![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection
This book constitutes the thoroughly refereed post-conference proceedings of the 27th British National Conference on Databases, BNCOD 27, held in Dundee, UK, in June 2010. The 10 revised full papers and 6 short papers, presented together with 3 invited papers, 1 best paper of the associated event on Teaching, Learning and Assessment of Databases (TLAD), and 2 PhD forum best papers were carefully reviewed and selected from 42 submissions. Special focus of the conference has been "Data Security and Security Data" and so the papers cover a wide range of topics such as data security, privacy and trust, security data, data integration and interoperability, data management for ubiquitous and mobile computing, data mining and information extraction, data modelling and architectures, data provenance, dataspaces, data streaming, databases and the grid, distributed information systems, electronic commerce, enterprise systems, heterogeneous databases, industrial applications, infrastructures and systems, intermittently connected data, file access methods and index structures, managing legacy data, new applications and processes, parallel and distributed databases, peer-to-peer data management, performance modelling of ubiquitous data use, personal data management, query and manipulation languages, query processing and optimisation, scientific applications, semantic Web and ontologies, semi-structured data, metadata and xml, user interfaces and data visualisation, Web data management and deep Web, Web services, and workflow support systems.
Media reform plays an increasingly important role in the struggle for social justice. As battles are fought over the future of investigative journalism, media ownership, spectrum management, speech rights, broadband access, network neutrality, the surveillance apparatus, and digital literacy, what effective strategies can be used in the pursuit of effective media reform? Prepared by thirty-three scholars and activists from more than twenty-five countries, Strategies for Media Reform focuses on theorizing media democratization and evaluating specific projects for media reform. This edited collection of articles offers readers the opportunity to reflect on the prospects for and challenges facing campaigns for media reform and gathers significant examples of theory, advocacy, and activism from multinational perspectives.
Good backup and recovery strategies are key to the health of any organization. Medium- to very-large-scale systems administrators have to protect large amounts of critical data as well as design backup solutions that are scalable and optimized to meet changing conditions. Pro Data Backup and Recovery will cover some of the more common backup applications, such as Symantec NetBackup/BackupExec, EMC NetWorker, and CommVault, but the main discussion will focus on the implementation of 21st century architectures that allow the backup software to be a "commodity" item. The underlying architecture provides the framework for meeting the requirements of data protection for the organization. This book covers new developments in data protection as well as the impact of single-instance storage upon backup infrastructures. It discusses the impact of backup and data replication, the often misapplied B2D and D2D strategies, and "tapeless" backup environments. Continuous data protection and remote replication strategies are also addressed as they are integrated within backup strategies-a very important topic today. Learn backup solution design regardless of specific backup software Design realistic recovery solutions Take into account new data protection standards and the impact of data replication Whether you are using NetBackup, CommVault, or some other backup software, Pro Data Backup and Recovery will give you the information you need to keep your data safe and available.
It’s been ten years since open data first broke onto the global stage. Over the past decade, thousands of programmes and projects around the world have worked to open data and use it to address a myriad of social and economic challenges. Meanwhile, issues related to data rights and privacy have moved to the centre of public and political discourse. As the open data movement enters a new phase in its evolution, shifting to target real-world problems and embed open data thinking into other existing or emerging communities of practice, big questions still remain. How will open data initiatives respond to new concerns about privacy, inclusion, and artificial intelligence? And what can we learn from the last decade in order to deliver impact where it is most needed? The State of Open Data brings together over 60 authors from around the world to address these questions and to take stock of the real progress made to date across sectors and around the world, uncovering the issues that will shape the future of open data in the years to come.
Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java provides resources that every Java and Oracle database application programmer needs to ensure that they have guarded the security of the data and identities entrusted to them. You'll learn to consider potential vulnerabilities, and to apply best practices in secure Java and PL/SQL coding. Author David Coffin shows how to develop code to encrypt data in transit and at rest, to accomplish single sign-on with Oracle proxy connections, to generate and distribute two-factor authentication tokens from the Oracle server using pagers, cell phones (SMS), and e-mail, and to securely store and distribute Oracle application passwords. Early chapters lay the foundation for effective security in an Oracle/Java environment. Each of the later chapters brings example code to a point where it may be applied as-is to address application security issues. Templates for applications are also provided to help you bring colleagues up to the same secure application standards.If you are less familiar with either Java or Oracle PL/SQL, you will not be left behind; all the concepts in this book are introduced as to a novice and addressed as to an expert.* Helps you protect against data loss, identity theft, SQL injection, and address spoofing * Provides techniques for encryption on network and disk, code obfuscation and wrap, database hardening, single sign-on and two-factor * Provides what database administrators need to know about secure password distribution, Java secure programming, Java stored procedures, secure application roles in Oracle, logon triggers, database design, various connection pooling schemes, and much more What you'll learn * Guard against data loss, identity theft, SQL Injection, and to address spoofing * Protect sensitive data through encryption, both on disk and on the wire * Control access to data using secure roles, single sign-on, proxy connections, and two-factor authentication * Protect sensitive source ode through randomization, obfuscation, and wrapping * Thwart attempts at SQL injection and other common attacks * Manage constraints on the visibility of data and the scope of access Who this book is for Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java is for every Java developer who uses an Oracle database.It is also for every Oracle database administrator or PL/SQL programmer who supports Java client and web applications. Whatever role you play in developing and supporting Java and Oracle applications, you need to address computer, application, data, and identity security. This book offers the tools you'll need to effectively manage security across all aspects of the applications you support. Table of Contents * Introduction * Oracle Security * Secure Java Development Concepts * Java Stored Procedures * Adding Public Key Encryption * Adding Secret Password Encryption * A Working Model for Data Encryption in Transit * Implementing Single Sign On * Implementing Two-Factor Authentication * Application Identification and Authorization * Enhancing Our Security * Administration of This Security System
Though often invisible, cryptography plays a critical role in our everyday lives. Broadly defined as a set of tools for establishing security in cyberspace, cryptography enables us to protect our information and share it securely. It underpins the security of mobile phone calls, card payments, web connections, internet messaging, Bitcoin transactions-in short, everything we do online. Clearly and concisely, Keith Martin reveals the many crucial ways we all rely on cryptographic technology and demystifies its controversial applications and the nuances behind alarming headlines about data breaches or Edward Snowden. Essential reading for anyone with a password, Cryptography offers a profound perspective on personal security, online and off.
The Internet has been transformed in the past years from a system primarily oriented on information provision into a medium for communication and community-building. The notion of Web 2.0, social software, and social networking sites such as Facebook, Twitter and MySpace have emerged in this context. With such platforms comes the massive provision and storage of personal data that are systematically evaluated, marketed, and used for targeting users with advertising. In a world of global economic competition, economic crisis, and fear of terrorism after 9/11, both corporations and state institutions have a growing interest in accessing this personal data. Here, contributors explore this changing landscape by addressing topics such as commercial data collection by advertising, consumer sites and interactive media; self-disclosure in the social web; surveillance of file-sharers; privacy in the age of the internet; civil watch-surveillance on social networking sites; and networked interactive surveillance in transnational space. This book is a result of a research action launched by the intergovernmental network COST (European Cooperation in Science and Technology).
The 2009 Australasian Conference on Information Security and Privacy was the 14th in an annual series that started in 1996. Over the years ACISP has grown froma relativelysmall conferencewith a largeproportionof paperscoming from Australia into a truly international conference with an established reputation. ACISP 2009 was held at Queensland University of Technology in Brisbane, d- ing July 1-3, 2009. This year there were 106 paper submissions and from those 30 papers were accepted for presentation, but one was subsequently withdrawn. Authors of - cepted papers came from 17 countries and 4 continents, illustrating the inter- tional ?avorof ACISP. We would like to extend our sincere thanks to all authors who submitted papers to ACISP 2009. The contributed papers were supplemented by two invited talks from e- nent researchers in information security. Basie von Solms (University of Joh- nesburg), currently President of IFIP, raised the question of how well dressed is the information security king. L. Jean Camp (Indiana University) talked about how to harden the network from the friend within. We are grateful to both of them for sharing their extensive knowledge and setting challenging questions for the ACISP 2009 delegates. We were fortunate to have an energetic team of experts who formed the Program Committee. Their names may be found overleaf, and we thank them warmly for their considerable e?orts. This team was helped by an even larger number of individuals who reviewedpapers in their particularareasof expertise.
