0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (122)
  • R250 - R500 (226)
  • R500+ (758)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

Handbook of Reinforcement Learning and Control (Paperback, 1st ed. 2021): Kyriakos G. Vamvoudakis, Yan Wan, Frank L. Lewis,... Handbook of Reinforcement Learning and Control (Paperback, 1st ed. 2021)
Kyriakos G. Vamvoudakis, Yan Wan, Frank L. Lewis, Derya Cansever
R6,654 Discovery Miles 66 540 Ships in 18 - 22 working days

This handbook presents state-of-the-art research in reinforcement learning, focusing on its applications in the control and game theory of dynamic systems and future directions for related research and technology. The contributions gathered in this book deal with challenges faced when using learning and adaptation methods to solve academic and industrial problems, such as optimization in dynamic environments with single and multiple agents, convergence and performance analysis, and online implementation. They explore means by which these difficulties can be solved, and cover a wide range of related topics including: deep learning; artificial intelligence; applications of game theory; mixed modality learning; and multi-agent reinforcement learning. Practicing engineers and scholars in the field of machine learning, game theory, and autonomous control will find the Handbook of Reinforcement Learning and Control to be thought-provoking, instructive and informative.

Hello World - How  to be Human in the Age of the Machine (Paperback): Hannah Fry Hello World - How to be Human in the Age of the Machine (Paperback)
Hannah Fry 2
R341 R308 Discovery Miles 3 080 Save R33 (10%) Ships in 9 - 17 working days

_______________ 'One of the best books yet written on data and algorithms. . .deserves a place on the bestseller charts.' (The Times) You are accused of a crime. Who would you rather determined your fate - a human or an algorithm? An algorithm is more consistent and less prone to error of judgement. Yet a human can look you in the eye before passing sentence. Welcome to the age of the algorithm, the story of a not-too-distant future where machines rule supreme, making important decisions - in healthcare, transport, finance, security, what we watch, where we go even who we send to prison. So how much should we rely on them? What kind of future do we want? Hannah Fry takes us on a tour of the good, the bad and the downright ugly of the algorithms that surround us. In Hello World she lifts the lid on their inner workings, demonstrates their power, exposes their limitations, and examines whether they really are an improvement on the humans they are replacing. A BBC RADIO 4: BOOK OF THE WEEK SHORTLISTED FOR THE 2018 BAILLIE GIFFORD PRIZE AND 2018 ROYAL SOCIETY SCIENCE BOOK PRIZE

Blockchain and Trustworthy Systems - Third International Conference, BlockSys 2021, Guangzhou, China, August 5-6, 2021, Revised... Blockchain and Trustworthy Systems - Third International Conference, BlockSys 2021, Guangzhou, China, August 5-6, 2021, Revised Selected Papers (Paperback, 1st ed. 2021)
Hong-Ning Dai, Xuanzhe Liu, Daniel Xiapu Luo, Jiang,Xiao, Xiangping Chen
R2,980 Discovery Miles 29 800 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post conference papers of the Third International Conference on Blockchain and Trustworthy Systems, Blocksys 2021, held in Guangzhou, China, in August 2021.*The 38 full papers and the 12 short papers were carefully reviewed and selected from 98 submissions. The papers are organized in topical sections: Contents Blockchain and Data Mining; Performance Optimization of Blockchain; Blockchain Security and Privacy; Theories and Algorithms for Blockchain; Blockchain and Internet of Things; Blockchain and Smart Contracts; Blockchain Services and Applications; Trustworthy System Development.*

Perspectives on Digital Humanism (Paperback, 1st ed. 2022): Hannes Werthner, Erich Prem, Edward A. Lee, Carlo Ghezzi Perspectives on Digital Humanism (Paperback, 1st ed. 2022)
Hannes Werthner, Erich Prem, Edward A. Lee, Carlo Ghezzi
R1,313 Discovery Miles 13 130 Ships in 18 - 22 working days

This open access book aims to set an agenda for research and action in the field of Digital Humanism through short essays written by selected thinkers from a variety of disciplines, including computer science, philosophy, education, law, economics, history, anthropology, political science, and sociology. This initiative emerged from the Vienna Manifesto on Digital Humanism and the associated lecture series. Digital Humanism deals with the complex relationships between people and machines in digital times. It acknowledges the potential of information technology. At the same time, it points to societal threats such as privacy violations and ethical concerns around artificial intelligence, automation and loss of jobs, ongoing monopolization on the Web, and sovereignty. Digital Humanism aims to address these topics with a sense of urgency but with a constructive mindset. The book argues for a Digital Humanism that analyses and, most importantly, influences the complex interplay of technology and humankind toward a better society and life while fully respecting universal human rights. It is a call to shaping technologies in accordance with human values and needs.

