0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (119)
  • R250 - R500 (221)
  • R500+ (777)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

Advanced Computing and Systems for Security - Volume Three (Paperback, 1st ed. 2017): Rituparna Chaki, Khalid Saeed, Agostino... Advanced Computing and Systems for Security - Volume Three (Paperback, 1st ed. 2017)
Rituparna Chaki, Khalid Saeed, Agostino Cortesi, Nabendu Chaki
R1,920 Discovery Miles 19 200 Ships in 18 - 22 working days

This book presents extended versions of papers originally presented and discussed at the 3rd International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2016) held from August 12 to 14, 2016 in Kolkata, India. The symposium was jointly organized by the AGH University of Science & Technology, Cracow, Poland; Ca' Foscari University, Venice, Italy; and the University of Calcutta, India. The book is divided into two volumes, Volumes 3 and 4, and presents dissertation works in the areas of Image Processing, Biometrics-based Authentication, Soft Computing, Data Mining, Next-Generation Networking and Network Security, Remote Healthcare, Communications, Embedded Systems, Software Engineering and Service Engineering. The first two volumes of the book published the works presented at the ACSS 2015, which was held from May 23 to 25, 2015 in Kolkata, India.

Advances in Human Factors in Cybersecurity - Proceedings of the AHFE 2016 International Conference on Human Factors in  ... Advances in Human Factors in Cybersecurity - Proceedings of the AHFE 2016 International Conference on Human Factors in Cybersecurity, July 27-31, 2016, Walt Disney World (R), Florida, USA (Paperback, 1st ed. 2016)
Denise Nicholson
R5,406 Discovery Miles 54 060 Ships in 18 - 22 working days

This book reports on the latest research and developments in the field of cybersecurity, giving a special emphasis on personal security and new methods for reducing human error and increasing cyber awareness, and innovative solutions for increasing the security of advanced Information Technology (IT) infrastructures. It covers a wealth of topics, including methods for human training, novel Cyber-Physical and Process-Control Systems, social, economic and behavioral aspects of the cyberspace, issues concerning the cyber security index, security metrics for enterprises, risk evaluation, and many others. Based on the AHFE 2016 International Conference on Human Factors in Cybersecurity, held on July 27-31, 2016, in Walt Disney World (R), Florida, USA, this book not only presents innovative cybersecurity technologies, but also discusses emerging threats, current gaps in the available systems and future challenges that may be coped with through the help of human factors research.

A Practical Guide to Privacy in Libraries (Paperback): Paul Pedley A Practical Guide to Privacy in Libraries (Paperback)
Paul Pedley
R1,808 Discovery Miles 18 080 Ships in 10 - 15 working days

Privacy is a core value of librarianship and yet as a concept, it is difficult to define and in practice, a challenge to uphold. This groundbreaking new book considers how privacy issues can arise in a library context and what library and information professionals can do to protect the privacy of their users. A Practical Guide to Privacy in Libraries features a wide range of practical examples of such issues, providing insights and practical steps which readers can follow. In-depth case studies and scenarios support the examples laid out in the book, while examples of data breaches which have occurred in a library setting, and the lessons we can learn from them, are also included. The book also covers the main legislation governing data protection - GDPR - which will be particularly relevant to European librarians, and international librarians offering services to EU citizens. The book provides a range of tools through which libraries can communicate how they handle the personal data of their users whilst ensuring that they are following best practice with their privacy policy statements, their privacy audits and data protection impact assessments. Privacy is not the same thing as data protection, and the book outlines the differences between these two concepts. Nevertheless, the book has been written with the requirements of data protection law very much in mind. Written in a highly practical manner, this book is essential reading for library and information professionals who need to understand and support privacy in the library setting and a useful reference for students and researchers in the field who need to understand this topic in practice.

