0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (123)
  • R250 - R500 (224)
  • R500+ (771)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

Information Risk Management - A practitioner's guide (Paperback, 2nd edition): David Sutton Information Risk Management - A practitioner's guide (Paperback, 2nd edition)
David Sutton
R1,278 Discovery Miles 12 780 Ships in 9 - 17 working days

Information risk management (IRM) is about identifying, assessing, prioritising and treating risks to keep information secure and available. This accessible book is a practical guide to understanding the principles of IRM and developing a strategic approach to an IRM programme. It is the only textbook for the BCS Practitioner Certificate in Information Risk Management and this new edition reflects recent changes to the syllabus and to the wider discipline.

Multidisciplinary Perspectives in Cryptology and Information Security (Hardcover): Sattar B. Sadkhan Al Maliky, Nidaa A. Abbas Multidisciplinary Perspectives in Cryptology and Information Security (Hardcover)
Sattar B. Sadkhan Al Maliky, Nidaa A. Abbas
R6,180 Discovery Miles 61 800 Ships in 18 - 22 working days

With the prevalence of digital information, IT professionals have encountered new challenges regarding data security. In an effort to address these challenges and offer solutions for securing digital information, new research on cryptology methods is essential. Multidisciplinary Perspectives in Cryptology and Information Security considers an array of multidisciplinary applications and research developments in the field of cryptology and communication security. This publication offers a comprehensive, in-depth analysis of encryption solutions and will be of particular interest to IT professionals, cryptologists, and researchers in the field.

On Secrets (Paperback): Annika Smethurst On Secrets (Paperback)
Annika Smethurst
R225 Discovery Miles 2 250 Ships in 10 - 15 working days

On June 4, Federal Police raided the home of Walkley award-winning journalist Annika Smethurst, changing her life forever. Police claim they were investigating the publication of classified information, her employer called it a 'dangerous act of intimidation', Smethurst believes she was simply doing her job. Smethurst became the accidental poster woman for press freedom as politicians debated the merits of police searching through her underwear drawer. In On Secrets she will discuss the impact this invasion has had on her life, and examine the importance of press freedom.

How To Be Invisible - Protect Your Home, Your Children, Your Assets, and Your Life (Hardcover, 3rd Revised, Updated ed.): J. J... How To Be Invisible - Protect Your Home, Your Children, Your Assets, and Your Life (Hardcover, 3rd Revised, Updated ed.)
J. J Luna
R677 R570 Discovery Miles 5 700 Save R107 (16%) Ships in 18 - 22 working days

"Fascinating... a regular field manual... meticulously researched and very entertaining." --G. Gordon Liddy

A thoroughly revised and updated edition of the essential guide to preserving your personal security

From cyberspace to crawl spaces, new innovations in information gathering have left the private life of the average person open to scrutiny, and worse, exploitation. In this thoroughly updated third edition of his immensely popular guide How to Be Invisible, J.J. Luna shows you how to protect your home address, hide your ownership of vehicles and real estate, use pagers with dumbphones, switch to low-profile banking and invisible money transfers, use alternate signatures, and how to secretly run a home-based business.

J.J. Luna is an expert and highly trained security consultant with years of experience protecting himself, his family, and his clients. Using real life stories and his own consulting experience, J.J. Luna divulges legal methods to attain the privacy you crave and deserve, whether you want to shield yourself from casual scrutiny or take your life savings with you and disappear without a trace. Whatever your needs, Luna reveals the shocking secrets that private detectives and other seekers of personal information use to uncover information and then shows how to make a serious commitment to safeguarding yourself.

There is a prevailing sense in our society that true privacy is a thing of the past. In a world where privacy concerns that only continue to grow in magnitude, How to Be Invisible, Third Edition is a critical antidote to the spread of new and more efficient ways of undermining our personal security.

