0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (118)
  • R250 - R500 (227)
  • R500+ (824)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

Hacking with Kali Linux - Penetration Testing Hacking Bible (Paperback): Alex Wagner Hacking with Kali Linux - Penetration Testing Hacking Bible (Paperback)
Alex Wagner
R735 R651 Discovery Miles 6 510 Save R84 (11%) Ships in 10 - 15 working days
The Gentrification of the Internet - How to Reclaim Our Digital Freedom (Hardcover): Jessa Lingel The Gentrification of the Internet - How to Reclaim Our Digital Freedom (Hardcover)
Jessa Lingel
R494 Discovery Miles 4 940 Ships in 10 - 15 working days

How we lost control of the internet-and how to win it back. The internet has become a battleground. Although it was unlikely to live up to the hype and hopes of the 1990s, only the most skeptical cynics could have predicted the World Wide Web as we know it today: commercial, isolating, and full of, even fueled by, bias. This was not inevitable. The Gentrification of the Internet argues that much like our cities, the internet has become gentrified, dominated by the interests of business and capital rather than the interests of the people who use it. Jessa Lingel uses the politics and debates of gentrification to diagnose the massive, systemic problems blighting our contemporary internet: erosions of privacy and individual ownership, small businesses wiped out by wealthy corporations, the ubiquitous paywall. But there are still steps we can take to reclaim the heady possibilities of the early internet. Lingel outlines actions that internet activists and everyday users can take to defend and secure more protections for the individual and to carve out more spaces of freedom for the people-not businesses-online.

Hacking - The Complete Beginner's Guide To Computer Hacking: More On How To Hack Networks and Computer Systems,... Hacking - The Complete Beginner's Guide To Computer Hacking: More On How To Hack Networks and Computer Systems, Information Gathering, Password Cracking, System Entry & Wireless Hacking (Paperback)
Jack Jones
R419 Discovery Miles 4 190 Ships in 10 - 15 working days
Blackstone's Guide to the Identity Cards Act 2006 (Paperback, New): John Wadham, Caoilfhionn Gallagher, Nicole Chrolavicius Blackstone's Guide to the Identity Cards Act 2006 (Paperback, New)
John Wadham, Caoilfhionn Gallagher, Nicole Chrolavicius
R2,038 Discovery Miles 20 380 Ships in 10 - 15 working days

The Blackstone's Guide Series delivers concise and accessible books covering the latest legislation changes and amendments. Published within weeks of an Act, they offer expert commentary by leading names on the effects, extent and scope of the legislation, plus a full copy of the Act itself. They offer a cost-effective solution to key information needs and are the perfect companion for any practitioner needing to get up to speed with the latest changes. The Identity Cards Act 2006 is a major piece of legislation which will fundamentally change the relationship between the state and the individual for people of all nationalities residing in the UK for more than three months. The Act will affect the operation of much existing legislation, including; the Data Protection Act 1998; the Police and Criminal Evidence Act 1984; the Regulation of Investigatory Powers Act 2000; the Race Relations Act 1976; the Immigration and Asylum Act 1999, and the Asylum and Immigration (Treatment of Claimants) Act 2004. The Act will have an impact on a wide range of legal areas, including; asylum and immigration; data protection and freedom of information; privacy; criminal; human rights; and civil liberties; and will introduce the following; - A complex range of new civil and criminal penalties - a new Commissioner's Office - New ways of working for those providing public services, such as the police, the NHS, the Passport Service, and benefit workers This Guide is written by two experienced practitioners currently based at Liberty, the National Council for Civil Liberties. Structured in a clear and logical way following the parts of the Act, it provides an up-to-date and informative guide, making it an essential purchase for practitioners and organisations working in a number of legal areas.

