0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (158)
  • R250 - R500 (194)
  • R500+ (825)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

Privacy and Big Data (Paperback): Terence Craig Privacy and Big Data (Paperback)
Terence Craig; Contributions by Mary E. Ludloff
R476 R390 Discovery Miles 3 900 Save R86 (18%) Ships in 12 - 19 working days

Much of what constitutes Big Data is information about us. Through our online activities, we leave an easy-to-follow trail of digital footprints that reveal who we are, what we buy, where we go, and much more. This eye-opening book explores the raging privacy debate over the use of personal data, with one undeniable conclusion: once data's been collected, we have absolutely no control over who uses it or how it is used.

Personal data is the hottest commodity on the market today--truly more valuable than gold. We are the asset that every company, industry, non-profit, and government wants. Privacy and Big Data introduces you to the players in the personal data game, and explains the stark differences in how the U.S., Europe, and the rest of the world approach the privacy issue.

You'll learn about: Collectors: social networking titans that collect, share, and sell user data Users: marketing organizations, government agencies, and many others Data markets: companies that aggregate and sell datasets to anyone Regulators: governments with one policy for commercial data use, and another for providing security

Genetic Testing and the Use of Information (Paperback): Clarisa Long Genetic Testing and the Use of Information (Paperback)
Clarisa Long
R414 R385 Discovery Miles 3 850 Save R29 (7%) Ships in 10 - 15 working days

We are in the early years of a technological revolution arising from our understanding of the genetic meaning of life. Scientists' ability to manipulate and decode genes is advancing at an extraordinary pace - so fast we are often unprepared to handle the many vexing legal, economic, ethical and social issues they raise. The combination of genetic research and information technology raises often chilling questions of privacy and genetic discrimination. Should individuals be allowed personal property rights to their DNA, cells or tissues? How should policymakers regulate the biotechnology industry to maximize safety without stifling innovation? What are the appropriate uses of gene therapy and other genetic manipulations? In "Genetic Testing and the Use of Information", leading scholars grapple with issues of genetic privacy, the regulation of genetic testing and genetic discrimination. They consider such questions as: Who should have access to information derived from a genetic test? Should one be obligated to tell a spouse or a child test results? Should governments ever appropriately mandate individual genetic testing or community-wide genetic screening? Will employers be able to require the release of genetic records as a condition of employment? Will insurance companies be allowed to use genetic information to determine risk? At what point does a genetic condition qualify as a disability under the American with Disabilities Act?

Ransomware (Paperback): Allan Liska, Timothy Gallo Ransomware (Paperback)
Allan Liska, Timothy Gallo
R1,075 R725 Discovery Miles 7 250 Save R350 (33%) Ships in 12 - 19 working days

The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay a ransom to unlock them. With this practical book, you'll learn how easily ransomware infects your system and what steps you can take to stop the attack before it sets foot in the network. Security experts Allan Liska and Timothy Gallo explain how the success of these attacks not only has spawned several variants of ransomware, but also a litany of ever-changing ways they're delivered to targets. You'll learn pragmatic methods for responding quickly to a ransomware attack, as well as how to protect yourself from becoming infected in the first place. Learn how ransomware enters your system and encrypts your files Understand why ransomware use has grown, especially in recent years Examine the organizations behind ransomware and the victims they target Learn how wannabe hackers use Ransomware as a Service (RaaS) to launch campaigns Understand how ransom is paid-and the pros and cons of paying Use methods to protect your organization's workstations and servers

The Handbook of Privacy Studies - An Interdisciplinary Introduction (Paperback, 0): Bart Sloot, Aviva Groot The Handbook of Privacy Studies - An Interdisciplinary Introduction (Paperback, 0)
Bart Sloot, Aviva Groot
R1,072 Discovery Miles 10 720 Ships in 12 - 19 working days

