0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (124)
  • R250 - R500 (223)
  • R500+ (771)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

Handbook of IoT and Blockchain - Methods, Solutions, and Recent Advancements (Hardcover): Brojo Kishore Mishra, Sanjay Kumar... Handbook of IoT and Blockchain - Methods, Solutions, and Recent Advancements (Hardcover)
Brojo Kishore Mishra, Sanjay Kumar Kuanar, Sheng-Lung Peng, Daniel D. Dasig, Jr
R5,059 Discovery Miles 50 590 Ships in 10 - 15 working days

Handbook of IoT and Blockchain: Methods, solutions, and Recent Advancements includes contributions from around the globe on recent advances and findings in the domain of Internet of Things (IoT) and Blockchain. Chapters include theoretical analysis, practical implications, and extensive surveys with analysis on methods, algorithms, and processes for new product development. IoT and Blockchain are the emerging topics in the current manufacturing scenario.This handbook includes recent advances; showcases the work of research around the globe; offers theoretical analysis and practical implications; presents extensive surveys with analysis, new contributions, and proposals on methods, algorithms, and processes; and also covers recent advances from quantitative and qualitative articles, case studies, conceptual works, and theoretical backing. This handbook will be of interest to graduate students, researchers, academicians, institutions, and professionals that are interested in exploring the areas of IoT and Blockchain.

Ethics in an Age of Surveillance - Personal Information and Virtual Identities (Paperback): Adam Henschke Ethics in an Age of Surveillance - Personal Information and Virtual Identities (Paperback)
Adam Henschke
R982 Discovery Miles 9 820 Ships in 10 - 15 working days

People increasingly live online, sharing publicly what might have once seemed private, but at the same time are enraged by extremes of government surveillance and the corresponding invasion into our private lives. In this enlightening work, Adam Henschke re-examines privacy and property in the age of surveillance in order to understand not only the importance of these social conventions, but also their moral relevance. By analyzing identity and information, and presenting a case for a relation between the two, he explains the moral importance of virtual identities and offers an ethically robust solution to designing surveillance technologies. This book should be read by anyone interested in surveillance technology, new information technology more generally, and social concepts like privacy and property.

Cybersecurity All-in-One For Dummies (Paperback): Joseph Steinberg, Kevin Beaver, Ira Winkler, Ted Coombs Cybersecurity All-in-One For Dummies (Paperback)
Joseph Steinberg, Kevin Beaver, Ira Winkler, Ted Coombs
R1,120 R831 Discovery Miles 8 310 Save R289 (26%) Ships in 9 - 17 working days

Over 700 pages of insight into all things cybersecurity Cybersecurity All-in-One For Dummies covers a lot of ground in the world of keeping computer systems safe from those who want to break in. This book offers a one-stop resource on cybersecurity basics, personal security, business security, cloud security, security testing, and security awareness. Filled with content to help with both personal and business cybersecurity needs, this book shows you how to lock down your computers, devices, and systems--and explains why doing so is more important now than ever. Dig in for info on what kind of risks are out there, how to protect a variety of devices, strategies for testing your security, securing cloud data, and steps for creating an awareness program in an organization. Explore the basics of cybersecurity at home and in business Learn how to secure your devices, data, and cloud-based assets Test your security to find holes and vulnerabilities before hackers do Create a culture of cybersecurity throughout an entire organization This For Dummies All-in-One is a stellar reference for business owners and IT support pros who need a guide to making smart security choices. Any tech user with concerns about privacy and protection will also love this comprehensive guide.

Cyber Strategy - Risk-Driven Security and Resiliency (Paperback): Carol A. Siegel, Mark Sweeney Cyber Strategy - Risk-Driven Security and Resiliency (Paperback)
Carol A. Siegel, Mark Sweeney
R1,239 Discovery Miles 12 390 Ships in 10 - 15 working days

