0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (120)
  • R250 - R500 (219)
  • R500+ (772)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

scam.con (Paperback): Tom Law scam.con (Paperback)
Tom Law
R865 Discovery Miles 8 650 Ships in 18 - 22 working days
Commercial Cyber Espionage and Barriers to Digital Trade in China (Paperback): U S -China Economic and Security Review Commercial Cyber Espionage and Barriers to Digital Trade in China (Paperback)
U S -China Economic and Security Review
R460 Discovery Miles 4 600 Ships in 18 - 22 working days
Secret Password Journal (Paperback): Speedy Publishing LLC Secret Password Journal (Paperback)
Speedy Publishing LLC
R348 R321 Discovery Miles 3 210 Save R27 (8%) Ships in 18 - 22 working days
Website Address Book (Paperback): Speedy Publishing LLC Website Address Book (Paperback)
Speedy Publishing LLC
R348 R321 Discovery Miles 3 210 Save R27 (8%) Ships in 18 - 22 working days
Password Journal and Website Keeper (Paperback): Speedy Publishing LLC Password Journal and Website Keeper (Paperback)
Speedy Publishing LLC
R348 R321 Discovery Miles 3 210 Save R27 (8%) Ships in 18 - 22 working days
My Password Journal (Paperback): Speedy Publishing LLC My Password Journal (Paperback)
Speedy Publishing LLC
R348 R321 Discovery Miles 3 210 Save R27 (8%) Ships in 18 - 22 working days
Password Keeper (Paperback): Speedy Publishing LLC Password Keeper (Paperback)
Speedy Publishing LLC
R348 R321 Discovery Miles 3 210 Save R27 (8%) Ships in 18 - 22 working days
Password Journal (Paperback): Speedy Publishing LLC Password Journal (Paperback)
Speedy Publishing LLC
R348 R321 Discovery Miles 3 210 Save R27 (8%) Ships in 18 - 22 working days
Cybersecurity - Setting the Rules for Responsible Global Cyber Behavior (Paperback): The Pacific Subcommittee on East Asia Cybersecurity - Setting the Rules for Responsible Global Cyber Behavior (Paperback)
The Pacific Subcommittee on East Asia
R419 Discovery Miles 4 190 Ships in 18 - 22 working days
Bit Wars - Cyber Crime, Hacking & Information Warfare (Paperback): Thomas S Hyslip Bit Wars - Cyber Crime, Hacking & Information Warfare (Paperback)
Thomas S Hyslip
R156 Discovery Miles 1 560 Ships in 18 - 22 working days
Boys Password Journal (Paperback): Speedy Publishing LLC Boys Password Journal (Paperback)
Speedy Publishing LLC
R348 R321 Discovery Miles 3 210 Save R27 (8%) Ships in 18 - 22 working days
Hacking for Beginners - Learn How to Hack! a Complete Beginners Guide to Hacking! Learn the Secrets That the Professional... Hacking for Beginners - Learn How to Hack! a Complete Beginners Guide to Hacking! Learn the Secrets That the Professional Hackers Are Using Today! (Paperback)
Kevin Donaldson 1
R268 Discovery Miles 2 680 Ships in 18 - 22 working days
Hack Proof - Protecting your privacy and personal data in the Digital Economy (Paperback): John Berry Hack Proof - Protecting your privacy and personal data in the Digital Economy (Paperback)
John Berry
R408 Discovery Miles 4 080 Ships in 18 - 22 working days
Tor Bible (Paperback): Arlen Kraham Tor Bible (Paperback)
Arlen Kraham
R940 Discovery Miles 9 400 Ships in 18 - 22 working days
Tackling the SPAM Menace (Paperback): John Davidson Tackling the SPAM Menace (Paperback)
John Davidson; Edited by Mendon Cottage Books; Dueep Jyot Singh
R175 Discovery Miles 1 750 Ships in 18 - 22 working days
Building a Life and Career in Security - A Guide from Day 1 to Building A Life and Career in Information Security (Paperback):... Building a Life and Career in Security - A Guide from Day 1 to Building A Life and Career in Information Security (Paperback)
Jay Schulman
R179 Discovery Miles 1 790 Ships in 18 - 22 working days
What Happens on Campus Stays on YouTube - The NEW rules for your reputation on campus, online, and beyond. (Paperback): Paul... What Happens on Campus Stays on YouTube - The NEW rules for your reputation on campus, online, and beyond. (Paperback)
Paul Gordon Brown, Jason L Meriwether, Courtney O'Connell
R427 Discovery Miles 4 270 Ships in 18 - 22 working days
Seguro, Atento y Simpatico - Como utilizar los medios sociales para impresionar a universidades y a futuros empleadores... Seguro, Atento y Simpatico - Como utilizar los medios sociales para impresionar a universidades y a futuros empleadores (Paperback)
Josh Ochs
R232 Discovery Miles 2 320 Ships in 18 - 22 working days
The Algorithmic Foundations of Differential Privacy (Paperback): Cynthia Dwork, Aaron Roth The Algorithmic Foundations of Differential Privacy (Paperback)
Cynthia Dwork, Aaron Roth
R2,191 Discovery Miles 21 910 Out of stock

