0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (122)
  • R250 - R500 (224)
  • R500+ (766)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

How to Destroy Surveillance Capitalism (Paperback): Cory Doctorow How to Destroy Surveillance Capitalism (Paperback)
Cory Doctorow
R291 R270 Discovery Miles 2 700 Save R21 (7%) Ships in 18 - 22 working days
Agenda de passwords - Agenda para enderecos electronicos e passwords - Capa cavalo curioso (Portuguese, Paperback): Coisas... Agenda de passwords - Agenda para enderecos electronicos e passwords - Capa cavalo curioso (Portuguese, Paperback)
Coisas Realmente Uteis
R205 Discovery Miles 2 050 Ships in 18 - 22 working days
Privacy in the Age of Neuroscience - Reimagining Law, State and Market (Paperback): David Grant Privacy in the Age of Neuroscience - Reimagining Law, State and Market (Paperback)
David Grant
R992 Discovery Miles 9 920 Ships in 10 - 15 working days

Neuroscience has begun to intrude deeply into what it means to be human, an intrusion that offers profound benefits but will demolish our present understanding of privacy. In Privacy in the Age of Neuroscience, David Grant argues that we need to reconceptualize privacy in a manner that will allow us to reap the rewards of neuroscience while still protecting our privacy and, ultimately, our humanity. Grant delves into our relationship with technology, the latest in what he describes as a historical series of 'magnitudes', following Deity, the State and the Market, proposing the idea that, for this new magnitude (Technology), we must control rather than be subjected to it. In this provocative work, Grant unveils a radical account of privacy and an equally radical proposal to create the social infrastructure we need to support it.

Privacy in the Age of Neuroscience - Reimagining Law, State and Market (Hardcover): David Grant Privacy in the Age of Neuroscience - Reimagining Law, State and Market (Hardcover)
David Grant
R3,318 R2,799 Discovery Miles 27 990 Save R519 (16%) Ships in 10 - 15 working days

Neuroscience has begun to intrude deeply into what it means to be human, an intrusion that offers profound benefits but will demolish our present understanding of privacy. In Privacy in the Age of Neuroscience, David Grant argues that we need to reconceptualize privacy in a manner that will allow us to reap the rewards of neuroscience while still protecting our privacy and, ultimately, our humanity. Grant delves into our relationship with technology, the latest in what he describes as a historical series of 'magnitudes', following Deity, the State and the Market, proposing the idea that, for this new magnitude (Technology), we must control rather than be subjected to it. In this provocative work, Grant unveils a radical account of privacy and an equally radical proposal to create the social infrastructure we need to support it.

Agenda de passwords - Agenda para endere os electr nicos e passwords - Capa p nei pequeno (Portuguese, Paperback): Coisas... Agenda de passwords - Agenda para endere os electr nicos e passwords - Capa p nei pequeno (Portuguese, Paperback)
Coisas Realmente Uteis
R205 Discovery Miles 2 050 Ships in 18 - 22 working days
Agenda de Senhas - Agenda para enderecos eletronicos e senhas: Capa cavalo curioso - Portugues (Brasil) (Portuguese,... Agenda de Senhas - Agenda para enderecos eletronicos e senhas: Capa cavalo curioso - Portugues (Brasil) (Portuguese, Paperback)
Agendas E Cadernos
R206 Discovery Miles 2 060 Ships in 18 - 22 working days
Agenda de passwords - Agenda para endere os electr nicos e passwords - Capa potro bonito (Portuguese, Paperback): Coisas... Agenda de passwords - Agenda para endere os electr nicos e passwords - Capa potro bonito (Portuguese, Paperback)
Coisas Realmente Uteis
R205 Discovery Miles 2 050 Ships in 18 - 22 working days
Agenda delle password - Agenda degli indirizzi web e delle password di accesso - Copertina cavallo curioso (Italian,... Agenda delle password - Agenda degli indirizzi web e delle password di accesso - Copertina cavallo curioso (Italian, Paperback)
Agende Pratiche
R205 Discovery Miles 2 050 Ships in 18 - 22 working days
Containing Big Tech - How To Protect Our Civil Rights, Economy, And Democracy (Hardcover): Tom Kemp Containing Big Tech - How To Protect Our Civil Rights, Economy, And Democracy (Hardcover)
Tom Kemp
R656 R595 Discovery Miles 5 950 Save R61 (9%) In Stock

The path forward to rein in online surveillance, AI, and tech monopolies.

