0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (121)
  • R250 - R500 (228)
  • R500+ (763)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

Cybersecurity Awareness Among Students and Faculty (Hardcover): Abbas Moallem Cybersecurity Awareness Among Students and Faculty (Hardcover)
Abbas Moallem
R1,796 Discovery Miles 17 960 Ships in 10 - 15 working days

Recipient of the SJSU San Jose State University Annual Author & Artist Awards 2019 In modern times, all individuals need to be knowledgeable about cybersecurity. They must have practical skills and abilities to protect themselves in cyberspace. What is the level of awareness among college students and faculty, who represent the most technologically active portion of the population in any society? According to the Federal Trade Commission's 2016 Consumer Sentinel Network report, 19 percent of identity theft complaints came from people under the age of 29. About 74,400 young adults fell victim to identity theft in 2016. This book reports the results of several studies that investigate student and faculty awareness and attitudes toward cybersecurity and the resulting risks. It proposes a plan of action that can help 26,000 higher education institutions worldwide with over 207 million college students, create security policies and educational programs that improve security awareness and protection. Features Offers an understanding of the state of privacy awareness Includes the state of identity theft awareness Covers mobile phone protection Discusses ransomware protection Discloses a plan of action to improve security awareness

Cinderella's Stick - A Fairy Tale for Digital Preservation (Hardcover, 1st ed. 2018): Yannis Tzitzikas, Yannis Marketakis Cinderella's Stick - A Fairy Tale for Digital Preservation (Hardcover, 1st ed. 2018)
Yannis Tzitzikas, Yannis Marketakis
R1,529 R598 Discovery Miles 5 980 Save R931 (61%) Ships in 9 - 17 working days

This book explains the main problems related to digital preservation using examples based on a modern version of the well-known Cinderella fairy tale. Digital preservation is the endeavor to protect digital material against loss, corruption, hardware/software technology changes, and changes in the knowledge of the community. he structure of the book is modular, with each chapter consisting of two parts: the episode and the technical background. The episodes narrate the story in chronological order, exactly as in a fairy tale. In addition to the story itself, each episode is related to one or more digital preservation problems, which are discussed in the technical background section of the chapter. To reveal a more general and abstract formulation of these problems, the notion of pattern is used. Each pattern has a name, a summary of the problem, a narrative describing an attempt to solve the problem, an explanation of what could have been done to avoid or alleviate this problem, some lessons learned, and lastly, links to related patterns discussed in other chapters. The book is intended for anyone wanting to understand the problems related to digital preservation, even if they lack the technical background. It explains the technical details at an introductory level, provides references to the main approaches (or solutions) currently available for tackling related problems, and is rounded out by questions and exercises appropriate for computer engineers and scientists. In addition, the book's website, maintained by the authors, presents the contents of Cinderella's "real USB stick," and includes links to various tools and updates.

Practical Cryptography (Paperback): N. Ferguson Practical Cryptography (Paperback)
N. Ferguson
R1,021 R851 Discovery Miles 8 510 Save R170 (17%) Ships in 9 - 17 working days

Security is the number one concern for businesses worldwide. The gold standard for attaining security is cryptography because it provides the most reliable tools for storing or transmitting digital information. Written by Niels Ferguson, lead cryptographer for Counterpane, Bruce Schneier's security company, and Bruce Schneier himself, this is the much anticipated follow-up book to Schneier's seminal encyclopedic reference, Applied Cryptography, Second Edition (0-471-11709-9), which has sold more than 150,000 copies.
Niels Ferguson (Amsterdam, Netherlands) is a cryptographic engineer and consultant at Counterpane Internet Security. He has extensive experience in the creation and design of security algorithms, protocols, and multinational security infrastructures. Previously, Ferguson was a cryptographer for DigiCash and CWI. At CWI he developed the first generation of off-line payment protocols. He has published numerous scientific papers.
Bruce Schneier (Minneapolis, MN) is Founder and Chief Technical Officer at Counterpane Internet Security, a managed-security monitoring company. He is also the author of Secrets and Lies: Digital Security in a Networked World (0-471-25311-1).