New Dark Age - Technology and the End of the Future (Paperback): James Bridle New Dark Age - Technology and the End of the Future (Paperback)
James Bridle 1
R295 R272 Discovery Miles 2 720 Save R23 (8%) Ships in 5 - 10 working days

We live in times of increasing inscrutability. Our news feeds are filled with unverified, unverifiable speculation, much of it automatically generated by anonymous software. As a result, we no longer understand what is happening around us. Underlying all of these trends is a single idea: the belief that quantitative data can provide a coherent model of the world, and the efficacy of computable information to provide us with ways of acting within it. Yet the sheer volume of information available to us today reveals less than we hope. Rather, it heralds a new Dark Age: a world of ever-increasing incomprehension. In his brilliant new work, leading artist and writer James Bridle offers us a warning against the future in which the contemporary promise of a new technologically assisted Enlightenment may just deliver its opposite: an age of complex uncertainty, predictive algorithms, surveillance, and the hollowing out of empathy. Surveying the history of art, technology and information systems he reveals the dark clouds that gather over discussions of the digital sublime.

Privacy and the Press (Paperback): Joshua Rozenberg Privacy and the Press (Paperback)
Joshua Rozenberg
R1,300 Discovery Miles 13 000 Ships in 10 - 15 working days

Do we need a law of privacy? Should judges be allowed to stop us reading about a footballer's adultery or enjoying pictures of a film star's wedding? Is a super-model's cocaine addiction something that she should be allowed to keep private? And aren't we entitled to walk down the street without having our most intimate activities recorded on security cameras and broadcast to the world? These questions have divided not only the country but also our most senior judges. Drawing a line between justified and unjustified intrusion places great stresses on our legal traditions with some judges favouring an approach which stretches existing laws to grant relief to deserving victims, whilst other judges feel that it would be more honest to simply recognize privacy as a new human right. The latter approach creates further problems: should it be up to Parliament alone to create such a right? And what about free speech? Do the newspapers and the public not have rights too? The issues raised are often highly emotive. Newspapers are not allowed to identify Thompson and Venables, the young men who murdered two-year-old James Bulger, because their lives would be in danger. Nobody may identify Mary Bell, who also killed when she was a child, even though there was no such risk. Will paedophiles be the next to demand lifelong anonymity? Steering a course through this minefield requires a grasp of legal concepts and principles and an understanding of how the law develops. This book explores how the English legal system has had to blend old laws on confidentiality with modern human rights law in order to deal with these problematic issues. Written for non-specialists by one of Britain s best known legal journalists, this book provides a uniquely accessible guide to the legal aspects of this public debate.

IT Audit, Control, and Security (Hardcover, 2nd Ed): R Moeller IT Audit, Control, and Security (Hardcover, 2nd Ed)
R Moeller
R2,414 Discovery Miles 24 140 Ships in 10 - 15 working days

When it comes to computer security, the role of auditors today has never been more crucial. Auditors must ensure that all computers, in particular those dealing with e-business, are secure. The only source for information on the combined areas of computer audit, control, and security, the "IT Audit, Control, and Security" describes the types of internal controls, security, and integrity procedures that management must build into its automated systems. This very timely book provides auditors with the guidance they need to ensure that their systems are secure from both internal and external threats.

Bulletproofing TCP/IP-based Windows NT/2000 Networks (Paperback): G. Held Bulletproofing TCP/IP-based Windows NT/2000 Networks (Paperback)
G. Held
R3,250 Discovery Miles 32 500 Ships in 10 - 15 working days

Find out about TCP/IP-based network attack methods and threats to Windows NT/2000 computers and the preventive measures you can use to protect your infrastructure.
Bulletproofing TCP/IP-based Windows NT/2000 Networks details the use of router access lists, firewalls, virus scanners and encryption. It includes examples of the configuration of hardware and software to prevent or minimize the effect of a wide range of communications-based attacks against TCP/IP networks and Windows NT/2000 hosts connected to such networks.

  • Covers how TCP/IP operates and how TCP/IP attacks occur.
  • Detailed coverage on how to secure both TCP/IP networks and the Windows NT/2000 host on such networks against different attack methods.
  • Describes a new attack method, 'script-form attack', which could cause a company financial problems, and its prevention.
  • Uses practical real-world examples of methods used to block potential attacks.
Aimed at TCP/IP network managers, LAN admiistrators, Windows NT/2000 administrators and network professionals. It can also be used for high level undergraduate and graduate electrical engineering and computer science courses covering network security.

