0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (121)
  • R250 - R500 (215)
  • R500+ (785)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

Safe Computing is Like Safe Sex - You have to practice it to avoid infection (Hardcover): Richard G Lowe Safe Computing is Like Safe Sex - You have to practice it to avoid infection (Hardcover)
Richard G Lowe
R956 R835 Discovery Miles 8 350 Save R121 (13%) Ships in 18 - 22 working days
Privacy, Intrusion Detection, and Response - Technologies for Protecting Networks (Hardcover, New): Peyman Kabiri Privacy, Intrusion Detection, and Response - Technologies for Protecting Networks (Hardcover, New)
Peyman Kabiri
R4,872 Discovery Miles 48 720 Ships in 18 - 22 working days

Though network security has almost always been about encryption and decryption, the field of network security is moving towards securing the network environment rather than just stored or transferred data. Privacy, Intrusion Detection and Response: Technologies for Protecting Networks explores the latest practices and research works in the area of privacy, intrusion detection, and response. Increased interest on intrusion detection together with prevention and response proves that protecting data either in the storage or during transfer is necessary, but not sufficient, for the security of a network. This book discusses the latest trends and developments in network security and privacy, and serves as a vital reference for researchers, academics, and practitioners working in the field of privacy, intrusion detection, and response.

The Digital Person - Technology and Privacy in the Information Age (Hardcover): Daniel J. Solove The Digital Person - Technology and Privacy in the Information Age (Hardcover)
Daniel J. Solove
R2,871 Discovery Miles 28 710 Ships in 18 - 22 working days

View the Table of Contents.
Read the Introduction.

aThis comprehensive analysis of privacy in the information age challenges traditional assumptions that breeches of privacy through the development of electronic dossiers involve the invasion of oneas private space.a
--"Choice"

"The Digital Person challenges the existing ways in which law and legal theory approach the social, political, and legal implications of the collection and use of personal information in computer databases. Solove's book is ambitious, and represents the most important publication in the field of information privacy law for some years."
--"Georgetown Law Journal"

"Anyone concerned with preserving privacy against technology's growing intrusiveness will find this book enlightening."
--"Publishers Weekly"

"Solove . . . truly understands the intersection of law and technology. This book is a fascinating journey into the almost surreal ways personal information is hoarded, used, and abused in the digital age."
--"The Wall Street Journal"

"Daniel Solove is one of the most energetic and creative scholars writing about privacy today. The Digital Person is an important contribution to the privacy debate, and Solove's discussion of the harms of what he calls 'digital dossiers' is invaluable."
--Jeffrey Rosen, author of "The Unwanted Gaze" and "The Naked Crowd"

"Powerful theme."
--"Privacy Journal"

"This is not only a book you should read, but you should make sure your friends read it."
--"IEEE Review"

"Solove offers a book that is both comprehensive and easy to understand, discussing the changes that technology has brought to our concept of privacy. An excellentstarting point for much needed discussion."
--"Law Technology News"

"An unusually perceptive discussion of one of the most vexing problems of the digital age--our loss of control over our personal information. It's a fascinating journey into the almost surreal ways personal information is hoarded, used, and abused in the digital age. I recommend his book highly."
--Bruce Schneier

"Solove's book is the best exposition thus far about the threat that computer databases containing personal data about millions of Americans poses for information privacy."
--Pamela Samuelson, Chancellor's Professor of Law and Information Management at the University of California, Berkeley

"Solove drives his points home through considerable reconfiguration of the basic argument. Rather than casting blame or urging retreat to a precomputer database era, the solution is seen in informing individuals, challenging data collectors, and bringing the law up-to-date."
--"Choice"

"If you want to find out what a mess the law of privacy is, how it got that way, and whether there is hope for the future, then read this book."
--"Legal Times"

"Solove evaluates the shortcomings of current approaches to privacy as well as some useful and controversial ideas for striking a new balance. Anyone who deals with privacy matters will find a lot ot consider."
--"DM News"