Privacy is a commonly-lamented casualty of the Information Age and of the world's changing climate--but that doesn't mean you have to stand for it. This new edition of J. J. Luna's classic manual contains step-by-step advice on building and maintaining your personal security, including brand new chapters on:

  • The dangers from Facebook, smartphones, and facial recognition
  • How to locate a nominee (or proxy) you can trust
  • The art of pretexting, aka social engineering
  • Moving to Baja California Sur; San Miguel de Allende, Guanajuato; Cuenca, Ecuador; or Spain's Canary Islands
  • The secrets of international privacy, and much more
Cybercrime Through an Interdisciplinary Lens (Hardcover): Thomas Holt Cybercrime Through an Interdisciplinary Lens (Hardcover)
Thomas Holt
R4,636 Discovery Miles 46 360 Ships in 10 - 15 working days

Research on cybercrime has been largely bifurcated, with social science and computer science researchers working with different research agendas. These fields have produced parallel scholarship to understand cybercrime offending and victimization, as well as techniques to harden systems from compromise and understand the tools used by cybercriminals. The literature developed from these two fields is diverse and informative, but until now there has been minimal interdisciplinary scholarship combining their insights in order to create a more informed and robust body of knowledge. This book offers an interdisciplinary approach to research on cybercrime and lays out frameworks for collaboration between the fields. Bringing together international experts, this book explores a range of issues from malicious software and hacking to victimization and fraud. This work also provides direction for policy changes to both cybersecurity and criminal justice practice based on the enhanced understanding of cybercrime that can be derived from integrated research from both the technical and social sciences. The authors demonstrate the breadth of contemporary scholarship as well as identifying key questions that could be addressed in the future or unique methods that could benefit the wider research community. This edited collection will be key reading for academics, researchers, and practitioners in both computer security and law enforcement. This book is also a comprehensive resource for postgraduate and advanced undergraduate students undertaking courses in social and technical studies.

The Foundations of EU Data Protection Law (Hardcover): Orla Lynskey The Foundations of EU Data Protection Law (Hardcover)
Orla Lynskey
R4,150 Discovery Miles 41 500 Ships in 10 - 15 working days

Nearly two decades after the EU first enacted data protection rules, key questions about the nature and scope of this EU policy, and the harms it seeks to prevent, remain unanswered. The inclusion of a Right to Data Protection in the EU Charter has increased the salience of these questions, which must be addressed in order to ensure the legitimacy, effectiveness and development of this Charter right and the EU data protection regime more generally. The Foundations of EU Data Protection Law is a timely and important work which sheds new light on this neglected area of law, challenging the widespread assumption that data protection is merely a subset of the right to privacy. By positioning EU data protection law within a comprehensive conceptual framework, it argues that data protection has evolved from a regulatory instrument into a fundamental right in the EU legal order and that this right grants individuals more control over more forms of data than the right to privacy. It suggests that this dimension of the right to data protection should be explicitly recognised, while identifying the practical and conceptual limits of individual control over personal data. At a time when EU data protection law is sitting firmly in the international spotlight, this book offers academics, policy-makers, and practitioners a coherent vision for the future of this key policy and fundamental right in the EU legal order, and how best to realise it.

Assessing and Managing Security Risk in IT Systems - A Structured Methodology (Hardcover): John McCumber Assessing and Managing Security Risk in IT Systems - A Structured Methodology (Hardcover)
John McCumber
R2,293 Discovery Miles 22 930 Ships in 10 - 15 working days

Assessing and Managing Security Risk in IT Systems: A Structured Methodology builds upon the original McCumber Cube model to offer proven processes that do not change, even as technology evolves. This book enables you to assess the security attributes of any information system and implement vastly improved security environments. Part I delivers an overview of information systems security, providing historical perspectives and explaining how to determine the value of information. This section offers the basic underpinnings of information security and concludes with an overview of the risk management process. Part II describes the McCumber Cube, providing the original paper from 1991 and detailing ways to accurately map information flow in computer and telecom systems. It also explains how to apply the methodology to individual system components and subsystems. Part III serves as a resource for analysts and security practitioners who want access to more detailed information on technical vulnerabilities and risk assessment analytics. McCumber details how information extracted from this resource can be applied to his assessment processes.

