0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (126)
  • R250 - R500 (244)
  • R500+ (796)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

Legal Aspects of Ethnic Data Collection and Positive Action - The Roma Minority in Europe (Paperback, 1st ed. 2019): Jozefien... Legal Aspects of Ethnic Data Collection and Positive Action - The Roma Minority in Europe (Paperback, 1st ed. 2019)
Jozefien Van Caeneghem
R2,553 Discovery Miles 25 530 Ships in 18 - 22 working days

This book addresses the legal feasibility of ethnic data collection and positive action for equality and anti-discrimination purposes, and considers how they could be used to promote the Roma minority's inclusion in Europe. The book's central aim is to research how a societal problem can be improved upon from a legal perspective. The controversy surrounding ethnic data collection and positive action severely limits their use at the national level. Accordingly, legal and political concerns are analysed and addressed in order to demonstrate that it is possible to collect such data and to implement such measures while fully respecting international and European human rights norms, provided that certain conditions are met. Part I focuses on ethnic data collection and explores the key rules and principles that govern it, the ways in which this equality tool could be used, and how potential obstacles might be overcome. It also identifies and addresses the specific challenges that arise when collecting ethnic data on the Roma minority in Europe. In turn, Part II explores positive action and the broad range of measures covered by the concept, before analysing the applicable international and European framework. It reviews the benefits and challenges of implementing positive action for Roma, identifies best practices, and gives special consideration to inter-cultural mediation in the advancement of Roma inclusion. The book concludes with an overview of the main findings on both topics and by identifying three essential elements that must be in place, in addition to full respect for the applicable legal rules, in order to combat discrimination and achieve the inclusion of Roma in Europe by complementing existing anti-discrimination frameworks with the collection of ethnic data and the implementation of positive action schemes.

Web Services - ICWS 2020 - 27th International Conference, Held as Part of the Services Conference Federation, SCF 2020,... Web Services - ICWS 2020 - 27th International Conference, Held as Part of the Services Conference Federation, SCF 2020, Honolulu, HI, USA, September 18-20, 2020, Proceedings (Paperback, 1st ed. 2020)
Wei-Shinn Ku, Yasuhiko Kanemasa, Mohamed Adel Serhani, Liang-Jie Zhang
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book constitutes the proceedings of the International Conference on Web of Services, ICWS 2020, held virtually as part of SCF 2020, in Honolulu, HI, USA, in September 2020. The 14 full papers presented in this volume were carefully reviewed and selected from 52 submissions. The conference proceeding ICWS 2020 presents the latest fundamental advances in the state of the art and practice of Web-based services, identify emerging research topics, and define the future of Web-based services. All topics regarding Web-centric services, enabling technologies and applications align with the theme of ICWS.

The Ethics of Cybersecurity (Paperback, 1st ed. 2020): Markus Christen, Bert Gordijn, Michele Loi The Ethics of Cybersecurity (Paperback, 1st ed. 2020)
Markus Christen, Bert Gordijn, Michele Loi
R2,456 Discovery Miles 24 560 Ships in 18 - 22 working days

This open access book provides the first comprehensive collection of papers that provide an integrative view on cybersecurity. It discusses theories, problems and solutions on the relevant ethical issues involved. This work is sorely needed in a world where cybersecurity has become indispensable to protect trust and confidence in the digital infrastructure whilst respecting fundamental values like equality, fairness, freedom, or privacy. The book has a strong practical focus as it includes case studies outlining ethical issues in cybersecurity and presenting guidelines and other measures to tackle those issues. It is thus not only relevant for academics but also for practitioners in cybersecurity such as providers of security software, governmental CERTs or Chief Security Officers in companies.