Agenda delle password - Agenda degli indirizzi web e delle password di accesso - Copertina Jack Russell Terrier (Italian,... Agenda delle password - Agenda degli indirizzi web e delle password di accesso - Copertina Jack Russell Terrier (Italian, Paperback)
Agende Pratiche
R205 Discovery Miles 2 050 Ships in 18 - 22 working days
Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II (Paperback, 1st ed. 2016)
Jung Hee Cheon, Tsuyoshi Takagi
R2,860 Discovery Miles 28 600 Ships in 18 - 22 working days

The two-volume set LNCS 10031 and LNCS 10032 constitutes the refereed proceedings of the 22nd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2016, held in Hanoi, Vietnam, in December 2016. The 67 revised full papers and 2 invited talks presented were carefully selected from 240 submissions. They are organized in topical sections on Mathematical Analysis; AES and White-Box; Hash Function; Randomness; Authenticated Encryption; Block Cipher; SCA and Leakage Resilience; Zero Knowledge; Post Quantum Cryptography; Provable Security; Digital Signature; Functional and Homomorphic Cryptography; ABE and IBE; Foundation; Cryptographic Protocol; Multi-Party Computation.

Managing Risk and Information Security - Protect to Enable (Paperback, 2nd ed.): Malcolm W. Harkins Managing Risk and Information Security - Protect to Enable (Paperback, 2nd ed.)
Malcolm W. Harkins
R1,591 Discovery Miles 15 910 Ships in 18 - 22 working days

Examine the evolving enterprise security landscape and discover how to manage and survive risk. While based primarily on the author's experience and insights at major companies where he has served as CISO and CSPO, the book also includes many examples from other well-known companies and provides guidance for a management-level audience. Managing Risk and Information Security provides thought leadership in the increasingly important area of enterprise information risk and security. It describes the changing risk environment and why a fresh approach to information security is needed. Because almost every aspect of an enterprise is now dependent on technology not only for internal operations but increasing as a part of product or service creation, the focus of IT security must shift from locking down assets to enabling the business while managing and surviving risk. This edition discusses business risk from a broader perspective, including privacy and regulatory considerations. It describes the increasing number of threats and vulnerabilities and offers strategies for developing solutions. These include discussions of how enterprises can take advantage of new and emerging technologies-such as social media and the huge proliferation of Internet-enabled devices-while minimizing risk. What You'll Learn Review how people perceive risk and the effects it has on information security See why different perceptions of risk within an organization matters Understand and reconcile these differing risk views Gain insights into how to safely enable the use of new technologies Who This Book Is ForThe primary audience is CIOs and other IT leaders, CISOs and other information security leaders, IT auditors, and other leaders of corporate governance and risk functions. The secondary audience is CEOs, board members, privacy professionals, and less senior-level information security and risk professionals. "Harkins' logical, methodical approach as a CISO to solving the most complex cybersecurity problems is reflected in the lucid style of this book. His enlightened approach to intelligence-based security infrastructure and risk mitigation is our best path forward if we are ever to realize the vast potential of the innovative digital world we are creating while reducing the threats to manageable levels. The author shines a light on that path in a comprehensive yet very readable way." -Art Coviello, Former CEO and Executive Chairman, RSA

Agenda de Senhas - Agenda para enderecos eletronicos e senhas: Capa gatinho de olhos azuis - Portugues (Brasil) (Portuguese,... Agenda de Senhas - Agenda para enderecos eletronicos e senhas: Capa gatinho de olhos azuis - Portugues (Brasil) (Portuguese, Paperback)
Agendas E Cadernos
R206 Discovery Miles 2 060 Ships in 18 - 22 working days
The Data Protection Officer - Profession, Rules, and Role (Hardcover): Paul Lambert The Data Protection Officer - Profession, Rules, and Role (Hardcover)
Paul Lambert
R4,083 Discovery Miles 40 830 Ships in 10 - 15 working days

The EU's General Data Protection Regulation created the position of corporate Data Protection Officer (DPO), who is empowered to ensure the organization is compliant with all aspects of the new data protection regime. Organizations must now appoint and designate a DPO. The specific definitions and building blocks of the data protection regime are enhanced by the new General Data Protection Regulation and therefore the DPO will be very active in passing the message and requirements of the new data protection regime throughout the organization. This book explains the roles and responsiblies of the DPO, as well as highlights the potential cost of getting data protection wrong.