The Perfect Police State - An Undercover Odyssey into China's Terrifying Surveillance Dystopia of the Future (Hardcover):... The Perfect Police State - An Undercover Odyssey into China's Terrifying Surveillance Dystopia of the Future (Hardcover)
Geoffrey Cain
R713 R637 Discovery Miles 6 370 Save R76 (11%) Ships in 9 - 17 working days

An in-depth, on-the ground view of how Chinese officials have co-opted technology, infrastructure and the minds of their people to establish the definitive police state. When blocked from facts and truth, and constantly under surveillance, most citizens cannot discern between enemy and friend and don't have the information they need to challenge the government. Society quickly breaks down. Friends betray each other, bosses snitch on employees, teachers rat on their students, and children turn on their parents. Everyone must turn to their government for protection. even if the government is not their true protector. This is the Perfect Police State, and China has created one. In The Perfect Police State Geoffrey Cain, an Asia-based reporter, recounts his travels and investigations into the multifaceted and comprehensive surveillance network in the Western Chinese province of Xinjiang. Drawing on first-hand testimony, and one citizen's tumultuous life and escape from Xinjiang, Cain describes the emergence of China's tech surveillance giants, and the implications for our global order, in an age of Covid-19 and police brutality protests. What results is a vivid and haunting investigation into how China established an effective and enduring technological dystopia.

Mastering the American Accent (Paperback, Second Edition): Lisa Mojsin Mastering the American Accent (Paperback, Second Edition)
Lisa Mojsin
R685 R614 Discovery Miles 6 140 Save R71 (10%) Ships in 18 - 22 working days

This combination book and audio instructional program is designed to diminish the accents of men and women who speak English as their second language. It will help them speak standard American English with clarity, confidence, and accuracy. Specific exercises concentrate on vowel sounds, problematic consonants such as V, W, TH, the American R, and the often confusing American T sound. It teaches them to employ correct syllable stress, emphasize the correct words in a sentence for native sounding rhythm, speak with American intonation, link words for smoother speech flow, use common word contractions, and more. Additional topics that often confuse ESL students are also discussed and explained. They include distinguishing between casual and formal speech, homophones (for instance, they're and there), recognizing words with silent letters (comb, receipt, and others), and avoiding embarrassing pronunciation mistakes, such as mixing up "beach" and "bitch." Students are familiarized with many irregular English spelling rules and exceptions, and are shown how such irregularities can contribute to pronunciation errors. A native language guide references problematic accent issues of 13 different language backgrounds. Correct lip and tongue positions for all sounds are discussed in detail. There is also a link to downloadable audio that uses male and female voices to coach correct American-style pronunciation.

Cryptography - The Key to Digital Security, How It Works, and Why It Matters (Paperback): Keith Martin Cryptography - The Key to Digital Security, How It Works, and Why It Matters (Paperback)
Keith Martin
R400 Discovery Miles 4 000 Ships in 9 - 17 working days

Though often invisible, cryptography plays a critical role in our everyday lives. Broadly defined as a set of tools for establishing security in cyberspace, cryptography enables us to protect our information and share it securely. It underpins the security of mobile phone calls, card payments, web connections, internet messaging, Bitcoin transactions-in short, everything we do online. Clearly and concisely, Keith Martin reveals the many crucial ways we all rely on cryptographic technology and demystifies its controversial applications and the nuances behind alarming headlines about data breaches or Edward Snowden. Essential reading for anyone with a password, Cryptography offers a profound perspective on personal security, online and off.

