Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection
The definitive guide for ensuring data privacy and GDPR compliance Privacy regulation is increasingly rigorous around the world and has become a serious concern for senior management of companies regardless of industry, size, scope, and geographic area. The Global Data Protection Regulation (GDPR) imposes complex, elaborate, and stringent requirements for any organization or individuals conducting business in the European Union (EU) and the European Economic Area (EEA)--while also addressing the export of personal data outside of the EU and EEA. This recently-enacted law allows the imposition of fines of up to 5% of global revenue for privacy and data protection violations. Despite the massive potential for steep fines and regulatory penalties, there is a distressing lack of awareness of the GDPR within the business community. A recent survey conducted in the UK suggests that only 40% of firms are even aware of the new law and their responsibilities to maintain compliance. The Data Privacy and GDPR Handbook helps organizations strictly adhere to data privacy laws in the EU, the USA, and governments around the world. This authoritative and comprehensive guide includes the history and foundation of data privacy, the framework for ensuring data privacy across major global jurisdictions, a detailed framework for complying with the GDPR, and perspectives on the future of data collection and privacy practices. Comply with the latest data privacy regulations in the EU, EEA, US, and others Avoid hefty fines, damage to your reputation, and losing your customers Keep pace with the latest privacy policies, guidelines, and legislation Understand the framework necessary to ensure data privacy today and gain insights on future privacy practices The Data Privacy and GDPR Handbook is an indispensable resource for Chief Data Officers, Chief Technology Officers, legal counsel, C-Level Executives, regulators and legislators, data privacy consultants, compliance officers, and audit managers.
The PIPA provides a new right to individuals in Bermuda and brings the country in line with international standards of privacy protection. The PIPA "The path to compliance; the exercise of rights" provides the reader with a practical guide to the Act both from the perspective of organisations that must comply with its requirements and individuals who might benefit for its protection. It has been written in plain English with examples and suggestions where relevant
This two volume set LNCS 10039 and LNCS 10040 constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Cloud Computing and Security, ICCCS 2016, held in Nanjing, China, during July 29-31, 2016. The 97 papers of these volumes were carefully reviewed and selected from 272 submissions. The papers are organized in topical sections such as: Information Hiding, Cloud Computing, Cloud Security, IOT Applications, Multimedia Applications, Multimedia Security and Forensics.
This two volume set LNCS 10039 and 10040 constitutes the refereed post-conference proceedings of the Second International Conference on Cloud Computing and Security, ICCCS 2016, held in Nanjing, China, during July 29-31, 2016. The 97 papers of these volumes were carefully reviewed and selected from 272 submissions. The papers are organized in topical sections such as: Information Hiding, Cloud Computing, Cloud Security, IOT Applications, Multimedia Applications, Multimedia Security and Forensics.
This book constitutes the refereed proceedings of the Third International Conference on Future Data and Security Engineering, FDSE 2016, held in Can Tho City, Vietnam, in November 2016. The 27 revised full papers and 2 short papers presented were carefully reviewed and selected from 115 submissions. They have been organized in the following topical sections: Big Data Analytics and Cloud Data Management; Internet of Things and Applications; Security and Privacy Engineering; Data Protection and Data Hiding; Advances in Authentication and Data Access Control; Access Control in NoSQL and Big Data; Context-based Data Analysis and Applications; Emerging Data Management Systems and Applications.
This book constitutes the refereed proceedings of the 10th International Conference on Provable Security, ProvSec 2016, held in Nanjing, China, in November 2016. The 17 full papers and 6 short papers presented were carefully reviewed and selected from 79 submissions. The papers are grouped in topical sections on attribute/role-based cryptography, data in cloud, searchable encryption, key management, encryption, leakage analysis, homomorphic encryption.
This book constitutes the refereed proceedings of the 7th International Conference on Decision and Game Theory for Security, GameSec 2016, held in New York, NY, USA, in November 2016. The 18 revised full papers presented together with 8 short papers and 5 poster papers were carefully reviewed and selected from 40 submissions. The papers are organized in topical sections on network security; security risks and investments; special track-validating models; decision making for privacy; security games; incentives and cybersecurity mechanisms; and intrusion detection and information limitations in security.
Federal Cloud Computing: The Definitive Guide for Cloud Service Providers, Second Edition offers an in-depth look at topics surrounding federal cloud computing within the federal government, including the Federal Cloud Computing Strategy, Cloud Computing Standards, Security and Privacy, and Security Automation. You will learn the basics of the NIST risk management framework (RMF) with a specific focus on cloud computing environments, all aspects of the Federal Risk and Authorization Management Program (FedRAMP) process, and steps for cost-effectively implementing the Assessment and Authorization (A&A) process, as well as strategies for implementing Continuous Monitoring, enabling the Cloud Service Provider to address the FedRAMP requirement on an ongoing basis. This updated edition will cover the latest changes to FedRAMP program, including clarifying guidance on the paths for Cloud Service Providers to achieve FedRAMP compliance, an expanded discussion of the new FedRAMP Security Control, which is based on the NIST SP 800-53 Revision 4, and maintaining FedRAMP compliance through Continuous Monitoring. Further, a new chapter has been added on the FedRAMP requirements for Vulnerability Scanning and Penetration Testing.