Ad Hoc Networks - 7th International Conference, AdHocHets 2015, San Remo, Italy, September 1-2, 2015. Proceedings (Paperback,... Ad Hoc Networks - 7th International Conference, AdHocHets 2015, San Remo, Italy, September 1-2, 2015. Proceedings (Paperback, 1st ed. 2015)
Nathalie Mitton, Melike Erol Kantarci, Antoine Gallais, Symeon Papavassiliou
R2,089 Discovery Miles 20 890 Ships in 18 - 22 working days

This book constitutes the proceedings of the International Conference on Ad Hoc Networks, ADHOCNETS 2015, held in September 2015 in Italy. The 17 regular and 3 invited papers presented were carefully reviewed and selected from numerous submissions. The papers cover topics such as physical layer; MAC and routing; mobility in networks; self-organization, virtualization and localization; cloud, virtualization and prototypage; security and fault tolerance in wireless mobile networks.

Agenda de passwords - Agenda para endere os electr nicos e passwords - Capa peekaboo (Portuguese, Paperback): Coisas Realmente... Agenda de passwords - Agenda para endere os electr nicos e passwords - Capa peekaboo (Portuguese, Paperback)
Coisas Realmente Uteis
R205 Discovery Miles 2 050 Ships in 18 - 22 working days
Encrypted Email - The History and Technology of Message Privacy (Paperback, 1st ed. 2015): Hilarie Orman Encrypted Email - The History and Technology of Message Privacy (Paperback, 1st ed. 2015)
Hilarie Orman
R1,645 Discovery Miles 16 450 Ships in 18 - 22 working days

This SpringerBrief examines the technology of email privacy encryption from its origins to its theoretical and practical details. It explains the challenges in standardization, usability, and trust that interfere with the user experience for software protection. Chapters address the origins of email encryption and why email encryption is rarely used despite the myriad of its benefits -- benefits that cannot be obtained in any other way. The construction of a secure message and its entwining with public key technology are covered. Other chapters address both independent standards for secure email and how they work. The final chapters include a discussion of getting started with encrypted email and how to live with it. Written by an expert in software security and computer tools, Encrypted Email: The History and Technology of Message Privacy is designed for researchers and professionals working in email security and encryption. Advanced-level students interested in security and networks will also find the content valuable.

Agenda delle password - Agenda degli indirizzi web e delle password di accesso - Copertina gattino con occhi blu (Italian,... Agenda delle password - Agenda degli indirizzi web e delle password di accesso - Copertina gattino con occhi blu (Italian, Paperback)
Agende Pratiche
R205 Discovery Miles 2 050 Ships in 18 - 22 working days
Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats (Paperback, 2011 ed.): Sushil Jajodia, Anup K. Ghosh,... Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats (Paperback, 2011 ed.)
Sushil Jajodia, Anup K. Ghosh, Vipin Swarup, Cliff Wang, X.Sean Wang
R2,427 Discovery Miles 24 270 Ships in 18 - 22 working days

Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats was developed by a group of leading researchers. It describes the fundamental challenges facing the research community and identifies new promising solution paths. Moving Target Defense which is motivated by the asymmetric costs borne by cyber defenders takes an advantage afforded to attackers and reverses it to advantage defenders. Moving Target Defense is enabled by technical trends in recent years, including virtualization and workload migration on commodity systems, widespread and redundant network connectivity, instruction set and address space layout randomization, just-in-time compilers, among other techniques. However, many challenging research problems remain to be solved, such as the security of virtualization infrastructures, secure and resilient techniques to move systems within a virtualized environment, automatic diversification techniques, automated ways to dynamically change and manage the configurations of systems and networks, quantification of security improvement, potential degradation and more. Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats is designed for advanced -level students and researchers focused on computer science, and as a secondary text book or reference. Professionals working in this field will also find this book valuable.

