0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (181)
  • R250 - R500 (209)
  • R500+ (794)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

The Digital Person - Technology and Privacy in the Information Age (Paperback, New Ed): Daniel J. Solove The Digital Person - Technology and Privacy in the Information Age (Paperback, New Ed)
Daniel J. Solove
R680 Discovery Miles 6 800 Ships in 12 - 17 working days

View the Table of Contents.
Read the Introduction.

aThis comprehensive analysis of privacy in the information age challenges traditional assumptions that breeches of privacy through the development of electronic dossiers involve the invasion of oneas private space.a
--"Choice"

"The Digital Person challenges the existing ways in which law and legal theory approach the social, political, and legal implications of the collection and use of personal information in computer databases. Solove's book is ambitious, and represents the most important publication in the field of information privacy law for some years."
--"Georgetown Law Journal"

"Anyone concerned with preserving privacy against technology's growing intrusiveness will find this book enlightening."
--"Publishers Weekly"

"Solove . . . truly understands the intersection of law and technology. This book is a fascinating journey into the almost surreal ways personal information is hoarded, used, and abused in the digital age."
--"The Wall Street Journal"

"Daniel Solove is one of the most energetic and creative scholars writing about privacy today. The Digital Person is an important contribution to the privacy debate, and Solove's discussion of the harms of what he calls 'digital dossiers' is invaluable."
--Jeffrey Rosen, author of "The Unwanted Gaze" and "The Naked Crowd"

"Powerful theme."
--"Privacy Journal"

"This is not only a book you should read, but you should make sure your friends read it."
--"IEEE Review"

"Solove offers a book that is both comprehensive and easy to understand, discussing the changes that technology has brought to our concept of privacy. An excellentstarting point for much needed discussion."
--"Law Technology News"

"An unusually perceptive discussion of one of the most vexing problems of the digital age--our loss of control over our personal information. It's a fascinating journey into the almost surreal ways personal information is hoarded, used, and abused in the digital age. I recommend his book highly."
--Bruce Schneier

"Solove's book is the best exposition thus far about the threat that computer databases containing personal data about millions of Americans poses for information privacy."
--Pamela Samuelson, Chancellor's Professor of Law and Information Management at the University of California, Berkeley

"Solove drives his points home through considerable reconfiguration of the basic argument. Rather than casting blame or urging retreat to a precomputer database era, the solution is seen in informing individuals, challenging data collectors, and bringing the law up-to-date."
--"Choice"

"If you want to find out what a mess the law of privacy is, how it got that way, and whether there is hope for the future, then read this book."
--"Legal Times"

"Solove evaluates the shortcomings of current approaches to privacy as well as some useful and controversial ideas for striking a new balance. Anyone who deals with privacy matters will find a lot ot consider."
--"DM News"

"Solove's treatment of this particular facet is thoughtful, thorough, concise, and occasionally laced with humor. The present volume gives us reason to look forward to his future contributions."
--"The Law and Politics Book Review"

"Solove's book is useful, particularly as an overview on how these private and governmentdatabases grew in sophistication and now interact with one another."
--"Christian Science Monitor"

"A far-reaching examination of how digital dossiers are shaping our lives. Daniel Solove has persuasively reconceptualized privacy for the digital age. A must-read."
--Paul Schwartz, Brooklyn Law School

"The Digital Person is a detailed and approachable resource on privacy issues and the laws that affect them."
--"IT Conversations"

Seven days a week, twenty-four hours a day, electronic databases are compiling information about you. As you surf the Internet, an unprecedented amount of your personal information is being recorded and preserved forever in the digital minds of computers. For each individual, these databases create a profile of activities, interests, and preferences used to investigate backgrounds, check credit, market products, and make a wide variety of decisions affecting our lives. The creation and use of these databases--which Daniel J. Solove calls "digital dossiers"--has thus far gone largely unchecked. In this startling account of new technologies for gathering and using personal data, Solove explains why digital dossiers pose a grave threat to our privacy.

The Digital Person sets forth a new understanding of what privacy is, one that is appropriate for the new challenges of the Information Age. Solove recommends how the law can be reformed to simultaneously protect our privacy and allow us to enjoy the benefits of our increasingly digital world.

