

Governments have responded to these new challenges to personal privacy in a wide variety of ways. At one extreme, the European Union in 1995 enacted sweeping regulation to protect personal information; at the other extreme, privacy law in the United States and many other countries is fragmented, inconsistent, and offers little protection for privacy on the internet and other electronic networks.

For all the passion that surrounds discussions about privacy, and the recent attention devoted to electronic privacy, surprisingly little consensus exists about what privacy means, what values are served--or compromised--by extending further legal protection to privacy, what values are affected by existing and proposed measures designed to protect privacy, and what principles should undergird a sensitive balancing of those values.

In this book, Fred Cate addresses these critical issues in the context of computerized information. He provides an overview of the technologies that are provoking the current privacy debate and discusses the range of legal issues that these technologies raise. He examines the central elements that make up the definition of privacy and the values served, and liabilities incurred, by each of those components. Separate chapters address the regulation of privacy in Europe and the United States. The final chapter identifies four sets of principles for protecting information privacy. The principles recognize the significance of individual and collective nongovernmental action, the limited role for privacy laws and government enforcement of those laws, and the ultimate goal of establishing multinational principles for protecting information privacy.

Privacy in the Information Age involves questions that cut across the fields of business, communications, economics, and law. Cate examines the debate in provocative, jargon-free, detail.

From Anarchy to Power - The Net Comes of Age (Hardcover): Wendy Grossman From Anarchy to Power - The Net Comes of Age (Hardcover)
Wendy Grossman
R1,621 Discovery Miles 16 210 Ships in 10 - 15 working days

"Both newbies (newcomers to the Internet) and Netizens (old-timers) will find challenges and rewards in this witty, knowledgeable, and timely report from the electronic front."
--"Publishers Weekly"

"Vividly describes the virtual realm as a place of interconnecting communities every bitas complicated, exciting, and dangerous as any city."
--"Booklist"

"A pleasant antidote to the breathless rhetoric one finds in many books and magazines devoted to computer culture."
--"Technology Review"

"Grossman brings a wealth of professional and personal experience to the material-and a clarity of style and analysis that is a welcome relief from both the hyperbolic prose of many Net boosters and the overwrought jeremiads of cyberphobes."
--"Reason"

"There is a lot to like about this survey, especially the diligent research and reading the author has invested in it. The endnotes are vast and informative..."From Anarchy to Power" gathers strengh as it goes along."
--"The Christian Century"

"An informative exploration into many of the issues and problems that plague the Net today...From Anarchy to Power is a must read."
-- "ComputerUser.com"

companion website: http: //www.nyupress.org/fap

Yesterday's battles over internet turf were fought on the net itself: today's battles are fought in government committees, in Congress, on the stock exchange, and in the marketplace. What was once an experimental ground for electronic commerce is now the hottest part of our economic infrastructure.

In From Anarchy to Power, Wendy Grossman explores the new dispensation on the net and tackles the questions that trouble every online user: How vulnerable are the internet andworld wide web to malicious cyber hackers? What are the limits of privacy online? How real is internet addiction and to what extent is the news media responsible for this phenomenon? Are women and minorities at a disadvantage in cyberspace? How is the increasing power of big business changing internet culture?

We learn about the political economy of the internet including issues of copyright law, corporate control and cryptography legislation. Throughout the book the emphasis is on the international dimensions of the net, focusing on privacy and censorship in the United States, Europe and Canada and the hitherto ignored contributions of other countries in the development of the net. Entertaining and informative From Anarchy to Power is required reading for anyone who wants to know where the new digital economy is heading.

