0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (126)
  • R250 - R500 (244)
  • R500+ (794)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

How to Destroy Surveillance Capitalism (Paperback): Cory Doctorow How to Destroy Surveillance Capitalism (Paperback)
Cory Doctorow
R291 R270 Discovery Miles 2 700 Save R21 (7%) Ships in 18 - 22 working days
Decision and Game Theory for Security - 6th International Conference, GameSec 2015, London, UK, November 4-5, 2015, Proceedings... Decision and Game Theory for Security - 6th International Conference, GameSec 2015, London, UK, November 4-5, 2015, Proceedings (Paperback, 1st ed. 2015)
Arman (MHR) Khouzani, Emmanouil Panaousis, George Theodorakopoulos
R2,375 Discovery Miles 23 750 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 6th International Conference on Decision and Game Theory for Security, GameSec 2015, held in London, UK, in November 2015. The 16 revised full papers presented together with 5 short papers were carefully reviewed and selected from 37 submissions. Game and decision theory has emerged as a valuable systematic framework with powerful analytical tools in dealing with the intricacies involved in making sound and sensible security decisions. For instance, game theory provides methodical approaches to account for interdependencies of security decisions, the role of hidden and asymmetric information, the perception of risks and costs in human behaviour, the incentives/limitations of the attackers, and much more. Combined with our classical approach to computer and network security, and drawing from various fields such as economic, social and behavioural sciences, game and decision theory is playing a fundamental role in the development of the pillars of the "science of security".

Cloud Computing and Security - Second International Conference, ICCCS 2016, Nanjing, China, July 29-31, 2016, Revised Selected... Cloud Computing and Security - Second International Conference, ICCCS 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part I (Paperback, 1st ed. 2016)
Xingming Sun, Alex Liu, Han-Chieh Chao, Elisa Bertino
R2,714 Discovery Miles 27 140 Ships in 18 - 22 working days

This two volume set LNCS 10039 and LNCS 10040 constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Cloud Computing and Security, ICCCS 2016, held in Nanjing, China, during July 29-31, 2016. The 97 papers of these volumes were carefully reviewed and selected from 272 submissions. The papers are organized in topical sections such as: Information Hiding, Cloud Computing, Cloud Security, IOT Applications, Multimedia Applications, Multimedia Security and Forensics.

Cloud Computing and Security - Second International Conference, ICCCS 2016, Nanjing, China, July 29-31, 2016, Revised Selected... Cloud Computing and Security - Second International Conference, ICCCS 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part II (Paperback, 1st ed. 2016)
Xingming Sun, Alex Liu, Han-Chieh Chao, Elisa Bertino
R3,095 Discovery Miles 30 950 Ships in 18 - 22 working days

This two volume set LNCS 10039 and 10040 constitutes the refereed post-conference proceedings of the Second International Conference on Cloud Computing and Security, ICCCS 2016, held in Nanjing, China, during July 29-31, 2016. The 97 papers of these volumes were carefully reviewed and selected from 272 submissions. The papers are organized in topical sections such as: Information Hiding, Cloud Computing, Cloud Security, IOT Applications, Multimedia Applications, Multimedia Security and Forensics.

Future Data and Security Engineering - Third International Conference, FDSE 2016, Can Tho City, Vietnam, November 23-25, 2016,... Future Data and Security Engineering - Third International Conference, FDSE 2016, Can Tho City, Vietnam, November 23-25, 2016, Proceedings (Paperback, 1st ed. 2016)
Tran Khanh Dang, Roland Wagner, Josef Kung, Nam Thoai, Makoto Takizawa, …
R2,534 Discovery Miles 25 340 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Third International Conference on Future Data and Security Engineering, FDSE 2016, held in Can Tho City, Vietnam, in November 2016. The 27 revised full papers and 2 short papers presented were carefully reviewed and selected from 115 submissions. They have been organized in the following topical sections: Big Data Analytics and Cloud Data Management; Internet of Things and Applications; Security and Privacy Engineering; Data Protection and Data Hiding; Advances in Authentication and Data Access Control; Access Control in NoSQL and Big Data; Context-based Data Analysis and Applications; Emerging Data Management Systems and Applications.