New Dimensions of Information Warfare (Paperback, 1st ed. 2021): Roberto Di Pietro, Simone Raponi, Maurantonio Caprolu, Stefano... New Dimensions of Information Warfare (Paperback, 1st ed. 2021)
Roberto Di Pietro, Simone Raponi, Maurantonio Caprolu, Stefano Cresci
R4,231 Discovery Miles 42 310 Ships in 18 - 22 working days

This book revises the strategic objectives of Information Warfare, interpreting them according to the modern canons of information age, focusing on the fabric of society, the economy, and critical Infrastructures. The authors build plausible detailed real-world scenarios for each entity, showing the related possible threats from the Information Warfare point of view. In addition, the authors dive into the description of the still open problems, especially when it comes to critical infrastructures, and the countermeasures that can be implemented, possibly inspiring further research in the domain. This book intends to provide a conceptual framework and a methodological guide, enriched with vivid and compelling use cases for the readers (e.g. technologists, academicians, military, government) interested in what Information Warfare really means, when its lenses are applied to current technology. Without sacrificing accuracy, rigor and, most importantly, the big picture of Information Warfare, this book dives into several relevant and up-to-date critical domains. The authors illustrate how finance (an always green target of Information Warfare) is intertwined with Social Media, and how an opponent could exploit these latter ones to reach its objectives. Also, how cryptocurrencies are going to reshape the economy, and the risks involved by this paradigm shift. Even more compelling is how the very fabric of society is going to be reshaped by technology, for instance how our democratic elections are exposed to risks that are even greater than what appears in the current public discussions. Not to mention how our Critical Infrastructure is becoming exposed to a series of novel threats, ranging from state-supported malware to drones. A detailed discussion of possible countermeasures and what the open issues are for each of the highlighted threats complete this book. This book targets a widespread audience that includes researchers and advanced level students studying and working in computer science with a focus on security. Military officers, government officials and professionals working in this field will also find this book useful as a reference.

Fog/Edge Computing For Security, Privacy, and Applications (Paperback, 1st ed. 2021): Wei Chang, Jie Wu Fog/Edge Computing For Security, Privacy, and Applications (Paperback, 1st ed. 2021)
Wei Chang, Jie Wu
R4,047 Discovery Miles 40 470 Ships in 18 - 22 working days

This book provides the state-of-the-art development on security and privacy for fog/edge computing, together with their system architectural support and applications. This book is organized into five parts with a total of 15 chapters. Each area corresponds to an important snapshot. The first part of this book presents an overview of fog/edge computing, focusing on its relationship with cloud technology and the future with the use of 5G communication. Several applications of edge computing are discussed. The second part of this book considers several security issues in fog/edge computing, including the secure storage and search services, collaborative intrusion detection method on IoT-fog computing, and the feasibility of deploying Byzantine agreement protocols in untrusted environments. The third part of this book studies the privacy issues in fog/edge computing. It first investigates the unique privacy challenges in fog/edge computing, and then discusses a privacy-preserving framework for the edge-based video analysis, a popular machine learning application on fog/edge. This book also covers the security architectural design of fog/edge computing, including a comprehensive overview of vulnerabilities in fog/edge computing within multiple architectural levels, the security and intelligent management, the implementation of network-function-virtualization-enabled multicasting in part four. It explains how to use the blockchain to realize security services. The last part of this book surveys applications of fog/edge computing, including the fog/edge computing in Industrial IoT, edge-based augmented reality, data streaming in fog/edge computing, and the blockchain-based application for edge-IoT. This book is designed for academics, researchers and government officials, working in the field of fog/edge computing and cloud computing. Practitioners, and business organizations (e.g., executives, system designers, and marketing professionals), who conduct teaching, research, decision making, and designing fog/edge technology will also benefit from this book The content of this book will be particularly useful for advanced-level students studying computer science, computer technology, and information systems, but also applies to students in business, education, and economics, who would benefit from the information, models, and case studies therein.