Securing Systems - Applied Security Architecture and Threat Models (Hardcover): Brook S. E. Schoenfield Securing Systems - Applied Security Architecture and Threat Models (Hardcover)
Brook S. E. Schoenfield
R3,679 Discovery Miles 36 790 Ships in 10 - 15 working days

Internet attack on computer systems is pervasive. It can take from less than a minute to as much as eight hours for an unprotected machine connected to the Internet to be completely compromised. It is the information security architect's job to prevent attacks by securing computer systems. This book describes both the process and the practice of assessing a computer system's existing information security posture. Detailing the time-tested practices of experienced security architects, it explains how to deliver the right security at the right time in the implementation lifecycle. Securing Systems: Applied Security Architecture and Threat Models covers all types of systems, from the simplest applications to complex, enterprise-grade, hybrid cloud architectures. It describes the many factors and prerequisite information that can influence an assessment. The book covers the following key aspects of security analysis: When should the security architect begin the analysis? At what points can a security architect add the most value? What are the activities the architect must execute? How are these activities delivered? What is the set of knowledge domains applied to the analysis? What are the outputs? What are the tips and tricks that make security architecture risk assessment easier? To help you build skill in assessing architectures for security, the book presents six sample assessments. Each assessment examines a different type of system architecture and introduces at least one new pattern for security analysis. The goal is that after you've seen a sufficient diversity of architectures, you'll be able to understand varied architectures and can better see the attack surfaces and prescribe security solutions.

Open Content Licensing - Cultivating the Creative Commons (Paperback): Brian Fitzgerald Open Content Licensing - Cultivating the Creative Commons (Paperback)
Brian Fitzgerald
R638 Discovery Miles 6 380 Ships in 10 - 15 working days

Open Content Licensing: Cultivating the Creative Commons brings together papers from some of the most prominent thinkers of our time on the internet, law and the importance of open content licensing in the digital age. Drawing on material presented at the Queensland University of Technology conference of January 2005, the text provides a snapshot of the thoughts of over 30 Australian and international experts on topics surrounding the international Creative Commons movement, from the landmark Eldred v Ashcroft copyright term decision to the legalities of digital sampling in a remix world.Open Content Licensing is a joint publication of Sydney University Press, Queensland University of Technology and CCI.

Cyber Crisis Management - The Practical Handbook on Crisis Management and Crisis Communication (Paperback, 1st ed. 2021):... Cyber Crisis Management - The Practical Handbook on Crisis Management and Crisis Communication (Paperback, 1st ed. 2021)
Holger Kaschner
R1,786 R1,684 Discovery Miles 16 840 Save R102 (6%) Ships in 9 - 17 working days

Cyber attacks and IT breakdowns threaten every organization. The incidents accumulate and often form the prelude to complex, existence-threatening crises. This book helps not only to manage them, but also to prepare for and prevent cyber crises. Structured in a practical manner, it is ideally suited for crisis team members, communicators, security, IT and data protection experts on a day-to-day basis. With numerous illustrations and checklists.This book is a translation of the original German 1st edition Cyber Crisis Management by Holger Kaschner, published by Springer Fachmedien Wiesbaden GmbH, part of Springer Nature in 2020. The translation was done with the help of artificial intelligence (machine translation by the service DeepL.com). A subsequent human revision was done primarily in terms of content, so that the book will read stylistically differently from a conventional translation. Springer Nature works continuously to further the development of tools for the production of books and on the related technologies to support the authors.

The CISO's Transformation - Security Leadership in a High Threat Landscape (Paperback, 1st ed. 2021): Raj Badhwar The CISO's Transformation - Security Leadership in a High Threat Landscape (Paperback, 1st ed. 2021)
Raj Badhwar
R1,436 Discovery Miles 14 360 Ships in 9 - 17 working days