The Handbook of Privacy Studies is the first book in the world that brings together several disciplinary perspectives on privacy, such as the legal, ethical, medical, informatics and anthropological perspective. Privacy is in the news almost every day: mass surveillance by intelligence agencies, the use of social media data for commercial profit and political microtargeting, password hacks and identity theft, new data protection regimes, questionable reuse of medical data, and concerns about how algorithms shape the way we think and decide. This book offers interdisciplinary background information about these developments and explains how to understand and properly evaluate them. The book is set up for use in interdisciplinary educational programmes. Each chapter provides a structured analysis of the role of privacy within that discipline, its characteristics, themes and debates, as well as current challenges. Disciplinary approaches are presented in such a way that students and researchers from every scientific background can follow the argumentation and enrich their own understanding of privacy issues.

Cyber Storm (Hardcover): Leading Cybersecurity Experts Cyber Storm (Hardcover)
Leading Cybersecurity Experts
R694 Discovery Miles 6 940 Ships in 10 - 15 working days
Datenanonymisierung im Kontext von Kunstlicher Intelligenz und Big Data - Grundlagen - Elementare Techniken - Anwendung... Datenanonymisierung im Kontext von Kunstlicher Intelligenz und Big Data - Grundlagen - Elementare Techniken - Anwendung (German, Paperback, 1. Aufl. 2022)
Heinz-Adalbert Krebs, Patricia Hagenweiler
R990 Discovery Miles 9 900 Ships in 10 - 15 working days

Die fortschreitende Digitalisierung, die immer hoehere Verfugbarkeit des Internets in Echtzeit sowie die progressive Entwicklung der IT ermoeglichen es Unternehmen und Organisationen, Daten in einem nie zuvor dagewesenen Umfang zu erzeugen und zu verarbeiten, wodurch sie einen enormen Stellen- und Marktwert erhalten haben. Zudem kann mithilfe der kunstlichen Intelligenz (KI) das in den Daten enthaltene Wissen extrahiert werden. Oft handelt es sich dabei um gesammelte Daten von Personen, mit denen Vorhersagen uber verschiedene Aspekte der Personen getroffen werden koennen.Das Buch befasst sich mit der Anonymisierung im Kontext der KI und Big Data. Dazu werden die wesentlichen Grundlagen dargestellt sowie pseudonymisierte und anonymisierte Daten mit Personenbezug im Rahmen der Datenschutz-Grundverordnung (DSGVO) und des Bundesdatenschutzgesetzes (BDSG) beleuchtet. Es werden Moeglichkeiten zur Pseudonymisierung, zu den jeweiligen Techniken und Verfahren der Anonymisierung sowie entsprechende Risikobetrachtungen behandelt. Abschliessend wird die Vorgehensweise der Anonymisierung aus rechtlicher und technischer Sicht unter Anwendung entsprechender Software behandelt.

Digitale Kompetenz - Grundlagen der Kunstlichen Intelligenz, Blockchain-Technologie, Quanten-Computing und deren Anwendungen... Digitale Kompetenz - Grundlagen der Kunstlichen Intelligenz, Blockchain-Technologie, Quanten-Computing und deren Anwendungen fur die Digitale Transformation (German, Paperback, 1. Aufl. 2022)
Volker Lang
R864 R752 Discovery Miles 7 520 Save R112 (13%) Ships in 10 - 15 working days