Anonymizing Health Data (Paperback): Khaled El Emam Anonymizing Health Data (Paperback)
Khaled El Emam; Contributions by Luk Arbuckle
R836 R652 Discovery Miles 6 520 Save R184 (22%) Ships in 10 - 15 working days

With this practical book, you will learn proven methods for anonymizing health data to help your organization share meaningful datasets, without exposing patient identity. Leading experts Khaled El Emam and Luk Arbuckle walk you through a risk-based methodology, using case studies from their efforts to de-identify hundreds of datasets.

Clinical data is valuable for research and other types of analytics, but making it anonymous without compromising data quality is tricky. This book demonstrates techniques for handling different data types, based on the authors' experiences with a maternal-child registry, inpatient discharge abstracts, health insurance claims, electronic medical record databases, and the World Trade Center disaster registry, among others.Understand different methods for working with cross-sectional and longitudinal datasetsAssess the risk of adversaries who attempt to re-identify patients in anonymized datasetsReduce the size and complexity of massive datasets without losing key information or jeopardizing privacyUse methods to anonymize unstructured free-form text dataMinimize the risks inherent in geospatial data, without omitting critical location-based health informationLook at ways to anonymize coding information in health dataLearn the challenge of anonymously linking related datasets

Personal Medical Information - Security, Engineering, and Ethics (Paperback, Softcover reprint of the original 1st ed. 1997):... Personal Medical Information - Security, Engineering, and Ethics (Paperback, Softcover reprint of the original 1st ed. 1997)
Ross Anderson
R1,597 Discovery Miles 15 970 Ships in 10 - 15 working days

This book originates from an international workshop on personal information held at the Isaac Newton Institute for Mathematical Sciences in Cambridge, UK, in June 1996. The workshop was organized under the joint sponsorship of the British Medical Association and the Isaac Newton Institute in the context of a six-month research program in computer security, cryptology, and coding theory.The revised workshop papers appearing in this volume reflect a lively interdisciplinary exchange of views and ideas between doctors, lawyers, privacy activists, and the computer security community. The volume gives a representative snapshot not merely of the state of the art of the medical computer security art in various countries, but of the complex interplay between human, political, and technical aspects.

Data Strategy - From definition to execution (Paperback): Ian Wallis Data Strategy - From definition to execution (Paperback)
Ian Wallis
R951 Discovery Miles 9 510 Ships in 9 - 17 working days

A well thought out, fit-for-purpose data strategy is vital to modern data-driven businesses. This book is your essential guide to planning, developing and implementing such a strategy, presenting a framework which takes you from data strategy definition to successful strategy delivery and execution with support and engagement from stakeholders. Key topics include data-driven business transformation, change enablers, benefits realisation and measurement.

Open Content Licensing - Cultivating the Creative Commons (Paperback): Brian Fitzgerald Open Content Licensing - Cultivating the Creative Commons (Paperback)
Brian Fitzgerald
R673 Discovery Miles 6 730 Ships in 10 - 15 working days

Open Content Licensing: Cultivating the Creative Commons brings together papers from some of the most prominent thinkers of our time on the internet, law and the importance of open content licensing in the digital age. Drawing on material presented at the Queensland University of Technology conference of January 2005, the text provides a snapshot of the thoughts of over 30 Australian and international experts on topics surrounding the international Creative Commons movement, from the landmark Eldred v Ashcroft copyright term decision to the legalities of digital sampling in a remix world.Open Content Licensing is a joint publication of Sydney University Press, Queensland University of Technology and CCI.

Customer Data and Privacy: The Insights You Need from Harvard Business Review - The Insights You Need from Harvard Business... Customer Data and Privacy: The Insights You Need from Harvard Business Review - The Insights You Need from Harvard Business Review (Paperback)
Harvard Business Review, Timothy Morey, Andrew Burt, Christine Moorman, Thomas C. Redman
R430 Discovery Miles 4 300 Ships in 10 - 15 working days