The first volume in the series EX MACHINA: LAW, TECHNOLOGY, AND SOCIETY

Advanced Persistent Training - Take Your Security Awareness Program to the Next Level (Paperback, 1st ed.): Jordan Schroeder Advanced Persistent Training - Take Your Security Awareness Program to the Next Level (Paperback, 1st ed.)
Jordan Schroeder
R1,750 Discovery Miles 17 500 Ships in 10 - 15 working days

Gain greater compliance with corporate training by addressing the heart of the very awareness vs. compliance problem: people are human. People have incredible strengths and incredible weaknesses, and as a Information Security professional, you need to recognize and devise training strategies that take advantage of both. This concise book introduces two such strategies, which combined, can take a security awareness program to the next level of effectiveness, retention, compliance, and maturity. Security policies and procedures are often times inconvenient, technically complex, and hard to understand. Advanced Persistent Training provides numerous tips from a wide range of disciplines to handle these especially difficult situations. Many information security professionals are required by regulation or policy to provide security awareness training within the companies they work for, but many believe that the resulting low compliance with training does not outweigh the costs of delivering that training. There are also many who believe that this training is crucial, if only it could be more effective. What you will learn: Present awareness materials all year-round in a way that people will really listen. Implement a "behavior-first" approach to teaching security awareness. Adopt to gamification the right way, even for people who hate games. Use tips from security awareness leaders addressing the same problems you face. Who is this book for Security awareness professionals or IT Security professionals who are tasked with teaching security awareness within their organization.

Advanced Computing and Systems for Security - Volume Four (Paperback, 1st ed. 2017): Rituparna Chaki, Khalid Saeed, Agostino... Advanced Computing and Systems for Security - Volume Four (Paperback, 1st ed. 2017)
Rituparna Chaki, Khalid Saeed, Agostino Cortesi, Nabendu Chaki
R1,968 Discovery Miles 19 680 Ships in 10 - 15 working days

This book presents extended versions of papers originally presented and discussed at the 3rd International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2016) held from August 12 to 14, 2016 in Kolkata, India. The symposium was jointly organized by the AGH University of Science & Technology, Cracow, Poland; Ca' Foscari University, Venice, Italy; and the University of Calcutta, India. The book is divided into two volumes, Volumes 3 and 4, and presents dissertation works in the areas of Image Processing, Biometrics-based Authentication, Soft Computing, Data Mining, Next-Generation Networking and Network Security, Remote Healthcare, Communications, Embedded Systems, Software Engineering and Service Engineering. The first two volumes of the book published the works presented at the ACSS 2015, which was held from May 23 to 25, 2015 in Kolkata, India.

Advanced Computing and Systems for Security - Volume Three (Paperback, 1st ed. 2017): Rituparna Chaki, Khalid Saeed, Agostino... Advanced Computing and Systems for Security - Volume Three (Paperback, 1st ed. 2017)
Rituparna Chaki, Khalid Saeed, Agostino Cortesi, Nabendu Chaki
R2,026 Discovery Miles 20 260 Ships in 10 - 15 working days

This book presents extended versions of papers originally presented and discussed at the 3rd International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2016) held from August 12 to 14, 2016 in Kolkata, India. The symposium was jointly organized by the AGH University of Science & Technology, Cracow, Poland; Ca' Foscari University, Venice, Italy; and the University of Calcutta, India. The book is divided into two volumes, Volumes 3 and 4, and presents dissertation works in the areas of Image Processing, Biometrics-based Authentication, Soft Computing, Data Mining, Next-Generation Networking and Network Security, Remote Healthcare, Communications, Embedded Systems, Software Engineering and Service Engineering. The first two volumes of the book published the works presented at the ACSS 2015, which was held from May 23 to 25, 2015 in Kolkata, India.

Strategic Cyber Deterrence - The Active Cyber Defense Option (Paperback): Scott Jasper Strategic Cyber Deterrence - The Active Cyber Defense Option (Paperback)
Scott Jasper
R1,167 Discovery Miles 11 670 Ships in 12 - 17 working days