Regulating New Technologies in Uncertain Times (Hardcover, 1st ed. 2019): Leonie Reins Regulating New Technologies in Uncertain Times (Hardcover, 1st ed. 2019)
Leonie Reins
R2,511 Discovery Miles 25 110 Ships in 12 - 17 working days

This book deals with questions of democracy and governance relating to new technologies. The deployment and application of new technologies is often accompanied with uncertainty as to their long-term (un)intended impacts. New technologies also raise questions about the limits of the law as the line between harmful and beneficial effects is often difficult to draw. The volume explores overarching concepts on how to regulate new technologies and their implications in a diverse and constantly changing society, as well as the way in which regulation can address differing, and sometimes conflicting, societal objectives, such as public health and the protection of privacy. Contributions focus on a broad range of issues such as Citizen Science, Smart Cities, big data, and health care, but also on the role of market regulation for new technologies.The book will serve as a useful research tool for scholars and practitioners interested in the latest developments in the field of technology regulation. Leonie Reins is Assistant Professor at the Tilburg Institute for Law, Technology, and Society (TILT) in The Netherlands.

The Future of Internet Policy (Paperback): Peter Decherney, Victor Pickard The Future of Internet Policy (Paperback)
Peter Decherney, Victor Pickard
R1,356 Discovery Miles 13 560 Ships in 12 - 17 working days

All of the short essays in this volume look past the rhetoric of technological determinism and reliance on the natural logic of the market to consider the power of law and policy to steer new media in one direction or another. Many of the essays look backwards through history or outwards across national borders. They all look forward to how today's policies will shape the future of the internet and society. A particular focus of interest for some of the contributors is the revelations that followed Edward Snowden's mass disclosure of classified documents in 2013, which revealed the U.S. National Security Agency's systematic and longstanding program of monitoring global communications. Some chapters consider different countries' varying approaches to regulating the proliferation of online communication, while others assess the current state of digital technology. They all call for policy interventions to solve market failures. This book was originally published as a special issue of Critical Studies in Media Communication.

Privacy II - Exploring Questions of Media Morality: A Special Issue of the journal of Mass Media Ethics (Paperback): Jay Black Privacy II - Exploring Questions of Media Morality: A Special Issue of the journal of Mass Media Ethics (Paperback)
Jay Black
R856 Discovery Miles 8 560 Ships in 12 - 17 working days

Concerns over privacy in America and the role of a free and responsible press have intensified in recent years. The Journal of Mass Media Ethics has worked with Poynter Institute for Media Studies in an effort to focus and broaden the discussion. This issue -- the second devoted to privacy matters -- features articles that the editors hope will add useful perspectives to the current discussions of privacy issues, particularly those raised by new technology.

Legal Data and Information in Practice - How Data and the Law Interact (Paperback): Sarah A. Sutherland Legal Data and Information in Practice - How Data and the Law Interact (Paperback)
Sarah A. Sutherland
R1,019 Discovery Miles 10 190 Ships in 12 - 17 working days

Legal Data and Information in Practice provides readers with an understanding of how to facilitate the acquisition, management, and use of legal data in organizations such as libraries, courts, governments, universities, and start-ups. Presenting a synthesis of information about legal data that will furnish readers with a thorough understanding of the topic, the book also explains why it is becoming crucial that data analysis be integrated into decision-making in the legal space. Legal organizations are looking at how to develop data-driven insights for a variety of purposes and it is, as Sutherland shows, vital that they have the necessary skills to facilitate this work. This book will assist in this endeavour by providing an international perspective on the issues affecting access to legal data and clearly describing methods of obtaining and evaluating it. Sutherland also incorporates advice about how to critically approach data analysis. Legal Data and Information in Practice will be essential reading for those in the law library community who are based in English-speaking countries with a common law tradition. The book will also be useful to those with a general interest in legal data, including students, academics engaged in the study of information science and law.