The Identity Trade - Selling Privacy and Reputation Online (Hardcover): Nora A. Draper The Identity Trade - Selling Privacy and Reputation Online (Hardcover)
Nora A. Draper
R2,561 Discovery Miles 25 610 Ships in 10 - 15 working days

The successes and failures of an industry that claims to protect and promote our online identities What does privacy mean in the digital era? As technology increasingly blurs the boundary between public and private, questions about who controls our data become harder and harder to answer. Our every web view, click, and online purchase can be sold to anyone to store and use as they wish. At the same time, our online reputation has become an important part of our identity-a form of cultural currency. The Identity Trade examines the relationship between online visibility and privacy, and the politics of identity and self-presentation in the digital age. In doing so, Nora Draper looks at the revealing two-decade history of efforts by the consumer privacy industry to give individuals control over their digital image through the sale of privacy protection and reputation management as a service. Through in-depth interviews with industry experts, as well as analysis of media coverage, promotional materials, and government policies, Draper examines how companies have turned the protection and promotion of digital information into a business. Along the way, she also provides insight into how these companies have responded to and shaped the ways we think about image and reputation in the digital age. Tracking the successes and failures of companies claiming to control our digital ephemera, Draper takes us inside an industry that has commodified strategies of information control. This book is a discerning overview of the debate around who controls our data, who buys and sells it, and the consequences of treating privacy as a consumer good.

Data Privacy for the Smart Grid (Hardcover): Rebecca Herold, Christine Hertzog Data Privacy for the Smart Grid (Hardcover)
Rebecca Herold, Christine Hertzog
R2,300 Discovery Miles 23 000 Ships in 10 - 15 working days

Many Smart Grid books include "privacy" in their title, but only touch on privacy, with most of the discussion focusing on cybersecurity. Filling this knowledge gap, Data Privacy for the Smart Grid provides a clear description of the Smart Grid ecosystem, presents practical guidance about its privacy risks, and details the actions required to protect data generated by Smart Grid technologies. It addresses privacy in electric, natural gas, and water grids and supplies two different perspectives of the topic-one from a Smart Grid expert and another from a privacy and information security expert.The authors have extensive experience with utilities and leading the U.S. government's National Institute of Standards and Technologies (NIST) Cyber Security Working Group (CSWG)/Smart Grid Interoperability Group (SGIP) Privacy Subgroup. This comprehensive book is understandable for all those involved in the Smart Grid. The authors detail the facts about Smart Grid privacy so readers can separate truth from myth about Smart Grid privacy. While considering privacy in the Smart Grid, the book also examines the data created by Smart Grid technologies and machine-to-machine (M2M) applications and associated legal issues. The text details guidelines based on the Organization for Economic Cooperation and Development Privacy Guidelines and the U.S. Federal Trade Commission Fair Information Practices. It includes privacy training recommendations and references to additional Smart Grid privacy resources. After reading the book, readers will be prepared to develop informed opinions, establish fact-based decisions, make meaningful contributions to Smart Grid legislation and policies, and to build technologies to preserve and protect privacy. Policy makers; Smart Grid and M2M product and service developers; utility customer and privacy resources; and other service providers and resources are primary beneficiaries of the information provided in

Intelligent Mobile Malware Detection (Hardcover): Tony Thomas, Teenu John, Mamoun Alazab, Roopak Surendran Intelligent Mobile Malware Detection (Hardcover)
Tony Thomas, Teenu John, Mamoun Alazab, Roopak Surendran
R2,347 Discovery Miles 23 470 Ships in 10 - 15 working days

Unique selling point: * This book proposes several approaches for dynamic Android malware detection based on system calls which do not have the limitations of existing mechanisms. * This book will be useful for researchers, students, developers and security analysts to know how malware behavior represented in the form of system call graphs can effectively detect Android malware. * The malware detection mechanisms in this book can be integrated with commercial antivirus softwares to detect Android malware including obfuscated variants.