Cyber Strategy: Risk-Driven Security and Resiliency provides a process and roadmap for any company to develop its unified Cybersecurity and Cyber Resiliency strategies. It demonstrates a methodology for companies to combine their disassociated efforts into one corporate plan with buy-in from senior management that will efficiently utilize resources, target high risk threats, and evaluate risk assessment methodologies and the efficacy of resultant risk mitigations. The book discusses all the steps required from conception of the plan from preplanning (mission/vision, principles, strategic objectives, new initiatives derivation), project management directives, cyber threat and vulnerability analysis, cyber risk and controls assessment to reporting and measurement techniques for plan success and overall strategic plan performance. In addition, a methodology is presented to aid in new initiative selection for the following year by identifying all relevant inputs. Tools utilized include: Key Risk Indicators (KRI) and Key Performance Indicators (KPI) National Institute of Standards and Technology (NIST) Cyber Security Framework (CSF) Target State Maturity interval mapping per initiative Comparisons of current and target state business goals and critical success factors A quantitative NIST-based risk assessment of initiative technology components Responsible, Accountable, Consulted, Informed (RACI) diagrams for Cyber Steering Committee tasks and Governance Boards' approval processes Swimlanes, timelines, data flow diagrams (inputs, resources, outputs), progress report templates, and Gantt charts for project management The last chapter provides downloadable checklists, tables, data flow diagrams, figures, and assessment tools to help develop your company's cybersecurity and cyber resiliency strategic plan.

IoT - Security and Privacy Paradigm (Hardcover): Souvik Pal, Vicente Garcia Diaz, Dac-Nhuong Le IoT - Security and Privacy Paradigm (Hardcover)
Souvik Pal, Vicente Garcia Diaz, Dac-Nhuong Le
R5,072 Discovery Miles 50 720 Ships in 10 - 15 working days

IOT: Security and Privacy Paradigm covers the evolution of security and privacy issues in the Internet of Things (IoT). It focuses on bringing all security and privacy related technologies into one source, so that students, researchers, and practitioners can refer to this book for easy understanding of IoT security and privacy issues. This edited book uses Security Engineering and Privacy-by-Design principles to design a secure IoT ecosystem and to implement cyber-security solutions. This book takes the readers on a journey that begins with understanding the security issues in IoT-enabled technologies and how it can be applied in various aspects. It walks readers through engaging with security challenges and builds a safe infrastructure for IoT devices. The book helps readers gain an understand of security architecture through IoT and describes the state of the art of IoT countermeasures. It also differentiates security threats in IoT-enabled infrastructure from traditional ad hoc or infrastructural networks, and provides a comprehensive discussion on the security challenges and solutions in RFID, WSNs, in IoT. This book aims to provide the concepts of related technologies and novel findings of the researchers through its chapter organization. The primary audience includes specialists, researchers, graduate students, designers, experts and engineers who are focused on research and security related issues. Souvik Pal, PhD, has worked as Assistant Professor in Nalanda Institute of Technology, Bhubaneswar, and JIS College of Engineering, Kolkata (NAAC "A" Accredited College). He is the organizing Chair and Plenary Speaker of RICE Conference in Vietnam; and organizing co-convener of ICICIT, Tunisia. He has served in many conferences as chair, keynote speaker, and he also chaired international conference sessions and presented session talks internationally. His research area includes Cloud Computing, Big Data, Wireless Sensor Network (WSN), Internet of Things, and Data Analytics. Vicente Garcia-Diaz, PhD, is an Associate Professor in the Department of Computer Science at the University of Oviedo (Languages and Computer Systems area). He is also the editor of several special issues in prestigious journals such as Scientific Programming and International Journal of Interactive Multimedia and Artificial Intelligence. His research interests include eLearning, machine learning and the use of domain specific languages in different areas. Dac-Nhuong Le, PhD, is Deputy-Head of Faculty of Information Technology, and Vice-Director of Information Technology Apply and Foreign Language Training Center, Haiphong University, Vietnam. His area of research includes: evaluation computing and approximate algorithms, network communication, security and vulnerability, network performance analysis and simulation, cloud computing, IoT and image processing in biomedical. Presently, he is serving on the editorial board of several international journals and has authored nine computer science books published by Springer, Wiley, CRC Press, Lambert Publication, and Scholar Press.