Nuking the Moon - And Other Intelligence Schemes and Military Plots Best Left on the Drawing Board (Paperback, Main): Vince... Nuking the Moon - And Other Intelligence Schemes and Military Plots Best Left on the Drawing Board (Paperback, Main)
Vince Houghton 1
R323 R260 Discovery Miles 2 600 Save R63 (20%) Ships in 12 - 17 working days

"Compulsively readable laugh out loud history." Mary Roach Bomb-carrying bats. Poisoned flower arrangements. Cigars laced with mind-altering drugs. Listening devices implanted into specially-trained cats. A torpedo-proof aircraft carrier made out of ice and sawdust. And a CIA plan to detonate a nuclear bomb on the moon ... just because. In Nuking the Moon, Vince Houghton, Historian and Curator at the International Spy Museum, collects the most inspired, implausible and downright bizarre military intelligence schemes that never quite made it off the drawing board. From the grandly ambitious to the truly devious, they illuminate a new side of warfare, revealing how a combination of desperation and innovation led not only to daring missions and brilliant technological advances, but to countless plans and experiments that failed spectacularly. Alternatively terrifying and hilarious, and combining archival research with newly-conducted interviews, these twenty-six chapters reveal not only what might have happened, but also what each one tells us about the history and people around it. If 'military intelligence' makes you think of James Bond and ingenious exploding gadgets ... get ready for the true story.

How Healthcare Data Privacy Is Almost Dead ... and What Can Be Done to Revive It! (Hardcover): John J. Trinckes Jr. How Healthcare Data Privacy Is Almost Dead ... and What Can Be Done to Revive It! (Hardcover)
John J. Trinckes Jr.
R4,041 Discovery Miles 40 410 Ships in 12 - 17 working days

The healthcare industry is under privacy attack. The book discusses the issues from the healthcare organization and individual perspectives. Someone hacking into a medical device and changing it is life-threatening. Personal information is available on the black market. And there are increased medical costs, erroneous medical record data that could lead to wrong diagnoses, insurance companies or the government data-mining healthcare information to formulate a medical 'FICO' score that could lead to increased insurance costs or restrictions of insurance. Experts discuss these issues and provide solutions and recommendations so that we can change course before a Healthcare Armageddon occurs.

Protecting Privacy in Data Release (Hardcover, 2015 ed.): Giovanni Livraga Protecting Privacy in Data Release (Hardcover, 2015 ed.)
Giovanni Livraga
R2,794 Discovery Miles 27 940 Ships in 10 - 15 working days

This book presents a comprehensive approach to protecting sensitive information when large data collections are released by their owners. It addresses three key requirements of data privacy: the protection of data explicitly released, the protection of information not explicitly released but potentially vulnerable due to a release of other data, and the enforcement of owner-defined access restrictions to the released data. It is also the first book with a complete examination of how to enforce dynamic read and write access authorizations on released data, applicable to the emerging data outsourcing and cloud computing situations. Private companies, public organizations and final users are releasing, sharing, and disseminating their data to take reciprocal advantage of the great benefits of making their data available to others. This book weighs these benefits against the potential privacy risks. A detailed analysis of recent techniques for privacy protection in data release and case studies illustrate crucial scenarios. Protecting Privacy in Data Release targets researchers, professionals and government employees working in security and privacy. Advanced-level students in computer science and electrical engineering will also find this book useful as a secondary text or reference.

Regulating Access and Transfer of Data (Hardcover): Bjoern Lundqvist Regulating Access and Transfer of Data (Hardcover)
Bjoern Lundqvist
R3,884 R2,644 Discovery Miles 26 440 Save R1,240 (32%) Ships in 12 - 17 working days

Data collected and distributed on the internet is generally free, non-exclusive, and non-rivalrous. Yet online data is often difficult to access. This book examines the infrastructure for collecting, storing, and distributing data to show how it is embedded behind intellectual property and technological barriers. It proposes that the EU introduce an access and transfer governance right to data that can work in tandem with data protection rules. Chapters explore the subject matter of this protection, potential rights holders and the scope of the protection, and exceptions and limitations under intellectual property law and competition law. Comprehensive and timely, Regulating Access and Transfer of Data, sets the foundations for a new legal system for our data-driven generation.