According to the FBI, about 4000 ransomware attacks happen every day. In the United States alone, victims lost $209 million to ransomware in the first quarter of 2016. Even worse is the threat to critical infrastructure, as seen by the malware infections at electrical distribution companies in Ukraine that caused outages to 225,000 customers in late 2015. Further, recent reports on the Russian hacks into the Democratic National Committee and subsequent release of emails in a coercive campaign to apparently influence the U.S. Presidential Election have brought national attention to the inadequacy of cyber deterrence. The U.S. government seems incapable of creating an adequate strategy to alter the behavior of the wide variety of malicious actors seeking to inflict harm or damage through cyberspace. This book offers a systematic analysis of the various existing strategic cyber deterrence options and introduces the alternative strategy of active cyber defense. It examines the array of malicious actors operating in the domain, their methods of attack, and their motivations. It also provides answers on what is being done, and what could be done, by the government and industry to convince malicious actors that their attacks will not succeed and that risk of repercussions exists. Traditional deterrence strategies of retaliation, denial and entanglement appear to lack the necessary conditions of capability, credibly, and communications due to these malicious actors' advantages in cyberspace. In response, the book offers the option of adopting a strategy of active cyber defense that combines internal systemic resilience to halt cyber attack progress with external disruption capacities to thwart malicious actors' objectives. It shows how active cyber defense is technically capable and legally viable as an alternative strategy for the deterrence of cyber attacks.

Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I (Paperback, 1st ed. 2016)
Jung Hee Cheon, Tsuyoshi Takagi
R2,985 Discovery Miles 29 850 Ships in 10 - 15 working days

The two-volume set LNCS 10031 and LNCS 10032 constitutes the refereed proceedings of the 22nd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2016, held in Hanoi, Vietnam, in December 2016. The 67 revised full papers and 2 invited talks presented were carefully selected from 240 submissions. They are organized in topical sections on Mathematical Analysis; AES and White-Box; Hash Function; Randomness; Authenticated Encryption; Block Cipher; SCA and Leakage Resilience; Zero Knowledge; Post Quantum Cryptography; Provable Security; Digital Signature; Functional and Homomorphic Cryptography; ABE and IBE; Foundation; Cryptographic Protocol; Multi-Party Computation.

Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II (Paperback, 1st ed. 2016)
Jung Hee Cheon, Tsuyoshi Takagi
R3,014 Discovery Miles 30 140 Ships in 10 - 15 working days

The two-volume set LNCS 10031 and LNCS 10032 constitutes the refereed proceedings of the 22nd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2016, held in Hanoi, Vietnam, in December 2016. The 67 revised full papers and 2 invited talks presented were carefully selected from 240 submissions. They are organized in topical sections on Mathematical Analysis; AES and White-Box; Hash Function; Randomness; Authenticated Encryption; Block Cipher; SCA and Leakage Resilience; Zero Knowledge; Post Quantum Cryptography; Provable Security; Digital Signature; Functional and Homomorphic Cryptography; ABE and IBE; Foundation; Cryptographic Protocol; Multi-Party Computation.

Automated Security Management (Paperback, Softcover reprint of the original 1st ed. 2013): Ehab Al-Shaer, Xinming Ou, Geoffrey... Automated Security Management (Paperback, Softcover reprint of the original 1st ed. 2013)
Ehab Al-Shaer, Xinming Ou, Geoffrey Xie
R1,980 Discovery Miles 19 800 Ships in 10 - 15 working days

In this contributed volume, leading international researchers explore configuration modeling and checking, vulnerability and risk assessment, configuration analysis, and diagnostics and discovery. The authors equip readers to understand automated security management systems and techniques that increase overall network assurability and usability. These constantly changing networks defend against cyber attacks by integrating hundreds of security devices such as firewalls, IPSec gateways, IDS/IPS, authentication servers, authorization/RBAC servers, and crypto systems. Automated Security Management presents a number of topics in the area of configuration automation. Early in the book, the chapter authors introduce modeling and validation of configurations based on high-level requirements and discuss how to manage the security risk as a result of configuration settings of network systems. Later chapters delve into the concept of configuration analysis and why it is important in ensuring the security and functionality of a properly configured system. The book concludes with ways to identify problems when things go wrong and more. A wide range of theoretical and practical content make this volume valuable for researchers and professionals who work with network systems.

Managing Risk and Information Security - Protect to Enable (Paperback, 2nd ed.): Malcolm W. Harkins Managing Risk and Information Security - Protect to Enable (Paperback, 2nd ed.)
Malcolm W. Harkins
R1,677 Discovery Miles 16 770 Ships in 10 - 15 working days

