0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (121)
  • R250 - R500 (223)
  • R500+ (783)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

mCommerce Security:  A Beginner's Guide (Paperback): Kapil Raina, Anurag Harsh mCommerce Security: A Beginner's Guide (Paperback)
Kapil Raina, Anurag Harsh
R1,169 R1,003 Discovery Miles 10 030 Save R166 (14%) Ships in 18 - 22 working days

Learn to implement a solid mCommerce security plan--from start to finish

Many businesses today recognize mobile commerce--mCommerce--as a way to increase revenue and offer customers a new level of convenience. Mobile phones and PDAs can now be used for online banking, purchasing tickets, messaging, and much more. For any transaction, security is a top priority--and this becomes increasingly complex when wireless and mobile applications are involved. This practical introductory guide clearly explains different mCommerce applications and their associated security risks. Through case studies, you'll learn best practices for implementing specific security methods in key industries--including banking, retail, entertainment, military, travel, and healthcare. The book also contains 8 pages of blueprints that depict secure end-to-end mCommerce architecture as well as identify key vulnerability points.Explore the latest security topics for both business and consumer mCommerce applications Improve services offered to customers through secure mCommerce applications Get details on various types of mobile applications and understand their security risks--including commerce, payments, information, communications, gaming, and military Discover the differences between mobile versus wired security Address mobile security issues in key industries such as banking and finance, travel, manufacturing, entertainment, public services, and defense Recognize the time- and cost-saving benefits of secured mCommerce applications through comprehensive case studies Preview the security of future mobile applications--such as 3G/4G networks and wearable computers

Managing Data for Patron Privacy - Comprehensive Strategies for Libraries (Paperback): Kristin Briney, Becky Yoose Managing Data for Patron Privacy - Comprehensive Strategies for Libraries (Paperback)
Kristin Briney, Becky Yoose
R1,570 Discovery Miles 15 700 Ships in 10 - 15 working days

Build trust with your library's users by securing their data privacy. Taking a holistic approach, this guide presents practical ways to implement privacy ethics into data practices. Libraries are not exempt from the financial costs of data breaches or leaks, no matter the size. Whether from a library worker unwittingly sharing a patron's address with a perpetrator of domestic violence to leaving sensitive patron data unprotected, patrons can also pay a hefty price when libraries fail to manage patron data securely and ethically. In this guide, readers will learn concrete action steps for putting the ethical management of data into practice, following two common public and academic library cumulative case studies. The authors explore such key topics as succinct summaries of major U.S. laws and other regulations and standards governing patron data management; information security practices to protect patrons and libraries from common threats; how to navigate barriers in organizational culture when implementing data privacy measures; sources for publicly available, customizable privacy training material for library workers; the data life cycle from planning and collecting to disposal; how to conduct a data inventory; understanding the associated privacy risks of different types of library data; why the current popular model of library assessment can become a huge privacy invasion; addressing key topics while keeping your privacy policy clear and understandable to patrons; and data privacy and security provisions to look for in vendor contracts.

The Personal Internet Security Guidebook - Keeping Hackers and Crackers out of Your Home (Paperback): Tim Speed, Juanita Ellis,... The Personal Internet Security Guidebook - Keeping Hackers and Crackers out of Your Home (Paperback)
Tim Speed, Juanita Ellis, Steffano Korper
R2,256 Discovery Miles 22 560 Ships in 18 - 22 working days

The Personal Internet Security Guidebook is a complete guide to protecting your computer(s) on the Internet. The newest attack point for hackers is home computers on DSL and/or cable modems. This book will show you how to set up a home network and protect it from the "bad dudes." Also covered in this book is how to protect your computer on the road. Many hotels are now offering high-speed Internet access and this book will show you how to keep your computer safe in the hotel room as well as on the hotel network.
This is a how-to guide to keeping your personal computer safe on the Internet. Following the success of The Internet Security Guidebook, the authors have used their expertise to create a book specifically addressing home computers and traveling notebooks. Included in this book is a comprehensive list of vendors and services. Included are these key elements: protecting your PC on the Internet, home firewall software, how to set up a home network, protecting your PC on the road, and protecting your PC via DSL and/or cable modem.
A comprehensive list of vendors and services that you can download or purchase
Key elements such as: protecting your PC on the internet
How to fully utilise home firewall software
How to set-up a home network
Information on protecting you PC on the road
Information on protecting your PC via DSL and cable modems

