|
|
Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection
Protecting Privacy in Video Surveillance offers the state of the
art from leading researchers and experts in the field. This broad
ranging volume discusses the topic from various technical points of
view and also examines surveillance from a societal
perspective.
A comprehensive introduction carefully guides the reader through
the collection of cutting-edge research and current thinking. The
technical elements of the field feature topics from MERL blind
vision, stealth vision and privacy by de-identifying face images,
to using mobile communications to assert privacy from video
surveillance, and using wearable computing devices for data
collection in surveillance environments. Surveillance and society
is approached with discussions of security versus privacy, the rise
of surveillance, and focusing on social control.
This rich array of the current research in the field will be an
invaluable reference for researchers, as well as graduate
students.
From transportation to healthcare, IoT has been heavily implemented
into practically every professional industry, making these systems
highly susceptible to security breaches. Because IoT connects not
just devices but also people and other entities, every component of
an IoT system remains vulnerable to attacks from hackers and other
unauthorized units. This clearly portrays the importance of
security and privacy in IoT, which should be strong enough to keep
the entire platform and stakeholders secure and smooth enough to
not disrupt the lucid flow of communication among IoT entities.
Applied Approach to Privacy and Security for the Internet of Things
is a collection of innovative research on the methods and applied
aspects of security in IoT-based systems by discussing core
concepts and studying real-life scenarios. While highlighting
topics including malware propagation, smart home vulnerabilities,
and bio-sensor safety, this book is ideally designed for security
analysts, software security engineers, researchers, computer
engineers, data scientists, security professionals, practitioners,
academicians, and students seeking current research on the various
aspects of privacy and security within IoT.
In today's globalized world, businesses and governments rely
heavily on technology for storing and protecting essential
information and data. Despite the benefits that computing systems
offer, there remains an assortment of issues and challenges in
maintaining the integrity and confidentiality of these databases.
As professionals become more dependent cyberspace, there is a need
for research on modern strategies and concepts for improving the
security and safety of these technologies. Modern Theories and
Practices for Cyber Ethics and Security Compliance is a collection
of innovative research on the concepts, models, issues, challenges,
innovations, and mitigation strategies needed to improve cyber
protection. While highlighting topics including database
governance, cryptography, and intrusion detection, this book
provides guidelines for the protection, safety, and security of
business data and national infrastructure from cyber-attacks. It is
ideally designed for security analysts, law enforcement,
researchers, legal practitioners, policymakers, business
professionals, governments, strategists, educators, and students
seeking current research on combative solutions for cyber threats
and attacks.
|
|