Examine the evolving enterprise security landscape and discover how to manage and survive risk. While based primarily on the author's experience and insights at major companies where he has served as CISO and CSPO, the book also includes many examples from other well-known companies and provides guidance for a management-level audience. Managing Risk and Information Security provides thought leadership in the increasingly important area of enterprise information risk and security. It describes the changing risk environment and why a fresh approach to information security is needed. Because almost every aspect of an enterprise is now dependent on technology not only for internal operations but increasing as a part of product or service creation, the focus of IT security must shift from locking down assets to enabling the business while managing and surviving risk. This edition discusses business risk from a broader perspective, including privacy and regulatory considerations. It describes the increasing number of threats and vulnerabilities and offers strategies for developing solutions. These include discussions of how enterprises can take advantage of new and emerging technologies-such as social media and the huge proliferation of Internet-enabled devices-while minimizing risk. What You'll Learn Review how people perceive risk and the effects it has on information security See why different perceptions of risk within an organization matters Understand and reconcile these differing risk views Gain insights into how to safely enable the use of new technologies Who This Book Is ForThe primary audience is CIOs and other IT leaders, CISOs and other information security leaders, IT auditors, and other leaders of corporate governance and risk functions. The secondary audience is CEOs, board members, privacy professionals, and less senior-level information security and risk professionals. "Harkins' logical, methodical approach as a CISO to solving the most complex cybersecurity problems is reflected in the lucid style of this book. His enlightened approach to intelligence-based security infrastructure and risk mitigation is our best path forward if we are ever to realize the vast potential of the innovative digital world we are creating while reducing the threats to manageable levels. The author shines a light on that path in a comprehensive yet very readable way." -Art Coviello, Former CEO and Executive Chairman, RSA

Advances in Human Factors in Cybersecurity - Proceedings of the AHFE 2016 International Conference on Human Factors in  ... Advances in Human Factors in Cybersecurity - Proceedings of the AHFE 2016 International Conference on Human Factors in Cybersecurity, July 27-31, 2016, Walt Disney World (R), Florida, USA (Paperback, 1st ed. 2016)
Denise Nicholson
R5,497 Discovery Miles 54 970 Ships in 10 - 15 working days

This book reports on the latest research and developments in the field of cybersecurity, giving a special emphasis on personal security and new methods for reducing human error and increasing cyber awareness, and innovative solutions for increasing the security of advanced Information Technology (IT) infrastructures. It covers a wealth of topics, including methods for human training, novel Cyber-Physical and Process-Control Systems, social, economic and behavioral aspects of the cyberspace, issues concerning the cyber security index, security metrics for enterprises, risk evaluation, and many others. Based on the AHFE 2016 International Conference on Human Factors in Cybersecurity, held on July 27-31, 2016, in Walt Disney World (R), Florida, USA, this book not only presents innovative cybersecurity technologies, but also discusses emerging threats, current gaps in the available systems and future challenges that may be coped with through the help of human factors research.

Coding for Penetration Testers - Building Better Tools (Paperback, 2nd edition): Jason Andress, Ryan Linn Coding for Penetration Testers - Building Better Tools (Paperback, 2nd edition)
Jason Andress, Ryan Linn
R1,015 Discovery Miles 10 150 Ships in 12 - 17 working days

Coding for Penetration Testers: Building Better Tools, Second Edition provides readers with an understanding of the scripting languages that are commonly used when developing tools for penetration testing, also guiding users through specific examples of custom tool development and the situations where such tools might be used. While developing a better understanding of each language, the book presents real-world scenarios and tool development that can be incorporated into a tester's toolkit. This completely updated edition focuses on an expanded discussion on the use of Powershell, and includes practical updates to all tools and coverage.

Intelligent Data Analysis for e-Learning - Enhancing Security and Trustworthiness in Online Learning Systems (Paperback): Jorge... Intelligent Data Analysis for e-Learning - Enhancing Security and Trustworthiness in Online Learning Systems (Paperback)
Jorge Miguel, Santi Caballe, Fatos Xhafa
R2,627 R2,290 Discovery Miles 22 900 Save R337 (13%) Ships in 12 - 17 working days

Intelligent Data Analysis for e-Learning: Enhancing Security and Trustworthiness in Online Learning Systems addresses information security within e-Learning based on trustworthiness assessment and prediction. Over the past decade, many learning management systems have appeared in the education market. Security in these systems is essential for protecting against unfair and dishonest conduct-most notably cheating-however, e-Learning services are often designed and implemented without considering security requirements. This book provides functional approaches of trustworthiness analysis, modeling, assessment, and prediction for stronger security and support in online learning, highlighting the security deficiencies found in most online collaborative learning systems. The book explores trustworthiness methodologies based on collective intelligence than can overcome these deficiencies. It examines trustworthiness analysis that utilizes the large amounts of data-learning activities generate. In addition, as processing this data is costly, the book offers a parallel processing paradigm that can support learning activities in real-time. The book discusses data visualization methods for managing e-Learning, providing the tools needed to analyze the data collected. Using a case-based approach, the book concludes with models and methodologies for evaluating and validating security in e-Learning systems. Indexing: The books of this series are submitted to EI-Compendex and SCOPUS