Digitale Kompetenz - Grundlagen der Kunstlichen Intelligenz, Blockchain-Technologie, Quanten-Computing und deren Anwendungen... Digitale Kompetenz - Grundlagen der Kunstlichen Intelligenz, Blockchain-Technologie, Quanten-Computing und deren Anwendungen fur die Digitale Transformation (German, Paperback, 1. Aufl. 2022)
Volker Lang
R795 R699 Discovery Miles 6 990 Save R96 (12%) Ships in 18 - 22 working days

Wenn Sie neugierig auf die Grundlagen der kunstlichen Intelligenz, der Blockchain-Technologie und des Quantencomputings sind, die fur die digitale Transformation und Innovation von entscheidender Bedeutung sind, ist Digital Fluency Ihr praktischer Leitfaden. Die realen Anwendungen dieser Spitzentechnologien nehmen rapide zu, und Ihr tagliches Leben wird weiterhin von jeder dieser Technologien beeinflusst werden. Es gibt keinen besseren Zeitpunkt als jetzt, um anzufangen und sich digital fit zu machen. Sie mussen keine Vorkenntnisse uber diese vielseitigen Technologien haben, denn der Autor Volker Lang fuhrt Sie kompetent durch das digitale Zeitalter. In zahlreichen Praxisbeispielen und mehr als 48 einpragsamen Abbildungen veranschaulicht er in Digital Fluency zentrale Konzepte und Anwendungen. Am Ende jedes Kapitels finden Sie eine hilfreiche Checkliste zur Umsetzung der zentralen Lektionen, bevor Sie zum nachsten Kapitel ubergehen. Dieses Buch geht den digitalen Schlagwoertern und Konzepten auf den Grund und sagt Ihnen, was sie wirklich bedeuten. Das Aufschlusseln von Themen wie automatisiertes Fahren und intelligente Robotik mit kunstlicher Intelligenz, Blockchain-basierte Kryptowahrungen und Smart Contracts, Medikamentenentwicklung und Optimierung von Finanzinvestitionsportfolios durch Quantencomputing und vieles mehr ist unerlasslich, um fur die Zukunft der Industrie gerustet zu sein. Unabhangig davon, ob Ihre eigene digitale Transformation in Ihrem privaten oder oeffentlichen Unternehmen, in Ihrem Studium oder in Ihrem Privathaushalt stattfindet, Digital Fluency erstellt einen konkreten digitalen Aktionsplan fur alle Ihre Anforderungen an Technologie- und Innovationsstrategien. Was Sie lernen werden Sich im digitalen Zeitalter orientieren, ohne Vorkenntnisse uber digitale Technologien und digitale Transformation zu benoetigen Lernen Sie die beliebtesten aktuellen und zukunftigen Anwendungen von kunstlicher Intelligenz, Blockchain-Technologie und Quantencomputing in einer Vielzahl von Branchen kennen, darunter das Gesundheitswesen, Finanzdienstleistungen und die Automobilindustrie Machen Sie sich mit den digitalen Innovationsmodellen von Amazon, Google, Microsoft, IBM und anderen weltweit fuhrenden Unternehmen vertraut. Setzen Sie Ihre eigene digitale Transformation entlang der acht Kerndimensionen eines konkreten digitalen Aktionsplans erfolgreich um. Fur wen dieses Buch bestimmt ist Vordenker, Fuhrungskrafte und Industriestrategen, Management- und Strategieberater, Politiker und Entscheidungstrager, Unternehmer, Finanzanalysten, Investoren und Risikokapitalgeber, Studenten und Forscher sowie allgemeine Leser, die sich digital fit machen wollen.

Rethinking Public Key Infrastructures and Digital Certificates - Building in Privacy (Paperback): Stefan Brands Rethinking Public Key Infrastructures and Digital Certificates - Building in Privacy (Paperback)
Stefan Brands
R1,177 Discovery Miles 11 770 Ships in 18 - 22 working days