This book constitutes the proceedings of the 10th International Conference on Network and System Security, NSS 2016, held in Taipei, Taiwan, in September 2016. The 31 full and 4 short papers presented in this volume were carefully reviewed and selected from 105 submissions. They were organized in topical sections named: authentication mechanism; cloud computing security; data mining for security application; privacy-preserving technologies; network security and forensics; searchable encryption; security policy and access control; security protocols, symmetric key cryptography; system security; Web security. The volume also contains one invited paper.
Building a Practical Information Security Program provides users with a strategic view on how to build an information security program that aligns with business objectives. The information provided enables both executive management and IT managers not only to validate existing security programs, but also to build new business-driven security programs. In addition, the subject matter supports aspiring security engineers to forge a career path to successfully manage a security program, thereby adding value and reducing risk to the business. Readers learn how to translate technical challenges into business requirements, understand when to "go big or go home," explore in-depth defense strategies, and review tactics on when to absorb risks. This book explains how to properly plan and implement an infosec program based on business strategy and results.
This book constitutes the refereed proceedings of the 13th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2016, held in Porto, Portugal, in September 2016 in conjunction with DEXA 2016. The 8 revised full papers presented were carefully reviewed and selected from 18 submissions. The papers are organized in the following topical sections: security, privacy and trust in eServices; security and privacy in cloud computing; privacy requirements; and information audit and trust.
The Basics of Cyber Safety: Computer and Mobile Device Safety Made Easy presents modern tactics on how to secure computer and mobile devices, including what behaviors are safe while surfing, searching, and interacting with others in the virtual world. The book's author, Professor John Sammons, who teaches information security at Marshall University, introduces readers to the basic concepts of protecting their computer, mobile devices, and data during a time that is described as the most connected in history. This timely resource provides useful information for readers who know very little about the basic principles of keeping the devices they are connected to-or themselves-secure while online. In addition, the text discusses, in a non-technical way, the cost of connectedness to your privacy, and what you can do to it, including how to avoid all kinds of viruses, malware, cybercrime, and identity theft. Final sections provide the latest information on safe computing in the workplace and at school, and give parents steps they can take to keep young kids and teens safe online.
This book offers a comprehensive introduction to relational (SQL) and non-relational (NoSQL) databases. The authors thoroughly review the current state of database tools and techniques, and examine coming innovations. The book opens with a broad look at data management, including an overview of information systems and databases, and an explanation of contemporary database types: SQL and NoSQL databases, and their respective management systems The nature and uses of Big Data A high-level view of the organization of data management Data Modeling and Consistency Chapter-length treatment is afforded Data Modeling in both relational and graph databases, including enterprise-wide data architecture, and formulas for database design. Coverage of languages extends from an overview of operators, to SQL and and QBE (Query by Example), to integrity constraints and more. A full chapter probes the challenges of Ensuring Data Consistency, covering: Multi-User Operation Troubleshooting Consistency in Massive Distributed Data Comparison of the ACID and BASE consistency models, and more System Architecture also gets from its own chapter, which explores Processing of Homogeneous and Heterogeneous Data; Storage and Access Structures; Multi-dimensional Data Structures and Parallel Processing with MapReduce, among other topics. Post-Relational and NoSQL Databases The chapter on post-relational databases discusses the limits of SQL - and what lies beyond, including Multi-Dimensional Databases, Knowledge Bases and and Fuzzy Databases. A final chapter covers NoSQL Databases, along with Development of Non-Relational Technologies, Key-Value, Column-Family and Document Stores XML Databases and Graphic Databases, and more The book includes more than 100 tables, examples and illustrations, and each chapter offers a list of resources for further reading. SQL & NoSQL Databases conveys the strengths and weaknesses of relational and non-relational approaches, and shows how to undertake development for big data applications. The book benefits readers including students and practitioners working across the broad field of applied information technology. This textbook has been recommended and developed for university courses in Germany, Austria and Switzerland.
Information risk management (IRM) is about identifying, assessing, prioritising and treating risks to keep information secure and available. This accessible book is a practical guide to understanding the principles of IRM and developing a strategic approach to an IRM programme. It is the only textbook for the BCS Practitioner Certificate in Information Risk Management and this new edition reflects recent changes to the syllabus and to the wider discipline.
Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis exposes the latest electronic covert communication techniques used by cybercriminals, along with the needed investigative methods for identifying them. The book shows how to use the Internet for legitimate covert communication, while giving investigators the information they need for detecting cybercriminals who attempt to hide their true identity. Intended for practitioners and investigators, the book offers concrete examples on how to communicate securely, serving as an ideal reference for those who truly need protection, as well as those who investigate cybercriminals.
