|
|
Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection
 |
Web Services - ICWS 2019
- 26th International Conference, Held as Part of the Services Conference Federation, SCF 2019, San Diego, CA, USA, June 25-30, 2019, Proceedings
(Paperback, 1st ed. 2019)
John Miller, Eleni Stroulia, Kisung Lee, Liang-Jie Zhang
|
R1,408
Discovery Miles 14 080
|
Ships in 18 - 22 working days
|
|
|
This volume constitutes the proceedings of the 26th International
Conference on Web Services, ICWS 2019, held as part of SCF 2019 in
San Diego, CA, USA in June 2019. The 11 full papers together with 1
short paper published in this volume were carefully reviewed and
selected from 31 submissions. ICWS has been a prime international
forum for both researchers and industry practitioners to exchange
the latest fundamental advances in the state of the art and
practice of Web-based services, to identify emerging research
topics, and to define the future of Web-based services. Topics
include Internet services modeling, discovery, composition,
testing, adaptation, delivery, as well as standards.
 |
The Ecosystem of e-Business: Technologies, Stakeholders, and Connections
- 17th Workshop on e-Business, WeB 2018, Santa Clara, CA, USA, December 12, 2018, Revised Selected Papers
(Paperback, 1st ed. 2019)
Jennifer J. Xu, Bin Zhu, Xiao Liu, Michael J. Shaw, Han Zhang, …
|
R1,408
Discovery Miles 14 080
|
Ships in 18 - 22 working days
|
|
|
This book constitutes revised selected papers from the 17th
Workshop on e-Business, WeB 2018, which took place in Santa Clara,
CA, USA, in December 2018. The purpose of WeB is to provide an open
forum for e-Business researchers and practitioners world-wide, to
share topical research findings, explore novel ideas, discuss
success stories and lessons learned, map out major challenges, and
collectively chart future directions for e-Business. The WeB 2018
theme was "The Ecosystem of e-Business: Technologies, Stakeholders,
and Connections." There was a total of 47 submissions and 41 papers
were presented at the conference. Of these, 19 revised papers are
presented in this volume. These contributions are organized in the
following topical sections: social, policy, and privacy issues;
e-market; FinTech; and artificial intelligence.
IOT: Security and Privacy Paradigm covers the evolution of security
and privacy issues in the Internet of Things (IoT). It focuses on
bringing all security and privacy related technologies into one
source, so that students, researchers, and practitioners can refer
to this book for easy understanding of IoT security and privacy
issues. This edited book uses Security Engineering and
Privacy-by-Design principles to design a secure IoT ecosystem and
to implement cyber-security solutions. This book takes the readers
on a journey that begins with understanding the security issues in
IoT-enabled technologies and how it can be applied in various
aspects. It walks readers through engaging with security challenges
and builds a safe infrastructure for IoT devices. The book helps
readers gain an understand of security architecture through IoT and
describes the state of the art of IoT countermeasures. It also
differentiates security threats in IoT-enabled infrastructure from
traditional ad hoc or infrastructural networks, and provides a
comprehensive discussion on the security challenges and solutions
in RFID, WSNs, in IoT. This book aims to provide the concepts of
related technologies and novel findings of the researchers through
its chapter organization. The primary audience includes
specialists, researchers, graduate students, designers, experts and
engineers who are focused on research and security related issues.
Souvik Pal, PhD, has worked as Assistant Professor in Nalanda
Institute of Technology, Bhubaneswar, and JIS College of
Engineering, Kolkata (NAAC "A" Accredited College). He is the
organizing Chair and Plenary Speaker of RICE Conference in Vietnam;
and organizing co-convener of ICICIT, Tunisia. He has served in
many conferences as chair, keynote speaker, and he also chaired
international conference sessions and presented session talks
internationally. His research area includes Cloud Computing, Big
Data, Wireless Sensor Network (WSN), Internet of Things, and Data
Analytics. Vicente Garcia-Diaz, PhD, is an Associate Professor in
the Department of Computer Science at the University of Oviedo
(Languages and Computer Systems area). He is also the editor of
several special issues in prestigious journals such as Scientific
Programming and International Journal of Interactive Multimedia and
Artificial Intelligence. His research interests include eLearning,
machine learning and the use of domain specific languages in
different areas. Dac-Nhuong Le, PhD, is Deputy-Head of Faculty of
Information Technology, and Vice-Director of Information Technology
Apply and Foreign Language Training Center, Haiphong University,
Vietnam. His area of research includes: evaluation computing and
approximate algorithms, network communication, security and
vulnerability, network performance analysis and simulation, cloud
computing, IoT and image processing in biomedical. Presently, he is
serving on the editorial board of several international journals
and has authored nine computer science books published by Springer,
Wiley, CRC Press, Lambert Publication, and Scholar Press.