Collect data and build trust. With the rise of data science and machine learning, companies are awash in customer data and powerful new ways to gain insight from that data. But in the absence of regulation and clear guidelines from most federal or state governments, it's difficult for companies to understand what qualifies as reasonable use and then determine how to act in the best interest of their customers. How do they build, not erode, trust? Customer Data and Privacy: The Insights You Need from Harvard Business Review brings you today's most essential thinking on customer data and privacy to help you understand the tangled interdependencies and complexities of this evolving issue. The lessons in this book will help you develop strategies that allow your company to be a good steward, collecting, using, and storing customer data responsibly. Business is changing. Will you adapt or be left behind? Get up to speed and deepen your understanding of the topics that are shaping your company's future with the Insights You Need from Harvard Business Review series. Featuring HBR's smartest thinking on fast-moving issues&#8212blockchain, cybersecurity, AI, and more&#8212each book provides the foundational introduction and practical case studies your organization needs to compete today and collects the best research, interviews, and analysis to get it ready for tomorrow. You can't afford to ignore how these issues will transform the landscape of business and society. The Insights You Need series will help you grasp these critical ideas&#8212and prepare you and your company for the future.

Data Privacy - Principles and Practice (Hardcover): Nataraj Venkataramanan, Ashwin Shriram Data Privacy - Principles and Practice (Hardcover)
Nataraj Venkataramanan, Ashwin Shriram
R3,579 Discovery Miles 35 790 Ships in 10 - 15 working days

The book covers data privacy in depth with respect to data mining, test data management, synthetic data generation etc. It formalizes principles of data privacy that are essential for good anonymization design based on the data format and discipline. The principles outline best practices and reflect on the conflicting relationship between privacy and utility. From a practice standpoint, it provides practitioners and researchers with a definitive guide to approach anonymization of various data formats, including multidimensional, longitudinal, time-series, transaction, and graph data. In addition to helping CIOs protect confidential data, it also offers a guideline as to how this can be implemented for a wide range of data at the enterprise level.

Of Privacy and Power - The Transatlantic Struggle over Freedom and Security (Paperback): Henry Farrell, Abraham L. Newman Of Privacy and Power - The Transatlantic Struggle over Freedom and Security (Paperback)
Henry Farrell, Abraham L. Newman
R566 Discovery Miles 5 660 Ships in 10 - 15 working days

How disputes over privacy and security have shaped the relationship between the European Union and the United States and what this means for the future We live in an interconnected world, where security problems like terrorism are spilling across borders, and globalized data networks and e-commerce platforms are reshaping the world economy. This means that states' jurisdictions and rule systems clash. How have they negotiated their differences over freedom and security? Of Privacy and Power investigates how the European Union and United States, the two major regulatory systems in world politics, have regulated privacy and security, and how their agreements and disputes have reshaped the transatlantic relationship. The transatlantic struggle over freedom and security has usually been depicted as a clash between a peace-loving European Union and a belligerent United States. Henry Farrell and Abraham Newman demonstrate how this misses the point. The real dispute was between two transnational coalitions-one favoring security, the other liberty-whose struggles have reshaped the politics of surveillance, e-commerce, and privacy rights. Looking at three large security debates in the period since 9/11, involving Passenger Name Record data, the SWIFT financial messaging controversy, and Edward Snowden's revelations, the authors examine how the powers of border-spanning coalitions have waxed and waned. Globalization has enabled new strategies of action, which security agencies, interior ministries, privacy NGOs, bureaucrats, and other actors exploit as circumstances dictate. The first serious study of how the politics of surveillance has been transformed, Of Privacy and Power offers a fresh view of the role of information and power in a world of economic interdependence.

E-Commerce Security and Privacy (Paperback, Softcover reprint of the original 1st ed. 2001): Anup K. Ghosh E-Commerce Security and Privacy (Paperback, Softcover reprint of the original 1st ed. 2001)
Anup K. Ghosh
R2,843 Discovery Miles 28 430 Ships in 10 - 15 working days