The 2018 Yearbook of the Digital Ethics Lab (Paperback, 1st ed. 2019): Carl OEhman, David Watson The 2018 Yearbook of the Digital Ethics Lab (Paperback, 1st ed. 2019)
Carl OEhman, David Watson
R1,391 Discovery Miles 13 910 Ships in 18 - 22 working days

This book explores a wide range of topics in digital ethics. It features 11 chapters that analyze the opportunities and the ethical challenges posed by digital innovation, delineate new approaches to solve them, and offer concrete guidance to harness the potential for good of digital technologies. The contributors are all members of the Digital Ethics Lab (the DELab), a research environment that draws on a wide range of academic traditions. The chapters highlight the inherently multidisciplinary nature of the subject, which cannot be separated from the epistemological foundations of the technologies themselves or the political implications of the requisite reforms. Coverage illustrates the importance of expert knowledge in the project of designing new reforms and political systems for the digital age. The contributions also show how this task requires a deep self-understanding of who we are as individuals and as a species. The questions raised here have ancient -- perhaps even timeless -- roots. The phenomena they address may be new. But, the contributors examine the fundamental concepts that undergird them: good and evil, justice and truth. Indeed, every epoch has its great challenges. The role of philosophy must be to redefine the meaning of these concepts in light of the particular challenges it faces. This is true also for the digital age. This book takes an important step towards redefining and re-implementing fundamental ethical concepts to this new era.

After the Digital Tornado - Networks, Algorithms, Humanity (Hardcover): Kevin Werbach After the Digital Tornado - Networks, Algorithms, Humanity (Hardcover)
Kevin Werbach
R2,926 Discovery Miles 29 260 Ships in 10 - 15 working days

Networks powered by algorithms are pervasive. Major contemporary technology trends - Internet of Things, Big Data, Digital Platform Power, Blockchain, and the Algorithmic Society - are manifestations of this phenomenon. The internet, which once seemed an unambiguous benefit to society, is now the basis for invasions of privacy, massive concentrations of power, and wide-scale manipulation. The algorithmic networked world poses deep questions about power, freedom, fairness, and human agency. The influential 1997 Federal Communications Commission whitepaper "Digital Tornado" hailed the "endless spiral of connectivity" that would transform society, and today, little remains untouched by digital connectivity. Yet fundamental questions remain unresolved, and even more serious challenges have emerged. This important collection, which offers a reckoning and a foretelling, features leading technology scholars who explain the legal, business, ethical, technical, and public policy challenges of building pervasive networks and algorithms for the benefit of humanity. This title is also available as Open Access on Cambridge Core.

Internet of Things-Applications and Future - Proceedings of ITAF 2019 (Paperback, 1st ed. 2020): Atef Zaki Ghalwash, Nashaat El... Internet of Things-Applications and Future - Proceedings of ITAF 2019 (Paperback, 1st ed. 2020)
Atef Zaki Ghalwash, Nashaat El Khameesy, Dalia A. Magdi, Amit Joshi
R5,190 Discovery Miles 51 900 Ships in 18 - 22 working days

This book is a collection of the best research papers presented at the First World Conference on Internet of Things: Applications & Future (ITAF 2019), Sponsored by GR Foundation and French University in Egypt, held at Triumph Luxury Hotel, Cairo, Egypt, on 14-15 October 2019. It includes innovative works from leading researchers, innovators, business executives, and industry professionals that cover the latest advances in and applications for commercial and industrial end users across sectors within the emerging Internet of Things ecosphere. It addresses both current and emerging topics related to the Internet of Things such as big data research, new services and analytics, Internet of Things (IoT) fundamentals, electronic computation and analysis, big data for multi-discipline services, security, privacy and trust, IoT technologies, and open and cloud technologies.