"Solove's treatment of this particular facet is thoughtful, thorough, concise, and occasionally laced with humor. The present volume gives us reason to look forward to his future contributions."
--"The Law and Politics Book Review"

"Solove's book is useful, particularly as an overview on how these private and governmentdatabases grew in sophistication and now interact with one another."
--"Christian Science Monitor"

"A far-reaching examination of how digital dossiers are shaping our lives. Daniel Solove has persuasively reconceptualized privacy for the digital age. A must-read."
--Paul Schwartz, Brooklyn Law School

"The Digital Person is a detailed and approachable resource on privacy issues and the laws that affect them."
--"IT Conversations"

Seven days a week, twenty-four hours a day, electronic databases are compiling information about you. As you surf the Internet, an unprecedented amount of your personal information is being recorded and preserved forever in the digital minds of computers. For each individual, these databases create a profile of activities, interests, and preferences used to investigate backgrounds, check credit, market products, and make a wide variety of decisions affecting our lives. The creation and use of these databases--which Daniel J. Solove calls "digital dossiers"--has thus far gone largely unchecked. In this startling account of new technologies for gathering and using personal data, Solove explains why digital dossiers pose a grave threat to our privacy.

The Digital Person sets forth a new understanding of what privacy is, one that is appropriate for the new challenges of the Information Age. Solove recommends how the law can be reformed to simultaneously protect our privacy and allow us to enjoy the benefits of our increasingly digital world.

The first volume in the series EX MACHINA: LAW, TECHNOLOGY, AND SOCIETY

Smart Card Security and Applications (Hardcover): Mike Hendry Smart Card Security and Applications (Hardcover)
Mike Hendry
R2,845 Discovery Miles 28 450 Ships in 18 - 22 working days

Smart cards have recently emerged as a key computer network and Internet security technology. These plastic cards contain an embedded microprocessor, allowing them to be programmed to perform specific duties. This extensively updated, second edition of the popular Artech House book, Smart Card Security and Applications, offers a current overview of the ways smart cards address the computer security issues of today's varied applications. Brand new discussions on multi-application operating systems, computer networks, and the Internet are included to keep technical and business professionals abreast of the very latest developments in this field. The book provides technical details on the newest protection mechanisms, features a discussion on the effects of recent attacks, and presents a clear methodology for solving unique security problems.

Improving Information Security Practices through Computational Intelligence (Hardcover): Wasan Shaker Awad, El-Sayed M El-Alfy,... Improving Information Security Practices through Computational Intelligence (Hardcover)
Wasan Shaker Awad, El-Sayed M El-Alfy, Yousif Al-Bastaki
R5,249 Discovery Miles 52 490 Ships in 18 - 22 working days

The recent explosion in complex global networking architectures has spurred a concomitant rise in the need for robust information security. Further, as computing power increases exponentially with every passing year, so do the number of proposed cryptographic schemata for improving and ensuring the encryption integrity of cutting-edge infosec protocols. Improving Information Security Practices through Computation Intelligence presents an overview of the latest and greatest research in the field, touching on such topics as cryptology, stream ciphers, and intrusion detection, and providing new insights to an audience of students, teachers, and entry-level researchers working in computational intelligence, information security, and security engineering.

Preserving Privacy Against Side-Channel Leaks - From Data Publishing to Web Applications (Hardcover, 1st ed. 2016): Wen Ming... Preserving Privacy Against Side-Channel Leaks - From Data Publishing to Web Applications (Hardcover, 1st ed. 2016)
Wen Ming Liu, Lingyu Wang
R3,225 Discovery Miles 32 250 Ships in 18 - 22 working days

This book offers a novel approach to data privacy by unifying side-channel attacks within a general conceptual framework. This book then applies the framework in three concrete domains. First, the book examines privacy-preserving data publishing with publicly-known algorithms, studying a generic strategy independent of data utility measures and syntactic privacy properties before discussing an extended approach to improve the efficiency. Next, the book explores privacy-preserving traffic padding in Web applications, first via a model to quantify privacy and cost and then by introducing randomness to provide background knowledge-resistant privacy guarantee. Finally, the book considers privacy-preserving smart metering by proposing a light-weight approach to simultaneously preserving users' privacy and ensuring billing accuracy. Designed for researchers and professionals, this book is also suitable for advanced-level students interested in privacy, algorithms, or web applications.