The first section of this book addresses the evolution of CISO (chief information security officer) leadership, with the most mature CISOs combining strong business and technical leadership skills. CISOs can now add significant value when they possess an advanced understanding of cutting-edge security technologies to address the risks from the nearly universal operational dependence of enterprises on the cloud, the Internet, hybrid networks, and third-party technologies demonstrated in this book. In our new cyber threat-saturated world, CISOs have begun to show their market value. Wall Street is more likely to reward companies with good cybersecurity track records with higher stock valuations. To ensure that security is always a foremost concern in business decisions, CISOs should have a seat on corporate boards, and CISOs should be involved from beginning to end in the process of adopting enterprise technologies. The second and third sections of this book focus on building strong security teams, and exercising prudence in cybersecurity. CISOs can foster cultures of respect through careful consideration of the biases inherent in the socio-linguistic frameworks shaping our workplace language and through the cultivation of cyber exceptionalism. CISOs should leave no stone unturned in seeking out people with unique abilities, skills, and experience, and encourage career planning and development, in order to build and retain a strong talent pool. The lessons of the breach of physical security at the US Capitol, the hack back trend, and CISO legal liability stemming from network and data breaches all reveal the importance of good judgment and the necessity of taking proactive stances on preventative measures. This book will target security and IT engineers, administrators and developers, CIOs, CTOs, CISOs, and CFOs. Risk personnel, CROs, IT, security auditors and security researchers will also find this book useful.

Personalized Privacy Protection in Big Data (Hardcover, 1st ed. 2021): Youyang Qu, Mohammad  Reza Nosouhi, Lei Cui, Shui Yu Personalized Privacy Protection in Big Data (Hardcover, 1st ed. 2021)
Youyang Qu, Mohammad Reza Nosouhi, Lei Cui, Shui Yu
R1,441 Discovery Miles 14 410 Ships in 9 - 17 working days

This book presents the data privacy protection which has been extensively applied in our current era of big data. However, research into big data privacy is still in its infancy. Given the fact that existing protection methods can result in low data utility and unbalanced trade-offs, personalized privacy protection has become a rapidly expanding research topic.In this book, the authors explore emerging threats and existing privacy protection methods, and discuss in detail both the advantages and disadvantages of personalized privacy protection. Traditional methods, such as differential privacy and cryptography, are discussed using a comparative and intersectional approach, and are contrasted with emerging methods like federated learning and generative adversarial nets. The advances discussed cover various applications, e.g. cyber-physical systems, social networks, and location-based services. Given its scope, the book is of interest to scientists, policy-makers, researchers, and postgraduates alike.

A Practical Guide to Security Engineering and Information Assurance (Hardcover): Debra S. Herrmann A Practical Guide to Security Engineering and Information Assurance (Hardcover)
Debra S. Herrmann
R3,868 Discovery Miles 38 680 Ships in 18 - 22 working days

Today the vast majority of the world's information resides in, is derived from, and is exchanged among multiple automated systems. Critical decisions are made, and critical action is taken based on information from these systems. Therefore, the information must be accurate, correct, and timely, and be manipulated, stored, retrieved, and exchanged safely, reliably, and securely. In a time when information is considered the latest commodity, information security should be top priority.
A Practical Guide to Security Engineering and Information Assurance gives you an engineering approach to information security and information assurance (IA). The book examines the impact of accidental and malicious intentional action and inaction on information security and IA. Innovative long-term vendor, technology, and application-independent strategies show you how to protect your critical systems and data from accidental and intentional action and inaction that could lead to system failure or compromise.
The author presents step-by-step, in-depth processes for defining information security and assurance goals, performing vulnerability and threat analysis, implementing and verifying the effectiveness of threat control measures, and conducting accident and incident investigations. She explores real-world strategies applicable to all systems, from small systems supporting a home-based business to those of a multinational corporation, government agency, or critical infrastructure system.
The information revolution has brought its share of risks. Exploring the synergy between security, safety, and reliability engineering, A Practical Guide to Security Engineering and Information Assurance consolidates and organizes current thinking about information security/IA techniques, approaches, and best practices. As this book will show you, there is considerably more to information security/IA than firewalls, encryption, and virus protection.