Web Services - ICWS 2019 - 26th International Conference, Held as Part of the Services Conference Federation, SCF 2019, San... Web Services - ICWS 2019 - 26th International Conference, Held as Part of the Services Conference Federation, SCF 2019, San Diego, CA, USA, June 25-30, 2019, Proceedings (Paperback, 1st ed. 2019)
John Miller, Eleni Stroulia, Kisung Lee, Liang-Jie Zhang
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This volume constitutes the proceedings of the 26th International Conference on Web Services, ICWS 2019, held as part of SCF 2019 in San Diego, CA, USA in June 2019. The 11 full papers together with 1 short paper published in this volume were carefully reviewed and selected from 31 submissions. ICWS has been a prime international forum for both researchers and industry practitioners to exchange the latest fundamental advances in the state of the art and practice of Web-based services, to identify emerging research topics, and to define the future of Web-based services. Topics include Internet services modeling, discovery, composition, testing, adaptation, delivery, as well as standards.

The Ecosystem of e-Business: Technologies, Stakeholders, and Connections - 17th Workshop on e-Business, WeB 2018, Santa Clara,... The Ecosystem of e-Business: Technologies, Stakeholders, and Connections - 17th Workshop on e-Business, WeB 2018, Santa Clara, CA, USA, December 12, 2018, Revised Selected Papers (Paperback, 1st ed. 2019)
Jennifer J. Xu, Bin Zhu, Xiao Liu, Michael J. Shaw, Han Zhang, …
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book constitutes revised selected papers from the 17th Workshop on e-Business, WeB 2018, which took place in Santa Clara, CA, USA, in December 2018. The purpose of WeB is to provide an open forum for e-Business researchers and practitioners world-wide, to share topical research findings, explore novel ideas, discuss success stories and lessons learned, map out major challenges, and collectively chart future directions for e-Business. The WeB 2018 theme was "The Ecosystem of e-Business: Technologies, Stakeholders, and Connections." There was a total of 47 submissions and 41 papers were presented at the conference. Of these, 19 revised papers are presented in this volume. These contributions are organized in the following topical sections: social, policy, and privacy issues; e-market; FinTech; and artificial intelligence.

Big Data Analytics and Computing for Digital Forensic Investigations (Hardcover): Suneeta Satpathy, Sachi Mohanty Big Data Analytics and Computing for Digital Forensic Investigations (Hardcover)
Suneeta Satpathy, Sachi Mohanty
R2,466 Discovery Miles 24 660 Ships in 10 - 15 working days

Digital forensics has recently gained a notable development and become the most demanding area in today's information security requirement. This book investigates the areas of digital forensics, digital investigation and data analysis procedures as they apply to computer fraud and cybercrime, with the main objective of describing a variety of digital crimes and retrieving potential digital evidence. Big Data Analytics and Computing for Digital Forensic Investigations gives a contemporary view on the problems of information security. It presents the idea that protective mechanisms and software must be integrated along with forensic capabilities into existing forensic software using big data computing tools and techniques. Features Describes trends of digital forensics served for big data and the challenges of evidence acquisition Enables digital forensic investigators and law enforcement agencies to enhance their digital investigation capabilities with the application of data science analytics, algorithms and fusion technique This book is focused on helping professionals as well as researchers to get ready with next-generation security systems to mount the rising challenges of computer fraud and cybercrimes as well as with digital forensic investigations. Dr Suneeta Satpathy has more than ten years of teaching experience in different subjects of the Computer Science and Engineering discipline. She is currently working as an associate professor in the Department of Computer Science and Engineering, College of Bhubaneswar, affiliated with Biju Patnaik University and Technology, Odisha. Her research interests include computer forensics, cybersecurity, data fusion, data mining, big data analysis and decision mining. Dr Sachi Nandan Mohanty is an associate professor in the Department of Computer Science and Engineering at ICFAI Tech, ICFAI Foundation for Higher Education, Hyderabad, India. His research interests include data mining, big data analysis, cognitive science, fuzzy decision-making, brain-computer interface, cognition and computational intelligence.