Operation Espionage - the Spy Within: A Primer on Risk Mitigation (Hardcover): Harris Schwartz Operation Espionage - the Spy Within: A Primer on Risk Mitigation (Hardcover)
Harris Schwartz
R786 Discovery Miles 7 860 Ships in 18 - 22 working days
Cyberethics - Social and Moral Issues in the Computer Age (Paperback): Robert M. Baird, Reagan M. Ramsower, Stuart E Rosenbaum Cyberethics - Social and Moral Issues in the Computer Age (Paperback)
Robert M. Baird, Reagan M. Ramsower, Stuart E Rosenbaum
R766 Discovery Miles 7 660 Ships in 10 - 15 working days

The amazing transformation of society brought about by the wide dispersion of computers has given rise to new moral dilemmas. With the rapid development of this technology, the impact of computers on privacy, personal identity, intellectual property, and the form and practice of democracy is becoming more apparent every day. Inevitably, this penetration of computer technology into our private and social lives has a moral dimension, which raises questions about our conduct and requires moral reflection and decision-making. The twenty-six groundbreaking essays collected in this insightful anthology define the nature of this new moral landscape and offer thoughtful answers to the ethical questions raised by the interaction of people and computers.
Divided into five sections, the volume begins with a definition of cyberethics. There is general agreement with James H. Moor's basic definition of the field as "the formulation and justification of policies for the ethical use of computers." Next the issues of anonymity and personal identity are considered. Computers provide individuals with a unique opportunity to create personae for the virtual world that are quite distinct from their normal identities. What are the moral dimensions of creating virtual personalities?
Perhaps the most pressing ethical issue is addressed in the next section on privacy. The ability of computers to store vast amounts of information on any individual raises the harrowing specter of a Big Brother society in the not-too-distant future. How should information be used and how might it be abused? What safeguards are needed to protect privacy as information technology becomes ever more sophisticated?
In the fourth section, questions concerning ownership of intellectual property and copyright law are considered. How can the rights of authorship be protected in the context of the internet?
Finally, the fifth section explores the debate now taking place regarding the impact of computers on democracy. Do computers offer new possibilities for enhancing democracy or will this prospect turn out to be a myth?
This is a much needed anthology of thought-provoking articles on the critical moral issues facing our "brave new world."

SSH Mastery - OpenSSH, PuTTY, Tunnels and Keys (Hardcover, 2nd ed.): Michael W Lucas SSH Mastery - OpenSSH, PuTTY, Tunnels and Keys (Hardcover, 2nd ed.)
Michael W Lucas
R892 R810 Discovery Miles 8 100 Save R82 (9%) Ships in 18 - 22 working days
E-Commerce Law in Europe and the USA (Hardcover, 2002 ed.): Gerald Spindler, Fritjof Boerner E-Commerce Law in Europe and the USA (Hardcover, 2002 ed.)
Gerald Spindler, Fritjof Boerner
R4,436 Discovery Miles 44 360 Ships in 18 - 22 working days

This unique text deals with the most important legal areas for e-commerce related business in most of the member states in Europe as well as the USA. In doing so the text takes into consideration the national law of the following countries: Belgium, France, Germany, Great Britain, Italy, Netherlands, Norway, Spain, Switzerland, and the USA. Topics that are dealt with include: contract law, consumer protection, intellectual property law, unfair competition, antitrust law, liability of providers, money transactions, privacy and data protection. The country-specific contributions follow a questionnaire which can be found in the beginning. The uniform structure of each contribution enables the reader to quickly find an answer to a legal question. All contributions have been written by experts from each member state.