Password Keeper - Size (6 x 9 inches) - 100 Pages - White Cover: Keep your usernames, passwords, social info, web addresses and... Password Keeper - Size (6 x 9 inches) - 100 Pages - White Cover: Keep your usernames, passwords, social info, web addresses and security questions in one. So easy & organized (Paperback)
Dorothy J Hall
R171 Discovery Miles 1 710 Ships in 18 - 22 working days
The Huawei and Snowden Questions - Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build... The Huawei and Snowden Questions - Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment? (Paperback, 1st ed. 2018)
Olav Lysne
R728 Discovery Miles 7 280 Ships in 18 - 22 working days

This open access book answers two central questions: firstly, is it at all possible to verify electronic equipment procured from untrusted vendors? Secondly, can I build trust into my products in such a way that I support verification by untrusting customers? In separate chapters the book takes readers through the state of the art in fields of computer science that can shed light on these questions. In a concluding chapter it discusses realistic ways forward. In discussions on cyber security, there is a tacit assumption that the manufacturer of equipment will collaborate with the user of the equipment to stop third-party wrongdoers. The Snowden files and recent deliberations on the use of Chinese equipment in the critical infrastructures of western countries have changed this. The discourse in both cases revolves around what malevolent manufacturers can do to harm their own customers, and the importance of the matter is on par with questions of national security. This book is of great interest to ICT and security professionals who need a clear understanding of the two questions posed in the subtitle, and to decision-makers in industry, national bodies and nation states.

Of Privacy and Power - The Transatlantic Struggle over Freedom and Security (Hardcover): Henry Farrell, Abraham L. Newman Of Privacy and Power - The Transatlantic Struggle over Freedom and Security (Hardcover)
Henry Farrell, Abraham L. Newman
R868 Discovery Miles 8 680 Ships in 10 - 15 working days

How disputes over privacy and security have shaped the relationship between the European Union and the United States and what this means for the future We live in an interconnected world, where security problems like terrorism are spilling across borders, and globalized data networks and e-commerce platforms are reshaping the world economy. This means that states' jurisdictions and rule systems clash. How have they negotiated their differences over freedom and security? Of Privacy and Power investigates how the European Union and United States, the two major regulatory systems in world politics, have regulated privacy and security, and how their agreements and disputes have reshaped the transatlantic relationship. The transatlantic struggle over freedom and security has usually been depicted as a clash between a peace-loving European Union and a belligerent United States. Henry Farrell and Abraham Newman demonstrate how this misses the point. The real dispute was between two transnational coalitions-one favoring security, the other liberty-whose struggles have reshaped the politics of surveillance, e-commerce, and privacy rights. Looking at three large security debates in the period since 9/11, involving Passenger Name Record data, the SWIFT financial messaging controversy, and Edward Snowden's revelations, the authors examine how the powers of border-spanning coalitions have waxed and waned. Globalization has enabled new strategies of action, which security agencies, interior ministries, privacy NGOs, bureaucrats, and other actors exploit as circumstances dictate. The first serious study of how the politics of surveillance has been transformed, Of Privacy and Power offers a fresh view of the role of information and power in a world of economic interdependence.

Ethics in an Age of Surveillance - Personal Information and Virtual Identities (Paperback): Adam Henschke Ethics in an Age of Surveillance - Personal Information and Virtual Identities (Paperback)
Adam Henschke
R982 Discovery Miles 9 820 Ships in 10 - 15 working days

People increasingly live online, sharing publicly what might have once seemed private, but at the same time are enraged by extremes of government surveillance and the corresponding invasion into our private lives. In this enlightening work, Adam Henschke re-examines privacy and property in the age of surveillance in order to understand not only the importance of these social conventions, but also their moral relevance. By analyzing identity and information, and presenting a case for a relation between the two, he explains the moral importance of virtual identities and offers an ethically robust solution to designing surveillance technologies. This book should be read by anyone interested in surveillance technology, new information technology more generally, and social concepts like privacy and property.