Wenn Sie neugierig auf die Grundlagen der kunstlichen Intelligenz, der Blockchain-Technologie und des Quantencomputings sind, die fur die digitale Transformation und Innovation von entscheidender Bedeutung sind, ist Digital Fluency Ihr praktischer Leitfaden. Die realen Anwendungen dieser Spitzentechnologien nehmen rapide zu, und Ihr tagliches Leben wird weiterhin von jeder dieser Technologien beeinflusst werden. Es gibt keinen besseren Zeitpunkt als jetzt, um anzufangen und sich digital fit zu machen. Sie mussen keine Vorkenntnisse uber diese vielseitigen Technologien haben, denn der Autor Volker Lang fuhrt Sie kompetent durch das digitale Zeitalter. In zahlreichen Praxisbeispielen und mehr als 48 einpragsamen Abbildungen veranschaulicht er in Digital Fluency zentrale Konzepte und Anwendungen. Am Ende jedes Kapitels finden Sie eine hilfreiche Checkliste zur Umsetzung der zentralen Lektionen, bevor Sie zum nachsten Kapitel ubergehen. Dieses Buch geht den digitalen Schlagwoertern und Konzepten auf den Grund und sagt Ihnen, was sie wirklich bedeuten. Das Aufschlusseln von Themen wie automatisiertes Fahren und intelligente Robotik mit kunstlicher Intelligenz, Blockchain-basierte Kryptowahrungen und Smart Contracts, Medikamentenentwicklung und Optimierung von Finanzinvestitionsportfolios durch Quantencomputing und vieles mehr ist unerlasslich, um fur die Zukunft der Industrie gerustet zu sein. Unabhangig davon, ob Ihre eigene digitale Transformation in Ihrem privaten oder oeffentlichen Unternehmen, in Ihrem Studium oder in Ihrem Privathaushalt stattfindet, Digital Fluency erstellt einen konkreten digitalen Aktionsplan fur alle Ihre Anforderungen an Technologie- und Innovationsstrategien. Was Sie lernen werden Sich im digitalen Zeitalter orientieren, ohne Vorkenntnisse uber digitale Technologien und digitale Transformation zu benoetigen Lernen Sie die beliebtesten aktuellen und zukunftigen Anwendungen von kunstlicher Intelligenz, Blockchain-Technologie und Quantencomputing in einer Vielzahl von Branchen kennen, darunter das Gesundheitswesen, Finanzdienstleistungen und die Automobilindustrie Machen Sie sich mit den digitalen Innovationsmodellen von Amazon, Google, Microsoft, IBM und anderen weltweit fuhrenden Unternehmen vertraut. Setzen Sie Ihre eigene digitale Transformation entlang der acht Kerndimensionen eines konkreten digitalen Aktionsplans erfolgreich um. Fur wen dieses Buch bestimmt ist Vordenker, Fuhrungskrafte und Industriestrategen, Management- und Strategieberater, Politiker und Entscheidungstrager, Unternehmer, Finanzanalysten, Investoren und Risikokapitalgeber, Studenten und Forscher sowie allgemeine Leser, die sich digital fit machen wollen.

The Foundations of EU Data Protection Law (Hardcover): Orla Lynskey The Foundations of EU Data Protection Law (Hardcover)
Orla Lynskey
R4,185 Discovery Miles 41 850 Ships in 12 - 19 working days

Nearly two decades after the EU first enacted data protection rules, key questions about the nature and scope of this EU policy, and the harms it seeks to prevent, remain unanswered. The inclusion of a Right to Data Protection in the EU Charter has increased the salience of these questions, which must be addressed in order to ensure the legitimacy, effectiveness and development of this Charter right and the EU data protection regime more generally. The Foundations of EU Data Protection Law is a timely and important work which sheds new light on this neglected area of law, challenging the widespread assumption that data protection is merely a subset of the right to privacy. By positioning EU data protection law within a comprehensive conceptual framework, it argues that data protection has evolved from a regulatory instrument into a fundamental right in the EU legal order and that this right grants individuals more control over more forms of data than the right to privacy. It suggests that this dimension of the right to data protection should be explicitly recognised, while identifying the practical and conceptual limits of individual control over personal data. At a time when EU data protection law is sitting firmly in the international spotlight, this book offers academics, policy-makers, and practitioners a coherent vision for the future of this key policy and fundamental right in the EU legal order, and how best to realise it.