Agenda delle password - Agenda degli indirizzi web e delle password di accesso - Copertina gattino giocoso (Italian,... Agenda delle password - Agenda degli indirizzi web e delle password di accesso - Copertina gattino giocoso (Italian, Paperback)
Agende Pratiche
R205 Discovery Miles 2 050 Ships in 18 - 22 working days
Agenda de Senhas - Agenda para enderecos eletronicos e senhas: Capa gatinho ruivo a relaxar - Portugues (Brasil) (Portuguese,... Agenda de Senhas - Agenda para enderecos eletronicos e senhas: Capa gatinho ruivo a relaxar - Portugues (Brasil) (Portuguese, Paperback)
Agendas E Cadernos
R205 Discovery Miles 2 050 Ships in 18 - 22 working days
Android Malware (Paperback, 2013 ed.): Xuxian Jiang, Yajin Zhou Android Malware (Paperback, 2013 ed.)
Xuxian Jiang, Yajin Zhou
R1,508 Discovery Miles 15 080 Ships in 18 - 22 working days

Mobile devices, such as smart phones, have achieved computing and networking capabilities comparable to traditional personal computers. Their successful consumerization has also become a source of pain for adopting users and organizations. In particular, the widespread presence of information-stealing applications and other types of mobile malware raises substantial security and privacy concerns. Android Malware presents a systematic view on state-of-the-art mobile malware that targets the popular Android mobile platform. Covering key topics like the Android malware history, malware behavior and classification, as well as, possible defense techniques.

Data Security and Security Data - 27th British National Conference on Databases, BNCOD 27, Dundee, UK, June 29 - July 1, 2010.... Data Security and Security Data - 27th British National Conference on Databases, BNCOD 27, Dundee, UK, June 29 - July 1, 2010. Revised Selected Papers (Paperback, 2012)
Lachlan Mackinnon
R1,713 Discovery Miles 17 130 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 27th British National Conference on Databases, BNCOD 27, held in Dundee, UK, in June 2010. The 10 revised full papers and 6 short papers, presented together with 3 invited papers, 1 best paper of the associated event on Teaching, Learning and Assessment of Databases (TLAD), and 2 PhD forum best papers were carefully reviewed and selected from 42 submissions. Special focus of the conference has been "Data Security and Security Data" and so the papers cover a wide range of topics such as data security, privacy and trust, security data, data integration and interoperability, data management for ubiquitous and mobile computing, data mining and information extraction, data modelling and architectures, data provenance, dataspaces, data streaming, databases and the grid, distributed information systems, electronic commerce, enterprise systems, heterogeneous databases, industrial applications, infrastructures and systems, intermittently connected data, file access methods and index structures, managing legacy data, new applications and processes, parallel and distributed databases, peer-to-peer data management, performance modelling of ubiquitous data use, personal data management, query and manipulation languages, query processing and optimisation, scientific applications, semantic Web and ontologies, semi-structured data, metadata and xml, user interfaces and data visualisation, Web data management and deep Web, Web services, and workflow support systems.

Pro Data Backup and Recovery (Paperback, 1st ed.): Steven Nelson Pro Data Backup and Recovery (Paperback, 1st ed.)
Steven Nelson
R1,530 Discovery Miles 15 300 Ships in 18 - 22 working days

Good backup and recovery strategies are key to the health of any organization. Medium- to very-large-scale systems administrators have to protect large amounts of critical data as well as design backup solutions that are scalable and optimized to meet changing conditions. Pro Data Backup and Recovery will cover some of the more common backup applications, such as Symantec NetBackup/BackupExec, EMC NetWorker, and CommVault, but the main discussion will focus on the implementation of 21st century architectures that allow the backup software to be a "commodity" item. The underlying architecture provides the framework for meeting the requirements of data protection for the organization. This book covers new developments in data protection as well as the impact of single-instance storage upon backup infrastructures. It discusses the impact of backup and data replication, the often misapplied B2D and D2D strategies, and "tapeless" backup environments. Continuous data protection and remote replication strategies are also addressed as they are integrated within backup strategies-a very important topic today. Learn backup solution design regardless of specific backup software Design realistic recovery solutions Take into account new data protection standards and the impact of data replication Whether you are using NetBackup, CommVault, or some other backup software, Pro Data Backup and Recovery will give you the information you need to keep your data safe and available.

