0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (121)
  • R250 - R500 (228)
  • R500+ (763)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

Hacking for Beginners - Learn How to Hack! a Complete Beginners Guide to Hacking! Learn the Secrets That the Professional... Hacking for Beginners - Learn How to Hack! a Complete Beginners Guide to Hacking! Learn the Secrets That the Professional Hackers Are Using Today! (Paperback)
Kevin Donaldson 1
R268 Discovery Miles 2 680 Ships in 18 - 22 working days
Bit Wars - Cyber Crime, Hacking & Information Warfare (Paperback): Thomas S Hyslip Bit Wars - Cyber Crime, Hacking & Information Warfare (Paperback)
Thomas S Hyslip
R156 Discovery Miles 1 560 Ships in 18 - 22 working days
Boys Password Journal (Paperback): Speedy Publishing LLC Boys Password Journal (Paperback)
Speedy Publishing LLC
R348 R321 Discovery Miles 3 210 Save R27 (8%) Ships in 18 - 22 working days
Tackling the SPAM Menace (Paperback): John Davidson Tackling the SPAM Menace (Paperback)
John Davidson; Edited by Mendon Cottage Books; Dueep Jyot Singh
R175 Discovery Miles 1 750 Ships in 18 - 22 working days
Building a Life and Career in Security - A Guide from Day 1 to Building A Life and Career in Information Security (Paperback):... Building a Life and Career in Security - A Guide from Day 1 to Building A Life and Career in Information Security (Paperback)
Jay Schulman
R179 Discovery Miles 1 790 Ships in 18 - 22 working days
What Happens on Campus Stays on YouTube - The NEW rules for your reputation on campus, online, and beyond. (Paperback): Paul... What Happens on Campus Stays on YouTube - The NEW rules for your reputation on campus, online, and beyond. (Paperback)
Paul Gordon Brown, Jason L Meriwether, Courtney O'Connell
R427 Discovery Miles 4 270 Ships in 18 - 22 working days
Surviving The Zombie Apocalypse - Safer Computing Tips for Small Business Managers and Everyday People (Paperback): Max Nomad Surviving The Zombie Apocalypse - Safer Computing Tips for Small Business Managers and Everyday People (Paperback)
Max Nomad
R699 R629 Discovery Miles 6 290 Save R70 (10%) Ships in 18 - 22 working days
Protecting Your Business From Cyber Attacks In Only 10 Minutes A Day - Simple Steps to Help You Create Better Security Habits... Protecting Your Business From Cyber Attacks In Only 10 Minutes A Day - Simple Steps to Help You Create Better Security Habits to Reduce the Risk of Becoming a Cyber Victim (Paperback)
Boaz Fischer
R1,776 Discovery Miles 17 760 Ships in 18 - 22 working days
Consumer Privacy in the 21st Century - Best Practices for Businesses & Policymakers (Hardcover): Larry A Schwartz Consumer Privacy in the 21st Century - Best Practices for Businesses & Policymakers (Hardcover)
Larry A Schwartz
R3,655 Discovery Miles 36 550 Ships in 10 - 15 working days

In today's world of smart phones, smart grids, and smart cars, companies are collecting, storing, and sharing more information about consumers than ever before. Although companies use this information to innovate and deliver better products and services to consumers, they should not do so at the expense of consumer privacy. This book provides an overview for how companies can act now to implement best practices to protect consumers' private information. These best practices would include making privacy the "default setting" for commercial data practices and give consumers greater control over the collection and use of their personal data through simplified choices and increased transparency. Implementing these best practices will enhance trust and stimulate commerce.

Basic Politics of Movement Security - A Talk of Security with J. Sakai & G20 Repression & Infiltration in Toronto: An Interview... Basic Politics of Movement Security - A Talk of Security with J. Sakai & G20 Repression & Infiltration in Toronto: An Interview with Mandy Hiscocks (Paperback)
J Sakai, Mandy Hiscocks
R185 Discovery Miles 1 850 Ships in 18 - 22 working days

Here are two "live" discussions by radical activists introducing the issues of movement security: u.s. activist and author J. Sakai & long-time Canadian organizer Mandy Hiscocks.