Customer Data and Privacy: The Insights You Need from Harvard Business Review (Hardcover): Harvard Business Review, Timothy... Customer Data and Privacy: The Insights You Need from Harvard Business Review (Hardcover)
Harvard Business Review, Timothy Morey, Andrew Burt, Christine Moorman, Thomas C. Redman
R1,063 R892 Discovery Miles 8 920 Save R171 (16%) Ships in 10 - 15 working days

Collect data and build trust. With the rise of data science and machine learning, companies are awash in customer data and powerful new ways to gain insight from that data. But in the absence of regulation and clear guidelines from most federal or state governments, it's difficult for companies to understand what qualifies as reasonable use and then determine how to act in the best interest of their customers. How do they build, not erode, trust? Customer Data and Privacy: The Insights You Need from Harvard Business Review brings you today's most essential thinking on customer data and privacy to help you understand the tangled interdependencies and complexities of this evolving issue. The lessons in this book will help you develop strategies that allow your company to be a good steward, collecting, using, and storing customer data responsibly. Business is changing. Will you adapt or be left behind? Get up to speed and deepen your understanding of the topics that are shaping your company's future with the Insights You Need from Harvard Business Review series. Featuring HBR's smartest thinking on fast-moving issues&#8212blockchain, cybersecurity, AI, and more&#8212each book provides the foundational introduction and practical case studies your organization needs to compete today and collects the best research, interviews, and analysis to get it ready for tomorrow. You can't afford to ignore how these issues will transform the landscape of business and society. The Insights You Need series will help you grasp these critical ideas&#8212and prepare you and your company for the future.

IT-Sicherheitsmanagement nach der neuen ISO 27001 - ISMS, Risiken, Kennziffern, Controls (German, Paperback, 2., akt. Aufl.... IT-Sicherheitsmanagement nach der neuen ISO 27001 - ISMS, Risiken, Kennziffern, Controls (German, Paperback, 2., akt. Aufl. 2020)
Heinrich Kersten, Gerhard Klett, Jurgen Reuter, Klaus-Werner Schroeder
R1,111 Discovery Miles 11 110 Ships in 10 - 15 working days

Dieses Buch behandelt das Management der Informationssicherheit auf der Basis der Norm ISO/IEC 27001. Mit der 2. Auflage wurden die Inhalte des Fachbuches umfassend aktualisiert und den Neuerungen der Norm angepasst. Die Autoren erlautern kompetent den Standard und seine organisatorisch-technische Umsetzung. Dies betrifft die Anforderungen an das Informationssicherheits-Managementsystem (ISMS) genauso wie die 114 Controls aus dem Anhang der Norm. Die ausfuhrlich kommentierten Controls unterstutzen Sicherheitsverantwortliche bei der Auswahl geeigneter Sicherheitsmassnahmen in allen Bereichen. Die Normenreihe ISO 27000 ist ein wichtiges Hilfsmittel fur Unternehmen und Behoerden, die ein IT-Sicherheitsmanagement in ihrer Organisation einfuhren und betreiben wollen. Im internationalen Kontext ist die Anwendung der ISO 27001 fur viele Organisationen nahezu unverzichtbar. Nicht zuletzt mit dem deutschen IT-Sicherheitsgesetz erhalt dieser Standard auch national eine hohe Bedeutung. Seit der Neufassung der Norm im Jahr 2015 (deutsche Version) und AEnderungen in 2017 mussen sich alle Organisationen entsprechend umstellen und ihr ISMS anpassen. Hierfur enthalt das Buch entsprechende "Fahrplane".