Provable Security - 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedings (Paperback,... Provable Security - 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedings (Paperback, 1st ed. 2016)
Liqun Chen, Jinguang Han
R2,439 Discovery Miles 24 390 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 10th International Conference on Provable Security, ProvSec 2016, held in Nanjing, China, in November 2016. The 17 full papers and 6 short papers presented were carefully reviewed and selected from 79 submissions. The papers are grouped in topical sections on attribute/role-based cryptography, data in cloud, searchable encryption, key management, encryption, leakage analysis, homomorphic encryption.

Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I (Paperback, 1st ed. 2016)
Jung Hee Cheon, Tsuyoshi Takagi
R2,834 Discovery Miles 28 340 Ships in 18 - 22 working days

The two-volume set LNCS 10031 and LNCS 10032 constitutes the refereed proceedings of the 22nd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2016, held in Hanoi, Vietnam, in December 2016. The 67 revised full papers and 2 invited talks presented were carefully selected from 240 submissions. They are organized in topical sections on Mathematical Analysis; AES and White-Box; Hash Function; Randomness; Authenticated Encryption; Block Cipher; SCA and Leakage Resilience; Zero Knowledge; Post Quantum Cryptography; Provable Security; Digital Signature; Functional and Homomorphic Cryptography; ABE and IBE; Foundation; Cryptographic Protocol; Multi-Party Computation.

Decision and Game Theory for Security - 7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016,... Decision and Game Theory for Security - 7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings (Paperback, 1st ed. 2016)
Quanyan Zhu, Tansu Alpcan, Emmanouil Panaousis, Milind Tambe, William Casey
R2,661 Discovery Miles 26 610 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 7th International Conference on Decision and Game Theory for Security, GameSec 2016, held in New York, NY, USA, in November 2016. The 18 revised full papers presented together with 8 short papers and 5 poster papers were carefully reviewed and selected from 40 submissions. The papers are organized in topical sections on network security; security risks and investments; special track-validating models; decision making for privacy; security games; incentives and cybersecurity mechanisms; and intrusion detection and information limitations in security.

Firewalls Don't Stop Dragons - A Step-by-Step Guide to Computer Security and Privacy for Non-Techies (Paperback, 5th ed.):... Firewalls Don't Stop Dragons - A Step-by-Step Guide to Computer Security and Privacy for Non-Techies (Paperback, 5th ed.)
Carey Parker
R979 R858 Discovery Miles 8 580 Save R121 (12%) Ships in 18 - 22 working days

Rely on this practical, comprehensive guide to significantly improve your cyber safety and data privacy. This book was written expressly for regular, everyday people -- though even technically savvy readers will find many useful tips here. This book contains everything you need to protect yourself-step by step, without judgment, and with as little jargon as possible. Protecting your digital domain is much like defending a medieval castle. Wide moats, towering walls and trained guards provide defense in depth, safeguarding the people and property within against the most common threats. But attempting to dragon-proof your castle would be counterproductive and costly. The goal of this book is to keep your devices and data safe from the most likely and impactful hazards - not a targeted attack by the NSA. Like wearing seat belts and sunscreen in the real world, there are dozens of simple, effective precautions we need to take in the virtual world. Author Carey Parker has structured this book to give you maximum benefit with minimum effort. If you just want to know what you need to do, each chapter includes a detailed checklist of expert tips. But the book also explains why you need to do these things, using entertaining analogies and straightforward explanations. This revised and expanded fifth edition includes: Updated for Windows 11, macOS 13 (Ventura), iOS 16 and Android 13. Updated recommendations for most secure and private products. Over 200 tips with complete step-by-step instructions and screenshots. What You Will Learn Maximize your computer and smartphone security. Minimize your vulnerabilities and data footprint. Solve your password problems and use two-factor authentication. Browse the web safely and confidently with a secure, private browser. Shop and bank online with maximum security and peace of mind. Defend against identity theft, ransomware and online scams. Safeguard your children online, at home and in school. Block online tracking, data mining and malicious online ads. Send files and messages with end-to-end encryption. Secure your home network and keep your smart devices from spying on you. Create automated backups of all your devices. Learn how to deal with account hacks, data. breaches and viruses. Understand how computers, the internet, VPNs and encryption really work And much more!