There are many books and articles reporting state repression, but not on that subject's more intimate relative, movement security. It is general practice to only pass along knowledge about movement security privately, in closed group lectures or by personal word-of-mouth. In fact, when new activists have questions about security problems, they quickly discover that there is no "Security for Dummies" to explore the basics. Adding to the confusion, the handful of available left security texts are usually about underground or illegal groups, not the far larger public movements that work on a more or less legal level.


During Montreal's 2013 Festival of Anarchy, J. Sakai gave a workshop about the politics of movement security, sharing the results of typical incidents of both the movement's successes and the movement's failures in combating the "political police" or state security agencies. He also discussed the nature of those state sub-cultures. This booklet contains a transcript of that talk, and of the subsequent lively question and answer period; along with several after-the-workshop observations by Sakai.


As he explains, "The key thing is, to start with, security is not about being macho vigilantes or having techniques of this or that. It's not some spy game. Security is about good politics. That's exactly why it's so difficult. But everyone will say that they have good politics. So this has to be broken down, this has to be explained." Which is what he does in this unusual talk.


Mandy Hiscocks comes at the topic from her personal experiences organizing against the 2010 G20 Summit in Toronto. In this in-depth interview, Hiscocks describes how her political scene and groups she worked with were infiltrated by undercover agents over a year before the summit even occurred. These police infiltrators provided information used in the prosecution of anti-Globalization organizers and participants. Hiscocks provides an honest and sobering appraisal of the practical challenge of State infiltration, and of how subsequent decisions played out in regards to the anti-G20 organizing and the repression that resulted. Hiscocks spent a year in prison as a result of these experiences, shortly after this interview was conducted.


Digital Assassination - Protecting Your Reputation, Brand, or Business Against Online Attacks (Paperback): Richard Torrenzano,... Digital Assassination - Protecting Your Reputation, Brand, or Business Against Online Attacks (Paperback)
Richard Torrenzano, Mark Davis
R544 R508 Discovery Miles 5 080 Save R36 (7%) Ships in 18 - 22 working days

"Two leading reputation experts reveal how the internet is being used to destroy brands, reputations and even lives, and how to fight back.
"From false Wikipedia entries, to fake YouTube videos, to Facebook lynch mobs, everyone from CEOs to fashion models, journalists to politicians, restaurateurs to doctors, is open to character assassination in the burgeoning realm of digital media.
Two top media experts recount vivid tales of character attacks, provide specific advice on how to counter them, and how to turn the tables on the attackers. Having spent decades preparing for and coping with these issues, Richard Torrenzano and Mark Davis share their secrets on dealing with problems at the top of today's news.
Torrenzano and Davis also take a step back to look at how the past might inform our future thinking about character assassination, from the slander wars between Thomas Jefferson and Alexander Hamilton, to predictions on what the end of privacy will mean for civilization.

Corporate Cyberwar (Paperback): Dr Michael Teng Corporate Cyberwar (Paperback)
Dr Michael Teng
R474 Discovery Miles 4 740 Ships in 18 - 22 working days

Corporate Cyberwar chronicles the daily battle between technical criminals and law enforcement. As new and advanced ways to cheat and financially ruin companies are discovered, many authorities not only have to figure out ways to stop it, but they also have to create new laws in order to prosecute the perpetrators. This book addresses how businesses/corporations can protect themselves against this increasingly vicious attack. To help convey the importance of protection and awareness, Cyberwar explores two very important cases, WikiLeaks and Stuxnet. Businesses/corporations are given a better understanding of such similar attacks in the future. Corporate Cyberwar does not only focus on problems, it also provides solutions. There is a point by point explanation of how Crimeware, Bot Networks and DDoS (Distributed Denial of Service) take place, which helps businesses/corporations understand exactly what needs to be done in order to prevent the attacks. Cyberwar is not only for those with a moderate understanding of technology, it is also for those with limited understanding of this threat and its devastating effects.