Smart and Innovative Trends in Next Generation Computing Technologies - Third International Conference, NGCT 2017, Dehradun,... Smart and Innovative Trends in Next Generation Computing Technologies - Third International Conference, NGCT 2017, Dehradun, India, October 30-31, 2017, Revised Selected Papers, Part II (Paperback, 1st ed. 2018)
Pushpak Bhattacharyya, Hanumat G. Sastry, Venkatadri Marriboyina, Rashmi Sharma
R2,847 Discovery Miles 28 470 Ships in 18 - 22 working days

The two-volume set CCIS 827 and 828 constitutes the thoroughly refereed proceedings of the Third International Conference on Next Generation Computing Technologies, NGCT 2017, held in Dehradun, India, in October 2017. The 135 full papers presented were carefully reviewed and selected from 948 submissions. There were organized in topical sections named: Smart and Innovative Trends in Communication Protocols and Standards; Smart and Innovative Trends in Computational Intelligence and Data Science; Smart and Innovative Trends in Image Processing and Machine Vision; Smart Innovative Trends in Natural Language Processing for Indian Languages; Smart Innovative Trends in Security and Privacy.

Hello World - How  to be Human in the Age of the Machine (Paperback): Hannah Fry Hello World - How to be Human in the Age of the Machine (Paperback)
Hannah Fry 2
R314 R284 Discovery Miles 2 840 Save R30 (10%) Ships in 9 - 17 working days

_______________ 'One of the best books yet written on data and algorithms. . .deserves a place on the bestseller charts.' (The Times) You are accused of a crime. Who would you rather determined your fate - a human or an algorithm? An algorithm is more consistent and less prone to error of judgement. Yet a human can look you in the eye before passing sentence. Welcome to the age of the algorithm, the story of a not-too-distant future where machines rule supreme, making important decisions - in healthcare, transport, finance, security, what we watch, where we go even who we send to prison. So how much should we rely on them? What kind of future do we want? Hannah Fry takes us on a tour of the good, the bad and the downright ugly of the algorithms that surround us. In Hello World she lifts the lid on their inner workings, demonstrates their power, exposes their limitations, and examines whether they really are an improvement on the humans they are replacing. A BBC RADIO 4: BOOK OF THE WEEK SHORTLISTED FOR THE 2018 BAILLIE GIFFORD PRIZE AND 2018 ROYAL SOCIETY SCIENCE BOOK PRIZE

Nuking the Moon - And Other Intelligence Schemes and Military Plots Best Left on the Drawing Board (Paperback, Main): Vince... Nuking the Moon - And Other Intelligence Schemes and Military Plots Best Left on the Drawing Board (Paperback, Main)
Vince Houghton 1
R310 R284 Discovery Miles 2 840 Save R26 (8%) Ships in 10 - 15 working days

"Compulsively readable laugh out loud history." Mary Roach Bomb-carrying bats. Poisoned flower arrangements. Cigars laced with mind-altering drugs. Listening devices implanted into specially-trained cats. A torpedo-proof aircraft carrier made out of ice and sawdust. And a CIA plan to detonate a nuclear bomb on the moon ... just because. In Nuking the Moon, Vince Houghton, Historian and Curator at the International Spy Museum, collects the most inspired, implausible and downright bizarre military intelligence schemes that never quite made it off the drawing board. From the grandly ambitious to the truly devious, they illuminate a new side of warfare, revealing how a combination of desperation and innovation led not only to daring missions and brilliant technological advances, but to countless plans and experiments that failed spectacularly. Alternatively terrifying and hilarious, and combining archival research with newly-conducted interviews, these twenty-six chapters reveal not only what might have happened, but also what each one tells us about the history and people around it. If 'military intelligence' makes you think of James Bond and ingenious exploding gadgets ... get ready for the true story.

Ethics in an Age of Surveillance - Personal Information and Virtual Identities (Hardcover): Adam Henschke Ethics in an Age of Surveillance - Personal Information and Virtual Identities (Hardcover)
Adam Henschke
R3,068 Discovery Miles 30 680 Ships in 10 - 15 working days

People increasingly live online, sharing publicly what might have once seemed private, but at the same time are enraged by extremes of government surveillance and the corresponding invasion into our private lives. In this enlightening work, Adam Henschke re-examines privacy and property in the age of surveillance in order to understand not only the importance of these social conventions, but also their moral relevance. By analyzing identity and information, and presenting a case for a relation between the two, he explains the moral importance of virtual identities and offers an ethically robust solution to designing surveillance technologies. This book should be read by anyone interested in surveillance technology, new information technology more generally, and social concepts like privacy and property.