Government and Information Rights - The Law Relating to Access, Disclosure and their Regulation (Paperback, 5th edition):... Government and Information Rights - The Law Relating to Access, Disclosure and their Regulation (Paperback, 5th edition)
Patrick Birkinshaw, Mike Varney
R4,073 Discovery Miles 40 730 Ships in 18 - 22 working days

Government and Information: The Law Relating to Access, Disclosure and their Regulation is the leading text offering comprehensive and practical advice on the access, disclosure and retention of government records under UK, EU and ECHR requirements. It is essential reading for all those dealing with public authority information. The fifth edition is extensively revised following numerous developments in both UK and EU law as well as the ever expanding case law on information rights under statutory, Convention and common law provisions. Legislation: Justice and Security Act 2013; Crime and Courts Act 2013 (s 34 in relation to press standards following Leveson); Re-use of Public Sector Information Regulations 2015 Investigatory Powers Bill 2016; Environmental Information Regulations 2004; General Data Protection Regulation 2016; Key cases since the last edition include: Evans v Attorney General [2015] UKSC 21 - the SC ruled that the Attorney General had acted unlawfully in issuing a veto preventing disclosure Kennedy v Charities Commission [2014] UKSC 20 - Supreme Court extended the ambit of the common law in relation to access to information and transparency Case 362/14 Schrems [2015]) - involving data transfer to the USA PJS v Newsgroup Newspapers ltd [2016] UKSC 26 - developing the law of personal privacy

Database Nation - The Death of Privacy in the 21st Century (Paperback, New edition): "Garfinkel" Database Nation - The Death of Privacy in the 21st Century (Paperback, New edition)
"Garfinkel"
R409 Discovery Miles 4 090 Ships in 18 - 22 working days

Fifty years ago, in "1984, " George Orwell imagined a future in which privacy was demolished by a totalitarian state that used spies, video surveillance, historical revisionism, and control over the media to maintain its power. Those who worry about personal privacy and identity--especially in this day of technologies that encroach upon these rights--still use Orwell's "Big Brother" language to discuss privacy issues. But the reality is that the age of a monolithic Big Brother is over. And yet the threats are perhaps even more likely to destroy the rights we've assumed were ours.

"Database Nation: The Death of Privacy in the 21st Century" shows how, in these early years of the 21st century, advances in technology endanger our privacy in ways never before imagined. Direct marketers and retailers track our every purchase; surveillance cameras observe our movements; mobile phones will soon report our location to those who want to track us; government eavesdroppers listen in on private communications; misused medical records turn our bodies and our histories against us; and linked databases assemble detailed consumer profiles used to predict and influence our behavior. Privacy--the most basic of our civil rights--is in grave peril.

Simson Garfinkel--journalist, entrepreneur, and international authority on computer security--has devoted his career to testing new technologies and warning about their implications. This newly revised update of the popular hardcover edition of "Database Nation " is his compelling account of how invasive technologies will affect our lives in the coming years. It's a timely, far-reaching, entertaining, and thought-provoking look at the serious threats to privacy facing us today. The book poses a disturbing question: how can we protect our basic rights to privacy, identity, and autonomy when technology is making invasion and control easier than ever before?

Garfinkel's captivating blend of journalism, storytelling, and futurism is a call to arms. It will frighten, entertain, and ultimately convince us that we must take action now to protect our privacy and identity before it's too late.

Of Privacy and Power - The Transatlantic Struggle over Freedom and Security (Paperback): Henry Farrell, Abraham L. Newman Of Privacy and Power - The Transatlantic Struggle over Freedom and Security (Paperback)
Henry Farrell, Abraham L. Newman
R749 Discovery Miles 7 490 Ships in 18 - 22 working days

How disputes over privacy and security have shaped the relationship between the European Union and the United States and what this means for the future We live in an interconnected world, where security problems like terrorism are spilling across borders, and globalized data networks and e-commerce platforms are reshaping the world economy. This means that states' jurisdictions and rule systems clash. How have they negotiated their differences over freedom and security? Of Privacy and Power investigates how the European Union and United States, the two major regulatory systems in world politics, have regulated privacy and security, and how their agreements and disputes have reshaped the transatlantic relationship. The transatlantic struggle over freedom and security has usually been depicted as a clash between a peace-loving European Union and a belligerent United States. Henry Farrell and Abraham Newman demonstrate how this misses the point. The real dispute was between two transnational coalitions-one favoring security, the other liberty-whose struggles have reshaped the politics of surveillance, e-commerce, and privacy rights. Looking at three large security debates in the period since 9/11, involving Passenger Name Record data, the SWIFT financial messaging controversy, and Edward Snowden's revelations, the authors examine how the powers of border-spanning coalitions have waxed and waned. Globalization has enabled new strategies of action, which security agencies, interior ministries, privacy NGOs, bureaucrats, and other actors exploit as circumstances dictate. The first serious study of how the politics of surveillance has been transformed, Of Privacy and Power offers a fresh view of the role of information and power in a world of economic interdependence.