Implementing Digital Forensic Readiness: From Reactive to Proactive Process shows information security and digital forensic professionals how to increase operational efficiencies by implementing a pro-active approach to digital forensics throughout their organization. It demonstrates how digital forensics aligns strategically within an organization's business operations and information security's program. This book illustrates how the proper collection, preservation, and presentation of digital evidence is essential for reducing potential business impact as a result of digital crimes, disputes, and incidents. It also explains how every stage in the digital evidence lifecycle impacts the integrity of data, and how to properly manage digital evidence throughout the entire investigation. Using a digital forensic readiness approach and preparedness as a business goal, the administrative, technical, and physical elements included throughout this book will enhance the relevance and credibility of digital evidence. Learn how to document the available systems and logs as potential digital evidence sources, how gap analysis can be used where digital evidence is not sufficient, and the importance of monitoring data sources in a timely manner. This book offers standard operating procedures to document how an evidence-based presentation should be made, featuring legal resources for reviewing digital evidence.
This book constitutes the refereed proceedings of the 6th International Conference on Decision and Game Theory for Security, GameSec 2015, held in London, UK, in November 2015. The 16 revised full papers presented together with 5 short papers were carefully reviewed and selected from 37 submissions. Game and decision theory has emerged as a valuable systematic framework with powerful analytical tools in dealing with the intricacies involved in making sound and sensible security decisions. For instance, game theory provides methodical approaches to account for interdependencies of security decisions, the role of hidden and asymmetric information, the perception of risks and costs in human behaviour, the incentives/limitations of the attackers, and much more. Combined with our classical approach to computer and network security, and drawing from various fields such as economic, social and behavioural sciences, game and decision theory is playing a fundamental role in the development of the pillars of the "science of security".
Digital Forensics: Threatscape and Best Practices surveys the problems and challenges confronting digital forensic professionals today, including massive data sets and everchanging technology. This book provides a coherent overview of the threatscape in a broad range of topics, providing practitioners and students alike with a comprehensive, coherent overview of the threat landscape and what can be done to manage and prepare for it. Digital Forensics: Threatscape and Best Practices delivers you with incisive analysis and best practices from a panel of expert authors, led by John Sammons, bestselling author of The Basics of Digital Forensics.
Nearly two decades after the EU first enacted data protection rules, key questions about the nature and scope of this EU policy, and the harms it seeks to prevent, remain unanswered. The inclusion of a Right to Data Protection in the EU Charter has increased the salience of these questions, which must be addressed in order to ensure the legitimacy, effectiveness and development of this Charter right and the EU data protection regime more generally. The Foundations of EU Data Protection Law is a timely and important work which sheds new light on this neglected area of law, challenging the widespread assumption that data protection is merely a subset of the right to privacy. By positioning EU data protection law within a comprehensive conceptual framework, it argues that data protection has evolved from a regulatory instrument into a fundamental right in the EU legal order and that this right grants individuals more control over more forms of data than the right to privacy. It suggests that this dimension of the right to data protection should be explicitly recognised, while identifying the practical and conceptual limits of individual control over personal data. At a time when EU data protection law is sitting firmly in the international spotlight, this book offers academics, policy-makers, and practitioners a coherent vision for the future of this key policy and fundamental right in the EU legal order, and how best to realise it.
With this practical book, you will learn proven methods for anonymizing health data to help your organization share meaningful datasets, without exposing patient identity. Leading experts Khaled El Emam and Luk Arbuckle walk you through a risk-based methodology, using case studies from their efforts to de-identify hundreds of datasets. Clinical data is valuable for research and other types of analytics, but making it anonymous without compromising data quality is tricky. This book demonstrates techniques for handling different data types, based on the authors' experiences with a maternal-child registry, inpatient discharge abstracts, health insurance claims, electronic medical record databases, and the World Trade Center disaster registry, among others.Understand different methods for working with cross-sectional and longitudinal datasetsAssess the risk of adversaries who attempt to re-identify patients in anonymized datasetsReduce the size and complexity of massive datasets without losing key information or jeopardizing privacyUse methods to anonymize unstructured free-form text dataMinimize the risks inherent in geospatial data, without omitting critical location-based health informationLook at ways to anonymize coding information in health dataLearn the challenge of anonymously linking related datasets |
You may like...
Research Handbook on Privacy and Data…
Gloria Gonzalez, Rosamunde van Brakel, …
Hardcover
R6,101
Discovery Miles 61 010
Smart-Tech Society - Convenience…
Mark Whitehead, William G.A. Collier
Hardcover
R2,732
Discovery Miles 27 320
Cyber Security and Threats - Concepts…
Information Reso Management Association
Hardcover
R9,960
Discovery Miles 99 600
Handbook of Research on Advanced…
Ahmed J. Obaid, Ghassan H Abdul-Majeed, …
Hardcover
R7,692
Discovery Miles 76 920
Cyber Security and Threats - Concepts…
Information Reso Management Association
Hardcover
R9,960
Discovery Miles 99 600
Digital Forensics and Cyber…
Kyung-Shick Choi, Sinchul Back, …
Paperback
R3,450
Discovery Miles 34 500
EU General Data Protection Regulation…
It Governance Privacy Team
Paperback
R738
Discovery Miles 7 380
|