Transatlantic Jurisdictional Conflicts in Data Protection Law - Fundamental Rights, Privacy and Extraterritoriality... Transatlantic Jurisdictional Conflicts in Data Protection Law - Fundamental Rights, Privacy and Extraterritoriality (Hardcover)
Mistale Taylor
R3,216 R2,644 Discovery Miles 26 440 Save R572 (18%) Ships in 12 - 17 working days

This book looks at transatlantic jurisdictional conflicts in data protection law and how the fundamental right to data protection conditions the EU's exercise of extraterritorial jurisdiction. Governments, companies and individuals are handling ever more digitised personal data, so it is increasingly important to ensure this data is protected. Meanwhile, the Internet is changing how territory and jurisdiction are realised online. The EU promotes personal data protection as a fundamental right. Especially since the EU's General Data Protection Regulation started applying in 2018, its data protection laws have had strong effects beyond its territory. In contrast, similar US information privacy laws are rooted in the marketplace and carry less normative heft. This has provoked clashes with the EU when their values, interests and laws conflict. This research uses three case studies to suggest ways to mitigate transatlantic jurisdictional tensions over data protection and security, the free flow of information and trade.

Blockchain Security in Cloud Computing (Hardcover, 1st ed. 2022): K.M. Baalamurugan, S Rakesh Kumar, Abhishek Kumar, Vishal... Blockchain Security in Cloud Computing (Hardcover, 1st ed. 2022)
K.M. Baalamurugan, S Rakesh Kumar, Abhishek Kumar, Vishal Kumar, Sanjeevikumar Padmanaban
R4,594 Discovery Miles 45 940 Ships in 12 - 17 working days

This book explores the concepts and techniques of cloud security using blockchain. Also discussed is the possibility of applying blockchain to provide security in various domains. The authors discuss how blockchain holds the potential to significantly increase data privacy and security while boosting accuracy and integrity in cloud data. The specific highlight of this book is focused on the application of integrated technologies in enhancing cloud security models, use cases, and its challenges. The contributors, both from academia and industry, present their technical evaluation and comparison with existing technologies. This book pertains to IT professionals, researchers, and academicians towards fourth revolution technologies.

Face Recognition Technology - Compulsory Visibility and Its Impact on Privacy and the Confidentiality of Personal Identifiable... Face Recognition Technology - Compulsory Visibility and Its Impact on Privacy and the Confidentiality of Personal Identifiable Images (Hardcover, 1st ed. 2020)
Ian Berle
R3,350 R1,924 Discovery Miles 19 240 Save R1,426 (43%) Ships in 12 - 17 working days

This book examines how face recognition technology is affecting privacy and confidentiality in an era of enhanced surveillance. Further, it offers a new approach to the complex issues of privacy and confidentiality, by drawing on Joseph K in Kafka's disturbing novel The Trial, and on Isaiah Berlin's notion of liberty and freedom. Taking into consideration rights and wrongs, protection from harm associated with compulsory visibility, and the need for effective data protection law, the author promotes ethical practices by reinterpreting privacy as a property right. To protect this right, the author advocates the licensing of personal identifiable images where appropriate. The book reviews American, UK and European case law concerning privacy and confidentiality, the effect each case has had on the developing jurisprudence, and the ethical issues involved. As such, it offers a valuable resource for students of ethico-legal fields, professionals specialising in image rights law, policy-makers, and liberty advocates and activists.