Web Services - ICWS 2022 - 29th International Conference, Held as Part of the Services Conference Federation, SCF 2022,... Web Services - ICWS 2022 - 29th International Conference, Held as Part of the Services Conference Federation, SCF 2022, Honolulu, HI, USA, December 10-14, 2022, Proceedings (Paperback, 1st ed. 2022)
Yuchao Zhang, Liang-Jie Zhang
R1,482 Discovery Miles 14 820 Ships in 18 - 22 working days

This book constitutes the proceedings of the 29th International Conference on Web Services, ICWS 2022, held in Honolulu, USA, as part of SCF 2022, during December 10-14, 2022.The 9 full papers presented in this volume were carefully reviewed and selected from 20 submissions. The papers cover aspects of services computing and applications. Centered around services computing, it covers various systems and networking research pertaining to cloud, edge and Internet-of-Things (IoT), as well as technologies for intelligent computing, learning, big data and blockchain applications.

Protecting Privacy through Homomorphic Encryption (Paperback, 1st ed. 2021): Kristin Lauter, Wei Dai, Kim Laine Protecting Privacy through Homomorphic Encryption (Paperback, 1st ed. 2021)
Kristin Lauter, Wei Dai, Kim Laine
R2,853 Discovery Miles 28 530 Ships in 18 - 22 working days

This book summarizes recent inventions, provides guidelines and recommendations, and demonstrates many practical applications of homomorphic encryption. This collection of papers represents the combined wisdom of the community of leading experts on Homomorphic Encryption. In the past 3 years, a global community consisting of researchers in academia, industry, and government, has been working closely to standardize homomorphic encryption. This is the first publication of whitepapers created by these experts that comprehensively describes the scientific inventions, presents a concrete security analysis, and broadly discusses applicable use scenarios and markets. This book also features a collection of privacy-preserving machine learning applications powered by homomorphic encryption designed by groups of top graduate students worldwide at the Private AI Bootcamp hosted by Microsoft Research. The volume aims to connect non-expert readers with this important new cryptographic technology in an accessible and actionable way. Readers who have heard good things about homomorphic encryption but are not familiar with the details will find this book full of inspiration. Readers who have preconceived biases based on out-of-date knowledge will see the recent progress made by industrial and academic pioneers on optimizing and standardizing this technology. A clear picture of how homomorphic encryption works, how to use it to solve real-world problems, and how to efficiently strengthen privacy protection, will naturally become clear.

Guide to Data Privacy - Models, Technologies, Solutions (Paperback, 1st ed. 2022): Vicenc Torra Guide to Data Privacy - Models, Technologies, Solutions (Paperback, 1st ed. 2022)
Vicenc Torra
R1,191 Discovery Miles 11 910 Ships in 18 - 22 working days

Data privacy technologies are essential for implementing information systems with privacy by design.Privacy technologies clearly are needed for ensuring that data does not lead to disclosure, but also that statistics or even data-driven machine learning models do not lead to disclosure. For example, can a deep-learning model be attacked to discover that sensitive data has been used for its training? This accessible textbook presents privacy models, computational definitions of privacy, and methods to implement them. Additionally, the book explains and gives plentiful examples of how to implement-among other models-differential privacy, k-anonymity, and secure multiparty computation. Topics and features: Provides integrated presentation of data privacy (including tools from statistical disclosure control, privacy-preserving data mining, and privacy for communications) Discusses privacy requirements and tools for different types of scenarios, including privacy for data, for computations, and for users Offers characterization of privacy models, comparing their differences, advantages, and disadvantages Describes some of the most relevant algorithms to implement privacy models Includes examples of data protection mechanisms This unique textbook/guide contains numerous examples and succinctly and comprehensively gathers the relevant information. As such, it will be eminently suitable for undergraduate and graduate students interested in data privacy, as well as professionals wanting a concise overview. Vicenc Torra is Professor with the Department of Computing Science at Umea University, Umea, Sweden.