The problem of privacy-preserving data analysis has a long history spanning multiple disciplines. As electronic data about individuals becomes increasingly detailed, and as technology enables ever more powerful collection and curation of these data, the need increases for a robust, meaningful, and mathematically rigorous definition of privacy, together with a computationally rich class of algorithms that satisfy this definition. Differential Privacy is such a definition. The Algorithmic Foundations of Differential Privacy starts out by motivating and discussing the meaning of differential privacy, and proceeds to explore the fundamental techniques for achieving differential privacy, and the application of these techniques in creative combinations, using the query-release problem as an ongoing example. A key point is that, by rethinking the computational goal, one can often obtain far better results than would be achieved by methodically replacing each step of a non-private computation with a differentially private implementation. Despite some powerful computational results, there are still fundamental limitations. Virtually all the algorithms discussed herein maintain differential privacy against adversaries of arbitrary computational power - certain algorithms are computationally intensive, others are efficient. Computational complexity for the adversary and the algorithm are both discussed. The monograph then turns from fundamentals to applications other than query-release, discussing differentially private methods for mechanism design and machine learning. The vast majority of the literature on differentially private algorithms considers a single, static, database that is subject to many analyses. Differential privacy in other models, including distributed databases and computations on data streams, is discussed. The Algorithmic Foundations of Differential Privacy is meant as a thorough introduction to the problems and techniques of differential privacy, and is an invaluable reference for anyone with an interest in the topic.

Examining the President's Cybersecurity Information-Sharing Proposal (Paperback): Committee on Homeland Security House of Examining the President's Cybersecurity Information-Sharing Proposal (Paperback)
Committee on Homeland Security House of
R397 Discovery Miles 3 970 Ships in 18 - 22 working days
The Complete Guide to Personal Computer Password Security (Paperback): Doug Felteau, Khalid J Hosein The Complete Guide to Personal Computer Password Security (Paperback)
Doug Felteau, Khalid J Hosein
R219 Discovery Miles 2 190 Ships in 18 - 22 working days
Protecting Your Business From Cyber Attacks In Only 10 Minutes A Day - Simple Steps to Help You Create Better Security Habits... Protecting Your Business From Cyber Attacks In Only 10 Minutes A Day - Simple Steps to Help You Create Better Security Habits to Reduce the Risk of Becoming a Cyber Victim (Paperback)
Boaz Fischer
R1,776 Discovery Miles 17 760 Ships in 18 - 22 working days
Consumer Privacy in the 21st Century - Best Practices for Businesses & Policymakers (Hardcover): Larry A Schwartz Consumer Privacy in the 21st Century - Best Practices for Businesses & Policymakers (Hardcover)
Larry A Schwartz
R3,655 Discovery Miles 36 550 Ships in 10 - 15 working days

In today's world of smart phones, smart grids, and smart cars, companies are collecting, storing, and sharing more information about consumers than ever before. Although companies use this information to innovate and deliver better products and services to consumers, they should not do so at the expense of consumer privacy. This book provides an overview for how companies can act now to implement best practices to protect consumers' private information. These best practices would include making privacy the "default setting" for commercial data practices and give consumers greater control over the collection and use of their personal data through simplified choices and increased transparency. Implementing these best practices will enhance trust and stimulate commerce.