The Identity Trade - Selling Privacy and Reputation Online (Paperback): Nora A. Draper The Identity Trade - Selling Privacy and Reputation Online (Paperback)
Nora A. Draper
R570 R505 Discovery Miles 5 050 Save R65 (11%) Ships in 12 - 17 working days

The successes and failures of an industry that claims to protect and promote our online identities What does privacy mean in the digital era? As technology increasingly blurs the boundary between public and private, questions about who controls our data become harder and harder to answer. Our every web view, click, and online purchase can be sold to anyone to store and use as they wish. At the same time, our online reputation has become an important part of our identity-a form of cultural currency. The Identity Trade examines the relationship between online visibility and privacy, and the politics of identity and self-presentation in the digital age. In doing so, Nora Draper looks at the revealing two-decade history of efforts by the consumer privacy industry to give individuals control over their digital image through the sale of privacy protection and reputation management as a service. Through in-depth interviews with industry experts, as well as analysis of media coverage, promotional materials, and government policies, Draper examines how companies have turned the protection and promotion of digital information into a business. Along the way, she also provides insight into how these companies have responded to and shaped the ways we think about image and reputation in the digital age. Tracking the successes and failures of companies claiming to control our digital ephemera, Draper takes us inside an industry that has commodified strategies of information control. This book is a discerning overview of the debate around who controls our data, who buys and sells it, and the consequences of treating privacy as a consumer good.

We Have Root - Even More Advice from Schneier on Security (Paperback): B. Schneier We Have Root - Even More Advice from Schneier on Security (Paperback)
B. Schneier
R482 R365 Discovery Miles 3 650 Save R117 (24%) Ships in 12 - 17 working days

A collection of popular essays from security guru Bruce Schneier In his latest collection of essays, security expert Bruce Schneier tackles a range of cybersecurity, privacy, and real-world security issues ripped from the headlines. Essays cover the ever-expanding role of technology in national security, war, transportation, the Internet of Things, elections, and more. Throughout, he challenges the status quo with a call for leaders, voters, and consumers to make better security and privacy decisions and investments. Bruce's writing has previously appeared in some of the world's best-known and most-respected publications, including The Atlantic, the Wall Street Journal, CNN, the New York Times, the Washington Post, Wired, and many others. And now you can enjoy his essays in one place--at your own speed and convenience. Timely security and privacy topics The impact of security and privacy on our world Perfect for fans of Bruce's blog and newsletter Lower price than his previous essay collections The essays are written for anyone who cares about the future and implications of security and privacy for society.

Data for the People - How to Make Our Post-Privacy Economy Work for You (Hardcover): Andreas Weigend Data for the People - How to Make Our Post-Privacy Economy Work for You (Hardcover)
Andreas Weigend
R1,060 Discovery Miles 10 600 Ships in 9 - 15 working days

A long-time chief data scientist at Amazon shows how open data can make everyone, not just corporations, richer Every time we Google something, Facebook someone, Uber somewhere, or even just turn on a light, we create data that businesses collect and use to make decisions about us. In many ways this has improved our lives, yet, we as individuals do not benefit from this wealth of data as much as we could. Moreover, whether it is a bank evaluating our credit worthiness, an insurance company determining our risk level, or a potential employer deciding whether we get a job, it is likely that this data will be used against us rather than for us. In Data for the People, Andreas Weigend draws on his years as a consultant for commerce, education, healthcare, travel and finance companies to outline how Big Data can work better for all of us. As of today, how much we benefit from Big Data depends on how closely the interests of big companies align with our own. Too often, outdated standards of control and privacy force us into unfair contracts with data companies, but it doesn't have to be this way. Weigend makes a powerful argument that we need to take control of how our data is used to actually make it work for us. Only then can we the people get back more from Big Data than we give it. Big Data is here to stay. Now is the time to find out how we can be empowered by it.

Introduction to Surveillance Studies (Hardcover): J. K. Petersen Introduction to Surveillance Studies (Hardcover)
J. K. Petersen
R3,069 Discovery Miles 30 690 Ships in 12 - 17 working days