Privacy on the internet is challenged in a wide variety of ways - from large social media companies, whose entire business models are based on privacy invasion, through the developing technologies of facial recognition, to the desire of governments to monitor our every activity online. But the impact these issues have on our daily lives is often underplayed or misunderstood. In this book, Paul Bernal analyses how the internet became what it is today, exploring how the current manifestation of the internet works for people, for companies and even for governments, with reference to the new privacy battlefields of location and health data, the internet of things and the increasingly contentious issue of personal data and political manipulation. The author then proposes what we should do about the problems surrounding internet privacy, such as significant changes in government policy, a reversal of the current 'war' on encryption, being brave enough to take on the internet giants, and challenging the idea that 'real names' would improve the discourse on social networks. ABOUT THE SERIES: The 'What Do We Know and What Should We Do About...?' series offers readers short, up-to-date overviews of key issues often misrepresented, simplified or misunderstood in modern society and the media. Each book is written by a leading social scientist with an established reputation in the relevant subject area. The Series Editor is Professor Chris Grey, Royal Holloway, University of London
Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge they need to know regarding security in the Internet of Things (IoT). This booming field, moving from strictly research to the marketplace, is advancing rapidly, yet security issues abound. This book explains the fundamental concepts of IoT security, describing practical solutions that account for resource limitations at IoT end-node, hybrid network architecture, communication protocols, and application characteristics. Highlighting the most important potential IoT security risks and threats, the book covers both the general theory and practical implications for people working in security in the Internet of Things.
This provocative book offers a probing account of the erosion of privacy in American society, that shows that we are often unwitting, if willing, accomplices, providing personal data in exchange for security or convenience. The author reveals that in today's "information society," the personal data that we make available to virtually any organization for virtually any purpose is apt to surface elsewhere, applied to utterly different purposes. The mass collection and processing of personal information produces such tremendous efficiencies that both the public and private sector feel justified in pushing as far as they can into our private lives. And there is no easy cure. Indeed, there are many cases where privacy invasion is both hurtful to the individual and indispensable to an organization's quest for efficiency. And as long as we willingly accept the pursuit of profit, or the reduction of crime, or cutting government costs as sufficient reason for intensified scrutiny over our lives, then privacy will remain endangered.
Big data, surveillance, crisis management. Three largely different and richly researched fields, however, the interplay amongst these three domains is rarely addressed. In this enlightening title, the link between these three fields is explored in a consequential order through a variety of contributions and series of unique and international case studies. Indeed, whilst considering crisis management as an "umbrella term" that covers a number of crises and ways of managing them, the reader will also explore the collection of "big data" by governmental crisis organisations. However, this volume also addresses the unintended consequences of using such data. In particular, through the lens of surveillance, one will also investigate how the use and abuse of big data can easily lead to monitoring and controlling the behaviour of people affected by crises. Thus, the reader will ultimately join the authors in their debate of how big data in crisis management needs to be examined as a political process involving questions of power and transparency. An enlightening and highly topical volume, Big Data, Surveillance and Crisis Management will appeal to postgraduate students and postdoctoral researchers interested in fields including Sociology and Surveillance Studies, Disaster and Crisis Management, Media Studies, Governmentality, Organisation Theory and Information Society Studies.
Failure to appreciate the full dimensions of data protection can lead to poor data protection management, costly resource allocation issues, and exposure to unnecessary risks. Data Protection: Governance, Risk Management, and Compliance explains how to gain a handle on the vital aspects of data protection. The author begins by building the foundation of data protection from a risk management perspective. He then introduces the two other pillars in the governance, risk management, and compliance (GRC) framework. After exploring data retention and data security in depth, the book focuses on data protection technologies primarily from a risk management viewpoint. It also discusses the special technology requirements for compliance, governance, and data security; the importance of eDiscovery for civil litigation; the impact of third-party services in conjunction with data protection; and data processing facets, such as the role of tiering and server and storage virtualization. The final chapter describes a model to help businesses get started in the planning process to improve their data protection. By examining the relationships among the pieces of the data protection puzzle, this book offers a solid understanding of how data protection fits into various organizations. It allows readers to assess their overall strategy, identify security gaps, determine their unique requirements, and decide what technologies and tactics can best meet those requirements.
Vast amounts of data are collected by service providers and system administ- tors, and are available in public information systems. Data mining technologies provide an ideal framework to assist in analyzing such collections for computer security and surveillance-related endeavors. For instance, system administrators can apply data mining to summarize activity patterns in access logs so that potential malicious incidents can be further investigated. Beyond computer - curity, data mining technology supports intelligence gathering and summari- tion for homeland security. For years, and most recently fueled by events such as September 11, 2001, government agencies have focused on developing and applying data mining technologies to monitor terrorist behaviors in public and private data collections. Theapplicationof data mining to person-speci?cdata raisesseriousconcerns regarding data con?dentiality and citizens' privacy rights. These concerns have led to the adoption of various legislation and policy controls. In 2005, the - ropean Union passed a data-retention directive that requires all telephone and Internetservice providersto store data ontheir consumers for up to two yearsto assist in the prevention of terrorismand organized crime. Similar data-retention regulationproposalsareunderheateddebateintheUnitedStatesCongress. Yet, the debate often focuses on ethical or policy aspects of the problem, such that resolutions have polarized consequences; e. g. , an organization can either share data for data mining purposes or it can not. Fortunately, computer scientists, and data mining researchers in particular, have recognized that technology can beconstructedtosupportlesspolarizedsolutions. Computerscientistsaredev- oping technologies that enable data mining goals without sacri?cing the privacy and security of the individuals to whom the data correspond.