Technology is a gift and a curse. The five Big Tech companies―Meta, Apple, Amazon, Microsoft, and Google―have built innovative products that improve many aspects of our lives. But their intrusiveness and our dependence on them have created pressing threats to our civil rights, economy, and democracy.

Coming from an extensive background building Silicon Valley-based tech startups, Tom Kemp eloquently and precisely weaves together the threats posed by Big Tech:

  • the overcollection and weaponization of our most sensitive data
  • the problematic ways Big Tech uses AI to process and act upon our data
  • the stifling of competition and entrepreneurship due to Big Tech's dominant market position

This richly detailed book exposes the consequences of Big Tech's digital surveillance, exploitative use of AI, and monopolistic and anticompetitive practices. It offers actionable solutions to these problems and a clear path forward for individuals and policymakers to advocate for change. By containing the excesses of Big Tech, we will ensure our civil rights are respected and preserved, our economy is competitive, and our democracy is protected.

Agenda delle password - Agenda degli indirizzi web e delle password di accesso - Copertina piccolo pony (Italian, Paperback):... Agenda delle password - Agenda degli indirizzi web e delle password di accesso - Copertina piccolo pony (Italian, Paperback)
Agende Pratiche
R205 Discovery Miles 2 050 Ships in 18 - 22 working days
After the Digital Tornado - Networks, Algorithms, Humanity (Hardcover): Kevin Werbach After the Digital Tornado - Networks, Algorithms, Humanity (Hardcover)
Kevin Werbach
R3,471 R2,926 Discovery Miles 29 260 Save R545 (16%) Ships in 10 - 15 working days

Networks powered by algorithms are pervasive. Major contemporary technology trends - Internet of Things, Big Data, Digital Platform Power, Blockchain, and the Algorithmic Society - are manifestations of this phenomenon. The internet, which once seemed an unambiguous benefit to society, is now the basis for invasions of privacy, massive concentrations of power, and wide-scale manipulation. The algorithmic networked world poses deep questions about power, freedom, fairness, and human agency. The influential 1997 Federal Communications Commission whitepaper "Digital Tornado" hailed the "endless spiral of connectivity" that would transform society, and today, little remains untouched by digital connectivity. Yet fundamental questions remain unresolved, and even more serious challenges have emerged. This important collection, which offers a reckoning and a foretelling, features leading technology scholars who explain the legal, business, ethical, technical, and public policy challenges of building pervasive networks and algorithms for the benefit of humanity. This title is also available as Open Access on Cambridge Core.

Agenda de Senhas - Agenda Para Endere os Eletr nicos E Senhas: Capa P nei Pequeno - Portugu s (Brasil) (Portuguese, Paperback):... Agenda de Senhas - Agenda Para Endere os Eletr nicos E Senhas: Capa P nei Pequeno - Portugu s (Brasil) (Portuguese, Paperback)
Agendas E Cadernos
R205 Discovery Miles 2 050 Ships in 18 - 22 working days
Agenda de passwords - Agenda para enderecos electronicos e passwords - Capa cavalo preto (Portuguese, Paperback): Coisas... Agenda de passwords - Agenda para enderecos electronicos e passwords - Capa cavalo preto (Portuguese, Paperback)
Coisas Realmente Uteis
R205 Discovery Miles 2 050 Ships in 18 - 22 working days
Agenda de Senhas - Agenda para enderecos eletronicos e senhas: Capa potro bonito - Portugues (Brasil) (Portuguese, Paperback):... Agenda de Senhas - Agenda para enderecos eletronicos e senhas: Capa potro bonito - Portugues (Brasil) (Portuguese, Paperback)
Agendas E Cadernos
R205 Discovery Miles 2 050 Ships in 18 - 22 working days
Agenda delle password - Agenda degli indirizzi web e delle password di accesso - Copertina tenero puledro (Italian, Paperback):... Agenda delle password - Agenda degli indirizzi web e delle password di accesso - Copertina tenero puledro (Italian, Paperback)
Agende Pratiche
R205 Discovery Miles 2 050 Ships in 18 - 22 working days
Agenda delle password - Agenda degli indirizzi web e delle password di accesso - Copertina cavallo nero (Italian, Paperback):... Agenda delle password - Agenda degli indirizzi web e delle password di accesso - Copertina cavallo nero (Italian, Paperback)
Agende Pratiche
R205 Discovery Miles 2 050 Ships in 18 - 22 working days
Google Hacking for Penetration Testers (Paperback, 3rd edition): Johnny Long, Bill Gardner, Justin Brown Google Hacking for Penetration Testers (Paperback, 3rd edition)
Johnny Long, Bill Gardner, Justin Brown
R1,273 Discovery Miles 12 730 Ships in 10 - 15 working days