Introduction to Privacy Enhancing Technologies - A Classification-Based Approach to Understanding PETs (Paperback, 1st ed.... Introduction to Privacy Enhancing Technologies - A Classification-Based Approach to Understanding PETs (Paperback, 1st ed. 2021)
Carlisle Adams
R1,420 Discovery Miles 14 200 Ships in 18 - 22 working days

This textbook provides a unique lens through which the myriad of existing Privacy Enhancing Technologies (PETs) can be easily comprehended and appreciated. It answers key privacy-centered questions with clear and detailed explanations. Why is privacy important? How and why is your privacy being eroded and what risks can this pose for you? What are some tools for protecting your privacy in online environments? How can these tools be understood, compared, and evaluated? What steps can you take to gain more control over your personal data? This book addresses the above questions by focusing on three fundamental elements: It introduces a simple classification of PETs that allows their similarities and differences to be highlighted and analyzed; It describes several specific PETs in each class, including both foundational technologies and important recent additions to the field; It explains how to use this classification to determine which privacy goals are actually achievable in a given real-world environment. Once the goals are known, this allows the most appropriate PETs to be selected in order to add the desired privacy protection to the target environment. To illustrate, the book examines the use of PETs in conjunction with various security technologies, with the legal infrastructure, and with communication and computing technologies such as Software Defined Networking (SDN) and Machine Learning (ML). Designed as an introductory textbook on PETs, this book is essential reading for graduate-level students in computer science and related fields, prospective PETs researchers, privacy advocates, and anyone interested in technologies to protect privacy in online environments.

Algorithms for Data and Computation Privacy (Paperback, 1st ed. 2021): Alex X. Liu, Rui Li Algorithms for Data and Computation Privacy (Paperback, 1st ed. 2021)
Alex X. Liu, Rui Li
R3,820 Discovery Miles 38 200 Ships in 18 - 22 working days

This book introduces the state-of-the-art algorithms for data and computation privacy. It mainly focuses on searchable symmetric encryption algorithms and privacy preserving multi-party computation algorithms. This book also introduces algorithms for breaking privacy, and gives intuition on how to design algorithm to counter privacy attacks. Some well-designed differential privacy algorithms are also included in this book. Driven by lower cost, higher reliability, better performance, and faster deployment, data and computing services are increasingly outsourced to clouds. In this computing paradigm, one often has to store privacy sensitive data at parties, that cannot fully trust and perform privacy sensitive computation with parties that again cannot fully trust. For both scenarios, preserving data privacy and computation privacy is extremely important. After the Facebook-Cambridge Analytical data scandal and the implementation of the General Data Protection Regulation by European Union, users are becoming more privacy aware and more concerned with their privacy in this digital world. This book targets database engineers, cloud computing engineers and researchers working in this field. Advanced-level students studying computer science and electrical engineering will also find this book useful as a reference or secondary text.

Advance Metadata Fair - The Retention and Disclosure of 4G, 5G and  Social Media Location Information,  for Law Enforcement and... Advance Metadata Fair - The Retention and Disclosure of 4G, 5G and Social Media Location Information, for Law Enforcement and National Security, and the Impact on Privacy in Australia (Paperback, 1st ed. 2020)
Stanley Shanapinda
R3,770 Discovery Miles 37 700 Ships in 18 - 22 working days

This book outlines the legal powers of a major Western nation - Australia - to collect and use location information. Mobile service and social media service providers now have the ability to track, record and store more precise location information. Unlike 4G, 5G mobile communications require that cell towers and antennas be in much closer proximity; as a result, the location data can reveal more personal and sensitive information about individual citizens. Despite this aspect, service providers are required to disclose the data to the authorities, without the need for a judicial warrant. This book was written from the perspective of big location data software analytics, a capability that makes it possible to combine various location data points to create a profile on a given individual's movements, habits, and political, religious and ideological orientation. In this regard, privacy is poorly protected. The rationale used to justify the powers was enforcing serious crimes - terrorism offences. Location data can now be retained for at least two years and be collected to investigate even minor offences. This can be done without the person being reasonably suspected of a criminal offence - when the individual is simply determined to be a person of interest. This poses legal risks to vulnerable communities. And yet, such investigative techniques are deemed lawful and reasonable. At a time when national security is so broadly defined to include economic issues, which in turn overlap with climate change and environmental protection, these legal powers should be reassessed. The book clarifies the complex rules that every citizen must know in order to have agency. Further, it calls upon authorities to reflect and to self-regulate, by making the conscious decision to surrender some of their powers to review by the independent judiciary. Without the requirement for a judicial warrant or judicial review, the powers are unfairly broad. The book pursues an interdisciplinary approach to assess the functionality of mobile telecommunications in direct relation to law enforcement powers and existing judicial precedents. Further, it offers a unifying techno-legal perspective on a complex issue touching on modern privacy law and communications technologies.