The State Of Open Data - Histories And Horizons (Paperback): Tim Davies, Stephen B Walker, Mor Rubinstein The State Of Open Data - Histories And Horizons (Paperback)
Tim Davies, Stephen B Walker, Mor Rubinstein
R300 R277 Discovery Miles 2 770 Save R23 (8%) Ships in 5 - 10 working days

It’s been ten years since open data first broke onto the global stage. Over the past decade, thousands of programmes and projects around the world have worked to open data and use it to address a myriad of social and economic challenges. Meanwhile, issues related to data rights and privacy have moved to the centre of public and political discourse.

As the open data movement enters a new phase in its evolution, shifting to target real-world problems and embed open data thinking into other existing or emerging communities of practice, big questions still remain. How will open data initiatives respond to new concerns about privacy, inclusion, and artificial intelligence? And what can we learn from the last decade in order to deliver impact where it is most needed?

The State of Open Data brings together over 60 authors from around the world to address these questions and to take stock of the real progress made to date across sectors and around the world, uncovering the issues that will shape the future of open data in the years to come.

Expert Oracle and Java Security - Programming Secure Oracle Database Applications With Java (Paperback, 1st ed.): David Coffin Expert Oracle and Java Security - Programming Secure Oracle Database Applications With Java (Paperback, 1st ed.)
David Coffin
R1,486 Discovery Miles 14 860 Ships in 18 - 22 working days

Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java provides resources that every Java and Oracle database application programmer needs to ensure that they have guarded the security of the data and identities entrusted to them. You'll learn to consider potential vulnerabilities, and to apply best practices in secure Java and PL/SQL coding. Author David Coffin shows how to develop code to encrypt data in transit and at rest, to accomplish single sign-on with Oracle proxy connections, to generate and distribute two-factor authentication tokens from the Oracle server using pagers, cell phones (SMS), and e-mail, and to securely store and distribute Oracle application passwords. Early chapters lay the foundation for effective security in an Oracle/Java environment. Each of the later chapters brings example code to a point where it may be applied as-is to address application security issues. Templates for applications are also provided to help you bring colleagues up to the same secure application standards.If you are less familiar with either Java or Oracle PL/SQL, you will not be left behind; all the concepts in this book are introduced as to a novice and addressed as to an expert.* Helps you protect against data loss, identity theft, SQL injection, and address spoofing * Provides techniques for encryption on network and disk, code obfuscation and wrap, database hardening, single sign-on and two-factor * Provides what database administrators need to know about secure password distribution, Java secure programming, Java stored procedures, secure application roles in Oracle, logon triggers, database design, various connection pooling schemes, and much more What you'll learn * Guard against data loss, identity theft, SQL Injection, and to address spoofing * Protect sensitive data through encryption, both on disk and on the wire * Control access to data using secure roles, single sign-on, proxy connections, and two-factor authentication * Protect sensitive source ode through randomization, obfuscation, and wrapping * Thwart attempts at SQL injection and other common attacks * Manage constraints on the visibility of data and the scope of access Who this book is for Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java is for every Java developer who uses an Oracle database.It is also for every Oracle database administrator or PL/SQL programmer who supports Java client and web applications. Whatever role you play in developing and supporting Java and Oracle applications, you need to address computer, application, data, and identity security. This book offers the tools you'll need to effectively manage security across all aspects of the applications you support. Table of Contents * Introduction * Oracle Security * Secure Java Development Concepts * Java Stored Procedures * Adding Public Key Encryption * Adding Secret Password Encryption * A Working Model for Data Encryption in Transit * Implementing Single Sign On * Implementing Two-Factor Authentication * Application Identification and Authorization * Enhancing Our Security * Administration of This Security System