Situational Privacy and Self-Disclosure - Communication Processes in Online Environments (Paperback, Softcover reprint of the... Situational Privacy and Self-Disclosure - Communication Processes in Online Environments (Paperback, Softcover reprint of the original 1st ed. 2019)
Philipp K. Masur
R2,683 Discovery Miles 26 830 Ships in 18 - 22 working days

Using both a theoretical argumentation and an empirical investigation, this book rationalizes the view that in order to understand people's privacy perceptions and behaviors, a situational perspective needs to be adopted. To this end, the book is divided into three parts. Part I advances the theory of situational privacy and self-disclosure by discussing impacts of new information and communication technologies on traditional theories of privacy and self-disclosure. Based on five basic suppositions, it describes three major processes of the theory: pre-situational privacy regulations processes, situational privacy perception and self-disclosure processes, and post-situational evaluation processes. Next, Part II presents the application of the theory to smartphone-based communication. It first analyses how people choose certain communication environments on their smartphones, how they manipulate them, and how these external factors affect self-disclosure within these environments. It then details a multi-method study conducted to test the derived assumptions and discusses the obtained results. Part III reflects on the overall implications of the theory, summarizes the major findings and lastly considers possible extensions and perspectives on future research. Intended mainly for researchers in privacy and communication studies, the book offers privacy scholars a systematic review of both classic and contemporary theories of privacy and self-disclosure. At the same time, communication scholars benefit from an additional methodological discussion of the mobile experience sampling method, which provides an invaluable approach to measuring situational communication processes.

Handbook of Mobile Data Privacy (Paperback, Softcover reprint of the original 1st ed. 2018): Aris Gkoulalas-Divanis, Claudio... Handbook of Mobile Data Privacy (Paperback, Softcover reprint of the original 1st ed. 2018)
Aris Gkoulalas-Divanis, Claudio Bettini
R3,372 Discovery Miles 33 720 Ships in 18 - 22 working days

This handbook covers the fundamental principles and theory, and the state-of-the-art research, systems and applications, in the area of mobility data privacy. It is primarily addressed to computer science and statistics researchers and educators, who are interested in topics related to mobility privacy. This handbook will also be valuable to industry developers, as it explains the state-of-the-art algorithms for offering privacy. By discussing a wide range of privacy techniques, providing in-depth coverage of the most important ones, and highlighting promising avenues for future research, this handbook also aims at attracting computer science and statistics students to this interesting field of research. The advances in mobile devices and positioning technologies, together with the progress in spatiotemporal database research, have made possible the tracking of mobile devices (and their human companions) at very high accuracy, while supporting the efficient storage of mobility data in data warehouses, which this handbook illustrates. This has provided the means to collect, store and process mobility data of an unprecedented quantity, quality and timeliness. As ubiquitous computing pervades our society, user mobility data represents a very useful but also extremely sensitive source of information. On one hand, the movement traces that are left behind by the mobile devices of the users can be very useful in a wide spectrum of applications such as urban planning, traffic engineering, and environmental pollution management. On the other hand, the disclosure of mobility data to third parties may severely jeopardize the privacy of the users whose movement is recorded, leading to abuse scenarios such as user tailing and profiling. A significant amount of research work has been conducted in the last 15 years in the area of mobility data privacy and important research directions, such as privacy-preserving mobility data management, privacy in location sensing technologies and location-based services, privacy in vehicular communication networks, privacy in location-based social networks, privacy in participatory sensing systems which this handbook addresses.. This handbook also identifies important privacy gaps in the use of mobility data and has resulted to the adoption of international laws for location privacy protection (e.g., in EU, US, Canada, Australia, New Zealand, Japan, Singapore), as well as to a large number of interesting technologies for privacy-protecting mobility data, some of which have been made available through open-source systems and featured in real-world applications.

Compressed Sensing for Privacy-Preserving Data Processing (Paperback, 1st ed. 2019): Matteo Testa, Diego Valsesia, Tiziano... Compressed Sensing for Privacy-Preserving Data Processing (Paperback, 1st ed. 2019)
Matteo Testa, Diego Valsesia, Tiziano Bianchi, Enrico Magli
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

The objective of this book is to provide the reader with a comprehensive survey of the topic compressed sensing in information retrieval and signal detection with privacy preserving functionality without compromising the performance of the embedding in terms of accuracy or computational efficiency. The reader is guided in exploring the topic by first establishing a shared knowledge about compressed sensing and how it is used nowadays. Then, clear models and definitions for its use as a cryptosystem and a privacy-preserving embedding are laid down, before tackling state-of-the-art results for both applications. The reader will conclude the book having learned that the current results in terms of security of compressed techniques allow it to be a very promising solution to many practical problems of interest. The book caters to a broad audience among researchers, scientists, or engineers with very diverse backgrounds, having interests in security, cryptography and privacy in information retrieval systems. Accompanying software is made available on the authors' website to reproduce the experiments and techniques presented in the book. The only background required to the reader is a good knowledge of linear algebra, probability and information theory.