Cybercrime Through an Interdisciplinary Lens (Hardcover): Thomas Holt Cybercrime Through an Interdisciplinary Lens (Hardcover)
Thomas Holt
R4,164 Discovery Miles 41 640 Ships in 12 - 17 working days

Research on cybercrime has been largely bifurcated, with social science and computer science researchers working with different research agendas. These fields have produced parallel scholarship to understand cybercrime offending and victimization, as well as techniques to harden systems from compromise and understand the tools used by cybercriminals. The literature developed from these two fields is diverse and informative, but until now there has been minimal interdisciplinary scholarship combining their insights in order to create a more informed and robust body of knowledge. This book offers an interdisciplinary approach to research on cybercrime and lays out frameworks for collaboration between the fields. Bringing together international experts, this book explores a range of issues from malicious software and hacking to victimization and fraud. This work also provides direction for policy changes to both cybersecurity and criminal justice practice based on the enhanced understanding of cybercrime that can be derived from integrated research from both the technical and social sciences. The authors demonstrate the breadth of contemporary scholarship as well as identifying key questions that could be addressed in the future or unique methods that could benefit the wider research community. This edited collection will be key reading for academics, researchers, and practitioners in both computer security and law enforcement. This book is also a comprehensive resource for postgraduate and advanced undergraduate students undertaking courses in social and technical studies.

Ad Hoc Networks - 7th International Conference, AdHocHets 2015, San Remo, Italy, September 1-2, 2015. Proceedings (Paperback,... Ad Hoc Networks - 7th International Conference, AdHocHets 2015, San Remo, Italy, September 1-2, 2015. Proceedings (Paperback, 1st ed. 2015)
Nathalie Mitton, Melike Erol Kantarci, Antoine Gallais, Symeon Papavassiliou
R2,209 Discovery Miles 22 090 Ships in 10 - 15 working days

This book constitutes the proceedings of the International Conference on Ad Hoc Networks, ADHOCNETS 2015, held in September 2015 in Italy. The 17 regular and 3 invited papers presented were carefully reviewed and selected from numerous submissions. The papers cover topics such as physical layer; MAC and routing; mobility in networks; self-organization, virtualization and localization; cloud, virtualization and prototypage; security and fault tolerance in wireless mobile networks.

Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security - 10th International Conference, ICGS3... Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security - 10th International Conference, ICGS3 2015, London, UK, September 15-17, 2015. Proceedings (Paperback, 1st ed. 2015)
Hamid Jahankhani, Alex Carlile, Babak Akhgar, Amie Taal, Ali G. Hessami, …
R2,496 Discovery Miles 24 960 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 10th International Conference on Global Security, Safety and Sustainability, ICGS3 2015, held in London, UK, in September 2015. The 31 revised full papers presented were carefully reviewed and selected from 57 submissions. The papers focus on the challenges of complexity, rapid pace of change and risk/opportunity issues associated with the 21st century living style, systems and infrastructures.

Encrypted Email - The History and Technology of Message Privacy (Paperback, 1st ed. 2015): Hilarie Orman Encrypted Email - The History and Technology of Message Privacy (Paperback, 1st ed. 2015)
Hilarie Orman
R1,727 Discovery Miles 17 270 Ships in 10 - 15 working days

This SpringerBrief examines the technology of email privacy encryption from its origins to its theoretical and practical details. It explains the challenges in standardization, usability, and trust that interfere with the user experience for software protection. Chapters address the origins of email encryption and why email encryption is rarely used despite the myriad of its benefits -- benefits that cannot be obtained in any other way. The construction of a secure message and its entwining with public key technology are covered. Other chapters address both independent standards for secure email and how they work. The final chapters include a discussion of getting started with encrypted email and how to live with it. Written by an expert in software security and computer tools, Encrypted Email: The History and Technology of Message Privacy is designed for researchers and professionals working in email security and encryption. Advanced-level students interested in security and networks will also find the content valuable.