Automated Security Management (Paperback, Softcover reprint of the original 1st ed. 2013): Ehab Al-Shaer, Xinming Ou, Geoffrey... Automated Security Management (Paperback, Softcover reprint of the original 1st ed. 2013)
Ehab Al-Shaer, Xinming Ou, Geoffrey Xie
R1,878 Discovery Miles 18 780 Ships in 18 - 22 working days

In this contributed volume, leading international researchers explore configuration modeling and checking, vulnerability and risk assessment, configuration analysis, and diagnostics and discovery. The authors equip readers to understand automated security management systems and techniques that increase overall network assurability and usability. These constantly changing networks defend against cyber attacks by integrating hundreds of security devices such as firewalls, IPSec gateways, IDS/IPS, authentication servers, authorization/RBAC servers, and crypto systems. Automated Security Management presents a number of topics in the area of configuration automation. Early in the book, the chapter authors introduce modeling and validation of configurations based on high-level requirements and discuss how to manage the security risk as a result of configuration settings of network systems. Later chapters delve into the concept of configuration analysis and why it is important in ensuring the security and functionality of a properly configured system. The book concludes with ways to identify problems when things go wrong and more. A wide range of theoretical and practical content make this volume valuable for researchers and professionals who work with network systems.

Constructive Side-Channel Analysis and Secure Design - 6th International Workshop, COSADE 2015, Berlin, Germany, April 13-14,... Constructive Side-Channel Analysis and Secure Design - 6th International Workshop, COSADE 2015, Berlin, Germany, April 13-14, 2015. Revised Selected Papers (Paperback, 1st ed. 2015)
Stefan Mangard, Axel Y. Poschmann
R2,111 Discovery Miles 21 110 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Workshop, COSADE 2015, held in Berlin, Germany, in April 2015. The 17 revised full papers presented were carefully selected from 48 submissions. the focus of this workshop was on following topics: side-channel attacks, FPGA countermeasures, timing attacks and countermeasures, fault attacks, countermeasures, and Hands-on Side-channel analysis.

Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security - 10th International Conference, ICGS3... Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security - 10th International Conference, ICGS3 2015, London, UK, September 15-17, 2015. Proceedings (Paperback, 1st ed. 2015)
Hamid Jahankhani, Alex Carlile, Babak Akhgar, Amie Taal, Ali G. Hessami, …
R2,354 Discovery Miles 23 540 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 10th International Conference on Global Security, Safety and Sustainability, ICGS3 2015, held in London, UK, in September 2015. The 31 revised full papers presented were carefully reviewed and selected from 57 submissions. The papers focus on the challenges of complexity, rapid pace of change and risk/opportunity issues associated with the 21st century living style, systems and infrastructures.

Cryptography and Information Security in the Balkans - First International Conference, BalkanCryptSec 2014, Istanbul, Turkey,... Cryptography and Information Security in the Balkans - First International Conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16-17, 2014, Revised Selected Papers (Paperback, 1st ed. 2015)
Berna Ors, Bart Preneel
R2,058 Discovery Miles 20 580 Ships in 18 - 22 working days

This book constitutes revised selected papers from the First International Conference on Cryptography and Information Security in the Balkans, Balkan Crypt Sec 2014, held in Istanbul, Turkey, in October 2014. The 15 papers presented in this volume were carefully reviewed and selected from 36 submissions. They were organized in topical sections named: symmetric cryptography, cryptographic hardware, cryptographic protocols and public key cryptography. The book also contains one invited talk in full paper length.

Trustworthy Computing and Services - International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014, Revised... Trustworthy Computing and Services - International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014, Revised Selected papers (Paperback, 2015 ed.)
Lu Yueming, Wu Xu, Zhang XI
R2,491 Discovery Miles 24 910 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the International Standard Conference on Trustworthy Computing and Services, ISCTCS 2014, held in Beijing, China, in November 2014. The 51 revised full papers presented were carefully reviewed and selected from 279 submissions. The topics covered are architecture for trusted computing systems; trusted computing platform; trusted system building; network and protocol security; mobile network security; network survivability, other critical theories and standard systems; credible assessment; credible measurement and metrics; trusted systems; trusted networks; trusted mobile networks; trusted routing; trusted software; trusted operating systems; trusted storage; fault-tolerant computing and other key technologies; trusted e-commerce and e-government; trusted logistics; trusted internet of things; trusted cloud and other trusted services and applications.