Privacy and the Commercial Use of Personal Information (Hardcover, 2002 ed.): Paul H. Rubin, Thomas M. Lenard Privacy and the Commercial Use of Personal Information (Hardcover, 2002 ed.)
Paul H. Rubin, Thomas M. Lenard
R2,715 Discovery Miles 27 150 Ships in 18 - 22 working days

The current debate over privacy presents some of the most complex policy-making challenges we have seen in some time. While data on consumers have long been used for marketing purposes, the Internet has substantially increased the flow of personal information. This has produced great benefits, but it also has raised concerns on the part of individuals about what information is being collected, how it is being used and who has access to it. These concerns, in turn, have led to calls for new government regulation. This study focuses on the market for personal information used for advertising and marketing purposes, which is the market affected by most of the regulatory and legislative proposals now under consideration. Unfortunately, there has been little careful analysis of these proposals and their likely consequences. This book attempts to fill this gap by addressing the following basic questions: Are there failures' in the market for personal information? If market failures exist, how do they adversely affect consumers? Can such failures be remedied by government regulation? Would the benefits of government regulation exceed the costs? A/LISTA The authors find that the commercial market for information appears to be working well and is responding to consumers' privacy concerns. They conclude that regulation imposed on a medium like the Internet that is changing so rapidly would have unpredictable and costly consequences. This study is a product of The Progress & Freedom Foundation's project on Regulating Personal Information: Balancing Benefits and Costs. The Progress & Freedom Foundation studies the impact of the digital revolution and its implications for public policy. It conductsresearch in fields such as electronic commerce, telecommunications and the impact of the Internet on government, society and economic growth. It also studies issues such as the need to reform government regulation, especially in technology-intensive fields such as medical innovation, energy and environmental regulation.

Privacy and the Digital State - Balancing Public Information and Personal Privacy (Hardcover): Alan Charles Raul Privacy and the Digital State - Balancing Public Information and Personal Privacy (Hardcover)
Alan Charles Raul
R1,492 Discovery Miles 14 920 Ships in 18 - 22 working days

Alan Charles Raul The devastating and reprehensible acts of terrorism committed against the 11, 2001 have greatly affected our lives, our United States on September livelihoods, and perhaps our way of living. The system of government embodied in our Constitution and Bill of Rights was designed to inhibit excessively efficient government. By imposing checks and balances against over-reaching governmental power, the Founders intended to promote the rule of laws, not men - and to protect the prerogatives of citizens over and above their rulers. No faction was to become so powerful that the rights and interests of any other groups or individuals could be easily trampled. Specifically, the Framers of our constitutional structure prohibited the government from suppressing speech, inhibiting the right of free association, of people, conducting unreasonable preventing (peaceful) assemblies searches and seizures, or acting without observing the dictates of due process and fair play. After September 11, there is a risk that the philosophical protections of the Constitution could appear more than a trifle "academic. " Indeed, our tradional notions of "fair play" will be sorely tested in the context of our compelling requirements for effective self-defense against brutal, evil killers who hate the very idea of America. Now that we witness the grave physical dangers that confront our families, friends, neighbors, and businesses, our commitment to limited government and robust individual liberties will of our inevitably - and understandably - be challenged.