The Internet Age has created vast and ubiquitous databases of personal information in universities, corporations, government agencies, and doctors' offices. Every week, stories of databases being compromised appear in the news. Yet, despite the fact that lost laptops and insecure computer servers jeopardize our privacy, privacy and security are typically considered in isolation. Advocates of privacy have sought to protect individuals from snooping corporations, while advocates of security have sought to protect corporations from snooping individuals. Securing Privacy in the Internet Age aims to merge the discussion of these two goals. The book brings together many of the world's leading academics, litigators, and public policy advocates to work towards enhancing privacy and security. While the traditional adversary of privacy advocates has been the government, in what they see as the role of the Orwellian Big Brother, the principal focus of this book is the fraternity of Little Brothers-the corporations and individuals who seek to profit from gathering personal information about others.
This book provides emergent knowledge relating to physical, cyber, and human risk mitigation in a practical and readable approach for the corporate environment. It presents and discusses practical applications of risk management techniques along with useable practical policy change options. This practical organizational security management approach examines multiple aspects of security to protect against physical, cyber, and human risk. A practical more tactical focus includes managing vulnerabilities and applying countermeasures. The book guides readers to a greater depth of understanding and action-oriented options.
Parenting for the Digital Generationprovides a practical handbook for parents, grandparents, teachers, and counselors who want to understand both the opportunities and the threats that exist for the generation of digital natives who are more familiar with a smartphone than they are with a paper book. This book provides straightforward, jargon-free information regarding the online environment and the experience in which children and young adults engage both inside and outside the classroom. The digital environment creates many challenges, some of which are largely the same as parents faced before the Internet, but others which are entirely new. Many children struggle to connect, and they underperform in the absence of the social and emotional support of a healthy learning environment. Parents must also help their children navigate a complex and occasionally dangerous online world. This book provides a step-by-step guide for parents seeking to raise happy, mature, creative, and well-adjusted children. The guide provides clear explanations of the keys to navigating as a parent in the online environment while providing practical strategies that do not look for dangers where there are only remote threats.
The Internet of Things (IoT), with its technological advancements and massive innovations, is building the idea of inter-connectivity among everyday life objects. With an explosive growth in the number of Internet-connected devices, the implications of the idea of IoT on enterprises, individuals, and society are huge. IoT is getting attention from both academia and industry due to its powerful real-time applications that raise demands to understand the entire spectrum of the field. However, due to increasing security issues, safeguarding the IoT ecosystem has become an important concern. With devices and information becoming more exposed and leading to increased attack possibilities, adequate security measures are required to leverage the benefits of this emerging concept. Internet of Things Security: Principles, Applications, Attacks, and Countermeasures is an extensive source that aims at establishing an understanding of the core concepts of IoT among its readers and the challenges and corresponding countermeasures in the field. Key features: Containment of theoretical aspects, as well as recent empirical findings associated with the underlying technologies Exploration of various challenges and trade-offs associated with the field and approaches to ensure security, privacy, safety, and trust across its key elements Vision of exciting areas for future research in the field to enhance the overall productivity This book is suitable for industrial professionals and practitioners, researchers, faculty members, and students across universities who aim to carry out research and development in the field of IoT security.
The Book presents an overview of newly developed watermarking techniques in various independent and hybrid domains Covers the basics of digital watermarking, its types, domain in which it is implemented and the application of machine learning algorithms onto digital watermarking Reviews hardware implementation of watermarking Discusses optimization problems and solutions in watermarking with a special focus on bio-inspired algorithms Includes a case study along with its MATLAB code and simulation results
In this book, Yuko Suda examines the Safe Harbor debate, the passenger name record (PNR) dispute, and the Society for Worldwide Interbank Financial Transactions (SWIFT) affair to understand the transfer of personal data from the European Union (EU) to the United States. She argues that the Safe Harbor, PNR, and SWIFT agreements were made to mitigate the potentially negative effects that may arise from the beyond-the-border reach of EU data protection rules or US counterterrorism regulation. A close examination of these high-profile cases would reveal how beyond-the-border reach of one jurisdiction's regulation might affect another jurisdiction's policy and what responses the affected jurisdiction possibly makes to manage the effects of such extraterritorial regulation. The Politics of Data Transfer adds another dimension to the study of transatlantic data conflicts by assuming that the cases exemplify not only the politics of data privacy but also the politics of extraterritorial regulation. A welcome and timely collection uncovering the evolution of and prospects for the politics of data privacy in the digitalized and interconnected world.