I'll Never Forget You - Internet Password Manager to Keep Your Private Information Safe - With A-Z Tabs and Flower Design... I'll Never Forget You - Internet Password Manager to Keep Your Private Information Safe - With A-Z Tabs and Flower Design (Paperback)
Secure Publishing
R260 Discovery Miles 2 600 Ships in 18 - 22 working days
The Gentrification of the Internet - How to Reclaim Our Digital Freedom (Hardcover): Jessa Lingel The Gentrification of the Internet - How to Reclaim Our Digital Freedom (Hardcover)
Jessa Lingel
R468 Discovery Miles 4 680 Ships in 10 - 15 working days

How we lost control of the internet-and how to win it back. The internet has become a battleground. Although it was unlikely to live up to the hype and hopes of the 1990s, only the most skeptical cynics could have predicted the World Wide Web as we know it today: commercial, isolating, and full of, even fueled by, bias. This was not inevitable. The Gentrification of the Internet argues that much like our cities, the internet has become gentrified, dominated by the interests of business and capital rather than the interests of the people who use it. Jessa Lingel uses the politics and debates of gentrification to diagnose the massive, systemic problems blighting our contemporary internet: erosions of privacy and individual ownership, small businesses wiped out by wealthy corporations, the ubiquitous paywall. But there are still steps we can take to reclaim the heady possibilities of the early internet. Lingel outlines actions that internet activists and everyday users can take to defend and secure more protections for the individual and to carve out more spaces of freedom for the people-not businesses-online.

Database Security XII - Status and Prospects (Paperback, Softcover reprint of the original 1st ed. 1999): Sushil Jajodia Database Security XII - Status and Prospects (Paperback, Softcover reprint of the original 1st ed. 1999)
Sushil Jajodia
R4,018 Discovery Miles 40 180 Ships in 18 - 22 working days

New technology is always evolving and companies must have appropriate security for their business to be able to keep up-to-date with the changes. With the rapid growth in internet and www facilities, database security will always be a key topic in business and in the public sector and has implications for the whole of society. Database Security Volume XII covers issues related to security and privacy of information in a wide range of applications, including: * Electronic Commerce * Informational Assurances * Workflow * Privacy * Policy Modeling * Mediation * Information Warfare Defense * Multilevel Security * Role-based Access Controls * Mobile Databases * Inference * Data Warehouses and Data Mining. This book contains papers and panel discussions from the Twelfth Annual Working Conference on Database Security, organized by the International Federation for Information Processing (IFIP) and held July 15-17, 1998 in Chalkidiki, Greece. Database Security Volume XII will prove invaluable reading for faculty and advanced students as well as for industrial researchers and practitioners working in the area of database security research and development.

Black Hat Banking - A Hacker's Guide to Financial Security & Privacy (Paperback): M Blaine Faulkner Black Hat Banking - A Hacker's Guide to Financial Security & Privacy (Paperback)
M Blaine Faulkner
R354 Discovery Miles 3 540 Ships in 18 - 22 working days
Internet of Things Security - Challenges, Advances, and Analytics (Paperback): Chintan Patel, Nishant Doshi Internet of Things Security - Challenges, Advances, and Analytics (Paperback)
Chintan Patel, Nishant Doshi
R1,776 Discovery Miles 17 760 Ships in 10 - 15 working days

Most of the devices in the Internet of Things will be battery powered sensor devices. All the operations done on battery powered devices require minimum computation. Secure algorithms like RSA become useless in the Internet of Things environment. Elliptic curve based cryptography emerges as a best solution for this problem because it provides higher security in smaller key size compare to RSA. This book focuses on the use of Elliptic Curve Cryptography with different authentication architectures and authentication schemes using various security algorithms. It also includes a review of the math required for security and understanding Elliptic Curve Cryptography.