Linking Sensitive Data - Methods and Techniques for Practical Privacy-Preserving Information Sharing (Paperback, 1st ed. 2020):... Linking Sensitive Data - Methods and Techniques for Practical Privacy-Preserving Information Sharing (Paperback, 1st ed. 2020)
Peter Christen, Thilina Ranbaduge, Rainer Schnell
R4,291 Discovery Miles 42 910 Ships in 18 - 22 working days

This book provides modern technical answers to the legal requirements of pseudonymisation as recommended by privacy legislation. It covers topics such as modern regulatory frameworks for sharing and linking sensitive information, concepts and algorithms for privacy-preserving record linkage and their computational aspects, practical considerations such as dealing with dirty and missing data, as well as privacy, risk, and performance assessment measures. Existing techniques for privacy-preserving record linkage are evaluated empirically and real-world application examples that scale to population sizes are described. The book also includes pointers to freely available software tools, benchmark data sets, and tools to generate synthetic data that can be used to test and evaluate linkage techniques. This book consists of fourteen chapters grouped into four parts, and two appendices. The first part introduces the reader to the topic of linking sensitive data, the second part covers methods and techniques to link such data, the third part discusses aspects of practical importance, and the fourth part provides an outlook of future challenges and open research problems relevant to linking sensitive databases. The appendices provide pointers and describe freely available, open-source software systems that allow the linkage of sensitive data, and provide further details about the evaluations presented. A companion Web site at https://dmm.anu.edu.au/lsdbook2020 provides additional material and Python programs used in the book. This book is mainly written for applied scientists, researchers, and advanced practitioners in governments, industry, and universities who are concerned with developing, implementing, and deploying systems and tools to share sensitive information in administrative, commercial, or medical databases. The Book describes how linkage methods work and how to evaluate their performance. It covers all the major concepts and methods and also discusses practical matters such as computational efficiency, which are critical if the methods are to be used in practice - and it does all this in a highly accessible way!David J. Hand, Imperial College, London

The Identity Trade - Selling Privacy and Reputation Online (Paperback): Nora A. Draper The Identity Trade - Selling Privacy and Reputation Online (Paperback)
Nora A. Draper
R878 Discovery Miles 8 780 Ships in 18 - 22 working days

The successes and failures of an industry that claims to protect and promote our online identities What does privacy mean in the digital era? As technology increasingly blurs the boundary between public and private, questions about who controls our data become harder and harder to answer. Our every web view, click, and online purchase can be sold to anyone to store and use as they wish. At the same time, our online reputation has become an important part of our identity-a form of cultural currency. The Identity Trade examines the relationship between online visibility and privacy, and the politics of identity and self-presentation in the digital age. In doing so, Nora Draper looks at the revealing two-decade history of efforts by the consumer privacy industry to give individuals control over their digital image through the sale of privacy protection and reputation management as a service. Through in-depth interviews with industry experts, as well as analysis of media coverage, promotional materials, and government policies, Draper examines how companies have turned the protection and promotion of digital information into a business. Along the way, she also provides insight into how these companies have responded to and shaped the ways we think about image and reputation in the digital age. Tracking the successes and failures of companies claiming to control our digital ephemera, Draper takes us inside an industry that has commodified strategies of information control. This book is a discerning overview of the debate around who controls our data, who buys and sells it, and the consequences of treating privacy as a consumer good.

Privacy-Preserving Deep Learning - A Comprehensive Survey (Paperback, 1st ed. 2021): Kwangjo Kim, Harry Chandra Tanuwidjaja Privacy-Preserving Deep Learning - A Comprehensive Survey (Paperback, 1st ed. 2021)
Kwangjo Kim, Harry Chandra Tanuwidjaja
R1,919 Discovery Miles 19 190 Ships in 18 - 22 working days