 |
Smart and Innovative Trends in Next Generation Computing Technologies
- Third International Conference, NGCT 2017, Dehradun, India, October 30-31, 2017, Revised Selected Papers, Part II
(Paperback, 1st ed. 2018)
Pushpak Bhattacharyya, Hanumat G. Sastry, Venkatadri Marriboyina, Rashmi Sharma
|
R2,847
Discovery Miles 28 470
|
Ships in 18 - 22 working days
|
|
|
The two-volume set CCIS 827 and 828 constitutes the thoroughly
refereed proceedings of the Third International Conference on Next
Generation Computing Technologies, NGCT 2017, held in Dehradun,
India, in October 2017. The 135 full papers presented were
carefully reviewed and selected from 948 submissions. There were
organized in topical sections named: Smart and Innovative Trends in
Communication Protocols and Standards; Smart and Innovative Trends
in Computational Intelligence and Data Science; Smart and
Innovative Trends in Image Processing and Machine Vision; Smart
Innovative Trends in Natural Language Processing for Indian
Languages; Smart Innovative Trends in Security and Privacy.
Cyber Strategy: Risk-Driven Security and Resiliency provides a
process and roadmap for any company to develop its unified
Cybersecurity and Cyber Resiliency strategies. It demonstrates a
methodology for companies to combine their disassociated efforts
into one corporate plan with buy-in from senior management that
will efficiently utilize resources, target high risk threats, and
evaluate risk assessment methodologies and the efficacy of
resultant risk mitigations. The book discusses all the steps
required from conception of the plan from preplanning
(mission/vision, principles, strategic objectives, new initiatives
derivation), project management directives, cyber threat and
vulnerability analysis, cyber risk and controls assessment to
reporting and measurement techniques for plan success and overall
strategic plan performance. In addition, a methodology is presented
to aid in new initiative selection for the following year by
identifying all relevant inputs. Tools utilized include: Key Risk
Indicators (KRI) and Key Performance Indicators (KPI) National
Institute of Standards and Technology (NIST) Cyber Security
Framework (CSF) Target State Maturity interval mapping per
initiative Comparisons of current and target state business goals
and critical success factors A quantitative NIST-based risk
assessment of initiative technology components Responsible,
Accountable, Consulted, Informed (RACI) diagrams for Cyber Steering
Committee tasks and Governance Boards' approval processes
Swimlanes, timelines, data flow diagrams (inputs, resources,
outputs), progress report templates, and Gantt charts for project
management The last chapter provides downloadable checklists,
tables, data flow diagrams, figures, and assessment tools to help
develop your company's cybersecurity and cyber resiliency strategic
plan.
Digital forensics has recently gained a notable development and
become the most demanding area in today's information security
requirement. This book investigates the areas of digital forensics,
digital investigation and data analysis procedures as they apply to
computer fraud and cybercrime, with the main objective of
describing a variety of digital crimes and retrieving potential
digital evidence. Big Data Analytics and Computing for Digital
Forensic Investigations gives a contemporary view on the problems
of information security. It presents the idea that protective
mechanisms and software must be integrated along with forensic
capabilities into existing forensic software using big data
computing tools and techniques. Features Describes trends of
digital forensics served for big data and the challenges of
evidence acquisition Enables digital forensic investigators and law
enforcement agencies to enhance their digital investigation
capabilities with the application of data science analytics,
algorithms and fusion technique This book is focused on helping
professionals as well as researchers to get ready with
next-generation security systems to mount the rising challenges of
computer fraud and cybercrimes as well as with digital forensic
investigations. Dr Suneeta Satpathy has more than ten years of
teaching experience in different subjects of the Computer Science
and Engineering discipline. She is currently working as an
associate professor in the Department of Computer Science and
Engineering, College of Bhubaneswar, affiliated with Biju Patnaik
University and Technology, Odisha. Her research interests include
computer forensics, cybersecurity, data fusion, data mining, big
data analysis and decision mining. Dr Sachi Nandan Mohanty is an
associate professor in the Department of Computer Science and
Engineering at ICFAI Tech, ICFAI Foundation for Higher Education,
Hyderabad, India. His research interests include data mining, big
data analysis, cognitive science, fuzzy decision-making,
brain-computer interface, cognition and computational intelligence.