Radical Secrecy - The Ends of Transparency in Datafied America (Paperback): Clare Birchall Radical Secrecy - The Ends of Transparency in Datafied America (Paperback)
Clare Birchall
R597 Discovery Miles 5 970 Ships in 12 - 19 working days

Reimagining transparency and secrecy in the era of digital data When total data surveillance delimits agency and revelations of political wrongdoing fail to have consequences, is transparency the social panacea liberal democracies purport it to be? This book sets forth the provocative argument that progressive social goals would be better served by a radical form of secrecy, at least while state and corporate forces hold an asymmetrical advantage over the less powerful in data control. Clare Birchall asks: How might transparency actually serve agendas that are far from transparent? Can we imagine a secrecy that could act in the service of, rather than against, a progressive politics? To move beyond atomizing calls for privacy and to interrupt the perennial tension between state security and the public's right to know, Birchall adapts Edouard Glissant's thinking to propose a digital "right to opacity." As a crucial element of radical secrecy, she argues, this would eventually give rise to a "postsecret" society, offering an understanding and experience of the political that is free from the false choice between secrecy and transparency. She grounds her arresting story in case studies including the varied presidential styles of George W. Bush, Barack Obama, and Donald Trump; the Snowden revelations; conspiracy theories espoused or endorsed by Trump; WikiLeaks and guerrilla transparency; and the opening of the state through data portals. Postsecrecy is the necessary condition for imagining, finally, an alternative vision of "the good," of equality, as neither shaped by neoliberal incarnations of transparency nor undermined by secret state surveillance. Not least, postsecrecy reimagines collective resistance in the era of digital data.

Designing a HIPAA-Compliant Security Operations Center - A Guide to Detecting and Responding to Healthcare Breaches and Events... Designing a HIPAA-Compliant Security Operations Center - A Guide to Detecting and Responding to Healthcare Breaches and Events (Paperback, 1st ed.)
Eric C. Thompson
R1,297 R1,077 Discovery Miles 10 770 Save R220 (17%) Ships in 10 - 15 working days

Develop a comprehensive plan for building a HIPAA-compliant security operations center, designed to detect and respond to an increasing number of healthcare data breaches and events. Using risk analysis, assessment, and management data combined with knowledge of cybersecurity program maturity, this book gives you the tools you need to operationalize threat intelligence, vulnerability management, security monitoring, and incident response processes to effectively meet the challenges presented by healthcare's current threats. Healthcare entities are bombarded with data. Threat intelligence feeds, news updates, and messages come rapidly and in many forms such as email, podcasts, and more. New vulnerabilities are found every day in applications, operating systems, and databases while older vulnerabilities remain exploitable. Add in the number of dashboards, alerts, and data points each information security tool provides and security teams find themselves swimming in oceans of data and unsure where to focus their energy. There is an urgent need to have a cohesive plan in place to cut through the noise and face these threats. Cybersecurity operations do not require expensive tools or large capital investments. There are ways to capture the necessary data. Teams protecting data and supporting HIPAA compliance can do this. All that's required is a plan-which author Eric Thompson provides in this book. What You Will Learn Know what threat intelligence is and how you can make it useful Understand how effective vulnerability management extends beyond the risk scores provided by vendors Develop continuous monitoring on a budget Ensure that incident response is appropriate Help healthcare organizations comply with HIPAA Who This Book Is For Cybersecurity, privacy, and compliance professionals working for organizations responsible for creating, maintaining, storing, and protecting patient information.

Informationssicherheit und Datenschutz systematisch und nachhaltig gestalten - Eine kompakte Einfuhrung in die Praxis (German,... Informationssicherheit und Datenschutz systematisch und nachhaltig gestalten - Eine kompakte Einfuhrung in die Praxis (German, Paperback, 2., korr. Aufl. 2020)
Inge Hanschke
R612 Discovery Miles 6 120 Ships in 10 - 15 working days

In diesem Buch werden die Anforderungen der EU-Datenschutz-Grundverordnung (EU-DSGVO) und des Informationssicherheitsmanagements eingefuhrt. Es wird aufgezeigt, welche wesentlichen Bestandteile fur ein integriertes, einfaches und effektives Management-Instrumentarium erforderlich sind. Durch die Kombination mit Enterprise Architecture Management, IT-Servicemanagement und weiteren Disziplinen in ein integriertes Managementsystem kann die Wirksamkeit noch erhoeht werden. Neben einer Einfuhrung erhalt der Leser Tipps und Tricks fur die typischen Fallstricke in der Praxis sowie unmittelbar anwendbare Leitfaden und Empfehlungen - und dies kurz und pragnant. In der 2. Auflage wurden kleinere Fehler korrigiert.