This book discusses the state-of-the-art in privacy-preserving deep learning (PPDL), especially as a tool for machine learning as a service (MLaaS), which serves as an enabling technology by combining classical privacy-preserving and cryptographic protocols with deep learning. Google and Microsoft announced a major investment in PPDL in early 2019. This was followed by Google's infamous announcement of "Private Join and Compute," an open source PPDL tools based on secure multi-party computation (secure MPC) and homomorphic encryption (HE) in June of that year. One of the challenging issues concerning PPDL is selecting its practical applicability despite the gap between the theory and practice. In order to solve this problem, it has recently been proposed that in addition to classical privacy-preserving methods (HE, secure MPC, differential privacy, secure enclaves), new federated or split learning for PPDL should also be applied. This concept involves building a cloud framework that enables collaborative learning while keeping training data on client devices. This successfully preserves privacy and while allowing the framework to be implemented in the real world. This book provides fundamental insights into privacy-preserving and deep learning, offering a comprehensive overview of the state-of-the-art in PPDL methods. It discusses practical issues, and leveraging federated or split-learning-based PPDL. Covering the fundamental theory of PPDL, the pros and cons of current PPDL methods, and addressing the gap between theory and practice in the most recent approaches, it is a valuable reference resource for a general audience, undergraduate and graduate students, as well as practitioners interested learning about PPDL from the scratch, and researchers wanting to explore PPDL for their applications.

Cyber Crisis Management - The Practical Handbook on Crisis Management and Crisis Communication (Paperback, 1st ed. 2021):... Cyber Crisis Management - The Practical Handbook on Crisis Management and Crisis Communication (Paperback, 1st ed. 2021)
Holger Kaschner
R2,191 Discovery Miles 21 910 Ships in 18 - 22 working days

Cyber attacks and IT breakdowns threaten every organization. The incidents accumulate and often form the prelude to complex, existence-threatening crises. This book helps not only to manage them, but also to prepare for and prevent cyber crises. Structured in a practical manner, it is ideally suited for crisis team members, communicators, security, IT and data protection experts on a day-to-day basis. With numerous illustrations and checklists.This book is a translation of the original German 1st edition Cyber Crisis Management by Holger Kaschner, published by Springer Fachmedien Wiesbaden GmbH, part of Springer Nature in 2020. The translation was done with the help of artificial intelligence (machine translation by the service DeepL.com). A subsequent human revision was done primarily in terms of content, so that the book will read stylistically differently from a conventional translation. Springer Nature works continuously to further the development of tools for the production of books and on the related technologies to support the authors.

Proceedings of Second International Conference on Computing, Communications, and Cyber-Security - IC4S 2020 (Paperback, 1st ed.... Proceedings of Second International Conference on Computing, Communications, and Cyber-Security - IC4S 2020 (Paperback, 1st ed. 2021)
Pradeep Kumar Singh, Slawomir T. Wierzchon, Sudeep Tanwar, Maria Ganzha, Joel J. P. C. Rodrigues
R5,350 Discovery Miles 53 500 Ships in 18 - 22 working days

This book features selected research papers presented at the Second International Conference on Computing, Communications, and Cyber-Security (IC4S 2020), organized in Krishna Engineering College (KEC), Ghaziabad, India, along with Academic Associates; Southern Federal University, Russia; IAC Educational, India; and ITS Mohan Nagar, Ghaziabad, India during 3-4 October 2020. It includes innovative work from researchers, leading innovators, and professionals in the area of communication and network technologies, advanced computing technologies, data analytics and intelligent learning, the latest electrical and electronics trends, and security and privacy issues.

Attribution of Advanced Persistent Threats - How to Identify the Actors Behind Cyber-Espionage (Paperback, 2020 ed.): Timo... Attribution of Advanced Persistent Threats - How to Identify the Actors Behind Cyber-Espionage (Paperback, 2020 ed.)
Timo Steffens
R1,956 Discovery Miles 19 560 Ships in 18 - 22 working days

An increasing number of countries develop capabilities for cyber-espionage and sabotage. The sheer number of reported network compromises suggests that some of these countries view cyber-means as integral and well-established elements of their strategical toolbox. At the same time the relevance of such attacks for society and politics is also increasing. Digital means were used to influence the US presidential election in 2016, repeatedly led to power outages in Ukraine, and caused economic losses of hundreds of millions of dollars with a malfunctioning ransomware. In all these cases the question who was behind the attacks is not only relevant from a legal perspective, but also has a political and social dimension. Attribution is the process of tracking and identifying the actors behind these cyber-attacks. Often it is considered an art, not a science. This book systematically analyses how hackers operate, which mistakes they make, and which traces they leave behind. Using examples from real cases the author explains the analytic methods used to ascertain the origin of Advanced Persistent Threats.