Blockchain and Trustworthy Systems - 4th International Conference, BlockSys 2022, Chengdu, China, August 4-5, 2022, Revised... Blockchain and Trustworthy Systems - 4th International Conference, BlockSys 2022, Chengdu, China, August 4-5, 2022, Revised Selected Papers (Paperback, 1st ed. 2022)
Davor Svetinovic, Yin Zhang, Xiapu Luo, Xiaoyan Huang, Xingping Chen
R2,226 Discovery Miles 22 260 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post conference papers of the 4th International Conference on Blockchain and Trustworthy Systems, Blocksys 2022, held in Chengdu, China, in August 2022. The 26 full papers were carefully reviewed and selected from 56 submissions. The papers are organized in topical sections: Trustworthy Systems; Blockchain; Private Computing.

Convergence of Internet of Things and Blockchain Technologies (Paperback, 1st ed. 2022): H L Gururaj, V. Ravi Kumar, Sam... Convergence of Internet of Things and Blockchain Technologies (Paperback, 1st ed. 2022)
H L Gururaj, V. Ravi Kumar, Sam Goundar, Ahmed A. Elngar, B H Swathi
R3,097 Discovery Miles 30 970 Ships in 18 - 22 working days

This book presents chapters from diverse range of authors on different aspects of how Blockchain and IoT are converging and the impacts of these developments. The book provides an extensive cross-sectional and multi-disciplinary look into this trend and how it affects artificial intelligence, cyber-physical systems, and robotics with a look at applications in aerospace, agriculture, automotive, critical infrastructures, healthcare, manufacturing, retail, smart transport systems, smart cities, and smart healthcare. Cases include the impact of Blockchain for IoT Security; decentralized access control systems in IoT; Blockchain architecture for scalable access management in IoT; smart and sustainable IoT applications incorporating Blockchain, and more. The book presents contributions from international academics, researchers, and practitioners from diverse perspectives. Presents how Blockchain and IoT are converging and the impacts of these developments on technology and its application; Discusses IoT and Blockchain from cross-sectional and multi-disciplinary perspectives; Includes contributions from researchers, academics, and professionals from around the world.

Blockchain Security in Cloud Computing (Paperback, 1st ed. 2022): K.M. Baalamurugan, S Rakesh Kumar, Abhishek Kumar, Vishal... Blockchain Security in Cloud Computing (Paperback, 1st ed. 2022)
K.M. Baalamurugan, S Rakesh Kumar, Abhishek Kumar, Vishal Kumar, Sanjeevikumar Padmanaban
R4,702 Discovery Miles 47 020 Ships in 18 - 22 working days

This book explores the concepts and techniques of cloud security using blockchain. Also discussed is the possibility of applying blockchain to provide security in various domains. The authors discuss how blockchain holds the potential to significantly increase data privacy and security while boosting accuracy and integrity in cloud data. The specific highlight of this book is focused on the application of integrated technologies in enhancing cloud security models, use cases, and its challenges. The contributors, both from academia and industry, present their technical evaluation and comparison with existing technologies. This book pertains to IT professionals, researchers, and academicians towards fourth revolution technologies.

Personalized Privacy Protection in Big Data (Paperback, 1st ed. 2021): Youyang Qu, Mohammad  Reza Nosouhi, Lei Cui, Shui Yu Personalized Privacy Protection in Big Data (Paperback, 1st ed. 2021)
Youyang Qu, Mohammad Reza Nosouhi, Lei Cui, Shui Yu
R1,709 Discovery Miles 17 090 Ships in 18 - 22 working days

This book presents the data privacy protection which has been extensively applied in our current era of big data. However, research into big data privacy is still in its infancy. Given the fact that existing protection methods can result in low data utility and unbalanced trade-offs, personalized privacy protection has become a rapidly expanding research topic.In this book, the authors explore emerging threats and existing privacy protection methods, and discuss in detail both the advantages and disadvantages of personalized privacy protection. Traditional methods, such as differential privacy and cryptography, are discussed using a comparative and intersectional approach, and are contrasted with emerging methods like federated learning and generative adversarial nets. The advances discussed cover various applications, e.g. cyber-physical systems, social networks, and location-based services. Given its scope, the book is of interest to scientists, policy-makers, researchers, and postgraduates alike.