Cybersecurity for Beginners (Paperback, 2nd Revised edition): Raef Meeuwisse Cybersecurity for Beginners (Paperback, 2nd Revised edition)
Raef Meeuwisse
R556 Discovery Miles 5 560 Ships in 9 - 17 working days
Database Nation - The Death of Privacy in the 21st Century (Paperback, New edition): "Garfinkel" Database Nation - The Death of Privacy in the 21st Century (Paperback, New edition)
"Garfinkel"
R425 R356 Discovery Miles 3 560 Save R69 (16%) Ships in 12 - 19 working days

Fifty years ago, in "1984, " George Orwell imagined a future in which privacy was demolished by a totalitarian state that used spies, video surveillance, historical revisionism, and control over the media to maintain its power. Those who worry about personal privacy and identity--especially in this day of technologies that encroach upon these rights--still use Orwell's "Big Brother" language to discuss privacy issues. But the reality is that the age of a monolithic Big Brother is over. And yet the threats are perhaps even more likely to destroy the rights we've assumed were ours.

"Database Nation: The Death of Privacy in the 21st Century" shows how, in these early years of the 21st century, advances in technology endanger our privacy in ways never before imagined. Direct marketers and retailers track our every purchase; surveillance cameras observe our movements; mobile phones will soon report our location to those who want to track us; government eavesdroppers listen in on private communications; misused medical records turn our bodies and our histories against us; and linked databases assemble detailed consumer profiles used to predict and influence our behavior. Privacy--the most basic of our civil rights--is in grave peril.

Simson Garfinkel--journalist, entrepreneur, and international authority on computer security--has devoted his career to testing new technologies and warning about their implications. This newly revised update of the popular hardcover edition of "Database Nation " is his compelling account of how invasive technologies will affect our lives in the coming years. It's a timely, far-reaching, entertaining, and thought-provoking look at the serious threats to privacy facing us today. The book poses a disturbing question: how can we protect our basic rights to privacy, identity, and autonomy when technology is making invasion and control easier than ever before?

Garfinkel's captivating blend of journalism, storytelling, and futurism is a call to arms. It will frighten, entertain, and ultimately convince us that we must take action now to protect our privacy and identity before it's too late.

Die Fortentwicklung des Datenschutzes - Zwischen Systemgestaltung und Selbstregulierung (German, Paperback, 1. Aufl. 2018):... Die Fortentwicklung des Datenschutzes - Zwischen Systemgestaltung und Selbstregulierung (German, Paperback, 1. Aufl. 2018)
Alexander Rossnagel, Michael Friedewald, Marit Hansen
R2,645 Discovery Miles 26 450 Ships in 10 - 15 working days

Der Datenschutz ist nicht ausreichend auf die Herausforderungen moderner Informationstechnik mit Ubiquitous Computing, Big Data, kunstlicher Intelligenz und lernenden Systemen eingestellt. Dies gilt auch fur die Datenschutz-Grundverordnung. Die Beitrage des Sammelbandes untersuchen die Anforderungen des digitalen Wandels an Konzepte, Instrumente und Institutionen des Datenschutzes; sie eroertern Loesungen fur bisher ungeregelte Datenschutzprobleme, entwerfen Konzepte fur einen modernen Grundrechts- und Datenschutz und entwickeln Modelle fur eine Evolution des Datenschutzes in der kunftigen digitalen Welt.