Security Rights in Intellectual Property (Paperback, 1st ed. 2020): Eva-Maria Kieninger Security Rights in Intellectual Property (Paperback, 1st ed. 2020)
Eva-Maria Kieninger
R4,128 Discovery Miles 41 280 Ships in 18 - 22 working days

This book discusses the main legal and economic challenges to the creation and enforcement of security rights in intellectual property and explores possible avenues of reform, such as more specific rules for security in IP rights and better coordination between intellectual property law and secured transactions law. In the context of business financing, intellectual property rights are still only reluctantly used as collateral, and on a small scale. If they are used at all, it is mostly done in the form of a floating charge or some other "all-asset" security right. The only sector in which security rights in intellectual property play a major role, at least in some jurisdictions, is the financing of movies. On the other hand, it is virtually undisputed that security rights in intellectual property could be economically valuable, or even crucial, for small and medium-sized enterprises - especially for start-ups, which are often very innovative and creative, but have limited access to corporate financing and must rely on capital markets (securitization, capital market). Therefore, they need to secure bank loans, yet lack their own traditional collateral, such as land.

Cloud Security For Dummies (Paperback): T. Coombs Cloud Security For Dummies (Paperback)
T. Coombs
R683 Discovery Miles 6 830 Ships in 10 - 15 working days

Embrace the cloud and kick hackers to the curb with this accessible guide on cloud security.

Cloud technology has changed the way we approach technology. It’s also given rise to a new set of security challenges caused by bad actors who seek to exploit vulnerabilities in a digital infrastructure. You can put the kibosh on these hackers and their dirty deeds by hardening the walls that protect your data.

Using the practical techniques discussed in Cloud Security For Dummies, you’ll mitigate the risk of a data breach by building security into your network from the bottom-up. Learn how to set your security policies to balance ease-of-use and data protection and work with tools provided by vendors trusted around the world.

This book offers step-by-step demonstrations of how to:

  • Establish effective security protocols for your cloud application, network, and infrastructure
  • Manage and use the security tools provided by different cloud vendors
  • Deliver security audits that reveal hidden flaws in your security setup and ensure compliance with regulatory frameworks

As firms around the world continue to expand their use of cloud technology, the cloud is becoming a bigger and bigger part of our lives. You can help safeguard this critical component of modern IT architecture with the straightforward strategies and hands-on techniques discussed in this book.

Perceived Privacy in Location-Based Mobile System (Paperback, 1st ed. 2020): Maija Elina Poikela Perceived Privacy in Location-Based Mobile System (Paperback, 1st ed. 2020)
Maija Elina Poikela
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This work aims at understanding behavior around location information, including why users share such information, why they protect the data, and what kind of other factors influence the decision to behave in a certain way. This book explores privacy in the context of location data, and answers questions such as what are the privacy related behaviors in this context, and what are the factors influencing such behaviors. The book gives an overview to what privacy means for users in terms of understandings, attitudes and valuations. This book discusses reasons for why research around this topic is challenging, and presents various methods for diving into the topic through empirical studies. The work is relevant for professionals, researchers, and users of technology.

Handbook of Big Data Privacy (Paperback, 1st ed. 2020): Kim-Kwang Raymond Choo, Ali Dehghantanha Handbook of Big Data Privacy (Paperback, 1st ed. 2020)
Kim-Kwang Raymond Choo, Ali Dehghantanha
R4,721 Discovery Miles 47 210 Ships in 18 - 22 working days

This handbook provides comprehensive knowledge and includes an overview of the current state-of-the-art of Big Data Privacy, with chapters written by international world leaders from academia and industry working in this field. The first part of this book offers a review of security challenges in critical infrastructure and offers methods that utilize acritical intelligence (AI) techniques to overcome those issues. It then focuses on big data security and privacy issues in relation to developments in the Industry 4.0. Internet of Things (IoT) devices are becoming a major source of security and privacy concern in big data platforms. Multiple solutions that leverage machine learning for addressing security and privacy issues in IoT environments are also discussed this handbook. The second part of this handbook is focused on privacy and security issues in different layers of big data systems. It discusses about methods for evaluating security and privacy of big data systems on network, application and physical layers. This handbook elaborates on existing methods to use data analytic and AI techniques at different layers of big data platforms to identify privacy and security attacks. The final part of this handbook is focused on analyzing cyber threats applicable to the big data environments. It offers an in-depth review of attacks applicable to big data platforms in smart grids, smart farming, FinTech, and health sectors. Multiple solutions are presented to detect, prevent and analyze cyber-attacks and assess the impact of malicious payloads to those environments. This handbook provides information for security and privacy experts in most areas of big data including; FinTech, Industry 4.0, Internet of Things, Smart Grids, Smart Farming and more. Experts working in big data, privacy, security, forensics, malware analysis, machine learning and data analysts will find this handbook useful as a reference. Researchers and advanced-level computer science students focused on computer systems, Internet of Things, Smart Grid, Smart Farming, Industry 4.0 and network analysts will also find this handbook useful as a reference.