From Anarchy to Power - The Net Comes of Age (Hardcover): Wendy Grossman From Anarchy to Power - The Net Comes of Age (Hardcover)
Wendy Grossman
R1,828 Discovery Miles 18 280 Ships in 18 - 22 working days

"Both newbies (newcomers to the Internet) and Netizens (old-timers) will find challenges and rewards in this witty, knowledgeable, and timely report from the electronic front."
--"Publishers Weekly"

"Vividly describes the virtual realm as a place of interconnecting communities every bitas complicated, exciting, and dangerous as any city."
--"Booklist"

"A pleasant antidote to the breathless rhetoric one finds in many books and magazines devoted to computer culture."
--"Technology Review"

"Grossman brings a wealth of professional and personal experience to the material-and a clarity of style and analysis that is a welcome relief from both the hyperbolic prose of many Net boosters and the overwrought jeremiads of cyberphobes."
--"Reason"

"There is a lot to like about this survey, especially the diligent research and reading the author has invested in it. The endnotes are vast and informative..."From Anarchy to Power" gathers strengh as it goes along."
--"The Christian Century"

"An informative exploration into many of the issues and problems that plague the Net today...From Anarchy to Power is a must read."
-- "ComputerUser.com"

companion website: http: //www.nyupress.org/fap

Yesterday's battles over internet turf were fought on the net itself: today's battles are fought in government committees, in Congress, on the stock exchange, and in the marketplace. What was once an experimental ground for electronic commerce is now the hottest part of our economic infrastructure.

In From Anarchy to Power, Wendy Grossman explores the new dispensation on the net and tackles the questions that trouble every online user: How vulnerable are the internet andworld wide web to malicious cyber hackers? What are the limits of privacy online? How real is internet addiction and to what extent is the news media responsible for this phenomenon? Are women and minorities at a disadvantage in cyberspace? How is the increasing power of big business changing internet culture?

We learn about the political economy of the internet including issues of copyright law, corporate control and cryptography legislation. Throughout the book the emphasis is on the international dimensions of the net, focusing on privacy and censorship in the United States, Europe and Canada and the hitherto ignored contributions of other countries in the development of the net. Entertaining and informative From Anarchy to Power is required reading for anyone who wants to know where the new digital economy is heading.

PAM Mastery (Hardcover): Michael W Lucas PAM Mastery (Hardcover)
Michael W Lucas
R878 R797 Discovery Miles 7 970 Save R81 (9%) Ships in 18 - 22 working days
Cyber Security - Everything an Executive Needs to Know (Hardcover): Phillip Ferraro Cyber Security - Everything an Executive Needs to Know (Hardcover)
Phillip Ferraro
R627 R566 Discovery Miles 5 660 Save R61 (10%) Ships in 18 - 22 working days
Privacy and Data Protection Seals (Hardcover, 1st ed. 2018): Rowena Rodrigues, Vagelis Papakonstantinou Privacy and Data Protection Seals (Hardcover, 1st ed. 2018)
Rowena Rodrigues, Vagelis Papakonstantinou
R2,200 Discovery Miles 22 000 Ships in 18 - 22 working days

The book presents timely and needed contributions on privacy and data protection seals as seen from general, legal, policy, economic, technological, and societal perspectives. It covers data protection certification in the EU (i.e., the possibilities, actors and building blocks); the Schleswig-Holstein Data Protection Seal; the French Privacy Seal Scheme; privacy seals in the USA, Europe, Japan, Canada, India and Australia; controversies, challenges and lessons for privacy seals; the potential for privacy seals in emerging technologies; and an economic analysis. This book is particularly relevant in the EU context, given the General Data Protection Regulation (GDPR) impetus to data protection certification mechanisms and the dedication of specific provisions to certification. Its coverage of practices in jurisdictions outside the EU also makes it relevant globally. This book will appeal to European legislators and policy-makers, privacy and data protection practitioners, certification bodies, international organisations, and academics. Rowena Rodrigues is a Senior Research Analyst with Trilateral Research Ltd. in London and Vagelis Papakonstantinou is a Senior Researcher at the Vrije Universiteit Brussel in Brussels.