Der Grundsatz Der Verfugbarkeit - Ziel, Rechtsstand Und Perspektiven Des Strafrechtlichen Informationsaustauschs in Der... Der Grundsatz Der Verfugbarkeit - Ziel, Rechtsstand Und Perspektiven Des Strafrechtlichen Informationsaustauschs in Der Europaischen Union (German, Paperback, 1. Aufl. 2018 ed.)
Magdalena Schmidt
R1,748 Discovery Miles 17 480 Ships in 10 - 15 working days
Informationelle Selbstbestimmung Im Digitalen Wandel (German, Paperback, 1. Aufl. 2017 ed.): Michael Friedewald, Joern Lamla,... Informationelle Selbstbestimmung Im Digitalen Wandel (German, Paperback, 1. Aufl. 2017 ed.)
Michael Friedewald, Joern Lamla, Alexander Rossnagel
R2,374 Discovery Miles 23 740 Ships in 10 - 15 working days
Your Safety and Privacy Online - The CIA and NSA (Paperback): Siggi Bjarnason Your Safety and Privacy Online - The CIA and NSA (Paperback)
Siggi Bjarnason
R314 R298 Discovery Miles 2 980 Save R16 (5%) Ships in 10 - 15 working days
Data Protection and Privacy, Volume 12 - Data Protection and Democracy (Hardcover): Dara Hallinan, Ronald Leenes, Serge... Data Protection and Privacy, Volume 12 - Data Protection and Democracy (Hardcover)
Dara Hallinan, Ronald Leenes, Serge Gutwirth, Paul De Hert
R2,669 Discovery Miles 26 690 Ships in 10 - 15 working days

The subjects of this volume are more relevant than ever, especially in light of the raft of electoral scandals concerning voter profiling. This volume brings together papers that offer conceptual analyses, highlight issues, propose solutions, and discuss practices regarding privacy and data protection. It is one of the results of the twelfth annual International Conference on Computers, Privacy and Data Protection, CPDP, held in Brussels in January 2019. The book explores the following topics: dataset nutrition labels, lifelogging and privacy by design, data protection iconography, the substance and essence of the right to data protection, public registers and data protection, modelling and verification in data protection impact assessments, examination scripts and data protection law in Cameroon, the protection of children's digital rights in the GDPR, the concept of the scope of risk in the GDPR and the ePrivacy Regulation. This interdisciplinary book has been written at a time when the scale and impact of data processing on society - not only on individuals, but also on social systems - is becoming ever starker. It discusses open issues as well as daring and prospective approaches, and will serve as an insightful resource for readers with an interest in computers, privacy and data protection.

Adapt and Overcome - What Business Owners Need to Do to Keep Employees, Clients and Infrastructure Safe During a Time of Crisis... Adapt and Overcome - What Business Owners Need to Do to Keep Employees, Clients and Infrastructure Safe During a Time of Crisis (Paperback)
Bryan Hornung, Chee Lam, Jeri Morgan
R428 Discovery Miles 4 280 Ships in 10 - 15 working days
Cybersecurity - 3 in 1- Beginner's Guide+ Tips and tricks+ Advanced and Effective measures to secure your Cyber Networks... Cybersecurity - 3 in 1- Beginner's Guide+ Tips and tricks+ Advanced and Effective measures to secure your Cyber Networks (Paperback)
Elijah Lewis
R1,215 Discovery Miles 12 150 Ships in 10 - 15 working days
Online Predators, an Internet Insurgency - A Field Manual for Teaching and Parenting in the Digital Arena (Hardcover): Jeffrey... Online Predators, an Internet Insurgency - A Field Manual for Teaching and Parenting in the Digital Arena (Hardcover)
Jeffrey A. Lee
R1,268 R1,011 Discovery Miles 10 110 Save R257 (20%) Ships in 12 - 19 working days

In Online Predators, An Internet Insurgency: A Field Manual for Teaching and Parenting in the Digital Arena Jeffrey A. Lee brings his ten plus years' experience in the fight against online child exploitation to bear in an easy to follow guide for all with a stake in the life of a child. This book equips parents, guardians, extended family, and educational professionals with practical strategies to help keep kids safe in a technology connected world. Instead of focusing on ever changing technology, Lee proposes a key fundamental change in the fight against online predation-to develop an insatiable curiosity about their child's online life, then get in the front lines and stay there.