A Study of Black Hole Attack Solutions - On AODV Routing Protocol in MANET (Paperback): Elahe Fazeldehkordi, I.S. Dr. Amiri,... A Study of Black Hole Attack Solutions - On AODV Routing Protocol in MANET (Paperback)
Elahe Fazeldehkordi, I.S. Dr. Amiri, Oluwatobi Ayodeji Akanbi
R1,370 R1,249 Discovery Miles 12 490 Save R121 (9%) Ships in 12 - 17 working days

Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact that they are dynamic, require no fixed infrastructure, and are scalable. However, MANETs are particularly susceptible to several different types of widely perpetrated cyberattack. One of the most common hacks aimed at MANETs is the Black Hole attack, in which a particular node within the network displays itself as having the shortest path for the node whose packets it wants to intercept. Once the packets are drawn to the Black Hole, they are then dropped instead of relayed, and the communication of the MANET is thereby disrupted, without knowledge of the other nodes in the network. Due to the sophistication of the Black Hole attack, there has been a lot of research conducted on how to detect it and prevent it. The authors of this short format title provide their research results on providing an effective solution to Black Hole attacks, including introduction of new MANET routing protocols that can be implemented in order to improve detection accuracy and network parameters such as total dropped packets, end-to-end delay, packet delivery ratio, and routing request overhead.

Data Privacy for the Smart Grid (Hardcover): Rebecca Herold, Christine Hertzog Data Privacy for the Smart Grid (Hardcover)
Rebecca Herold, Christine Hertzog
R2,070 Discovery Miles 20 700 Ships in 12 - 17 working days

Many Smart Grid books include "privacy" in their title, but only touch on privacy, with most of the discussion focusing on cybersecurity. Filling this knowledge gap, Data Privacy for the Smart Grid provides a clear description of the Smart Grid ecosystem, presents practical guidance about its privacy risks, and details the actions required to protect data generated by Smart Grid technologies. It addresses privacy in electric, natural gas, and water grids and supplies two different perspectives of the topic-one from a Smart Grid expert and another from a privacy and information security expert.The authors have extensive experience with utilities and leading the U.S. government's National Institute of Standards and Technologies (NIST) Cyber Security Working Group (CSWG)/Smart Grid Interoperability Group (SGIP) Privacy Subgroup. This comprehensive book is understandable for all those involved in the Smart Grid. The authors detail the facts about Smart Grid privacy so readers can separate truth from myth about Smart Grid privacy. While considering privacy in the Smart Grid, the book also examines the data created by Smart Grid technologies and machine-to-machine (M2M) applications and associated legal issues. The text details guidelines based on the Organization for Economic Cooperation and Development Privacy Guidelines and the U.S. Federal Trade Commission Fair Information Practices. It includes privacy training recommendations and references to additional Smart Grid privacy resources. After reading the book, readers will be prepared to develop informed opinions, establish fact-based decisions, make meaningful contributions to Smart Grid legislation and policies, and to build technologies to preserve and protect privacy. Policy makers; Smart Grid and M2M product and service developers; utility customer and privacy resources; and other service providers and resources are primary beneficiaries of the information provided in

Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats (Paperback, 2011 ed.): Sushil Jajodia, Anup K. Ghosh,... Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats (Paperback, 2011 ed.)
Sushil Jajodia, Anup K. Ghosh, Vipin Swarup, Cliff Wang, X.Sean Wang
R2,549 Discovery Miles 25 490 Ships in 10 - 15 working days

Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats was developed by a group of leading researchers. It describes the fundamental challenges facing the research community and identifies new promising solution paths. Moving Target Defense which is motivated by the asymmetric costs borne by cyber defenders takes an advantage afforded to attackers and reverses it to advantage defenders. Moving Target Defense is enabled by technical trends in recent years, including virtualization and workload migration on commodity systems, widespread and redundant network connectivity, instruction set and address space layout randomization, just-in-time compilers, among other techniques. However, many challenging research problems remain to be solved, such as the security of virtualization infrastructures, secure and resilient techniques to move systems within a virtualized environment, automatic diversification techniques, automated ways to dynamically change and manage the configurations of systems and networks, quantification of security improvement, potential degradation and more. Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats is designed for advanced -level students and researchers focused on computer science, and as a secondary text book or reference. Professionals working in this field will also find this book valuable.

The Basics of Digital Privacy - Simple Tools to Protect Your Personal Information and Your Identity Online (Paperback): Denny... The Basics of Digital Privacy - Simple Tools to Protect Your Personal Information and Your Identity Online (Paperback)
Denny Cherry
R587 Discovery Miles 5 870 Ships in 12 - 17 working days

Who s watching you online? These days, it s hard to be sure. But the recent Edward Snowden revelations of NSA data mining and the constant threat of identity theft from criminals mean your privacy is in jeopardy.