While e-commerce has experienced meteoric growth recently, security risks have similarly grown in scope and magnitude. Three major factors have driven the security risks in e-commerce: the growing reliance on the electronic medium for a company's core business, the growing complexity of the software systems needed to support e-commerce, and the value of the digital assets brought online to an inherently insecure medium - the Internet. While security has long been a primary concern in e-commerce, more recently privacy has also grown in importance to consumers. Many of the same Internet technologies that make e-commerce possible also make it possible to create detailed profiles of an individual's purchases, to spy on individual Web usage habits, and even to peer into confidential files that reside on an individual's machine. E-Commerce Security and Privacy is the first volume to pull together leading researchers and practitioners in diverse areas of computer science and software engineering to explore their technical innovations to problems in security and privacy in e-commerce.The information is drawn from selected papers presented at the first Workshop on Security and Privacy in E-Commerce (WSPEC'00) held in Athens, Greece, November 4, 2000. As such, E-Commerce Security and Privacy introduces both practitioners and researchers to innovations in secure and private e-commerce. Practitioners will gain great insight from the case studies, and researchers will learn about state-of-the-art protocols in secure and private e-commerce that will serve as the basis for future innovations in applied e-commerce technologies. E-Commerce Security and Privacy is suitable as a secondary text for a graduate level course, and as a reference for researchers and practitioners in industry.

Privacy and Big Data (Paperback): Terence Craig Privacy and Big Data (Paperback)
Terence Craig; Contributions by Mary E. Ludloff
R476 R390 Discovery Miles 3 900 Save R86 (18%) Ships in 10 - 15 working days

Much of what constitutes Big Data is information about us. Through our online activities, we leave an easy-to-follow trail of digital footprints that reveal who we are, what we buy, where we go, and much more. This eye-opening book explores the raging privacy debate over the use of personal data, with one undeniable conclusion: once data's been collected, we have absolutely no control over who uses it or how it is used.

Personal data is the hottest commodity on the market today--truly more valuable than gold. We are the asset that every company, industry, non-profit, and government wants. Privacy and Big Data introduces you to the players in the personal data game, and explains the stark differences in how the U.S., Europe, and the rest of the world approach the privacy issue.

You'll learn about: Collectors: social networking titans that collect, share, and sell user data Users: marketing organizations, government agencies, and many others Data markets: companies that aggregate and sell datasets to anyone Regulators: governments with one policy for commercial data use, and another for providing security

Ransomware (Paperback): Allan Liska, Timothy Gallo Ransomware (Paperback)
Allan Liska, Timothy Gallo
R1,075 R725 Discovery Miles 7 250 Save R350 (33%) Ships in 10 - 15 working days

The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay a ransom to unlock them. With this practical book, you'll learn how easily ransomware infects your system and what steps you can take to stop the attack before it sets foot in the network. Security experts Allan Liska and Timothy Gallo explain how the success of these attacks not only has spawned several variants of ransomware, but also a litany of ever-changing ways they're delivered to targets. You'll learn pragmatic methods for responding quickly to a ransomware attack, as well as how to protect yourself from becoming infected in the first place. Learn how ransomware enters your system and encrypts your files Understand why ransomware use has grown, especially in recent years Examine the organizations behind ransomware and the victims they target Learn how wannabe hackers use Ransomware as a Service (RaaS) to launch campaigns Understand how ransom is paid-and the pros and cons of paying Use methods to protect your organization's workstations and servers

The Handbook of Privacy Studies - An Interdisciplinary Introduction (Paperback, 0): Bart Sloot, Aviva Groot The Handbook of Privacy Studies - An Interdisciplinary Introduction (Paperback, 0)
Bart Sloot, Aviva Groot
R1,072 Discovery Miles 10 720 Ships in 10 - 15 working days

The Handbook of Privacy Studies is the first book in the world that brings together several disciplinary perspectives on privacy, such as the legal, ethical, medical, informatics and anthropological perspective. Privacy is in the news almost every day: mass surveillance by intelligence agencies, the use of social media data for commercial profit and political microtargeting, password hacks and identity theft, new data protection regimes, questionable reuse of medical data, and concerns about how algorithms shape the way we think and decide. This book offers interdisciplinary background information about these developments and explains how to understand and properly evaluate them. The book is set up for use in interdisciplinary educational programmes. Each chapter provides a structured analysis of the role of privacy within that discipline, its characteristics, themes and debates, as well as current challenges. Disciplinary approaches are presented in such a way that students and researchers from every scientific background can follow the argumentation and enrich their own understanding of privacy issues.