SQL & NoSQL Databases - Models, Languages, Consistency Options and Architectures for Big Data Management (Paperback, 1st ed.... SQL & NoSQL Databases - Models, Languages, Consistency Options and Architectures for Big Data Management (Paperback, 1st ed. 2019)
Andreas Meier, Michael Kaufmann
R1,308 Discovery Miles 13 080 Ships in 9 - 17 working days

This book offers a comprehensive introduction to relational (SQL) and non-relational (NoSQL) databases. The authors thoroughly review the current state of database tools and techniques, and examine coming innovations. The book opens with a broad look at data management, including an overview of information systems and databases, and an explanation of contemporary database types: SQL and NoSQL databases, and their respective management systems The nature and uses of Big Data A high-level view of the organization of data management Data Modeling and Consistency Chapter-length treatment is afforded Data Modeling in both relational and graph databases, including enterprise-wide data architecture, and formulas for database design. Coverage of languages extends from an overview of operators, to SQL and and QBE (Query by Example), to integrity constraints and more. A full chapter probes the challenges of Ensuring Data Consistency, covering: Multi-User Operation Troubleshooting Consistency in Massive Distributed Data Comparison of the ACID and BASE consistency models, and more System Architecture also gets from its own chapter, which explores Processing of Homogeneous and Heterogeneous Data; Storage and Access Structures; Multi-dimensional Data Structures and Parallel Processing with MapReduce, among other topics. Post-Relational and NoSQL Databases The chapter on post-relational databases discusses the limits of SQL - and what lies beyond, including Multi-Dimensional Databases, Knowledge Bases and and Fuzzy Databases. A final chapter covers NoSQL Databases, along with Development of Non-Relational Technologies, Key-Value, Column-Family and Document Stores XML Databases and Graphic Databases, and more The book includes more than 100 tables, examples and illustrations, and each chapter offers a list of resources for further reading. SQL & NoSQL Databases conveys the strengths and weaknesses of relational and non-relational approaches, and shows how to undertake development for big data applications. The book benefits readers including students and practitioners working across the broad field of applied information technology. This textbook has been recommended and developed for university courses in Germany, Austria and Switzerland.

Cybersecurity - Advanced and Effective Measures to Secure Your Cyber Networks (Paperback): Elijah Lewis Cybersecurity - Advanced and Effective Measures to Secure Your Cyber Networks (Paperback)
Elijah Lewis
R538 Discovery Miles 5 380 Ships in 10 - 15 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Advanced Methodologies and Technologies…
Mehdi Khosrowpour Hardcover R7,742 Discovery Miles 77 420
Your Safety and Privacy Online - The CIA…
Siggi Bjarnason Hardcover R564 R524 Discovery Miles 5 240
Research Handbook on Privacy and Data…
Gloria Gonzalez, Rosamunde van Brakel, … Hardcover R6,731 Discovery Miles 67 310
EU General Data Protection Regulation…
It Governance Privacy Team Paperback R805 Discovery Miles 8 050
Elementary... the Art and Science of…
Miguel Fernandez, Alan Millington, … Hardcover R1,184 Discovery Miles 11 840
Pandemic Surveillance - Privacy…
Margaret Hu Hardcover R3,175 Discovery Miles 31 750
Handbook of Research on Advanced…
Ahmed J. Obaid, Ghassan H Abdul-Majeed, … Hardcover R7,930 Discovery Miles 79 300
Identified, Tracked, and Profiled - The…
Peter Dauvergne Hardcover R2,354 Discovery Miles 23 540
Security and Privacy Management…
Yassine Maleh Hardcover R5,556 Discovery Miles 55 560
Online Predators, an Internet Insurgency…
Jeffrey A. Lee Paperback R606 Discovery Miles 6 060

 

Partners