Digital Transformation: Challenges and Opportunities - 16th Workshop on e-Business, WeB 2017, Seoul, South Korea, December 10,... Digital Transformation: Challenges and Opportunities - 16th Workshop on e-Business, WeB 2017, Seoul, South Korea, December 10, 2017, Revised Selected Papers (Paperback, 1st ed. 2018)
Wooje Cho, Ming Fan, Michael J. Shaw, Byungjoon Yoo, Han Zhang
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book constitutes revised selected papers from the 16th Workshop on e-Business, WeB 2017, which took place in Seoul, South Korea, in December 2017. The purpose of WeB is to provide an open forum for e-Business researchers and practitioners world-wide, to share topical research findings, explore novel ideas, discuss success stories and lessons learned, map out major challenges, and collectively chart future directions for e-Business. The WeB 2017 theme was "Digital transformation: challenges and opportunities". The 11 papers presented in this volume were carefully reviewed and selected from 43 submissions. These are original research articles with a broad coverage of behavioral issues on consumers, citizens, businesses, industries and governments, ranging from technical to strategic issues.

Privacy in Statistical Databases - UNESCO Chair in Data Privacy, International Conference, PSD 2018, Valencia, Spain, September... Privacy in Statistical Databases - UNESCO Chair in Data Privacy, International Conference, PSD 2018, Valencia, Spain, September 26-28, 2018, Proceedings (Paperback, 1st ed. 2018)
Josep Domingo-Ferrer, Francisco Montes
R1,769 Discovery Miles 17 690 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the International Conference on Privacy in Statistical Databases, PSD 2018, held in Valencia, Spain, in September 2018 under the sponsorship of the UNESCO Chair in Data Privacy. The 23 revised full papers presented were carefully reviewed and selected from 42 submissions. The papers are organized into the following topics: tabular data protection; synthetic data; microdata and big data masking; record linkage; and spatial and mobility data. Chapter "SwapMob: Swapping Trajectories for Mobility Anonymization" is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.

Web Services - ICWS 2018 - 25th International Conference, Held as Part of the Services Conference Federation, SCF 2018,... Web Services - ICWS 2018 - 25th International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings (Paperback, 1st ed. 2018)
Hai Jin, Qingyang Wang, Liang-Jie Zhang
R1,472 Discovery Miles 14 720 Ships in 18 - 22 working days

This volume constitutes the proceedings of the 16th International Conference on Web Services, ICWS 2018, held as Part of SCF 2018 in Seattle, WA, USA in June 2018. The 31 full papers together with 1 short paper published in this volume were carefully reviewed and selected from 116 submissions. They are organized in topical sections such as Web Services, RESTful web services, Web Services Description Langugage, Universal Description Discovery and Integration, Service discovery and interfaces, Domain-specific security and privacy architectures, Location bases services, Sercurity Services and Markup languages.

Personal Analytics and Privacy. An Individual and Collective Perspective - First International Workshop, PAP 2017, Held in... Personal Analytics and Privacy. An Individual and Collective Perspective - First International Workshop, PAP 2017, Held in Conjunction with ECML PKDD 2017, Skopje, Macedonia, September 18, 2017, Revised Selected Papers (Paperback, 1st ed. 2017)
Riccardo Guidotti, Anna Monreale, Dino Pedreschi, Serge Abiteboul
R1,846 Discovery Miles 18 460 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the First International Workshop on Personal Analytics and Privacy, PAP 2017, held in Skopje, Macedonia, in September 2017. The 14 papers presented together with 2 invited talks in this volume were carefully reviewed and selected for inclusion in this book and handle topics such as personal analytics, personal data mining and privacy in the context where real individual data are used for developing a data-driven service, for realizing a social study aimed at understanding nowadays society, and for publication purposes.