Datenanonymisierung im Kontext von Kunstlicher Intelligenz und Big Data - Grundlagen - Elementare Techniken - Anwendung... Datenanonymisierung im Kontext von Kunstlicher Intelligenz und Big Data - Grundlagen - Elementare Techniken - Anwendung (German, Paperback, 1. Aufl. 2022)
Heinz-Adalbert Krebs, Patricia Hagenweiler
R990 Discovery Miles 9 900 Ships in 10 - 15 working days

Die fortschreitende Digitalisierung, die immer hoehere Verfugbarkeit des Internets in Echtzeit sowie die progressive Entwicklung der IT ermoeglichen es Unternehmen und Organisationen, Daten in einem nie zuvor dagewesenen Umfang zu erzeugen und zu verarbeiten, wodurch sie einen enormen Stellen- und Marktwert erhalten haben. Zudem kann mithilfe der kunstlichen Intelligenz (KI) das in den Daten enthaltene Wissen extrahiert werden. Oft handelt es sich dabei um gesammelte Daten von Personen, mit denen Vorhersagen uber verschiedene Aspekte der Personen getroffen werden koennen.Das Buch befasst sich mit der Anonymisierung im Kontext der KI und Big Data. Dazu werden die wesentlichen Grundlagen dargestellt sowie pseudonymisierte und anonymisierte Daten mit Personenbezug im Rahmen der Datenschutz-Grundverordnung (DSGVO) und des Bundesdatenschutzgesetzes (BDSG) beleuchtet. Es werden Moeglichkeiten zur Pseudonymisierung, zu den jeweiligen Techniken und Verfahren der Anonymisierung sowie entsprechende Risikobetrachtungen behandelt. Abschliessend wird die Vorgehensweise der Anonymisierung aus rechtlicher und technischer Sicht unter Anwendung entsprechender Software behandelt.

Digitale Kompetenz - Grundlagen der Kunstlichen Intelligenz, Blockchain-Technologie, Quanten-Computing und deren Anwendungen... Digitale Kompetenz - Grundlagen der Kunstlichen Intelligenz, Blockchain-Technologie, Quanten-Computing und deren Anwendungen fur die Digitale Transformation (German, Paperback, 1. Aufl. 2022)
Volker Lang
R864 R752 Discovery Miles 7 520 Save R112 (13%) Ships in 10 - 15 working days

Wenn Sie neugierig auf die Grundlagen der kunstlichen Intelligenz, der Blockchain-Technologie und des Quantencomputings sind, die fur die digitale Transformation und Innovation von entscheidender Bedeutung sind, ist Digital Fluency Ihr praktischer Leitfaden. Die realen Anwendungen dieser Spitzentechnologien nehmen rapide zu, und Ihr tagliches Leben wird weiterhin von jeder dieser Technologien beeinflusst werden. Es gibt keinen besseren Zeitpunkt als jetzt, um anzufangen und sich digital fit zu machen. Sie mussen keine Vorkenntnisse uber diese vielseitigen Technologien haben, denn der Autor Volker Lang fuhrt Sie kompetent durch das digitale Zeitalter. In zahlreichen Praxisbeispielen und mehr als 48 einpragsamen Abbildungen veranschaulicht er in Digital Fluency zentrale Konzepte und Anwendungen. Am Ende jedes Kapitels finden Sie eine hilfreiche Checkliste zur Umsetzung der zentralen Lektionen, bevor Sie zum nachsten Kapitel ubergehen. Dieses Buch geht den digitalen Schlagwoertern und Konzepten auf den Grund und sagt Ihnen, was sie wirklich bedeuten. Das Aufschlusseln von Themen wie automatisiertes Fahren und intelligente Robotik mit kunstlicher Intelligenz, Blockchain-basierte Kryptowahrungen und Smart Contracts, Medikamentenentwicklung und Optimierung von Finanzinvestitionsportfolios durch Quantencomputing und vieles mehr ist unerlasslich, um fur die Zukunft der Industrie gerustet zu sein. Unabhangig davon, ob Ihre eigene digitale Transformation in Ihrem privaten oder oeffentlichen Unternehmen, in Ihrem Studium oder in Ihrem Privathaushalt stattfindet, Digital Fluency erstellt einen konkreten digitalen Aktionsplan fur alle Ihre Anforderungen an Technologie- und Innovationsstrategien. Was Sie lernen werden Sich im digitalen Zeitalter orientieren, ohne Vorkenntnisse uber digitale Technologien und digitale Transformation zu benoetigen Lernen Sie die beliebtesten aktuellen und zukunftigen Anwendungen von kunstlicher Intelligenz, Blockchain-Technologie und Quantencomputing in einer Vielzahl von Branchen kennen, darunter das Gesundheitswesen, Finanzdienstleistungen und die Automobilindustrie Machen Sie sich mit den digitalen Innovationsmodellen von Amazon, Google, Microsoft, IBM und anderen weltweit fuhrenden Unternehmen vertraut. Setzen Sie Ihre eigene digitale Transformation entlang der acht Kerndimensionen eines konkreten digitalen Aktionsplans erfolgreich um. Fur wen dieses Buch bestimmt ist Vordenker, Fuhrungskrafte und Industriestrategen, Management- und Strategieberater, Politiker und Entscheidungstrager, Unternehmer, Finanzanalysten, Investoren und Risikokapitalgeber, Studenten und Forscher sowie allgemeine Leser, die sich digital fit machen wollen.