Privacy Technologies and Policy - 6th Annual Privacy Forum, APF 2018, Barcelona, Spain, June 13-14, 2018, Revised Selected... Privacy Technologies and Policy - 6th Annual Privacy Forum, APF 2018, Barcelona, Spain, June 13-14, 2018, Revised Selected Papers (Paperback, 1st ed. 2018)
Manel Medina, Andreas Mitrakas, Kai Rannenberg, Erich Schweighofer, Nikolaos Tsouroulas
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 6th Annual Privacy Forum, APF 2018, held in Barcelona, Spain, in June 2018. The 11 revised full papers were carefully reviewed and selected from 49 submissions. The papers are grouped in topical sections named: technical analysis and techniques; privacy implementation; compliance; and legal aspects.

Smart and Innovative Trends in Next Generation Computing Technologies - Third International Conference, NGCT 2017, Dehradun,... Smart and Innovative Trends in Next Generation Computing Technologies - Third International Conference, NGCT 2017, Dehradun, India, October 30-31, 2017, Revised Selected Papers, Part I (Paperback, 1st ed. 2018)
Pushpak Bhattacharyya, Hanumat G. Sastry, Venkatadri Marriboyina, Rashmi Sharma
R3,255 Discovery Miles 32 550 Ships in 18 - 22 working days

The two-volume set CCIS 827 and 828 constitutes the thoroughly refereed proceedings of the Third International Conference on Next Generation Computing Technologies, NGCT 2017, held in Dehradun, India, in October 2017. The 135 full papers presented were carefully reviewed and selected from 948 submissions. There were organized in topical sections named: Smart and Innovative Trends in Communication Protocols and Standards; Smart and Innovative Trends in Computational Intelligence and Data Science; Smart and Innovative Trends in Image Processing and Machine Vision; Smart Innovative Trends in Natural Language Processing for Indian Languages; Smart Innovative Trends in Security and Privacy.

A Practical Guide to Privacy in Libraries (Paperback): Paul Pedley A Practical Guide to Privacy in Libraries (Paperback)
Paul Pedley
R1,808 Discovery Miles 18 080 Ships in 10 - 15 working days

Privacy is a core value of librarianship and yet as a concept, it is difficult to define and in practice, a challenge to uphold. This groundbreaking new book considers how privacy issues can arise in a library context and what library and information professionals can do to protect the privacy of their users. A Practical Guide to Privacy in Libraries features a wide range of practical examples of such issues, providing insights and practical steps which readers can follow. In-depth case studies and scenarios support the examples laid out in the book, while examples of data breaches which have occurred in a library setting, and the lessons we can learn from them, are also included. The book also covers the main legislation governing data protection - GDPR - which will be particularly relevant to European librarians, and international librarians offering services to EU citizens. The book provides a range of tools through which libraries can communicate how they handle the personal data of their users whilst ensuring that they are following best practice with their privacy policy statements, their privacy audits and data protection impact assessments. Privacy is not the same thing as data protection, and the book outlines the differences between these two concepts. Nevertheless, the book has been written with the requirements of data protection law very much in mind. Written in a highly practical manner, this book is essential reading for library and information professionals who need to understand and support privacy in the library setting and a useful reference for students and researchers in the field who need to understand this topic in practice.