People increasingly live online, sharing publicly what might have
once seemed private, but at the same time are enraged by extremes
of government surveillance and the corresponding invasion into our
private lives. In this enlightening work, Adam Henschke re-examines
privacy and property in the age of surveillance in order to
understand not only the importance of these social conventions, but
also their moral relevance. By analyzing identity and information,
and presenting a case for a relation between the two, he explains
the moral importance of virtual identities and offers an ethically
robust solution to designing surveillance technologies. This book
should be read by anyone interested in surveillance technology, new
information technology more generally, and social concepts like
privacy and property.
 |
Privacy Technologies and Policy
- 6th Annual Privacy Forum, APF 2018, Barcelona, Spain, June 13-14, 2018, Revised Selected Papers
(Paperback, 1st ed. 2018)
Manel Medina, Andreas Mitrakas, Kai Rannenberg, Erich Schweighofer, Nikolaos Tsouroulas
|
R1,408
Discovery Miles 14 080
|
Ships in 18 - 22 working days
|
|
|
This book constitutes the thoroughly refereed post-conference
proceedings of the 6th Annual Privacy Forum, APF 2018, held in
Barcelona, Spain, in June 2018. The 11 revised full papers were
carefully reviewed and selected from 49 submissions. The papers are
grouped in topical sections named: technical analysis and
techniques; privacy implementation; compliance; and legal aspects.
 |
Smart and Innovative Trends in Next Generation Computing Technologies
- Third International Conference, NGCT 2017, Dehradun, India, October 30-31, 2017, Revised Selected Papers, Part I
(Paperback, 1st ed. 2018)
Pushpak Bhattacharyya, Hanumat G. Sastry, Venkatadri Marriboyina, Rashmi Sharma
|
R3,255
Discovery Miles 32 550
|
Ships in 18 - 22 working days
|
|
|
The two-volume set CCIS 827 and 828 constitutes the thoroughly
refereed proceedings of the Third International Conference on Next
Generation Computing Technologies, NGCT 2017, held in Dehradun,
India, in October 2017. The 135 full papers presented were
carefully reviewed and selected from 948 submissions. There were
organized in topical sections named: Smart and Innovative Trends in
Communication Protocols and Standards; Smart and Innovative Trends
in Computational Intelligence and Data Science; Smart and
Innovative Trends in Image Processing and Machine Vision; Smart
Innovative Trends in Natural Language Processing for Indian
Languages; Smart Innovative Trends in Security and Privacy.
Privacy is a core value of librarianship and yet as a concept, it
is difficult to define and in practice, a challenge to uphold. This
groundbreaking new book considers how privacy issues can arise in a
library context and what library and information professionals can
do to protect the privacy of their users. A Practical Guide to
Privacy in Libraries features a wide range of practical examples of
such issues, providing insights and practical steps which readers
can follow. In-depth case studies and scenarios support the
examples laid out in the book, while examples of data breaches
which have occurred in a library setting, and the lessons we can
learn from them, are also included. The book also covers the main
legislation governing data protection - GDPR - which will be
particularly relevant to European librarians, and international
librarians offering services to EU citizens. The book provides a
range of tools through which libraries can communicate how they
handle the personal data of their users whilst ensuring that they
are following best practice with their privacy policy statements,
their privacy audits and data protection impact assessments.
Privacy is not the same thing as data protection, and the book
outlines the differences between these two concepts. Nevertheless,
the book has been written with the requirements of data protection
law very much in mind. Written in a highly practical manner, this
book is essential reading for library and information professionals
who need to understand and support privacy in the library setting
and a useful reference for students and researchers in the field
who need to understand this topic in practice.
Gain greater compliance with corporate training by addressing the
heart of the very awareness vs. compliance problem: people are
human. People have incredible strengths and incredible weaknesses,
and as a Information Security professional, you need to recognize
and devise training strategies that take advantage of both. This
concise book introduces two such strategies, which combined, can
take a security awareness program to the next level of
effectiveness, retention, compliance, and maturity. Security
policies and procedures are often times inconvenient, technically
complex, and hard to understand. Advanced Persistent Training
provides numerous tips from a wide range of disciplines to handle
these especially difficult situations. Many information security
professionals are required by regulation or policy to provide
security awareness training within the companies they work for, but
many believe that the resulting low compliance with training does
not outweigh the costs of delivering that training. There are also
many who believe that this training is crucial, if only it could be
more effective. What you will learn: Present awareness materials
all year-round in a way that people will really listen. Implement a
"behavior-first" approach to teaching security awareness. Adopt to
gamification the right way, even for people who hate games. Use
tips from security awareness leaders addressing the same problems
you face. Who is this book for Security awareness professionals or
IT Security professionals who are tasked with teaching security
awareness within their organization.