Privacy in Dynamical Systems (Paperback, 1st ed. 2020): Farhad Farokhi Privacy in Dynamical Systems (Paperback, 1st ed. 2020)
Farhad Farokhi
R2,203 Discovery Miles 22 030 Ships in 18 - 22 working days

This book addresses privacy in dynamical systems, with applications to smart metering, traffic estimation, and building management. In the first part, the book explores statistical methods for privacy preservation from the areas of differential privacy and information-theoretic privacy (e.g., using privacy metrics motivated by mutual information, relative entropy, and Fisher information) with provable guarantees. In the second part, it investigates the use of homomorphic encryption for the implementation of control laws over encrypted numbers to support the development of fully secure remote estimation and control. Chiefly intended for graduate students and researchers, the book provides an essential overview of the latest developments in privacy-aware design for dynamical systems.

Face Recognition Technology - Compulsory Visibility and Its Impact on Privacy and the Confidentiality of Personal Identifiable... Face Recognition Technology - Compulsory Visibility and Its Impact on Privacy and the Confidentiality of Personal Identifiable Images (Paperback, 1st ed. 2020)
Ian Berle
R3,332 Discovery Miles 33 320 Ships in 18 - 22 working days

This book examines how face recognition technology is affecting privacy and confidentiality in an era of enhanced surveillance. Further, it offers a new approach to the complex issues of privacy and confidentiality, by drawing on Joseph K in Kafka's disturbing novel The Trial, and on Isaiah Berlin's notion of liberty and freedom. Taking into consideration rights and wrongs, protection from harm associated with compulsory visibility, and the need for effective data protection law, the author promotes ethical practices by reinterpreting privacy as a property right. To protect this right, the author advocates the licensing of personal identifiable images where appropriate. The book reviews American, UK and European case law concerning privacy and confidentiality, the effect each case has had on the developing jurisprudence, and the ethical issues involved. As such, it offers a valuable resource for students of ethico-legal fields, professionals specialising in image rights law, policy-makers, and liberty advocates and activists.

Differential Privacy and Applications (Hardcover, 1st ed. 2017): Tianqing Zhu, Wanlei Zhou, Gang Li, Philip S. Yu Differential Privacy and Applications (Hardcover, 1st ed. 2017)
Tianqing Zhu, Wanlei Zhou, Gang Li, Philip S. Yu
R3,880 R3,595 Discovery Miles 35 950 Save R285 (7%) Ships in 9 - 17 working days

This book focuses on differential privacy and its application with an emphasis on technical and application aspects. This book also presents the most recent research on differential privacy with a theory perspective. It provides an approachable strategy for researchers and engineers to implement differential privacy in real world applications. Early chapters are focused on two major directions, differentially private data publishing and differentially private data analysis. Data publishing focuses on how to modify the original dataset or the queries with the guarantee of differential privacy. Privacy data analysis concentrates on how to modify the data analysis algorithm to satisfy differential privacy, while retaining a high mining accuracy. The authors also introduce several applications in real world applications, including recommender systems and location privacy Advanced level students in computer science and engineering, as well as researchers and professionals working in privacy preserving, data mining, machine learning and data analysis will find this book useful as a reference. Engineers in database, network security, social networks and web services will also find this book useful.