Cyber Storm III (Paperback): Department of Homeland Security Cyber Storm III (Paperback)
Department of Homeland Security
R296 Discovery Miles 2 960 Ships in 18 - 22 working days
The Data Governance Imperative - A Business Strategy for Corporate Data (Paperback, New): Steve Sarsfield The Data Governance Imperative - A Business Strategy for Corporate Data (Paperback, New)
Steve Sarsfield
R1,064 Discovery Miles 10 640 Ships in 18 - 22 working days

Attention to corporate information has never been more important than now. The ability to generate accurate business intelligence, accurate financial reports and to understand your business relies on better processes and personal commitment to clean data. Every byte of data that resides inside your company, and some that resides outside its walls, has the potential to make you stronger by giving you the agility, speed and intelligence that none of your competitors yet have. Data governance is the term given to changing the hearts and minds of your company to see the value of such information quality. The Data Governance Imperative is a business person's view of data governance. This practical book covers both strategies and tactics around managing a data governance initiative. The author, Steve Sarsfield, works for a major enterprise software company and is a leading expert in data quality and data governance, focusing on the business perspectives that are important to data champions, front-office employees, and executives. Steve runs an award-winning and world-recognized blog called the Data Governance and Data Quality Insider, offering practical wisdom.

Protectors of Privacy - Regulating Personal Data in the Global Economy (Hardcover): Abraham L. Newman Protectors of Privacy - Regulating Personal Data in the Global Economy (Hardcover)
Abraham L. Newman
R1,619 Discovery Miles 16 190 Ships in 18 - 22 working days

From credit-card purchases to electronic fingerprints, the amount of personal data available to government and business is growing exponentially. All industrial societies face the problem of how to regulate this vast world of information, but their governments have chosen distinctly different solutions. In Protectors of Privacy, Abraham L. Newman details how and why, in contrast to the United States, the nations of the European Union adopted comprehensive data privacy for both the public and the private sectors, enforceable by independent regulatory agencies known as data privacy authorities. Despite U.S. prominence in data technology, Newman shows, the strict privacy rules of the European Union have been adopted far more broadly across the globe than the self-regulatory approach championed by the United States. This rift has led to a series of trade and security disputes between the United States and the European Union.Based on many interviews with politicians, civil servants, and representatives from business and NGOs, and supplemented with archival sources, statistical analysis, and examples, Protectors of Privacy delineates the two principal types of privacy regimes-comprehensive and limited. The book presents a theory of regulatory development that highlights the role of transgovernmental networks not only in implementing rules but also in actively shaping the political process surrounding policymaking. More broadly, Newman explains how Europe's institutional revolution has created in certain sectors the regulatory capacity that allows it to challenge U.S. dominance in international economic governance.

Cybercrime - Secure It or Lose It (Paperback): Denise M Chatam Cybercrime - Secure It or Lose It (Paperback)
Denise M Chatam
R416 R390 Discovery Miles 3 900 Save R26 (6%) Ships in 18 - 22 working days

"Cybercrime: Secure IT or Lose IT" looks at the who, what, why, when, and where of Internet crime from the perspective of businesspeople. Information security and audit personnel will find value in the materials provided in this book to establish and maintain a comprehensive information security program and to aid in satisfying regulatory compliance requirements.

Identity Theft - A Comprehensive Guide (Paperback): Jay Mason Identity Theft - A Comprehensive Guide (Paperback)
Jay Mason
R246 R228 Discovery Miles 2 280 Save R18 (7%) Ships in 18 - 22 working days

"Identity Theft: A Comprehensive Guide," enables readers to understand, prevent and recover from the crime of identity theft. Included in the book are chapters on how to safeguard your computer, how to avoid scams, 40 ways to prevent identity theft, 20 things to do if you are a victim of identity theft, how to order your free credit report and FACTA.

Thorough information is provided on the latest identity theft insurance and what to avoid in purchasing this type of protection. The book includes a library of letters an identity theft victim will need to use and a snapshot of current state laws influencing identity theft.