Surveillance is a divisive issue-one might say it is inherently controversial. Used by private industry, law enforcement, and for national security, it can be a potent tool for protecting resources and assets. It can also be extremely invasive, calling into question our basic rights to freedom and privacy. Introduction to Surveillance Studies explores technological trends, past- and present-day rationales for surveillance and surveillance devices, and current social issues surrounding them. The book begins with a brief historical perspective on the evolution of surveillance technologies, then charts the development of modern-day devices from the invention of radar to the dawn of the Internet. Next, it describes emerging technologies-including GIS, GPS devices, Google Maps, biometric technology, surveillance cameras, global satellites, miniaturization of devices, and social media-that are challenging notions of privacy and the right of access to information. While focusing on the technology, the book also discusses surveillance as a phenomenon and what these technologies mean to our understanding of freedom, privacy, and the impact of technology on communications and the structure of society. Enhanced with numerous photos, the book presents the pros and cons-and some of the controversy-of these increasingly sophisticated technologies, their collective impact, and what the future may hold. It is ideal for those new to surveillance; security, military, and law enforcement professionals who utilize surveillance technologies; and students of privacy, constitutional freedom, journalism, and sociology.

Pegasus - The Story of the World's Most Dangerous Spyware (Hardcover): Laurent Richard, Sandrine Rigaud Pegasus - The Story of the World's Most Dangerous Spyware (Hardcover)
Laurent Richard, Sandrine Rigaud
R486 Discovery Miles 4 860 Ships in 12 - 17 working days

Pegasus is almost certainly the most powerful piece of spyware ever developed. Installed by as little as a missed WhatsApp call, once on your phone it can record your calls, copy your messages, steal your photos and secretly film you. Those that control it can find out your daily movements: exactly where you've been, and who you've met. From a wayward princess who married into the royal family of Dubai, to the president of one of the most powerful and long-standing Republics in Europe and a reporter investigating arms deals being negotiated by the government of Hungarian Prime Minister Viktor Orban and the Trump administration. These three individuals and many more have been targeted by Pegasus - with sometimes deadly consequences. The personal data of the victims is captured by their own governments, foreign governments and even by private criminal enterprises. They have become, in an instant, vulnerable to blackmail, intimidation, false imprisonment and assassination. Some have already suffered these fates. Laurent Richard and Sandrine Rigaud are award-winning journalists who have conducted international investigations for more than twenty years. Pegasus investigates how people's lives and privacy are being threatened as cyber-surveillance occurs with exponentially increasing frequency across the world, at a sweep and scale that astounds - and horrifies.

Cyber Strategy - Risk-Driven Security and Resiliency (Paperback): Carol A. Siegel, Mark Sweeney Cyber Strategy - Risk-Driven Security and Resiliency (Paperback)
Carol A. Siegel, Mark Sweeney
R1,184 Discovery Miles 11 840 Ships in 12 - 17 working days

Cyber Strategy: Risk-Driven Security and Resiliency provides a process and roadmap for any company to develop its unified Cybersecurity and Cyber Resiliency strategies. It demonstrates a methodology for companies to combine their disassociated efforts into one corporate plan with buy-in from senior management that will efficiently utilize resources, target high risk threats, and evaluate risk assessment methodologies and the efficacy of resultant risk mitigations. The book discusses all the steps required from conception of the plan from preplanning (mission/vision, principles, strategic objectives, new initiatives derivation), project management directives, cyber threat and vulnerability analysis, cyber risk and controls assessment to reporting and measurement techniques for plan success and overall strategic plan performance. In addition, a methodology is presented to aid in new initiative selection for the following year by identifying all relevant inputs. Tools utilized include: Key Risk Indicators (KRI) and Key Performance Indicators (KPI) National Institute of Standards and Technology (NIST) Cyber Security Framework (CSF) Target State Maturity interval mapping per initiative Comparisons of current and target state business goals and critical success factors A quantitative NIST-based risk assessment of initiative technology components Responsible, Accountable, Consulted, Informed (RACI) diagrams for Cyber Steering Committee tasks and Governance Boards' approval processes Swimlanes, timelines, data flow diagrams (inputs, resources, outputs), progress report templates, and Gantt charts for project management The last chapter provides downloadable checklists, tables, data flow diagrams, figures, and assessment tools to help develop your company's cybersecurity and cyber resiliency strategic plan.