Advanced Persistent Training - Take Your Security Awareness Program to the Next Level (Paperback, 1st ed.): Jordan Schroeder Advanced Persistent Training - Take Your Security Awareness Program to the Next Level (Paperback, 1st ed.)
Jordan Schroeder
R1,667 Discovery Miles 16 670 Ships in 18 - 22 working days

Gain greater compliance with corporate training by addressing the heart of the very awareness vs. compliance problem: people are human. People have incredible strengths and incredible weaknesses, and as a Information Security professional, you need to recognize and devise training strategies that take advantage of both. This concise book introduces two such strategies, which combined, can take a security awareness program to the next level of effectiveness, retention, compliance, and maturity. Security policies and procedures are often times inconvenient, technically complex, and hard to understand. Advanced Persistent Training provides numerous tips from a wide range of disciplines to handle these especially difficult situations. Many information security professionals are required by regulation or policy to provide security awareness training within the companies they work for, but many believe that the resulting low compliance with training does not outweigh the costs of delivering that training. There are also many who believe that this training is crucial, if only it could be more effective. What you will learn: Present awareness materials all year-round in a way that people will really listen. Implement a "behavior-first" approach to teaching security awareness. Adopt to gamification the right way, even for people who hate games. Use tips from security awareness leaders addressing the same problems you face. Who is this book for Security awareness professionals or IT Security professionals who are tasked with teaching security awareness within their organization.

Advanced Computing and Systems for Security - Volume Four (Paperback, 1st ed. 2017): Rituparna Chaki, Khalid Saeed, Agostino... Advanced Computing and Systems for Security - Volume Four (Paperback, 1st ed. 2017)
Rituparna Chaki, Khalid Saeed, Agostino Cortesi, Nabendu Chaki
R1,868 Discovery Miles 18 680 Ships in 18 - 22 working days

This book presents extended versions of papers originally presented and discussed at the 3rd International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2016) held from August 12 to 14, 2016 in Kolkata, India. The symposium was jointly organized by the AGH University of Science & Technology, Cracow, Poland; Ca' Foscari University, Venice, Italy; and the University of Calcutta, India. The book is divided into two volumes, Volumes 3 and 4, and presents dissertation works in the areas of Image Processing, Biometrics-based Authentication, Soft Computing, Data Mining, Next-Generation Networking and Network Security, Remote Healthcare, Communications, Embedded Systems, Software Engineering and Service Engineering. The first two volumes of the book published the works presented at the ACSS 2015, which was held from May 23 to 25, 2015 in Kolkata, India.

Privacy-Preserving Machine Learning (Paperback, 1st ed. 2022): Jin Li, Ping Li, Zheli Liu, Xiaofeng Chen, Tong Li Privacy-Preserving Machine Learning (Paperback, 1st ed. 2022)
Jin Li, Ping Li, Zheli Liu, Xiaofeng Chen, Tong Li
R1,533 Discovery Miles 15 330 Ships in 10 - 15 working days

This book provides a thorough overview of the evolution of privacy-preserving machine learning schemes over the last ten years, after discussing the importance of privacy-preserving techniques. In response to the diversity of Internet services, data services based on machine learning are now available for various applications, including risk assessment and image recognition. In light of open access to datasets and not fully trusted environments, machine learning-based applications face enormous security and privacy risks. In turn, it presents studies conducted to address privacy issues and a series of proposed solutions for ensuring privacy protection in machine learning tasks involving multiple parties. In closing, the book reviews state-of-the-art privacy-preserving techniques and examines the security threats they face.

Advanced Computing and Systems for Security - Volume Three (Paperback, 1st ed. 2017): Rituparna Chaki, Khalid Saeed, Agostino... Advanced Computing and Systems for Security - Volume Three (Paperback, 1st ed. 2017)
Rituparna Chaki, Khalid Saeed, Agostino Cortesi, Nabendu Chaki
R1,920 Discovery Miles 19 200 Ships in 18 - 22 working days

This book presents extended versions of papers originally presented and discussed at the 3rd International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2016) held from August 12 to 14, 2016 in Kolkata, India. The symposium was jointly organized by the AGH University of Science & Technology, Cracow, Poland; Ca' Foscari University, Venice, Italy; and the University of Calcutta, India. The book is divided into two volumes, Volumes 3 and 4, and presents dissertation works in the areas of Image Processing, Biometrics-based Authentication, Soft Computing, Data Mining, Next-Generation Networking and Network Security, Remote Healthcare, Communications, Embedded Systems, Software Engineering and Service Engineering. The first two volumes of the book published the works presented at the ACSS 2015, which was held from May 23 to 25, 2015 in Kolkata, India.