The Art Of Mac Malware - The Guide to Analyzing Malicious Software (Paperback): Patrick Wardle The Art Of Mac Malware - The Guide to Analyzing Malicious Software (Paperback)
Patrick Wardle
R1,163 R892 Discovery Miles 8 920 Save R271 (23%) Ships in 10 - 15 working days

Written by leading macOS threat analyst Patrick Wardle, The Art of Mac Malware Analysis covers the knowledge and hands-on skills required to analyze Mac malware. Using real-world examples and references to original research, Part 1 surveys the malware's various infection methods, persistence mechanisms, and capabilities. In Part 2, you'll learn about the static and dynamic analysis tools and techniques needed to examine malware you may find in the wild. Finally, you'll put these lessons into practice by walking through a comprehensive analysis of a complex Mac malware specimen (Part 3).

The Foundations of EU Data Protection Law (Hardcover): Orla Lynskey The Foundations of EU Data Protection Law (Hardcover)
Orla Lynskey
R4,410 Discovery Miles 44 100 Ships in 10 - 15 working days

Nearly two decades after the EU first enacted data protection rules, key questions about the nature and scope of this EU policy, and the harms it seeks to prevent, remain unanswered. The inclusion of a Right to Data Protection in the EU Charter has increased the salience of these questions, which must be addressed in order to ensure the legitimacy, effectiveness and development of this Charter right and the EU data protection regime more generally. The Foundations of EU Data Protection Law is a timely and important work which sheds new light on this neglected area of law, challenging the widespread assumption that data protection is merely a subset of the right to privacy. By positioning EU data protection law within a comprehensive conceptual framework, it argues that data protection has evolved from a regulatory instrument into a fundamental right in the EU legal order and that this right grants individuals more control over more forms of data than the right to privacy. It suggests that this dimension of the right to data protection should be explicitly recognised, while identifying the practical and conceptual limits of individual control over personal data. At a time when EU data protection law is sitting firmly in the international spotlight, this book offers academics, policy-makers, and practitioners a coherent vision for the future of this key policy and fundamental right in the EU legal order, and how best to realise it.

Customer Data and Privacy: The Insights You Need from Harvard Business Review (Hardcover): Harvard Business Review, Timothy... Customer Data and Privacy: The Insights You Need from Harvard Business Review (Hardcover)
Harvard Business Review, Timothy Morey, Andrew Burt, Christine Moorman, Thomas C. Redman
R1,063 R892 Discovery Miles 8 920 Save R171 (16%) Ships in 10 - 15 working days