Customer Data and Privacy: The Insights You Need from Harvard Business Review (Hardcover): Harvard Business Review, Timothy... Customer Data and Privacy: The Insights You Need from Harvard Business Review (Hardcover)
Harvard Business Review, Timothy Morey, Andrew Burt, Christine Moorman, Thomas C. Redman
R979 R828 Discovery Miles 8 280 Save R151 (15%) Ships in 18 - 22 working days

Collect data and build trust. With the rise of data science and machine learning, companies are awash in customer data and powerful new ways to gain insight from that data. But in the absence of regulation and clear guidelines from most federal or state governments, it's difficult for companies to understand what qualifies as reasonable use and then determine how to act in the best interest of their customers. How do they build, not erode, trust? Customer Data and Privacy: The Insights You Need from Harvard Business Review brings you today's most essential thinking on customer data and privacy to help you understand the tangled interdependencies and complexities of this evolving issue. The lessons in this book will help you develop strategies that allow your company to be a good steward, collecting, using, and storing customer data responsibly. Business is changing. Will you adapt or be left behind? Get up to speed and deepen your understanding of the topics that are shaping your company's future with the Insights You Need from Harvard Business Review series. Featuring HBR's smartest thinking on fast-moving issues&#8212blockchain, cybersecurity, AI, and more&#8212each book provides the foundational introduction and practical case studies your organization needs to compete today and collects the best research, interviews, and analysis to get it ready for tomorrow. You can't afford to ignore how these issues will transform the landscape of business and society. The Insights You Need series will help you grasp these critical ideas&#8212and prepare you and your company for the future.

Privacy in Context - Technology, Policy, and the Integrity of Social Life (Paperback): Helen Nissenbaum Privacy in Context - Technology, Policy, and the Integrity of Social Life (Paperback)
Helen Nissenbaum
R643 Discovery Miles 6 430 Ships in 9 - 17 working days

Privacy is one of the most urgent issues associated with information technology and digital media. This book claims that what people really care about when they complain and protest that privacy has been violated is not the act of sharing information itself--most people understand that this is crucial to social life --but the inappropriate, improper sharing of information.
Arguing that privacy concerns should not be limited solely to concern about control over personal information, Helen Nissenbaum counters that information ought to be distributed and protected according to norms governing distinct social contexts--whether it be workplace, health care, schools, or among family and friends. She warns that basic distinctions between public and private, informing many current privacy policies, in fact obscure more than they clarify. In truth, contemporary information systems should alarm us only when they function without regard for social norms and values, and thereby weaken the fabric of social life.

Cybersecurity for Beginners (Paperback, 2nd Revised edition): Raef Meeuwisse Cybersecurity for Beginners (Paperback, 2nd Revised edition)
Raef Meeuwisse
R528 Discovery Miles 5 280 Ships in 9 - 17 working days
Die Zukunft von Privatheit und Selbstbestimmung - Analysen und Empfehlungen zum Schutz der Grundrechte in der digitalen Welt... Die Zukunft von Privatheit und Selbstbestimmung - Analysen und Empfehlungen zum Schutz der Grundrechte in der digitalen Welt (German, Paperback, 1. Aufl. 2022)
Alexander Rossnagel, Michael Friedewald
R1,029 Discovery Miles 10 290 Ships in 10 - 15 working days

Die in diesem Open-Access-Buch zusammengefuhrten interdisziplinaren Untersuchungen des "Forums Privatheit" gehen der Frage nach, wie sich die Verwirklichungsbedingungen von Privatheit und Selbstbestimmung durch die Digitalisierung aller Lebensbereiche radikal andern. Nahezu jede Lebensregung hinterlasst Datenspuren, ermoeglicht vielfaltige und intensive Datensammlungen uber Menschen, unterstutzt Verhaltensbeeinflussungen und verstarkt Ungleichgewichte in der Informationsmacht. Es analysiert die Auswirkungen der Digitalisierung auf den rechtlichen und politischen Schutz der Grundrechte, die oekonomischen Beziehungen, die gesellschaftliche Integration und die individuelle Entfaltung. Das Buch zeigt aber auch auf, wie Digitalisierung und ihre gesellschaftlichen Rahmenbedingungen technisch, sozial, oekonomisch und rechtlich gestaltet werden koennen, um Privatheit und Selbstbestimmung zu schutzen.