The Governance of Privacy - Policy Instruments in Global Perspective (Paperback, New Ed): Colin J. Bennett, Charles Raab The Governance of Privacy - Policy Instruments in Global Perspective (Paperback, New Ed)
Colin J. Bennett, Charles Raab
R1,185 Discovery Miles 11 850 Ships in 18 - 22 working days

Analyzes privacy policy instruments available to contemporary industrial states, from government regulations and transnational regimes to self-regulation and privacy enhancing technologies. Privacy protection, according to Colin Bennett and Charles Raab, involves politics and public policy as much as it does law and technology. Moreover, the protection of our personal information in a globalized, borderless world means that privacy-related policies are inextricably interdependent. In this updated paperback edition of The Governance of Privacy, Bennett and Raab analyze a broad range of privacy policy instruments available to contemporary advanced industrial states, from government regulations and transnational regimes to self-regulation and privacy-enhancing technologies. They consider two possible dynamics of privacy regulation-a "race to the bottom," with competitive deregulation by countries eager to attract global investment in information technology, versus "a race to the top," with the progressive establishment of global privacy standards. Bennett and Raab begin by discussing the goals of privacy protection, the liberal and individualist assumptions behind it, and the neglected relationship between privacy and social equity. They describe and evaluate different policy instruments, including the important 1995 Directive on Data Protection from the European Union, as well as the general efficacy of the "top-down" statutory approach and self-regulatory and technological alternatives to it. They evaluate the interrelationships of these policy instruments and their position in a global framework of regulation and policy by state and non-state actors. And finally, they consider whether all of this policy activity at international, national, and corporate levels necessarily means higher levels of privacy protection.

RSA Security's Official Guide to XML Security (Paperback, Ed): Blake Dournee RSA Security's Official Guide to XML Security (Paperback, Ed)
Blake Dournee
R1,622 R1,334 Discovery Miles 13 340 Save R288 (18%) Ships in 18 - 22 working days

Use this book as both an XML primer and to get up to speed on XML-related security issues. Written by the experts at RSA Security, Inc., you’ll get inside tips on how to prevent denial of service attacks, and how to implement security measures to keep your XML programs protected.

Cyber Security, Privacy and Networking - Proceedings of ICSPN 2021 (Paperback, 1st ed. 2022): Dharma P. Agrawal, Nadia Nedjah,... Cyber Security, Privacy and Networking - Proceedings of ICSPN 2021 (Paperback, 1st ed. 2022)
Dharma P. Agrawal, Nadia Nedjah, Bb Gupta, Gregorio Martinez Perez
R5,901 Discovery Miles 59 010 Ships in 10 - 15 working days

This book covers selected high-quality research papers presented in the International Conference on Cyber Security, Privacy and Networking (ICSPN 2021), organized during 17-19 September 2021 in India in Online mode. The objectives of ICSPN 2021 is to provide a premier international platform for deliberations on strategies, recent trends, innovative approaches, discussions and presentations on the most recent cyber security, privacy and networking challenges and developments from the perspective of providing security awareness and its best practices for the real world. Moreover, the motivation to organize this conference is to promote research by sharing innovative ideas among all levels of the scientific community, and to provide opportunities to develop creative solutions to various security, privacy and networking problems.

mCommerce Security:  A Beginner's Guide (Paperback): Kapil Raina, Anurag Harsh mCommerce Security: A Beginner's Guide (Paperback)
Kapil Raina, Anurag Harsh
R1,169 R1,003 Discovery Miles 10 030 Save R166 (14%) Ships in 18 - 22 working days

Learn to implement a solid mCommerce security plan--from start to finish

Many businesses today recognize mobile commerce--mCommerce--as a way to increase revenue and offer customers a new level of convenience. Mobile phones and PDAs can now be used for online banking, purchasing tickets, messaging, and much more. For any transaction, security is a top priority--and this becomes increasingly complex when wireless and mobile applications are involved. This practical introductory guide clearly explains different mCommerce applications and their associated security risks. Through case studies, you'll learn best practices for implementing specific security methods in key industries--including banking, retail, entertainment, military, travel, and healthcare. The book also contains 8 pages of blueprints that depict secure end-to-end mCommerce architecture as well as identify key vulnerability points.Explore the latest security topics for both business and consumer mCommerce applications Improve services offered to customers through secure mCommerce applications Get details on various types of mobile applications and understand their security risks--including commerce, payments, information, communications, gaming, and military Discover the differences between mobile versus wired security Address mobile security issues in key industries such as banking and finance, travel, manufacturing, entertainment, public services, and defense Recognize the time- and cost-saving benefits of secured mCommerce applications through comprehensive case studies Preview the security of future mobile applications--such as 3G/4G networks and wearable computers