Privacy Technologies and Policy - 5th Annual Privacy Forum, APF 2017, Vienna, Austria, June 7-8, 2017, Revised Selected Papers... Privacy Technologies and Policy - 5th Annual Privacy Forum, APF 2017, Vienna, Austria, June 7-8, 2017, Revised Selected Papers (Paperback, 1st ed. 2017)
Erich Schweighofer, Herbert Leitold, Andreas Mitrakas, Kai Rannenberg
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 5th Annual Privacy Forum, APF 2017, held in Vienna, Austria, in June 2017. The 12 revised full papers were carefully selected from 41 submissions on the basis of significance, novelty, and scientific quality. These selected papers are organized in three different chapters corresponding to the conference sessions. The first chapter, "Data Protection Regulation", discusses topics concerning big genetic data, a privacy-preserving European identity ecosystem, the right to be forgotten und the re-use of privacy risk analysis. The second chapter, "Neutralisation and Anonymization", discusses neutralisation of threat actors, privacy by design data exchange between CSIRTs, differential privacy and database anonymization. Finally, the third chapter, "Privacy Policies in Practice", discusses privacy by design, privacy scores, privacy data management in healthcare and trade-offs between privacy and utility.

Network and System Security - 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings... Network and System Security - 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings (Paperback, 1st ed. 2016)
Jia Geng Chen, Vincenzo Piuri, Chunhua Su, Moti Yung
R2,830 Discovery Miles 28 300 Ships in 18 - 22 working days

This book constitutes the proceedings of the 10th International Conference on Network and System Security, NSS 2016, held in Taipei, Taiwan, in September 2016. The 31 full and 4 short papers presented in this volume were carefully reviewed and selected from 105 submissions. They were organized in topical sections named: authentication mechanism; cloud computing security; data mining for security application; privacy-preserving technologies; network security and forensics; searchable encryption; security policy and access control; security protocols, symmetric key cryptography; system security; Web security. The volume also contains one invited paper.

Trust, Privacy and Security in Digital Business - 13th International Conference, TrustBus 2016, Porto, Portugal, September 7-8,... Trust, Privacy and Security in Digital Business - 13th International Conference, TrustBus 2016, Porto, Portugal, September 7-8, 2016, Proceedings (Paperback, 1st ed. 2016)
Sokratis Katsikas, Costas Lambrinoudakis, Steven Furnell
R1,493 Discovery Miles 14 930 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 13th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2016, held in Porto, Portugal, in September 2016 in conjunction with DEXA 2016. The 8 revised full papers presented were carefully reviewed and selected from 18 submissions. The papers are organized in the following topical sections: security, privacy and trust in eServices; security and privacy in cloud computing; privacy requirements; and information audit and trust.

Scam Proof Your Life in the End Times - Justice & Restoration for Christians (Paperback): Steve Cioccolanti Scam Proof Your Life in the End Times - Justice & Restoration for Christians (Paperback)
Steve Cioccolanti
R314 Discovery Miles 3 140 Ships in 18 - 22 working days
Ethics in an Age of Surveillance - Personal Information and Virtual Identities (Hardcover): Adam Henschke Ethics in an Age of Surveillance - Personal Information and Virtual Identities (Hardcover)
Adam Henschke
R3,068 Discovery Miles 30 680 Ships in 10 - 15 working days

People increasingly live online, sharing publicly what might have once seemed private, but at the same time are enraged by extremes of government surveillance and the corresponding invasion into our private lives. In this enlightening work, Adam Henschke re-examines privacy and property in the age of surveillance in order to understand not only the importance of these social conventions, but also their moral relevance. By analyzing identity and information, and presenting a case for a relation between the two, he explains the moral importance of virtual identities and offers an ethically robust solution to designing surveillance technologies. This book should be read by anyone interested in surveillance technology, new information technology more generally, and social concepts like privacy and property.