The Art Of Mac Malware - The Guide to Analyzing Malicious Software (Paperback): Patrick Wardle The Art Of Mac Malware - The Guide to Analyzing Malicious Software (Paperback)
Patrick Wardle
R1,099 R843 Discovery Miles 8 430 Save R256 (23%) Ships in 10 - 15 working days

Written by leading macOS threat analyst Patrick Wardle, The Art of Mac Malware Analysis covers the knowledge and hands-on skills required to analyze Mac malware. Using real-world examples and references to original research, Part 1 surveys the malware's various infection methods, persistence mechanisms, and capabilities. In Part 2, you'll learn about the static and dynamic analysis tools and techniques needed to examine malware you may find in the wild. Finally, you'll put these lessons into practice by walking through a comprehensive analysis of a complex Mac malware specimen (Part 3).

Cybersecurity - 3 in 1- Beginner's Guide+ Tips and tricks+ Advanced and Effective measures to secure your Cyber Networks... Cybersecurity - 3 in 1- Beginner's Guide+ Tips and tricks+ Advanced and Effective measures to secure your Cyber Networks (Paperback)
Elijah Lewis
R1,125 Discovery Miles 11 250 Ships in 18 - 22 working days
Data Protection Officer (Paperback): Filip Johnssen, Sofia Edvardsen Data Protection Officer (Paperback)
Filip Johnssen, Sofia Edvardsen; Technical editing by John Potts
R619 Discovery Miles 6 190 Ships in 9 - 17 working days

This book provides a practical guide to the DPO role, encompassing the key activities you'll need to manage to succeed in the role. Coverage includes data protection fundamentals and processes, understanding risk and relevant standards, frameworks and tools, with DPO tips also embedded throughout the book and case studies included to support practice-based learning.

Data in Society - Challenging Statistics in an Age of Globalisation (Paperback): Jim Ridgway, Ron Johnston, Liliana Bounegru,... Data in Society - Challenging Statistics in an Age of Globalisation (Paperback)
Jim Ridgway, Ron Johnston, Liliana Bounegru, Jonathan Gray, Amy Sippitt, …
R911 R845 Discovery Miles 8 450 Save R66 (7%) Ships in 9 - 17 working days

Statistical data and evidence-based claims are increasingly central to our everyday lives. Critically examining 'Big Data', this book charts the recent explosion in sources of data, including those precipitated by global developments and technological change. It sets out changes and controversies related to data harvesting and construction, dissemination and data analytics by a range of private, governmental and social organisations in multiple settings. Analysing the power of data to shape political debate, the presentation of ideas to us by the media, and issues surrounding data ownership and access, the authors suggest how data can be used to uncover injustices and to advance social progress.

Kali Linux - Advanced Methods and Strategies to Learn Kali Linux (Paperback): Ethan Thorpe Kali Linux - Advanced Methods and Strategies to Learn Kali Linux (Paperback)
Ethan Thorpe
R496 Discovery Miles 4 960 Ships in 18 - 22 working days
Advanced WordPress Security - Go beyond the basics and stop sophisticated attacks (Paperback): Grant Stokley Advanced WordPress Security - Go beyond the basics and stop sophisticated attacks (Paperback)
Grant Stokley
R513 Discovery Miles 5 130 Ships in 18 - 22 working days
Cybersecurity essentials - Beginners guide - Step-by-step manual with ten methods to protect your privacy online (Paperback):... Cybersecurity essentials - Beginners guide - Step-by-step manual with ten methods to protect your privacy online (Paperback)
Gianluca Amadio, David Costa
R247 Discovery Miles 2 470 Ships in 18 - 22 working days
Using Computational Intelligence for the Dark Web and Illicit Behavior Detection (Paperback): Romil Rawat, Upinder Kaur, Shadab... Using Computational Intelligence for the Dark Web and Illicit Behavior Detection (Paperback)
Romil Rawat, Upinder Kaur, Shadab Pasha Khan, Ranjana Sikarwar, K. Sakthidasan Sankaran
R4,778 Discovery Miles 47 780 Ships in 18 - 22 working days