Systems Security Engineering - Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems... Systems Security Engineering - Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems (Paperback)
National Institute of St And Technology, U. S. Department of Commerce
R531 Discovery Miles 5 310 Ships in 18 - 22 working days
Tor - Accessing The Deep Web & Dark Web With Tor: How To Set Up Tor, Stay Anonymous Online, Avoid NSA Spying & Access The Deep... Tor - Accessing The Deep Web & Dark Web With Tor: How To Set Up Tor, Stay Anonymous Online, Avoid NSA Spying & Access The Deep Web & Dark Web (Paperback)
Jack Jones
R382 Discovery Miles 3 820 Ships in 18 - 22 working days
Hacking and Pen Testing - Become an Expert in Computer Hacking and Security (Paperback): James Smith Hacking and Pen Testing - Become an Expert in Computer Hacking and Security (Paperback)
James Smith
R252 Discovery Miles 2 520 Ships in 18 - 22 working days
Blackstone's Guide to the Identity Cards Act 2006 (Paperback, New): John Wadham, Caoilfhionn Gallagher, Nicole Chrolavicius Blackstone's Guide to the Identity Cards Act 2006 (Paperback, New)
John Wadham, Caoilfhionn Gallagher, Nicole Chrolavicius
R1,920 Discovery Miles 19 200 Ships in 10 - 15 working days

The Blackstone's Guide Series delivers concise and accessible books covering the latest legislation changes and amendments. Published within weeks of an Act, they offer expert commentary by leading names on the effects, extent and scope of the legislation, plus a full copy of the Act itself. They offer a cost-effective solution to key information needs and are the perfect companion for any practitioner needing to get up to speed with the latest changes. The Identity Cards Act 2006 is a major piece of legislation which will fundamentally change the relationship between the state and the individual for people of all nationalities residing in the UK for more than three months. The Act will affect the operation of much existing legislation, including; the Data Protection Act 1998; the Police and Criminal Evidence Act 1984; the Regulation of Investigatory Powers Act 2000; the Race Relations Act 1976; the Immigration and Asylum Act 1999, and the Asylum and Immigration (Treatment of Claimants) Act 2004. The Act will have an impact on a wide range of legal areas, including; asylum and immigration; data protection and freedom of information; privacy; criminal; human rights; and civil liberties; and will introduce the following; - A complex range of new civil and criminal penalties - a new Commissioner's Office - New ways of working for those providing public services, such as the police, the NHS, the Passport Service, and benefit workers This Guide is written by two experienced practitioners currently based at Liberty, the National Council for Civil Liberties. Structured in a clear and logical way following the parts of the Act, it provides an up-to-date and informative guide, making it an essential purchase for practitioners and organisations working in a number of legal areas.

Big Book of Spyware (Paperback): Pierre Zollo Big Book of Spyware (Paperback)
Pierre Zollo
R899 Discovery Miles 8 990 Ships in 18 - 22 working days
Web Security Exploits (Paperback): Bryant Wan, Nicholas Dworak, Elden Federgreen Web Security Exploits (Paperback)
Bryant Wan, Nicholas Dworak, Elden Federgreen
R873 Discovery Miles 8 730 Ships in 18 - 22 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Drug Use and Social Change - The…
M. Shiner Hardcover R2,371 Discovery Miles 23 710
Pristine Bamboo Lid Glass Jar (650ml)
R139 R112 Discovery Miles 1 120
Marijuana Legalization - What Everyone…
Jonathan P Caulkins, Angela Hawken, … Hardcover R1,827 Discovery Miles 18 270
Pyrex Cook & Store Round Dish with…
R228 Discovery Miles 2 280
Media Studies: Volume 3 - Media Content…
Pieter J. Fourie Paperback  (1)
R908 R807 Discovery Miles 8 070
Annual Reports on NMR Spectroscopy…
Graham A. Webb Hardcover R4,803 Discovery Miles 48 030
All Caps - Stories That Justify an…
Craig Colby Hardcover R1,053 R901 Discovery Miles 9 010
New Approaches in Biomedical…
Katrin Kneipp, Ricardo Aroca, … Hardcover R3,257 Discovery Miles 32 570
Underworld
Fanie Viljoen Paperback R295 R277 Discovery Miles 2 770
Motocross and Off-Road Motorcycle Setup…
Mark Thompson Paperback R630 R574 Discovery Miles 5 740

 

Partners