|
|
Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection
The problem of privacy-preserving data analysis has a long history
spanning multiple disciplines. As electronic data about individuals
becomes increasingly detailed, and as technology enables ever more
powerful collection and curation of these data, the need increases
for a robust, meaningful, and mathematically rigorous definition of
privacy, together with a computationally rich class of algorithms
that satisfy this definition. Differential Privacy is such a
definition. The Algorithmic Foundations of Differential Privacy
starts out by motivating and discussing the meaning of differential
privacy, and proceeds to explore the fundamental techniques for
achieving differential privacy, and the application of these
techniques in creative combinations, using the query-release
problem as an ongoing example. A key point is that, by rethinking
the computational goal, one can often obtain far better results
than would be achieved by methodically replacing each step of a
non-private computation with a differentially private
implementation. Despite some powerful computational results, there
are still fundamental limitations. Virtually all the algorithms
discussed herein maintain differential privacy against adversaries
of arbitrary computational power - certain algorithms are
computationally intensive, others are efficient. Computational
complexity for the adversary and the algorithm are both discussed.
The monograph then turns from fundamentals to applications other
than query-release, discussing differentially private methods for
mechanism design and machine learning. The vast majority of the
literature on differentially private algorithms considers a single,
static, database that is subject to many analyses. Differential
privacy in other models, including distributed databases and
computations on data streams, is discussed. The Algorithmic
Foundations of Differential Privacy is meant as a thorough
introduction to the problems and techniques of differential
privacy, and is an invaluable reference for anyone with an interest
in the topic.
Here are two "live" discussions by radical activists introducing
the issues of movement security: u.s. activist and author J. Sakai
& long-time Canadian organizer Mandy Hiscocks.
There are many books and articles reporting state repression, but
not on that subject's more intimate relative, movement security. It
is general practice to only pass along knowledge about movement
security privately, in closed group lectures or by personal
word-of-mouth. In fact, when new activists have questions about
security problems, they quickly discover that there is no "Security
for Dummies" to explore the basics. Adding to the confusion, the
handful of available left security texts are usually about
underground or illegal groups, not the far larger public movements
that work on a more or less legal level.
During Montreal's 2013 Festival of Anarchy, J. Sakai gave a
workshop about the politics of movement security, sharing the
results of typical incidents of both the movement's successes and
the movement's failures in combating the "political police" or
state security agencies. He also discussed the nature of those
state sub-cultures. This booklet contains a transcript of that
talk, and of the subsequent lively question and answer period;
along with several after-the-workshop observations by Sakai.
As he explains, "The key thing is, to start with, security is not
about being macho vigilantes or having techniques of this or that.
It's not some spy game. Security is about good politics. That's
exactly why it's so difficult. But everyone will say that they have
good politics. So this has to be broken down, this has to be
explained." Which is what he does in this unusual talk.
Mandy Hiscocks comes at the topic from her personal experiences
organizing against the 2010 G20 Summit in Toronto. In this in-depth
interview, Hiscocks describes how her political scene and groups
she worked with were infiltrated by undercover agents over a year
before the summit even occurred. These police infiltrators provided
information used in the prosecution of anti-Globalization
organizers and participants. Hiscocks provides an honest and
sobering appraisal of the practical challenge of State
infiltration, and of how subsequent decisions played out in regards
to the anti-G20 organizing and the repression that resulted.
Hiscocks spent a year in prison as a result of these experiences,
shortly after this interview was conducted.
In the world of technology, cybersecurity is, without a doubt, one
of the most dynamic topics of our times. Protecting Our Future
brings together a range of experts from across the cybersecurity
spectrum and shines a spotlight on operational challenges and needs
across the workforce: in military, health care, international
relations, telecommunications, finance, education, utilities,
government, small businesses, and nonprofits. Contributors offer an
assessment of strengths and weaknesses within each subfield, and,
with deep subject-matter expertise, they introduce practitioners,
as well as those considering a future in cybersecurity, to the
challenges and opportunities when building a cybersecurity
workforce.
In today's world of smart phones, smart grids, and smart cars,
companies are collecting, storing, and sharing more information
about consumers than ever before. Although companies use this
information to innovate and deliver better products and services to
consumers, they should not do so at the expense of consumer
privacy. This book provides an overview for how companies can act
now to implement best practices to protect consumers' private
information. These best practices would include making privacy the
"default setting" for commercial data practices and give consumers
greater control over the collection and use of their personal data
through simplified choices and increased transparency. Implementing
these best practices will enhance trust and stimulate commerce.
 |
Myjot
(Paperback)
Chris Hunter, Lisa Hunter
|
R143
Discovery Miles 1 430
|
Ships in 18 - 22 working days
|
|
|
Can't remember your passwords? Tired of resetting your passwords?
myJot is a convenient tool for jotting down important information
we use on a daily basis for work, online accounts, social media,
& email. myJot provides a convenient and organized way to keep
usernames, passwords & account information centrally located.
Corporate Cyberwar chronicles the daily battle between technical
criminals and law enforcement. As new and advanced ways to cheat
and financially ruin companies are discovered, many authorities not
only have to figure out ways to stop it, but they also have to
create new laws in order to prosecute the perpetrators. This book
addresses how businesses/corporations can protect themselves
against this increasingly vicious attack. To help convey the
importance of protection and awareness, Cyberwar explores two very
important cases, WikiLeaks and Stuxnet. Businesses/corporations are
given a better understanding of such similar attacks in the future.
Corporate Cyberwar does not only focus on problems, it also
provides solutions. There is a point by point explanation of how
Crimeware, Bot Networks and DDoS (Distributed Denial of Service)
take place, which helps businesses/corporations understand exactly
what needs to be done in order to prevent the attacks. Cyberwar is
not only for those with a moderate understanding of technology, it
is also for those with limited understanding of this threat and its
devastating effects.
|
You may like...
M&A in Belgium
Wim Dejonghe, Wouter Van de Voorde
Hardcover
R3,171
Discovery Miles 31 710
|