Cyber Security. Simply. Make it Happen. - Leveraging Digitization Through IT Security (Hardcover, 1st ed. 2017): Ferri... Cyber Security. Simply. Make it Happen. - Leveraging Digitization Through IT Security (Hardcover, 1st ed. 2017)
Ferri Abolhassan
R1,872 R1,427 Discovery Miles 14 270 Save R445 (24%) Ships in 10 - 15 working days

This book provides a practical and strategic perspective on IT and cyber security for corporations and other businesses. Leading experts from industry, politics and research discuss the status quo and future prospects of corporate cyber security. They answer questions such as: How much will IT security cost? Who will provide IT security? Can security even be fun? The book claims that digitization will increasingly pervade all areas of the economy, as well as our daily professional and personal lives. It will produce speed, agility and cost efficiency, but also increasing vulnerability in the context of public, corporate and private life. Consequently, cyber security is destined to become the great facilitator of digitization, providing maximum protection for data, networks, data centres and terminal devices.

Cybersecurity Exposed - The Cyber House Rules (Hardcover): Raef Meeuwisse Cybersecurity Exposed - The Cyber House Rules (Hardcover)
Raef Meeuwisse
R656 Discovery Miles 6 560 Ships in 18 - 22 working days
PCI Compliance - Understand and Implement Effective PCI Data Security Standard Compliance (Paperback, 5th edition): Branden... PCI Compliance - Understand and Implement Effective PCI Data Security Standard Compliance (Paperback, 5th edition)
Branden Williams, James Adamson
R1,371 Discovery Miles 13 710 Ships in 9 - 17 working days

Unique selling point: * Industry standard book for merchants, banks, and consulting firms looking to learn more about PCI DSS compliance. Core audience: * Retailers (both physical and electronic), firms who handle credit or debit cards (such as merchant banks and processors), and firms who deliver PCI DSS products and services. Place in the market: * Currently there are no PCI DSS 4.0 books

Information Hiding Techniques for Steganography and Digital Watermarking (Hardcover): Stefan Katzenbeisser, Fabien Peticolas Information Hiding Techniques for Steganography and Digital Watermarking (Hardcover)
Stefan Katzenbeisser, Fabien Peticolas; Fabien Petitcolas, Stefan Katzenbeisser; Edited by F. Petticolas
R2,742 Discovery Miles 27 420 Ships in 18 - 22 working days

Steganography, a means by which two or more parties may communicate using "invisible" or "subliminal" communication, and watermarking, a means of hiding copyright data in images, are becoming necessary components of commercial multimedia applications that are subject to illegal use. This is a comprehensive survey of steganography and watermarking and their application to modern communications and multimedia. It helps the reader to understand steganography, the history of this previously neglected element of cryptography, the hurdles of international law on strong cryptographic techniques, and a description of the methods you can use to hide information in modern media. Included in this discussion is an overview of "steganalysis", methods which can be used to break stenographic communication. This resource also includes an introduction to and survey of watermarking methods, and discusses this method's similarities to and differences from steganography. The reader should gain a working knowledge of watermarking's pros and cons, and learn the legal implications of watermarking and copyright issues on the Internet.

Security and Privacy in Social Networks (Hardcover, 2013 ed.): Yaniv Altshuler, Yuval Elovici, Armin B. Cremers, Nadav Aharony,... Security and Privacy in Social Networks (Hardcover, 2013 ed.)
Yaniv Altshuler, Yuval Elovici, Armin B. Cremers, Nadav Aharony, Alex Pentland
R2,672 Discovery Miles 26 720 Ships in 18 - 22 working days

"Security and Privacy in Social Networks" brings to the forefront innovative approaches for analyzing and enhancing the security and privacy dimensions in online social networks, and is the first comprehensive attempt dedicated entirely to this field. In order to facilitate the transition of such methods from theory to mechanisms designed and deployed in existing online social networking services, the book aspires to create a common language between the researchers and practitioners of this new area- spanning from the theory of computational social sciences to conventional security and network engineering.