Rethinking Public Key Infrastructures and Digital Certificates - Building in Privacy (Paperback): Stefan Brands Rethinking Public Key Infrastructures and Digital Certificates - Building in Privacy (Paperback)
Stefan Brands
R1,177 Discovery Miles 11 770 Ships in 18 - 22 working days

Stefan Brands proposes cryptographic building blocks for the design of digital certificates that preserve privacy without sacrificing security. As paper-based communication and transaction mechanisms are replaced by automated ones, traditional forms of security such as photographs and handwritten signatures are becoming outdated. Most security experts believe that digital certificates offer the best technology for safeguarding electronic communications. They are already widely used for authenticating and encrypting email and software, and eventually will be built into any device or piece of software that must be able to communicate securely. There is a serious problem, however, with this unavoidable trend: unless drastic measures are taken, everyone will be forced to communicate via what will be the most pervasive electronic surveillance tool ever built. There will also be abundant opportunity for misuse of digital certificates by hackers, unscrupulous employees, government agencies, financial institutions, insurance companies, and so on.In this book Stefan Brands proposes cryptographic building blocks for the design of digital certificates that preserve privacy without sacrificing security. Such certificates function in much the same way as cinema tickets or subway tokens: anyone can establish their validity and the data they specify, but no more than that. Furthermore, different actions by the same person cannot be linked. Certificate holders have control over what information is disclosed, and to whom. Subsets of the proposed cryptographic building blocks can be used in combination, allowing a cookbook approach to the design of public key infrastructures. Potential applications include electronic cash, electronic postage, digital rights management, pseudonyms for online chat rooms, health care information storage, electronic voting, and even electronic gambling.

The Limits Of Privacy (Paperback): Amitai Etzioni The Limits Of Privacy (Paperback)
Amitai Etzioni
R686 Discovery Miles 6 860 Ships in 18 - 22 working days

Privacy is perhaps the most hallowed of American rights--and most people are concerned that new technologies available to governments and corporations threaten to erode this most privileged of rights. But in The Limits of Privacy, Amitai Etzioni offers a decidedly different point of view, in which the right to privacy is balanced against concern for public safety and health. Etzioni looks at five flashpoint issues: Megan's Laws, HIV testing of infants, deciphering of encrypted messages, national identification cards, and medical records, and concludes that there are times when Amricans' insistence on privacy is not in the best interests of society at large. He offers four clear and concise criteria which, when applied jointly, help us to determine when the right to privacy should be overridden for the greater public good.Almost every week headlines warn us that our cell phones are being monitored, our e-mails read, and our medical records traded on the open market. Public opinion polls show that Americans are dismayed about incursions against personal privacy. Congress and state legislatures are considering laws designed to address their concerns.Focusing on five flashpoint issues--Megan's Law, mandatory HIV testing of infants, encryption of electronic documents, national identification cards and biometric identifiers, and medical records--The Limits of Privacy argues counterintuitively that sometimes major public health and safety concerns should outweigh the individual's right to privacy. Presenting four concise criteria to determine when the right to privacy should be preserved and when it should be overridden in the interests of the wider community, Etzioni argues that, in somecases, we would do well to sacrifice the privacy of the individual in the name of the common good.

Digitale Kompetenz - Grundlagen der Kunstlichen Intelligenz, Blockchain-Technologie, Quanten-Computing und deren Anwendungen... Digitale Kompetenz - Grundlagen der Kunstlichen Intelligenz, Blockchain-Technologie, Quanten-Computing und deren Anwendungen fur die Digitale Transformation (German, Paperback, 1. Aufl. 2022)
Volker Lang
R795 R699 Discovery Miles 6 990 Save R96 (12%) Ships in 18 - 22 working days