Privacy-Preserving Machine Learning (Paperback): Di Zhuang, G. Samaraweera, J Chang Privacy-Preserving Machine Learning (Paperback)
Di Zhuang, G. Samaraweera, J Chang
R1,485 Discovery Miles 14 850 Ships in 10 - 15 working days

Privacy-Preserving Machine Learning is a practical guide to keeping ML data anonymous and secure. You'll learn the core principles behind different privacy preservation technologies, and how to put theory into practice for your own machine learning. Complex privacy-enhancing technologies are demystified through real world use cases forfacial recognition, cloud data storage, and more. Alongside skills for technical implementation, you'll learn about current and future machine learning privacy challenges and how to adapt technologies to your specific needs. By the time you're done, you'll be able to create machine learning systems that preserve user privacy without sacrificing data quality and model performance. Large-scale scandals such as the Facebook Cambridge Analytic a data breach have made many users wary of sharing sensitive and personal information. Demand has surged among machine learning engineers for privacy-preserving techniques that can keep users private details secure without adversely affecting the performance of models.

Managing Risk and Information Security - Protect to Enable (Paperback, 2nd ed.): Malcolm W. Harkins Managing Risk and Information Security - Protect to Enable (Paperback, 2nd ed.)
Malcolm W. Harkins
R1,591 Discovery Miles 15 910 Ships in 18 - 22 working days

Examine the evolving enterprise security landscape and discover how to manage and survive risk. While based primarily on the author's experience and insights at major companies where he has served as CISO and CSPO, the book also includes many examples from other well-known companies and provides guidance for a management-level audience. Managing Risk and Information Security provides thought leadership in the increasingly important area of enterprise information risk and security. It describes the changing risk environment and why a fresh approach to information security is needed. Because almost every aspect of an enterprise is now dependent on technology not only for internal operations but increasing as a part of product or service creation, the focus of IT security must shift from locking down assets to enabling the business while managing and surviving risk. This edition discusses business risk from a broader perspective, including privacy and regulatory considerations. It describes the increasing number of threats and vulnerabilities and offers strategies for developing solutions. These include discussions of how enterprises can take advantage of new and emerging technologies-such as social media and the huge proliferation of Internet-enabled devices-while minimizing risk. What You'll Learn Review how people perceive risk and the effects it has on information security See why different perceptions of risk within an organization matters Understand and reconcile these differing risk views Gain insights into how to safely enable the use of new technologies Who This Book Is ForThe primary audience is CIOs and other IT leaders, CISOs and other information security leaders, IT auditors, and other leaders of corporate governance and risk functions. The secondary audience is CEOs, board members, privacy professionals, and less senior-level information security and risk professionals. "Harkins' logical, methodical approach as a CISO to solving the most complex cybersecurity problems is reflected in the lucid style of this book. His enlightened approach to intelligence-based security infrastructure and risk mitigation is our best path forward if we are ever to realize the vast potential of the innovative digital world we are creating while reducing the threats to manageable levels. The author shines a light on that path in a comprehensive yet very readable way." -Art Coviello, Former CEO and Executive Chairman, RSA

Ad Hoc Networks - 7th International Conference, AdHocHets 2015, San Remo, Italy, September 1-2, 2015. Proceedings (Paperback,... Ad Hoc Networks - 7th International Conference, AdHocHets 2015, San Remo, Italy, September 1-2, 2015. Proceedings (Paperback, 1st ed. 2015)
Nathalie Mitton, Melike Erol Kantarci, Antoine Gallais, Symeon Papavassiliou
R2,089 Discovery Miles 20 890 Ships in 18 - 22 working days

This book constitutes the proceedings of the International Conference on Ad Hoc Networks, ADHOCNETS 2015, held in September 2015 in Italy. The 17 regular and 3 invited papers presented were carefully reviewed and selected from numerous submissions. The papers cover topics such as physical layer; MAC and routing; mobility in networks; self-organization, virtualization and localization; cloud, virtualization and prototypage; security and fault tolerance in wireless mobile networks.

Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II (Paperback, 1st ed. 2016)
Jung Hee Cheon, Tsuyoshi Takagi
R2,860 Discovery Miles 28 600 Ships in 18 - 22 working days

The two-volume set LNCS 10031 and LNCS 10032 constitutes the refereed proceedings of the 22nd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2016, held in Hanoi, Vietnam, in December 2016. The 67 revised full papers and 2 invited talks presented were carefully selected from 240 submissions. They are organized in topical sections on Mathematical Analysis; AES and White-Box; Hash Function; Randomness; Authenticated Encryption; Block Cipher; SCA and Leakage Resilience; Zero Knowledge; Post Quantum Cryptography; Provable Security; Digital Signature; Functional and Homomorphic Cryptography; ABE and IBE; Foundation; Cryptographic Protocol; Multi-Party Computation.

Advances in Human Factors in Cybersecurity - Proceedings of the AHFE 2016 International Conference on Human Factors in  ... Advances in Human Factors in Cybersecurity - Proceedings of the AHFE 2016 International Conference on Human Factors in Cybersecurity, July 27-31, 2016, Walt Disney World (R), Florida, USA (Paperback, 1st ed. 2016)
Denise Nicholson
R5,406 Discovery Miles 54 060 Ships in 18 - 22 working days

This book reports on the latest research and developments in the field of cybersecurity, giving a special emphasis on personal security and new methods for reducing human error and increasing cyber awareness, and innovative solutions for increasing the security of advanced Information Technology (IT) infrastructures. It covers a wealth of topics, including methods for human training, novel Cyber-Physical and Process-Control Systems, social, economic and behavioral aspects of the cyberspace, issues concerning the cyber security index, security metrics for enterprises, risk evaluation, and many others. Based on the AHFE 2016 International Conference on Human Factors in Cybersecurity, held on July 27-31, 2016, in Walt Disney World (R), Florida, USA, this book not only presents innovative cybersecurity technologies, but also discusses emerging threats, current gaps in the available systems and future challenges that may be coped with through the help of human factors research.

Parenting for the Digital Generation - A Guide to Digital Education and the Online Environment (Hardcover): Jon M Garon Parenting for the Digital Generation - A Guide to Digital Education and the Online Environment (Hardcover)
Jon M Garon
R1,031 Discovery Miles 10 310 Ships in 18 - 22 working days

Parenting for the Digital Generationprovides a practical handbook for parents, grandparents, teachers, and counselors who want to understand both the opportunities and the threats that exist for the generation of digital natives who are more familiar with a smartphone than they are with a paper book. This book provides straightforward, jargon-free information regarding the online environment and the experience in which children and young adults engage both inside and outside the classroom. The digital environment creates many challenges, some of which are largely the same as parents faced before the Internet, but others which are entirely new. Many children struggle to connect, and they underperform in the absence of the social and emotional support of a healthy learning environment. Parents must also help their children navigate a complex and occasionally dangerous online world. This book provides a step-by-step guide for parents seeking to raise happy, mature, creative, and well-adjusted children. The guide provides clear explanations of the keys to navigating as a parent in the online environment while providing practical strategies that do not look for dangers where there are only remote threats.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Sensors and Systems for Indoor…
Riccardo Carotenuto, Massimo Merenda, … Hardcover R1,716 R1,479 Discovery Miles 14 790
Crossfire
Wilbur Smith, David Churchill Hardcover R399 R362 Discovery Miles 3 620
A System of Electrotherapeutics - Direct…
International Correspondence Schools Paperback R684 Discovery Miles 6 840
Verity
Colleen Hoover Paperback  (2)
R305 R272 Discovery Miles 2 720
Electromagnetic Compatibility in Power…
Francesco Lattarulo Hardcover R3,817 Discovery Miles 38 170
Adaptive Optics Progress
Robert Tyson Hardcover R3,107 Discovery Miles 31 070
Doolhof
Rudie van Rensburg Paperback R365 R326 Discovery Miles 3 260
Camino Ghosts
John Grisham Paperback R470 R419 Discovery Miles 4 190
Practical Analog, Digital, and Embedded…
Brett D. DePaola Paperback R770 Discovery Miles 7 700
The Watchmaker's Hand
Jeffery Deaver Paperback R479 Discovery Miles 4 790

 

Partners