Basic Politics of Movement Security - A Talk of Security with J. Sakai & G20 Repression & Infiltration in Toronto: An Interview... Basic Politics of Movement Security - A Talk of Security with J. Sakai & G20 Repression & Infiltration in Toronto: An Interview with Mandy Hiscocks (Paperback)
J Sakai, Mandy Hiscocks
R185 Discovery Miles 1 850 Ships in 18 - 22 working days

Here are two "live" discussions by radical activists introducing the issues of movement security: u.s. activist and author J. Sakai & long-time Canadian organizer Mandy Hiscocks.


There are many books and articles reporting state repression, but not on that subject's more intimate relative, movement security. It is general practice to only pass along knowledge about movement security privately, in closed group lectures or by personal word-of-mouth. In fact, when new activists have questions about security problems, they quickly discover that there is no "Security for Dummies" to explore the basics. Adding to the confusion, the handful of available left security texts are usually about underground or illegal groups, not the far larger public movements that work on a more or less legal level.


During Montreal's 2013 Festival of Anarchy, J. Sakai gave a workshop about the politics of movement security, sharing the results of typical incidents of both the movement's successes and the movement's failures in combating the "political police" or state security agencies. He also discussed the nature of those state sub-cultures. This booklet contains a transcript of that talk, and of the subsequent lively question and answer period; along with several after-the-workshop observations by Sakai.


As he explains, "The key thing is, to start with, security is not about being macho vigilantes or having techniques of this or that. It's not some spy game. Security is about good politics. That's exactly why it's so difficult. But everyone will say that they have good politics. So this has to be broken down, this has to be explained." Which is what he does in this unusual talk.


Mandy Hiscocks comes at the topic from her personal experiences organizing against the 2010 G20 Summit in Toronto. In this in-depth interview, Hiscocks describes how her political scene and groups she worked with were infiltrated by undercover agents over a year before the summit even occurred. These police infiltrators provided information used in the prosecution of anti-Globalization organizers and participants. Hiscocks provides an honest and sobering appraisal of the practical challenge of State infiltration, and of how subsequent decisions played out in regards to the anti-G20 organizing and the repression that resulted. Hiscocks spent a year in prison as a result of these experiences, shortly after this interview was conducted.


Digital Assassination - Protecting Your Reputation, Brand, or Business Against Online Attacks (Paperback): Richard Torrenzano,... Digital Assassination - Protecting Your Reputation, Brand, or Business Against Online Attacks (Paperback)
Richard Torrenzano, Mark Davis
R544 R508 Discovery Miles 5 080 Save R36 (7%) Ships in 18 - 22 working days

"Two leading reputation experts reveal how the internet is being used to destroy brands, reputations and even lives, and how to fight back.
"From false Wikipedia entries, to fake YouTube videos, to Facebook lynch mobs, everyone from CEOs to fashion models, journalists to politicians, restaurateurs to doctors, is open to character assassination in the burgeoning realm of digital media.
Two top media experts recount vivid tales of character attacks, provide specific advice on how to counter them, and how to turn the tables on the attackers. Having spent decades preparing for and coping with these issues, Richard Torrenzano and Mark Davis share their secrets on dealing with problems at the top of today's news.
Torrenzano and Davis also take a step back to look at how the past might inform our future thinking about character assassination, from the slander wars between Thomas Jefferson and Alexander Hamilton, to predictions on what the end of privacy will mean for civilization.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Johannesevangelium Und Johannesbriefe…
Walter Schmithals Hardcover R5,133 Discovery Miles 51 330
Marketing
C.W. Lamb, J.F. Hair, … Paperback R679 R599 Discovery Miles 5 990
Hardware Accelerator Systems for…
Shiho Kim, Ganesh Chandra Deka Hardcover R3,950 Discovery Miles 39 500
Strategic Marketing
J.A. Wiid, M C Cant Paperback R573 R539 Discovery Miles 5 390
Managed Grids and Cloud Systems in the…
Simon C. Lin, Eric Yen Hardcover R5,340 Discovery Miles 53 400
A Beginner's Guide to New Testament…
Richard J. Erickson Paperback R760 R668 Discovery Miles 6 680
Social Media Marketing - A Quickstudy…
Edwards Poster R232 Discovery Miles 2 320
Theologische Grundstrukturen DES Alten…
G. Fohrer Paperback R3,332 Discovery Miles 33 320
Marketing
C. Lamb, J. Hair Paperback R752 Discovery Miles 7 520
My Yoga Journey Gift Set
Kassandra Reinhardt Kit R785 Discovery Miles 7 850

 

Partners