Welcome to the 2nd International Conference on Image and Video Retrieval, CIVR2003. The goal of CIVR is to illuminate the state of the art in visual information retrieval and to stimulate collaboration between researchers and practitioners. This year we received 110 submissions from 26 countries. Based upon the reviews of at least 3 members of the program committee, 43 papers were accepted for the research track of the conference. First, we would like to thank all of the members of the Program Committee and the additional referees listed below. Their reviews of the submissions played a pivotal role in the quality of the conference. Moreover, we are grateful to Nicu Sebe and Xiang Zhou for helping to organize the review process; Shih-Fu Chang and Alberto del Bimbo for setting up the practitioner track; and Erwin Bakker for editing the proceedings and designing the conference poster. Special thanks go to our keynote and plenary speakers, Nevenka Dimitrova fromPhilipsResearch, RameshJainfromGeorgiaTech, ChrisPorterfromGetty Images, andAlanSmeatonfromDublinCityUniversity.Furthermore, wewishto acknowledge our sponsors, the Beckman Institute at the University of Illinois at Urbana-Champaign, TsingHuaUniversity, theInstitutionofElectricalEngineers (IEE), PhilipsResearch, andtheLeidenInstituteofAdvancedComputerScience at Leiden University. Finally, we would like to express our thanks to severalpeople who performed important work related to the organization of the conference: Jennifer Quirk and Catherine Zech for the localorganizationat the BeckmanInstitute; Richard Harvey for his help with promotional activity and sponsorship for CIVR2003; andtotheorganizingcommitteeofthe?rstCIVRforsettinguptheinternational mission and structure of the co
In Industry Unbound, Ari Ezra Waldman exposes precisely how the tech industry conducts its ongoing crusade to undermine our privacy. With research based on interviews with scores of tech employees and internal documents outlining corporate strategies, Waldman reveals that companies don't just lobby against privacy law; they also manipulate how we think about privacy, how their employees approach their work, and how they weaken the law to make data-extractive products the norm. In contrast to those who claim that privacy law is getting stronger, Waldman shows why recent shifts in privacy law are precisely the kinds of changes that corporations want and how even those who think of themselves as privacy advocates often unwittingly facilitate corporate malfeasance. This powerful account should be read by anyone who wants to understand why privacy laws are not working and how corporations trap us into giving up our personal information.
This book constitutes the thoroughly refereed post-proceedings of the 5th International Conference on Financial Cryptography, FC 2001, held in Grand Cayman, British West Indies, in February 2001.The 20 revised full papers presented together with various panel statements and one invited paper were carefully selected during two rounds of reviewing and improvement. The papers are organized in topical sections on managing payment transaction costs, trust and risk management, groups and anonymity, certificates and authentication, credit card security, markets and multiparty computation, digital signatures and financial cryptography, and auctions.
This book constitutes the refereed proceedings of the 22nd International Cryptology Conference, CRYPTO 2002, held in Santa Barbara, CA, in August 2002.The 39 revised full papers presented were carefully reviewed and selected from a total of 175 submissions. The papers are organized in topical sections on block ciphers, multi-user oriented cryptosystems, foundations and methodology, security and practical protocols, secure multiparty computation, public key encryption, information theory and secret sharing, cipher design and analysis, elliptic curves and Abelian varieties, authentication, distributed cryptosystems, pseudorandomness, stream ciphers and Boolean functions, commitment schemes, and signature schemes.
Inference control in statistical databases, also known as statistical disclosure limitation or statistical confidentiality, is about finding tradeoffs to the tension between the increasing societal need for accurate statistical data and the legal and ethical obligation to protect privacy of individuals and enterprises which are the source of data for producing statistics. Techniques used by intruders to make inferences compromising privacy increasingly draw on data mining, record linkage, knowledge discovery, and data analysis and thus statistical inference control becomes an integral part of computer science.This coherent state-of-the-art survey presents some of the most recent work in the field. The papers presented together with an introduction are organized in topical sections on tabular data protection, microdata protection, and software and user case studies. |
You may like...
Dixon Jones - Buildings and Projects…
Ian Latham, Mark Swenarton
Hardcover
R956
Discovery Miles 9 560
Advances in Remote Sensing of Postfire…
Alfonso Fernandez-Manso, Carmen Quintano
Hardcover
Artificial Psychology - Psychological…
James A. Crowder, John Carbone, …
Hardcover
R3,661
Discovery Miles 36 610
|