Wenn Sie neugierig auf die Grundlagen der kunstlichen Intelligenz, der Blockchain-Technologie und des Quantencomputings sind, die fur die digitale Transformation und Innovation von entscheidender Bedeutung sind, ist Digital Fluency Ihr praktischer Leitfaden. Die realen Anwendungen dieser Spitzentechnologien nehmen rapide zu, und Ihr tagliches Leben wird weiterhin von jeder dieser Technologien beeinflusst werden. Es gibt keinen besseren Zeitpunkt als jetzt, um anzufangen und sich digital fit zu machen. Sie mussen keine Vorkenntnisse uber diese vielseitigen Technologien haben, denn der Autor Volker Lang fuhrt Sie kompetent durch das digitale Zeitalter. In zahlreichen Praxisbeispielen und mehr als 48 einpragsamen Abbildungen veranschaulicht er in Digital Fluency zentrale Konzepte und Anwendungen. Am Ende jedes Kapitels finden Sie eine hilfreiche Checkliste zur Umsetzung der zentralen Lektionen, bevor Sie zum nachsten Kapitel ubergehen. Dieses Buch geht den digitalen Schlagwoertern und Konzepten auf den Grund und sagt Ihnen, was sie wirklich bedeuten. Das Aufschlusseln von Themen wie automatisiertes Fahren und intelligente Robotik mit kunstlicher Intelligenz, Blockchain-basierte Kryptowahrungen und Smart Contracts, Medikamentenentwicklung und Optimierung von Finanzinvestitionsportfolios durch Quantencomputing und vieles mehr ist unerlasslich, um fur die Zukunft der Industrie gerustet zu sein. Unabhangig davon, ob Ihre eigene digitale Transformation in Ihrem privaten oder oeffentlichen Unternehmen, in Ihrem Studium oder in Ihrem Privathaushalt stattfindet, Digital Fluency erstellt einen konkreten digitalen Aktionsplan fur alle Ihre Anforderungen an Technologie- und Innovationsstrategien. Was Sie lernen werden Sich im digitalen Zeitalter orientieren, ohne Vorkenntnisse uber digitale Technologien und digitale Transformation zu benoetigen Lernen Sie die beliebtesten aktuellen und zukunftigen Anwendungen von kunstlicher Intelligenz, Blockchain-Technologie und Quantencomputing in einer Vielzahl von Branchen kennen, darunter das Gesundheitswesen, Finanzdienstleistungen und die Automobilindustrie Machen Sie sich mit den digitalen Innovationsmodellen von Amazon, Google, Microsoft, IBM und anderen weltweit fuhrenden Unternehmen vertraut. Setzen Sie Ihre eigene digitale Transformation entlang der acht Kerndimensionen eines konkreten digitalen Aktionsplans erfolgreich um. Fur wen dieses Buch bestimmt ist Vordenker, Fuhrungskrafte und Industriestrategen, Management- und Strategieberater, Politiker und Entscheidungstrager, Unternehmer, Finanzanalysten, Investoren und Risikokapitalgeber, Studenten und Forscher sowie allgemeine Leser, die sich digital fit machen wollen.

Understanding Digital Signature - Establishing Trust Over the Internet and Other Networks (Paperback): Gail Grant Understanding Digital Signature - Establishing Trust Over the Internet and Other Networks (Paperback)
Gail Grant
R945 R813 Discovery Miles 8 130 Save R132 (14%) Ships in 18 - 22 working days

This volume explains the technology behind digital signatures and key infrastructures (PKI). These are the standards that make it absolutely safe to buy, sell, sign documents and exchange sensitive financial data on the Internet.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Suspect Race - Causes and Consequences…
Jack Glaser Hardcover R1,350 Discovery Miles 13 500
On the Warrior's Path, Second Edition…
Daniele Bolelli Paperback R487 R457 Discovery Miles 4 570
MOUS Excel 2003 Expert
A Tommy Paperback R597 Discovery Miles 5 970
Language in Writing Instruction…
Maria Estela Brisk Paperback R1,287 Discovery Miles 12 870
Intermediate Excel
M. L. Humphrey Hardcover R556 Discovery Miles 5 560
Sherlock Bones and the Curse of the…
Tim Collins Paperback R169 Discovery Miles 1 690
Karate - Welcome to the Dojo. Jindokai…
Marko Fagerroos Hardcover R667 R596 Discovery Miles 5 960
Excel Macros - The Ultimate Beginner's…
David A. Williams Paperback R437 R404 Discovery Miles 4 040
Five Rings Illustrated - The Classic…
Miyamoto Musashi Hardcover R900 R771 Discovery Miles 7 710
Excel Basics In 30 Minutes - The…
Ian Lamont Hardcover R540 Discovery Miles 5 400

 

Partners