Exclusive M1 Macbook Pro User Guide - An Exhaustive Step By Step Guide in Mastering the New Apple M1 Chip with MacOS Big Sur... Exclusive M1 Macbook Pro User Guide - An Exhaustive Step By Step Guide in Mastering the New Apple M1 Chip with MacOS Big Sur (Paperback)
Michael Eleazar
R421 Discovery Miles 4 210 Ships in 18 - 22 working days
Password Book With Alphabetical Tabs - Email Address Book with Tabs Alphabetical Password Book Organizer Internet Password... Password Book With Alphabetical Tabs - Email Address Book with Tabs Alphabetical Password Book Organizer Internet Password Logbook Password Journal (Paperback)
Iris Lorry Harrlez
R236 R221 Discovery Miles 2 210 Save R15 (6%) Ships in 18 - 22 working days
Cinderella's Stick - A Fairy Tale for Digital Preservation (Hardcover, 1st ed. 2018): Yannis Tzitzikas, Yannis Marketakis Cinderella's Stick - A Fairy Tale for Digital Preservation (Hardcover, 1st ed. 2018)
Yannis Tzitzikas, Yannis Marketakis
R1,529 R598 Discovery Miles 5 980 Save R931 (61%) Ships in 9 - 17 working days

This book explains the main problems related to digital preservation using examples based on a modern version of the well-known Cinderella fairy tale. Digital preservation is the endeavor to protect digital material against loss, corruption, hardware/software technology changes, and changes in the knowledge of the community. he structure of the book is modular, with each chapter consisting of two parts: the episode and the technical background. The episodes narrate the story in chronological order, exactly as in a fairy tale. In addition to the story itself, each episode is related to one or more digital preservation problems, which are discussed in the technical background section of the chapter. To reveal a more general and abstract formulation of these problems, the notion of pattern is used. Each pattern has a name, a summary of the problem, a narrative describing an attempt to solve the problem, an explanation of what could have been done to avoid or alleviate this problem, some lessons learned, and lastly, links to related patterns discussed in other chapters. The book is intended for anyone wanting to understand the problems related to digital preservation, even if they lack the technical background. It explains the technical details at an introductory level, provides references to the main approaches (or solutions) currently available for tackling related problems, and is rounded out by questions and exercises appropriate for computer engineers and scientists. In addition, the book's website, maintained by the authors, presents the contents of Cinderella's "real USB stick," and includes links to various tools and updates.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Fundamentals of Speaker Recognition
Homayoon Beigi Hardcover R3,738 Discovery Miles 37 380
Theories of Generalised Functions…
R.F. Hoskins, J S Pinto Paperback R1,809 Discovery Miles 18 090
The Handbook of Metabolic Phenotyping
John C. Lindon, Jeremy K. Nicholson, … Paperback R4,944 Discovery Miles 49 440
Tales of Justice and Rituals of Divine…
Aditya Malik Hardcover R3,570 Discovery Miles 35 700
The Proceedings of the International…
Ming Jiang, Nathan Ida, … Hardcover R5,211 Discovery Miles 52 110
The Upanishads
Swami Paramananda Hardcover R442 Discovery Miles 4 420
Chalcogenide Glasses - Preparation…
J-L. Adam, X. Zhang Hardcover R5,824 Discovery Miles 58 240
Geometric Methods in PDE's
Giovanna Citti, Maria Manfredini, … Hardcover R4,297 R3,496 Discovery Miles 34 960
Freestyle Cooking With Chef Ollie
Oliver Swart Hardcover R450 R402 Discovery Miles 4 020
An Invitation to Unbounded…
Konrad Schmudgen Hardcover R1,803 Discovery Miles 18 030

 

Partners