"The Basics of Digital Privacy" teaches you how to protect the privacy of your data and your identity while surfing, searching, and interacting with others in a virtual world. Author Denny Cherry teaches professionals how to keep huge databases secure, and he will introduce you to the basic concepts of protecting your identity, your financial data, and your personal information from prying eyes while using your computer and smartphone. You ll learn how to stay connected and conduct business online, while protecting your privacy with every keystroke and click.

"The Basics of Digital Privacy" gives you clear, non-technical explanations of how to safely store personal information online, create secure usernames and passwords for websites, and participate in social media without compromising your privacy. Learn how to find out who s watching you online, and what the law has to say about your privacy rights. A great resource for anyone who ventures into the online world on a daily basis
The most straightforward and up-to-date guide to privacy for anyone who goes online for work, school, or personal useReal-world examples show you how cyber criminals commit their crimes, and what you can do to keep your identity and your data safeWritten by author Denny Cherry, who teaches top security professionals how to protect huge databases of informationLearn the best ways to create secure passwords, chat, text, email and conduct business online without compromising your identity and your personal data"

Our Data, Ourselves - A Personal Guide to Digital Privacy (Paperback): Jacqueline D. Lipton Our Data, Ourselves - A Personal Guide to Digital Privacy (Paperback)
Jacqueline D. Lipton
R517 Discovery Miles 5 170 Ships in 12 - 17 working days

A practical, user-friendly handbook for understanding and protecting our personal data and digital privacy. Our Data, Ourselves addresses a common and crucial question: What can we as private individuals do to protect our personal information in a digital world? In this practical handbook, legal expert Jacqueline D. Lipton guides readers through important issues involving technology, data collection, and digital privacy as they apply to our daily lives. Our Data, Ourselves covers a broad range of everyday privacy concerns with easily digestible, accessible overviews and real-world examples. Lipton explores the ways we can protect our personal data and monitor its use by corporations, the government, and others. She also explains our rights regarding sensitive personal data like health insurance records and credit scores, as well as what information retailers can legally gather, and how. Who actually owns our personal information? Can an employer legally access personal emails? What privacy rights do we have on social media? Answering these questions and more, Our Data, Ourselves provides a strategic approach to assuming control over, and ultimately protecting, our personal information.

Android Malware (Paperback, 2013 ed.): Xuxian Jiang, Yajin Zhou Android Malware (Paperback, 2013 ed.)
Xuxian Jiang, Yajin Zhou
R1,578 Discovery Miles 15 780 Ships in 10 - 15 working days

Mobile devices, such as smart phones, have achieved computing and networking capabilities comparable to traditional personal computers. Their successful consumerization has also become a source of pain for adopting users and organizations. In particular, the widespread presence of information-stealing applications and other types of mobile malware raises substantial security and privacy concerns. Android Malware presents a systematic view on state-of-the-art mobile malware that targets the popular Android mobile platform. Covering key topics like the Android malware history, malware behavior and classification, as well as, possible defense techniques.

Data Power - Radical Geographies of Control and Resistance (Hardcover): Jim E. Thatcher, Craig M. Dalton Data Power - Radical Geographies of Control and Resistance (Hardcover)
Jim E. Thatcher, Craig M. Dalton
R1,960 Discovery Miles 19 600 Ships in 12 - 17 working days

In recent years, popular media have inundated audiences with sensationalised headlines recounting data breaches, new forms of surveillance and other dangers of our digital age. Despite their regularity, such accounts treat each case as unprecedented and unique. This book proposes a radical rethinking of the history, present and future of our relations with the digital, spatial technologies that increasingly mediate our everyday lives. From smartphones to surveillance cameras, to navigational satellites, these new technologies offer visions of integrated, smooth and efficient societies, even as they directly conflict with the ways users experience them. Recognising the potential for both control and liberation, the authors argue against both acquiescence to and rejection of these technologies. Through intentional use of the very systems that monitor them, activists from Charlottesville to Hong Kong are subverting, resisting and repurposing geographic technologies. Using examples as varied as writings on the first telephones to the experiences of a feminist collective for migrant women in Spain, the authors present a revolution of everyday technologies. In the face of the seemingly inevitable dominance of corporate interests, these technologies allow us to create new spaces of affinity, and a new politics of change.