Emerging Challenges for Security, Privacy and Trust - 24th IFIP TC 11 International Information Security Conference, SEC 2009,... Emerging Challenges for Security, Privacy and Trust - 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009, Proceedings (Hardcover, 2009 ed.)
Dimitris Gritzalis, Javier Lopez
R2,867 Discovery Miles 28 670 Ships in 10 - 15 working days

It was an honor and a privilege to chair the 24th IFIP International Information Se- rity Conference (SEC 2009), a 24-year-old event that has become a tradition for - formation security professionals around the world. SEC 2009 was organized by the Technical Committee 11 (TC-11) of IFIP, and took place in Pafos, Cyprus, during May 18-20, 2009. It is an indication of good fortune for a Chair to serve a conference that takes place in a country with the natural beauty of Cyprus, an island where the hospitality and frie- liness of the people have been going together, hand-in-hand, with its long history. This volume contains the papers selected for presentation at SEC 2009. In response to the call for papers, 176 papers were submitted to the conference. All of them were evaluated on the basis of their novelty and technical quality, and reviewed by at least two members of the conference Program Committee. Of the papers submitted, 39 were selected for presentation at the conference; the acceptance rate was as low as 22%, thus making the conference a highly competitive forum. It is the commitment of several people that makes international conferences pos- ble. That also holds true for SEC 2009. The list of people who volunteered their time and energy to help is really long.

Handbook of Reinforcement Learning and Control (Paperback, 1st ed. 2021): Kyriakos G. Vamvoudakis, Yan Wan, Frank L. Lewis,... Handbook of Reinforcement Learning and Control (Paperback, 1st ed. 2021)
Kyriakos G. Vamvoudakis, Yan Wan, Frank L. Lewis, Derya Cansever
R6,312 Discovery Miles 63 120 Ships in 10 - 15 working days

This handbook presents state-of-the-art research in reinforcement learning, focusing on its applications in the control and game theory of dynamic systems and future directions for related research and technology. The contributions gathered in this book deal with challenges faced when using learning and adaptation methods to solve academic and industrial problems, such as optimization in dynamic environments with single and multiple agents, convergence and performance analysis, and online implementation. They explore means by which these difficulties can be solved, and cover a wide range of related topics including: deep learning; artificial intelligence; applications of game theory; mixed modality learning; and multi-agent reinforcement learning. Practicing engineers and scholars in the field of machine learning, game theory, and autonomous control will find the Handbook of Reinforcement Learning and Control to be thought-provoking, instructive and informative.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Containing Big Tech - How To Protect Our…
Tom Kemp Hardcover R712 R603 Discovery Miles 6 030
Research Handbook on Privacy and Data…
Gloria Gonzalez, Rosamunde van Brakel, … Hardcover R6,101 Discovery Miles 61 010
Identified, Tracked, and Profiled - The…
Peter Dauvergne Hardcover R2,127 Discovery Miles 21 270
Smart-Tech Society - Convenience…
Mark Whitehead, William G.A. Collier Hardcover R2,732 Discovery Miles 27 320
Cyber Security and Threats - Concepts…
Information Reso Management Association Hardcover R9,960 Discovery Miles 99 600
Handbook of Research on Advanced…
Ahmed J. Obaid, Ghassan H Abdul-Majeed, … Hardcover R7,692 Discovery Miles 76 920
Advanced Methodologies and Technologies…
Mehdi Khosrowpour Hardcover R7,464 Discovery Miles 74 640
Digital Forensics and Cyber…
Kyung-Shick Choi, Sinchul Back, … Paperback R3,450 Discovery Miles 34 500
EU General Data Protection Regulation…
It Governance Privacy Team Paperback R738 Discovery Miles 7 380
Information And Communications…
Dana van der Merwe Paperback R1,257 R1,116 Discovery Miles 11 160

 

Partners