Google is the most popular search engine ever created, but Google's search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web, including social security numbers, credit card numbers, trade secrets, and federally classified documents. Google Hacking for Penetration Testers, Third Edition, shows you how security professionals and system administratord manipulate Google to find this sensitive information and "self-police" their own organizations. You will learn how Google Maps and Google Earth provide pinpoint military accuracy, see how bad guys can manipulate Google to create super worms, and see how they can "mash up" Google with Facebook, LinkedIn, and more for passive reconnaissance. This third edition includes completely updated content throughout and all new hacks such as Google scripting and using Google hacking with other search engines and APIs. Noted author Johnny Long, founder of Hackers for Charity, gives you all the tools you need to conduct the ultimate open source reconnaissance and penetration testing.

Agenda de Senhas - Agenda para enderecos eletronicos e senhas: Capa cavalo preto - Portugues (Brasil) (Portuguese, Paperback):... Agenda de Senhas - Agenda para enderecos eletronicos e senhas: Capa cavalo preto - Portugues (Brasil) (Portuguese, Paperback)
Agendas E Cadernos
R206 Discovery Miles 2 060 Ships in 18 - 22 working days
Agenda de passwords - Agenda para endere os electr nicos e passwords - Capa French Mastiff (Portuguese, Paperback): Coisas... Agenda de passwords - Agenda para endere os electr nicos e passwords - Capa French Mastiff (Portuguese, Paperback)
Coisas Realmente Uteis
R205 Discovery Miles 2 050 Ships in 18 - 22 working days
Agenda de passwords - Agenda para endere os electr nicos e passwords - Capa Basset (Portuguese, Paperback): Coisas Realmente... Agenda de passwords - Agenda para endere os electr nicos e passwords - Capa Basset (Portuguese, Paperback)
Coisas Realmente Uteis
R205 Discovery Miles 2 050 Ships in 18 - 22 working days
Agenda de Senhas - Agenda para enderecos eletronicos e senhas: Capa French Mastiff - Portugues (Brasil) (Portuguese,... Agenda de Senhas - Agenda para enderecos eletronicos e senhas: Capa French Mastiff - Portugues (Brasil) (Portuguese, Paperback)
Agendas E Cadernos
R205 Discovery Miles 2 050 Ships in 18 - 22 working days
Handbook of IoT and Blockchain - Methods, Solutions, and Recent Advancements (Hardcover): Brojo Kishore Mishra, Sanjay Kumar... Handbook of IoT and Blockchain - Methods, Solutions, and Recent Advancements (Hardcover)
Brojo Kishore Mishra, Sanjay Kumar Kuanar, Sheng-Lung Peng, Daniel D. Dasig, Jr
R5,059 Discovery Miles 50 590 Ships in 10 - 15 working days

Handbook of IoT and Blockchain: Methods, solutions, and Recent Advancements includes contributions from around the globe on recent advances and findings in the domain of Internet of Things (IoT) and Blockchain. Chapters include theoretical analysis, practical implications, and extensive surveys with analysis on methods, algorithms, and processes for new product development. IoT and Blockchain are the emerging topics in the current manufacturing scenario.This handbook includes recent advances; showcases the work of research around the globe; offers theoretical analysis and practical implications; presents extensive surveys with analysis, new contributions, and proposals on methods, algorithms, and processes; and also covers recent advances from quantitative and qualitative articles, case studies, conceptual works, and theoretical backing. This handbook will be of interest to graduate students, researchers, academicians, institutions, and professionals that are interested in exploring the areas of IoT and Blockchain.