Database Security XII - Status and Prospects (Paperback, Softcover reprint of the original 1st ed. 1999): Sushil Jajodia Database Security XII - Status and Prospects (Paperback, Softcover reprint of the original 1st ed. 1999)
Sushil Jajodia
R4,235 Discovery Miles 42 350 Ships in 10 - 15 working days

New technology is always evolving and companies must have appropriate security for their business to be able to keep up-to-date with the changes. With the rapid growth in internet and www facilities, database security will always be a key topic in business and in the public sector and has implications for the whole of society. Database Security Volume XII covers issues related to security and privacy of information in a wide range of applications, including: * Electronic Commerce * Informational Assurances * Workflow * Privacy * Policy Modeling * Mediation * Information Warfare Defense * Multilevel Security * Role-based Access Controls * Mobile Databases * Inference * Data Warehouses and Data Mining. This book contains papers and panel discussions from the Twelfth Annual Working Conference on Database Security, organized by the International Federation for Information Processing (IFIP) and held July 15-17, 1998 in Chalkidiki, Greece. Database Security Volume XII will prove invaluable reading for faculty and advanced students as well as for industrial researchers and practitioners working in the area of database security research and development.

Practical Anonymity - Hiding in Plain Sight Online (Paperback): Pete Loshin Practical Anonymity - Hiding in Plain Sight Online (Paperback)
Pete Loshin
R593 Discovery Miles 5 930 Ships in 12 - 17 working days

For those with legitimate reason to use the Internet anonymously--diplomats, military and other government agencies, journalists, political activists, IT professionals, law enforcement personnel, political refugees and others--anonymous networking provides an invaluable tool, and many good reasons that anonymity can serve a very important purpose. Anonymous use of the Internet is made difficult by the many websites that know everything about us, by the cookies and ad networks, IP-logging ISPs, even nosy officials may get involved. It is no longer possible to turn off browser cookies to be left alone in your online life. "Practical Anonymity: Hiding in Plain Sight Online "shows you how to use the most effective and widely-used anonymity tools--the ones that protect diplomats, military and other government agencies to become invisible online. This "practical "guide skips the theoretical and technical details and focuses on getting from zero to anonymous as fast as possible.

For many, using any of the open-source, peer-reviewed tools for connecting to the Internet via an anonymous network may be (or seem to be) too difficult becausemost of the information about these tools is burdened with discussions of how they work and how to maximize security. Even tech-savvy users may find the burden too great--but actually using the tools can be pretty simple.

The primary market for this book consists of IT professionals who need/want tools for anonymity to test/work around corporate firewalls and router filtering as well as provide anonymity tools to their customers.

Simple, step-by-step instructions for configuring and using anonymous networking software Simple, step-by-step instructions for configuring and using anonymous networking software Use of open source, time-proven and peer-reviewed tools for anonymity Plain-language discussion of actual threats and concrete suggestions for appropriate responses Easy-to-follow tips for safer computing
Simple, step-by-step instructions for configuring and using anonymous networking software Use of open source, time-proven and peer-reviewed tools for anonymity Plain-language discussion of actual threats, and concrete suggestions for appropriate responses Easy to follow tips for safer computing. "

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Age of AI - And Our Human Future
Henry A. Kissinger, Eric Schmidt, … Paperback R291 R262 Discovery Miles 2 620
Research Handbook on Privacy and Data…
Gloria Gonzalez, Rosamunde van Brakel, … Hardcover R6,101 Discovery Miles 61 010
Cyber Security and Threats - Concepts…
Information Reso Management Association Hardcover R9,960 Discovery Miles 99 600
Handbook of Research on Advanced…
Ahmed J. Obaid, Ghassan H Abdul-Majeed, … Hardcover R7,692 Discovery Miles 76 920
Cyber Security and Threats - Concepts…
Information Reso Management Association Hardcover R9,960 Discovery Miles 99 600
Permanent Record
Edward Snowden Paperback R299 R234 Discovery Miles 2 340
EU General Data Protection Regulation…
It Governance Privacy Team Paperback R738 Discovery Miles 7 380
Exchanging Terrorism Oxygen for Media…
Mahmoud Eid Hardcover R5,147 Discovery Miles 51 470
Pandemic Surveillance - Privacy…
Margaret Hu Hardcover R2,865 Discovery Miles 28 650
Algorithms for Data and Computation…
Alex X. Liu, Rui Li Hardcover R3,643 Discovery Miles 36 430

 

Partners