Cybersecurity, Privacy and Freedom Protection in the Connected World - Proceedings of the 13th International Conference on... Cybersecurity, Privacy and Freedom Protection in the Connected World - Proceedings of the 13th International Conference on Global Security, Safety and Sustainability, London, January 2021 (Paperback, 1st ed. 2021)
Hamid Jahankhani, Arshad Jamal, Shaun Lawson
R1,459 Discovery Miles 14 590 Ships in 18 - 22 working days

This book provides an opportunity for investigators, government officials, systems scientists, strategists, assurance researchers, owners, operators and maintainers of large, complex and advanced systems and infrastructures to update their knowledge with the state of best practice in the challenging domains whilst networking with the leading representatives, researchers and solution providers. Drawing on 12 years of successful events on information security, digital forensics and cyber-crime, the 13th ICGS3-20 conference aims to provide attendees with an information-packed agenda with representatives from across the industry and the globe. The challenges of complexity, rapid pace of change and risk/opportunity issues associated with modern products, systems, special events and infrastructures. In an era of unprecedented volatile, political and economic environment across the world, computer-based systems face ever more increasing challenges, disputes and responsibilities, and whilst the Internet has created a global platform for the exchange of ideas, goods and services, it has also created boundless opportunities for cyber-crime. As an increasing number of large organizations and individuals use the Internet and its satellite mobile technologies, they are increasingly vulnerable to cyber-crime threats. It is therefore paramount that the security industry raises its game to combat these threats. Whilst there is a huge adoption of technology and smart home devices, comparably, there is a rise of threat vector in the abuse of the technology in domestic violence inflicted through IoT too. All these are an issue of global importance as law enforcement agencies all over the world are struggling to cope.

Blockchain Systems and Communication Networks: From Concepts to Implementation (Paperback, 1st ed. 2021): Mubashir Husain... Blockchain Systems and Communication Networks: From Concepts to Implementation (Paperback, 1st ed. 2021)
Mubashir Husain Rehmani
R1,608 Discovery Miles 16 080 Ships in 18 - 22 working days

This book provides extensive insights on blockchain systems, starting from a historical perspective and moving towards building foundational knowledge, with focus on communication networks. It covers blockchain applications, algorithms, architectures, design and implementation, and security and privacy issues, providing the reader with a comprehensive overview. Further, it discusses blockchain systems and its integration to communication networks. The book includes hands-on, practical tutorials, self-assessment exercises, and review questions; tips and sample programs are also provided throughout. Complementary supporting material for instructors, including open source programming code for practical tutorials and exercises, is also available. The target audience includes graduate students, professionals, and researchers working in the areas of blockchain systems, distributed ledger technology, computer networks and communications, artificial intelligence, and cybersecurity.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Broken Code - Inside Facebook And The…
Jeff Horwitz Paperback R578 Discovery Miles 5 780
Cyber Security and Threats - Concepts…
Information Reso Management Association Hardcover R9,416 Discovery Miles 94 160
Auditing Corporate Surveillance Systems…
Isabel Wagner Hardcover R1,846 Discovery Miles 18 460
Advanced Methodologies and Technologies…
Mehdi Khosrowpour Hardcover R7,137 Discovery Miles 71 370
Modern Day Surveillance Ecosystem and…
Ananda Mitra Hardcover R5,333 Discovery Miles 53 330
Information And Communications…
Dana van der Merwe Paperback R1,320 R1,199 Discovery Miles 11 990
Hiding Behind the Keyboard - Uncovering…
Brett Shavers, John Bair Paperback R1,202 Discovery Miles 12 020
EU General Data Protection Regulation…
It Governance Privacy Team Paperback R762 Discovery Miles 7 620
Intelligent Data Analysis for e-Learning…
Jorge Miguel, Santi Caballe, … Paperback R2,520 R2,325 Discovery Miles 23 250
#Myprivacy #Myright - Protect It While…
Robin M Singh Hardcover R536 Discovery Miles 5 360

 

Partners