Stefan Brands proposes cryptographic building blocks for the design of digital certificates that preserve privacy without sacrificing security. As paper-based communication and transaction mechanisms are replaced by automated ones, traditional forms of security such as photographs and handwritten signatures are becoming outdated. Most security experts believe that digital certificates offer the best technology for safeguarding electronic communications. They are already widely used for authenticating and encrypting email and software, and eventually will be built into any device or piece of software that must be able to communicate securely. There is a serious problem, however, with this unavoidable trend: unless drastic measures are taken, everyone will be forced to communicate via what will be the most pervasive electronic surveillance tool ever built. There will also be abundant opportunity for misuse of digital certificates by hackers, unscrupulous employees, government agencies, financial institutions, insurance companies, and so on.In this book Stefan Brands proposes cryptographic building blocks for the design of digital certificates that preserve privacy without sacrificing security. Such certificates function in much the same way as cinema tickets or subway tokens: anyone can establish their validity and the data they specify, but no more than that. Furthermore, different actions by the same person cannot be linked. Certificate holders have control over what information is disclosed, and to whom. Subsets of the proposed cryptographic building blocks can be used in combination, allowing a cookbook approach to the design of public key infrastructures. Potential applications include electronic cash, electronic postage, digital rights management, pseudonyms for online chat rooms, health care information storage, electronic voting, and even electronic gambling.

The Limits Of Privacy (Paperback): Amitai Etzioni The Limits Of Privacy (Paperback)
Amitai Etzioni
R686 Discovery Miles 6 860 Ships in 18 - 22 working days

Privacy is perhaps the most hallowed of American rights--and most people are concerned that new technologies available to governments and corporations threaten to erode this most privileged of rights. But in The Limits of Privacy, Amitai Etzioni offers a decidedly different point of view, in which the right to privacy is balanced against concern for public safety and health. Etzioni looks at five flashpoint issues: Megan's Laws, HIV testing of infants, deciphering of encrypted messages, national identification cards, and medical records, and concludes that there are times when Amricans' insistence on privacy is not in the best interests of society at large. He offers four clear and concise criteria which, when applied jointly, help us to determine when the right to privacy should be overridden for the greater public good.Almost every week headlines warn us that our cell phones are being monitored, our e-mails read, and our medical records traded on the open market. Public opinion polls show that Americans are dismayed about incursions against personal privacy. Congress and state legislatures are considering laws designed to address their concerns.Focusing on five flashpoint issues--Megan's Law, mandatory HIV testing of infants, encryption of electronic documents, national identification cards and biometric identifiers, and medical records--The Limits of Privacy argues counterintuitively that sometimes major public health and safety concerns should outweigh the individual's right to privacy. Presenting four concise criteria to determine when the right to privacy should be preserved and when it should be overridden in the interests of the wider community, Etzioni argues that, in somecases, we would do well to sacrifice the privacy of the individual in the name of the common good.

Genetic Testing and the Use of Information (Paperback): Clarisa Long Genetic Testing and the Use of Information (Paperback)
Clarisa Long
R381 R355 Discovery Miles 3 550 Save R26 (7%) Ships in 18 - 22 working days

We are in the early years of a technological revolution arising from our understanding of the genetic meaning of life. Scientists' ability to manipulate and decode genes is advancing at an extraordinary pace - so fast we are often unprepared to handle the many vexing legal, economic, ethical and social issues they raise. The combination of genetic research and information technology raises often chilling questions of privacy and genetic discrimination. Should individuals be allowed personal property rights to their DNA, cells or tissues? How should policymakers regulate the biotechnology industry to maximize safety without stifling innovation? What are the appropriate uses of gene therapy and other genetic manipulations? In "Genetic Testing and the Use of Information", leading scholars grapple with issues of genetic privacy, the regulation of genetic testing and genetic discrimination. They consider such questions as: Who should have access to information derived from a genetic test? Should one be obligated to tell a spouse or a child test results? Should governments ever appropriately mandate individual genetic testing or community-wide genetic screening? Will employers be able to require the release of genetic records as a condition of employment? Will insurance companies be allowed to use genetic information to determine risk? At what point does a genetic condition qualify as a disability under the American with Disabilities Act?

Surviving in the Security Alarm Business (Paperback): Lou Sepulveda Surviving in the Security Alarm Business (Paperback)
Lou Sepulveda
R1,551 Discovery Miles 15 510 Ships in 18 - 22 working days

In the very competitive security alarm business, companies are finding themselves more and more burdened with the responsibility of preparing corporate mission statements, paradigm analyses, and corporate reengineering plans. Surviving in the Security Alarm Business will help explain their importance, how to perform them, and what the expected result will be.

Teaches alarm professionals how to recreate their business "from scratch" for greater selling success
Illustrates how to do business in the future in response to market changes and trends
Suggests techniques for willing recurring revenue rather than single-sale profit

Understanding Digital Signature - Establishing Trust Over the Internet and Other Networks (Paperback): Gail Grant Understanding Digital Signature - Establishing Trust Over the Internet and Other Networks (Paperback)
Gail Grant
R945 R813 Discovery Miles 8 130 Save R132 (14%) Ships in 18 - 22 working days

This volume explains the technology behind digital signatures and key infrastructures (PKI). These are the standards that make it absolutely safe to buy, sell, sign documents and exchange sensitive financial data on the Internet.