FinTech and Data Privacy in Germany - An Empirical Analysis with Policy Recommendations (Paperback, 1st ed. 2019): Gregor... FinTech and Data Privacy in Germany - An Empirical Analysis with Policy Recommendations (Paperback, 1st ed. 2019)
Gregor Dorfleitner, Lars Hornuf
R3,310 Discovery Miles 33 100 Ships in 18 - 22 working days

This book examines the FinTech revolution from a data privacy perspective. It analyzes key players on the FinTech market and the developments in various market segments. Particular attention is paid to an empirical analysis of the privacy statements of 505 German FinTech firms and how they were adapted after the General Data Protection Regulation (GDPR) entered into effect in May 2018. The analysis also includes 38 expert interviews with relevant stakeholders from supervisory and regulatory authorities, the financial and FinTech industry, leading consulting firms and consumer protection agencies. By adopting this approach, the book identifies key regulatory needs, offers a valuable asset for practitioners and academics alike, and shares intriguing insights for lawyers, economists and everyone interested in FinTech and data privacy.

Blockchain and Trustworthy Systems - Second International Conference, BlockSys 2020, Dali, China, August 6-7, 2020, Revised... Blockchain and Trustworthy Systems - Second International Conference, BlockSys 2020, Dali, China, August 6-7, 2020, Revised Selected Papers (Paperback, 1st ed. 2020)
Zibin Zheng, Hong-Ning Dai, Xiaodong Fu, Benhui Chen
R2,765 Discovery Miles 27 650 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post conference papers of the Second International Conference on Blockchain and Trustworthy Systems, Blocksys 2020, held in Dali, China*, in August 2020. The 42 full papers and the 11 short papers were carefully reviewed and selected from 100 submissions. The papers are organized in topical sections: theories and algorithms for blockchain, performance optimization of blockchain, blockchain security and privacy, blockchain and cloud computing, blockchain and internet of things, blockchain and mobile edge computing, blockchain and smart contracts, blockchain and data mining, blockchain services and applications, trustworthy system development. *The conference was held virtually due to the COVID-19 pandemic.

Exploding Data - Reclaiming Our Cyber Security in the Digital Age (Hardcover, Main): Michael Chertoff Exploding Data - Reclaiming Our Cyber Security in the Digital Age (Hardcover, Main)
Michael Chertoff 1
R583 R518 Discovery Miles 5 180 Save R65 (11%) Ships in 10 - 15 working days

A powerful argument for new laws and policies regarding cyber-security, from the former US Secretary of Homeland Security. The most dangerous threat we-individually and as a society-face today is no longer military, but rather the increasingly pervasive exposure of our personal information; nothing undermines our freedom more than losing control of information about ourselves. And yet, as daily events underscore, we are ever more vulnerable to cyber-attack. In this bracing book, Michael Chertoff makes clear that our laws and policies surrounding the protection of personal information, written for an earlier time, need to be completely overhauled in the Internet era. On the one hand, the collection of data-more widespread by business than by government, and impossible to stop-should be facilitated as an ultimate protection for society. On the other, standards under which information can be inspected, analysed or used must be significantly tightened. In offering his compelling call for action, Chertoff argues that what is at stake is not only the simple loss of privacy, which is almost impossible to protect, but also that of individual autonomy-the ability to make personal choices free of manipulation or coercion. Offering colourful stories over many decades that illuminate the three periods of data gathering we have experienced, Chertoff explains the complex legalities surrounding issues of data collection and dissemination today and charts a forceful new strategy that balances the needs of government, business and individuals alike.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Seven Votes - How WWII Changed South…
Richard Steyn Paperback  (1)
R300 R268 Discovery Miles 2 680
Flee, Be Silent, Pray - Ancient Prayers…
Ed Cyzewski Paperback R379 R353 Discovery Miles 3 530
The South African Law Of Persons
Jacqueline Heaton Paperback  (7)
R1,006 R849 Discovery Miles 8 490
CATIA v5 - Advanced Parametric and…
Ionut Ghionea, Sasa Cukovic, … Hardcover R4,118 Discovery Miles 41 180
40 Lives In 40 Days - Experiencing God's…
John MacArthur Hardcover R397 R360 Discovery Miles 3 600
Popularizing Science - The Life and Work…
Krishna Dronamraju Hardcover R1,131 Discovery Miles 11 310
Rearing Children in a Postmodern World
Carey N. Ingram Hardcover R453 Discovery Miles 4 530
The Love Song Of Andre P. Brink - A…
Leon De Kock Paperback  (1)
R399 Discovery Miles 3 990
Computer Programming The Doctrine 2.0…
Adesh Silva Hardcover R637 R576 Discovery Miles 5 760
15 Minute Vegan: On a Budget - Fast…
Katy Beskow Hardcover  (4)
R435 Discovery Miles 4 350

 

Partners