We have created the ultimate hive-mind robot: an Internet of
interconnected devices that senses, thinks and acts. Bruce Schneier
calls it the "World-Sized Web". It includes everything from
driverless cars to smart thermostats, from billboards that respond
to specific people to drones equipped with their own behavioural
algorithms. While the World-Sized Web carries enormous potential,
Schneier argues that we are unprepared for the vulnerabilities it
brings. Cutting-edge digital attackers can now crash your car,
pacemaker and home security system and everyone else's. Click Here
to Kill Everybody explores the risks and security implications of
the World-Sized Web and lays out common-sense policies that will
allow us to enjoy the benefits of this new omnipotent age without
surrendering ourselves entirely to our creation.
This book presents extended versions of papers originally presented
and discussed at the 3rd International Doctoral Symposium on
Applied Computation and Security Systems (ACSS 2016) held from
August 12 to 14, 2016 in Kolkata, India. The symposium was jointly
organized by the AGH University of Science & Technology,
Cracow, Poland; Ca' Foscari University, Venice, Italy; and the
University of Calcutta, India. The book is divided into two
volumes, Volumes 3 and 4, and presents dissertation works in the
areas of Image Processing, Biometrics-based Authentication, Soft
Computing, Data Mining, Next-Generation Networking and Network
Security, Remote Healthcare, Communications, Embedded Systems,
Software Engineering and Service Engineering. The first two volumes
of the book published the works presented at the ACSS 2015, which
was held from May 23 to 25, 2015 in Kolkata, India.
This book provides a thorough overview of the evolution of
privacy-preserving machine learning schemes over the last ten
years, after discussing the importance of privacy-preserving
techniques. In response to the diversity of Internet services, data
services based on machine learning are now available for various
applications, including risk assessment and image recognition. In
light of open access to datasets and not fully trusted
environments, machine learning-based applications face enormous
security and privacy risks. In turn, it presents studies conducted
to address privacy issues and a series of proposed solutions for
ensuring privacy protection in machine learning tasks involving
multiple parties. In closing, the book reviews state-of-the-art
privacy-preserving techniques and examines the security threats
they face.
Over 700 pages of insight into all things cybersecurity
Cybersecurity All-in-One For Dummies covers a lot of ground in the
world of keeping computer systems safe from those who want to break
in. This book offers a one-stop resource on cybersecurity basics,
personal security, business security, cloud security, security
testing, and security awareness. Filled with content to help with
both personal and business cybersecurity needs, this book shows you
how to lock down your computers, devices, and systems--and explains
why doing so is more important now than ever. Dig in for info on
what kind of risks are out there, how to protect a variety of
devices, strategies for testing your security, securing cloud data,
and steps for creating an awareness program in an organization.
Explore the basics of cybersecurity at home and in business Learn
how to secure your devices, data, and cloud-based assets Test your
security to find holes and vulnerabilities before hackers do Create
a culture of cybersecurity throughout an entire organization This
For Dummies All-in-One is a stellar reference for business owners
and IT support pros who need a guide to making smart security
choices. Any tech user with concerns about privacy and protection
will also love this comprehensive guide.
This book presents extended versions of papers originally presented
and discussed at the 3rd International Doctoral Symposium on
Applied Computation and Security Systems (ACSS 2016) held from
August 12 to 14, 2016 in Kolkata, India. The symposium was jointly
organized by the AGH University of Science & Technology,
Cracow, Poland; Ca' Foscari University, Venice, Italy; and the
University of Calcutta, India. The book is divided into two
volumes, Volumes 3 and 4, and presents dissertation works in the
areas of Image Processing, Biometrics-based Authentication, Soft
Computing, Data Mining, Next-Generation Networking and Network
Security, Remote Healthcare, Communications, Embedded Systems,
Software Engineering and Service Engineering. The first two volumes
of the book published the works presented at the ACSS 2015, which
was held from May 23 to 25, 2015 in Kolkata, India.
|
You may like...
Bad Luck Penny
Amy Heydenrych
Paperback
(1)
R350
R323
Discovery Miles 3 230
The Heist
Jack Du Brul
Paperback
R395
R353
Discovery Miles 3 530
|