Cyber Law, Privacy, and Security - Concepts, Methodologies, Tools, and Applications, VOL 2 (Hardcover): Information Reso... Cyber Law, Privacy, and Security - Concepts, Methodologies, Tools, and Applications, VOL 2 (Hardcover)
Information Reso Management Association
R9,436 Discovery Miles 94 360 Ships in 18 - 22 working days
Privacy and Technologies of Identity - A Cross-Disciplinary Conversation (Hardcover, 2006 ed.): Katherine J. Strandburg,... Privacy and Technologies of Identity - A Cross-Disciplinary Conversation (Hardcover, 2006 ed.)
Katherine J. Strandburg, Daniela Stan Raicu
R4,223 Discovery Miles 42 230 Ships in 18 - 22 working days

Privacy and Technologies of Identity: A Cross-Disciplinary Conversation provides an overview of ways in which technological changes raise privacy concerns. It then addresses four major areas of technology: RFID and location tracking technology; biometric technology, data mining; and issues with anonymity and authentication of identity. Many of the chapters are written with the non-specialist in mind, seeking to educate a diverse audience on the "basics" of the technology and the law and to point out the promise and perils of each technology for privacy. The material in this book provides an interface between legal and policy approaches to privacy and technologies that either threaten or enhance privacy.

This book grew out of the Fall 2004 CIPLIT(r) Symposium on Privacy and Identity: The Promise and Perils of a Technological Age, co-sponsored by DePaul University's College of Law and School of Computer Science, Telecommunications and Information Systems. The Symposium brought together leading researchers in advanced technology and leading thinkers from the law and policy arenas, many of whom have contributed chapters to the book. Like the Symposium, the book seeks to contribute to a conversation among technologists, lawyers, and policymakers about how best to handle the challenges to privacy that arise from recent technological advances.

The Data Bank Society (Routledge Revivals) - Organizations, Computers and Social Freedom (Paperback): Malcolm Warner, Mike Stone The Data Bank Society (Routledge Revivals) - Organizations, Computers and Social Freedom (Paperback)
Malcolm Warner, Mike Stone
R678 Discovery Miles 6 780 Ships in 10 - 15 working days

This study, written in the context of its first publication in 1970, discusses and documents the invasion of privacy by the corporation and the social institution in the search for efficiency in information processing. Discussing areas such as the impact of the computer on administration, privacy and the storage on information, the authors assess the technical and social feasibility of constructing integrated data banks to cover the details of populations. The book was hugely influential both in terms of scholarship and legislation, and the years following saw the Data Protection Act of 1984, which was then consolidated by the Act of 1998. The topics under discussion remain of great concern to the public in our increasingly web-based world, ensuring the continued relevance of this title to academics and students with an interest in data protection and public privacy.

Cyber Law, Privacy, and Security - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover): Information Reso... Cyber Law, Privacy, and Security - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover)
Information Reso Management Association
R9,442 Discovery Miles 94 420 Ships in 18 - 22 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Tilted Pentagram
Matthew MacDevette Paperback R360 R332 Discovery Miles 3 320
Restore Me - Shatter Me: Book 4
Tahereh Mafi Hardcover R590 R519 Discovery Miles 5 190
Fourth Wing - The Empyrean: Book 1
Rebecca Yarros Paperback  (3)
R305 R272 Discovery Miles 2 720
The Atlas Six
Olivie Blake Paperback R285 R258 Discovery Miles 2 580
The Ragpicker King - The Chronicles Of…
Cassandra Clare Paperback R399 R362 Discovery Miles 3 620
Court Of The Vampire Queen
Katee Robert Paperback R298 R274 Discovery Miles 2 740
Onyx Storm - The Empyrean: Book 3
Rebecca Yarros Hardcover R690 R593 Discovery Miles 5 930
Apprentice to the Villain
Hannah Nicole Maehrer Paperback R275 R246 Discovery Miles 2 460
Beautiful Nightmares - Fortuna Sworn…
K J Sutton Paperback R335 R310 Discovery Miles 3 100
Six Scorched Roses
Carissa Broadbent Paperback  (1)
R385 R349 Discovery Miles 3 490

 

Partners