Collect data and build trust. With the rise of data science and machine learning, companies are awash in customer data and powerful new ways to gain insight from that data. But in the absence of regulation and clear guidelines from most federal or state governments, it's difficult for companies to understand what qualifies as reasonable use and then determine how to act in the best interest of their customers. How do they build, not erode, trust? Customer Data and Privacy: The Insights You Need from Harvard Business Review brings you today's most essential thinking on customer data and privacy to help you understand the tangled interdependencies and complexities of this evolving issue. The lessons in this book will help you develop strategies that allow your company to be a good steward, collecting, using, and storing customer data responsibly. Business is changing. Will you adapt or be left behind? Get up to speed and deepen your understanding of the topics that are shaping your company's future with the Insights You Need from Harvard Business Review series. Featuring HBR's smartest thinking on fast-moving issues&#8212blockchain, cybersecurity, AI, and more&#8212each book provides the foundational introduction and practical case studies your organization needs to compete today and collects the best research, interviews, and analysis to get it ready for tomorrow. You can't afford to ignore how these issues will transform the landscape of business and society. The Insights You Need series will help you grasp these critical ideas&#8212and prepare you and your company for the future.

IT-Sicherheitsmanagement nach der neuen ISO 27001 - ISMS, Risiken, Kennziffern, Controls (German, Paperback, 2., akt. Aufl.... IT-Sicherheitsmanagement nach der neuen ISO 27001 - ISMS, Risiken, Kennziffern, Controls (German, Paperback, 2., akt. Aufl. 2020)
Heinrich Kersten, Gerhard Klett, Jurgen Reuter, Klaus-Werner Schroeder
R1,111 Discovery Miles 11 110 Ships in 10 - 15 working days

Dieses Buch behandelt das Management der Informationssicherheit auf der Basis der Norm ISO/IEC 27001. Mit der 2. Auflage wurden die Inhalte des Fachbuches umfassend aktualisiert und den Neuerungen der Norm angepasst. Die Autoren erlautern kompetent den Standard und seine organisatorisch-technische Umsetzung. Dies betrifft die Anforderungen an das Informationssicherheits-Managementsystem (ISMS) genauso wie die 114 Controls aus dem Anhang der Norm. Die ausfuhrlich kommentierten Controls unterstutzen Sicherheitsverantwortliche bei der Auswahl geeigneter Sicherheitsmassnahmen in allen Bereichen. Die Normenreihe ISO 27000 ist ein wichtiges Hilfsmittel fur Unternehmen und Behoerden, die ein IT-Sicherheitsmanagement in ihrer Organisation einfuhren und betreiben wollen. Im internationalen Kontext ist die Anwendung der ISO 27001 fur viele Organisationen nahezu unverzichtbar. Nicht zuletzt mit dem deutschen IT-Sicherheitsgesetz erhalt dieser Standard auch national eine hohe Bedeutung. Seit der Neufassung der Norm im Jahr 2015 (deutsche Version) und AEnderungen in 2017 mussen sich alle Organisationen entsprechend umstellen und ihr ISMS anpassen. Hierfur enthalt das Buch entsprechende "Fahrplane".

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Present-day Dialectology - Problems and…
Jan Berns, Jaap Van Marle Hardcover R4,824 Discovery Miles 48 240
Sociology as Applied to Nursing and…
Mary Birchenall, Peter Birchenall Paperback R968 Discovery Miles 9 680
Working with Dynamic Crop Models…
Daniel Wallach, David Makowski, … Hardcover R3,873 R3,187 Discovery Miles 31 870
Racism and Society
Les Back, John Solomos Hardcover R4,921 Discovery Miles 49 210
The Produce Contamination Problem…
Karl Matthews Paperback R3,222 R2,892 Discovery Miles 28 920
Seasons of Life - Our Walk with Christ
Marilee Mayfield Paperback R473 Discovery Miles 4 730
The Ethics of Cryonics - Is it Immoral…
Francesca Minerva Hardcover R1,890 Discovery Miles 18 900
Melo's Kingdom - Storytime Adventures In…
Thuli Madonsela Hardcover  (1)
R251 Discovery Miles 2 510
The Oxford Handbook of Material Culture…
Dan Hicks, Mary C. Beaudry Hardcover R4,832 Discovery Miles 48 320
Climate Change and Crop Stress…
Arun K. Shanker, Chitra Shanker, … Paperback R5,303 Discovery Miles 53 030

 

Partners