Malware Analysis and Detection Engineering - A Comprehensive Approach to Detect and Analyze Modern Malware (Paperback, 1st... Malware Analysis and Detection Engineering - A Comprehensive Approach to Detect and Analyze Modern Malware (Paperback, 1st ed.)
Abhijit Mohanta, Anoop Saldanha
R2,132 R1,759 Discovery Miles 17 590 Save R373 (17%) Ships in 18 - 22 working days

Discover how the internals of malware work and how you can analyze and detect it. You will learn not only how to analyze and reverse malware, but also how to classify and categorize it, giving you insight into the intent of the malware. Malware Analysis and Detection Engineering is a one-stop guide to malware analysis that simplifies the topic by teaching you undocumented tricks used by analysts in the industry. You will be able to extend your expertise to analyze and reverse the challenges that malicious software throws at you. The book starts with an introduction to malware analysis and reverse engineering to provide insight on the different types of malware and also the terminology used in the anti-malware industry. You will know how to set up an isolated lab environment to safely execute and analyze malware. You will learn about malware packing, code injection, and process hollowing plus how to analyze, reverse, classify, and categorize malware using static and dynamic tools. You will be able to automate your malware analysis process by exploring detection tools to modify and trace malware programs, including sandboxes, IDS/IPS, anti-virus, and Windows binary instrumentation. The book provides comprehensive content in combination with hands-on exercises to help you dig into the details of malware dissection, giving you the confidence to tackle malware that enters your environment. What You Will Learn Analyze, dissect, reverse engineer, and classify malware Effectively handle malware with custom packers and compilers Unpack complex malware to locate vital malware components and decipher their intent Use various static and dynamic malware analysis tools Leverage the internals of various detection engineering tools to improve your workflow Write Snort rules and learn to use them with Suricata IDS Who This Book Is For Security professionals, malware analysts, SOC analysts, incident responders, detection engineers, reverse engineers, and network security engineers "This book is a beast! If you're looking to master the ever-widening field of malware analysis, look no further. This is the definitive guide for you." Pedram Amini, CTO Inquest; Founder OpenRCE.org and ZeroDayInitiative

Agenda delle password - Agenda degli indirizzi web e delle password di accesso - Copertina Mastino Francese (Italian,... Agenda delle password - Agenda degli indirizzi web e delle password di accesso - Copertina Mastino Francese (Italian, Paperback)
Agende Pratiche
R205 Discovery Miles 2 050 Ships in 18 - 22 working days
Ethics in an Age of Surveillance - Personal Information and Virtual Identities (Paperback): Adam Henschke Ethics in an Age of Surveillance - Personal Information and Virtual Identities (Paperback)
Adam Henschke
R982 Discovery Miles 9 820 Ships in 10 - 15 working days

People increasingly live online, sharing publicly what might have once seemed private, but at the same time are enraged by extremes of government surveillance and the corresponding invasion into our private lives. In this enlightening work, Adam Henschke re-examines privacy and property in the age of surveillance in order to understand not only the importance of these social conventions, but also their moral relevance. By analyzing identity and information, and presenting a case for a relation between the two, he explains the moral importance of virtual identities and offers an ethically robust solution to designing surveillance technologies. This book should be read by anyone interested in surveillance technology, new information technology more generally, and social concepts like privacy and property.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Of Grammatology
Jacques Derrida Paperback R980 Discovery Miles 9 800
Mechatronics '98
J. Adolfsson, J. Karlsen Hardcover R6,769 Discovery Miles 67 690
Analytical Design of PID Controllers
Ivan D. Diaz-Rodriguez, Sang-Jin Han, … Hardcover R3,366 Discovery Miles 33 660
Theory of Hybrid Systems: Deterministic…
Mohamad S. Alwan, Xinzhi Liu Hardcover R4,030 Discovery Miles 40 300
Janjak and Freda Go to the Citadelle
Elizabeth Turnbull Hardcover R544 Discovery Miles 5 440
Derrida, Literature and War - Absence…
Sean Gaston Hardcover R5,274 Discovery Miles 52 740
Aeroservoelasticity - Modeling and…
Ashish Tewari Hardcover R2,942 Discovery Miles 29 420
Quantitative Marketing and Marketing…
Adamantios Diamantopoulos, Wolfgang Fritz, … Hardcover R2,792 Discovery Miles 27 920
The Anti-Oedipus Complex - Lacan…
Rob Weatherill Hardcover R5,489 Discovery Miles 54 890
Fault Diagnosis and Fault-Tolerant…
Qikun Shen, Bin Jiang, … Hardcover R4,159 R3,359 Discovery Miles 33 590

 

Partners