Information Security and Privacy - 14th Australasian Conference, ACISP 2009 Brisbane, Australia, July 1-3, 2009 Proceedings... Information Security and Privacy - 14th Australasian Conference, ACISP 2009 Brisbane, Australia, July 1-3, 2009 Proceedings (Paperback, 2009 ed.)
Colin Boyd, Juan Gonzalez Nieto
R1,459 Discovery Miles 14 590 Ships in 18 - 22 working days

The 2009 Australasian Conference on Information Security and Privacy was the 14th in an annual series that started in 1996. Over the years ACISP has grown froma relativelysmall conferencewith a largeproportionof paperscoming from Australia into a truly international conference with an established reputation. ACISP 2009 was held at Queensland University of Technology in Brisbane, d- ing July 1-3, 2009. This year there were 106 paper submissions and from those 30 papers were accepted for presentation, but one was subsequently withdrawn. Authors of - cepted papers came from 17 countries and 4 continents, illustrating the inter- tional ?avorof ACISP. We would like to extend our sincere thanks to all authors who submitted papers to ACISP 2009. The contributed papers were supplemented by two invited talks from e- nent researchers in information security. Basie von Solms (University of Joh- nesburg), currently President of IFIP, raised the question of how well dressed is the information security king. L. Jean Camp (Indiana University) talked about how to harden the network from the friend within. We are grateful to both of them for sharing their extensive knowledge and setting challenging questions for the ACISP 2009 delegates. We were fortunate to have an energetic team of experts who formed the Program Committee. Their names may be found overleaf, and we thank them warmly for their considerable e?orts. This team was helped by an even larger number of individuals who reviewedpapers in their particularareasof expertise.

Internet and Surveillance - The Challenges of Web 2.0 and Social Media (Hardcover): Christian Fuchs, Kees Boersma, Anders... Internet and Surveillance - The Challenges of Web 2.0 and Social Media (Hardcover)
Christian Fuchs, Kees Boersma, Anders Albrechtslund, Marisol Sandoval
R4,655 Discovery Miles 46 550 Ships in 10 - 15 working days

The Internet has been transformed in the past years from a system primarily oriented on information provision into a medium for communication and community-building. The notion of Web 2.0, social software, and social networking sites such as Facebook, Twitter and MySpace have emerged in this context. With such platforms comes the massive provision and storage of personal data that are systematically evaluated, marketed, and used for targeting users with advertising. In a world of global economic competition, economic crisis, and fear of terrorism after 9/11, both corporations and state institutions have a growing interest in accessing this personal data. Here, contributors explore this changing landscape by addressing topics such as commercial data collection by advertising, consumer sites and interactive media; self-disclosure in the social web; surveillance of file-sharers; privacy in the age of the internet; civil watch-surveillance on social networking sites; and networked interactive surveillance in transnational space. This book is a result of a research action launched by the intergovernmental network COST (European Cooperation in Science and Technology).

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Unfortunate Reality of Our Education…
A Caban Hardcover R649 Discovery Miles 6 490
Cricut Joy Xtra Standard Grip Machine…
R286 Discovery Miles 2 860
High Voltage Vacuum Insulation - Basic…
Rod V. Latham Hardcover R1,376 Discovery Miles 13 760
Celestial Navigation - A Complete Home…
David Burch Hardcover R1,161 R995 Discovery Miles 9 950
Art Therapy, Dreams, and Healing…
Johanne Hamel Paperback R1,068 Discovery Miles 10 680
A Boundary Waters History - Canoeing…
Stephen Wilbers Paperback R496 R463 Discovery Miles 4 630
Fermentation for Beginners - The…
Drakes Press Paperback R262 R248 Discovery Miles 2 480
Shedding Light on England - My Tour of…
Hedda Peet Paperback R371 Discovery Miles 3 710
Canning and Preserving - What You Need…
Dion Rosser Hardcover R667 R596 Discovery Miles 5 960
Hudson River State Hospital
Joseph Galante, Lynn Rightmyer, … Paperback R541 R500 Discovery Miles 5 000

 

Partners