The Dark Web is a known hub that hosts myriad illegal activities behind the veil of anonymity for its users. For years now, law enforcement has been struggling to track these illicit activities and put them to an end. However, the depth and anonymity of the Dark Web has made these efforts difficult, and as cyber criminals have more advanced technologies available to them, the struggle appears to only have the potential to worsen. Law enforcement and government organizations also have emerging technologies on their side, however. It is essential for these organizations to stay up to date on these emerging technologies, such as computational intelligence, in order to put a stop to the illicit activities and behaviors presented in the Dark Web. Using Computational Intelligence for the Dark Web and Illicit Behavior Detection presents the emerging technologies and applications of computational intelligence for the law enforcement of the Dark Web. It features analysis into cybercrime data, examples of the application of computational intelligence in the Dark Web, and provides future opportunities for growth in this field. Covering topics such as cyber threat detection, crime prediction, and keyword extraction, this premier reference source is an essential resource for government organizations, law enforcement agencies, non-profit organizations, politicians, computer scientists, researchers, students, and academicians.

Cyber Security for Small Business - Protect Your Digital World (Paperback): Cat Paterson Cyber Security for Small Business - Protect Your Digital World (Paperback)
Cat Paterson
R340 Discovery Miles 3 400 Ships in 18 - 22 working days
Programming for beginners - 2 books in 1: Kali linux and python for beginners (Paperback): Adam Harris Programming for beginners - 2 books in 1: Kali linux and python for beginners (Paperback)
Adam Harris
R546 Discovery Miles 5 460 Ships in 18 - 22 working days
The Data Protection Officer - IDSolves.com (Paperback): Adams Choubey Williams The Data Protection Officer - IDSolves.com (Paperback)
Adams Choubey Williams
R880 Discovery Miles 8 800 Ships in 18 - 22 working days
Cyber Storm (Hardcover): Leading Cybersecurity Experts Cyber Storm (Hardcover)
Leading Cybersecurity Experts
R646 Discovery Miles 6 460 Ships in 18 - 22 working days
Certified Cyber Security Operations Manager - Exam Prep Guide (Paperback): Michael I. Kaplan Certified Cyber Security Operations Manager - Exam Prep Guide (Paperback)
Michael I. Kaplan
R1,399 Discovery Miles 13 990 Ships in 18 - 22 working days
Practical Paranoia Chromebook Security Essentials (Paperback): Marc Louis Mintz Practical Paranoia Chromebook Security Essentials (Paperback)
Marc Louis Mintz
R1,411 Discovery Miles 14 110 Ships in 18 - 22 working days
The Personal Cybersecurity Manual - How Anyone Can Protect Themselves from Fraud, Identity Theft, and Other Cybercrimes... The Personal Cybersecurity Manual - How Anyone Can Protect Themselves from Fraud, Identity Theft, and Other Cybercrimes (Paperback)
Marlon Buchanan
R418 R387 Discovery Miles 3 870 Save R31 (7%) Ships in 18 - 22 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Richard F. Kahn - Collected Economic…
Maria Cristina Marcuzzo, Paolo Paesani Hardcover R2,662 Discovery Miles 26 620
Fixed Point Theory in Distance Spaces
William Kirk, Naseer Shahzad Hardcover R2,445 R1,830 Discovery Miles 18 300
Spectral Theory of Value and Actual…
Theodore Mariolis, Nikolaos Rodousakis, … Hardcover R3,194 Discovery Miles 31 940
Riemannian Geometry In An Orthogonal…
Vladislav V. Goldberg Hardcover R2,333 Discovery Miles 23 330
Elementary Topology And Applications
Carlos R Borges Hardcover R1,447 Discovery Miles 14 470
Leon Louw - A Legacy Of Solutions
Tim Cohen Paperback R360 R295 Discovery Miles 2 950
The Imperial Roman Economy
George Maher Hardcover R560 Discovery Miles 5 600
Vulnerable People, Vulnerable States…
Daniel Bromley, Glen Anderson Hardcover R4,489 Discovery Miles 44 890
Cape Flats To The JSE - Black Excellence…
Phakamisa Ndzamela Paperback R350 R260 Discovery Miles 2 600
Integral Geometry and Radon Transforms
Sigurdur Helgason Hardcover R1,503 Discovery Miles 15 030

 

Partners