Datenanonymisierung im Kontext von Kunstlicher Intelligenz und Big Data - Grundlagen - Elementare Techniken - Anwendung... Datenanonymisierung im Kontext von Kunstlicher Intelligenz und Big Data - Grundlagen - Elementare Techniken - Anwendung (German, Paperback, 1. Aufl. 2022)
Heinz-Adalbert Krebs, Patricia Hagenweiler
R918 Discovery Miles 9 180 Ships in 18 - 22 working days

Die fortschreitende Digitalisierung, die immer hoehere Verfugbarkeit des Internets in Echtzeit sowie die progressive Entwicklung der IT ermoeglichen es Unternehmen und Organisationen, Daten in einem nie zuvor dagewesenen Umfang zu erzeugen und zu verarbeiten, wodurch sie einen enormen Stellen- und Marktwert erhalten haben. Zudem kann mithilfe der kunstlichen Intelligenz (KI) das in den Daten enthaltene Wissen extrahiert werden. Oft handelt es sich dabei um gesammelte Daten von Personen, mit denen Vorhersagen uber verschiedene Aspekte der Personen getroffen werden koennen.Das Buch befasst sich mit der Anonymisierung im Kontext der KI und Big Data. Dazu werden die wesentlichen Grundlagen dargestellt sowie pseudonymisierte und anonymisierte Daten mit Personenbezug im Rahmen der Datenschutz-Grundverordnung (DSGVO) und des Bundesdatenschutzgesetzes (BDSG) beleuchtet. Es werden Moeglichkeiten zur Pseudonymisierung, zu den jeweiligen Techniken und Verfahren der Anonymisierung sowie entsprechende Risikobetrachtungen behandelt. Abschliessend wird die Vorgehensweise der Anonymisierung aus rechtlicher und technischer Sicht unter Anwendung entsprechender Software behandelt.

The Hacked World Order - How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age (Paperback): Adam Segal The Hacked World Order - How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age (Paperback)
Adam Segal
R540 Discovery Miles 5 400 Ships in 18 - 22 working days

For more than three hundred years, the world wrestled with conflicts that arose between nation-states. Nation-states wielded military force, financial pressure, and diplomatic persuasion to create "world order." Even after the end of the Cold War, the elements comprising world order remained essentially unchanged. But 2012 marked a transformation in geopolitics and the tactics of both the established powers and smaller entities looking to challenge the international community. That year, the US government revealed its involvement in Operation "Olympic Games," a mission aimed at disrupting the Iranian nuclear program through cyberattacks; Russia and China conducted massive cyber-espionage operations; and the world split over the governance of the Internet. Cyberspace became a battlefield. Cyber conflict is hard to track, often delivered by proxies, and has outcomes that are hard to gauge. It demands that the rules of engagement be completely reworked and all the old niceties of diplomacy be recast. Many of the critical resources of statecraft are now in the hands of the private sector, giant technology companies in particular. In this new world order, cybersecurity expert Adam Segal reveals, power has been well and truly hacked.

Informationssicherheit und Datenschutz systematisch und nachhaltig gestalten - Eine kompakte Einfuhrung in die Praxis (German,... Informationssicherheit und Datenschutz systematisch und nachhaltig gestalten - Eine kompakte Einfuhrung in die Praxis (German, Paperback, 2., korr. Aufl. 2020)
Inge Hanschke
R570 Discovery Miles 5 700 Ships in 18 - 22 working days

In diesem Buch werden die Anforderungen der EU-Datenschutz-Grundverordnung (EU-DSGVO) und des Informationssicherheitsmanagements eingefuhrt. Es wird aufgezeigt, welche wesentlichen Bestandteile fur ein integriertes, einfaches und effektives Management-Instrumentarium erforderlich sind. Durch die Kombination mit Enterprise Architecture Management, IT-Servicemanagement und weiteren Disziplinen in ein integriertes Managementsystem kann die Wirksamkeit noch erhoeht werden. Neben einer Einfuhrung erhalt der Leser Tipps und Tricks fur die typischen Fallstricke in der Praxis sowie unmittelbar anwendbare Leitfaden und Empfehlungen - und dies kurz und pragnant. In der 2. Auflage wurden kleinere Fehler korrigiert.

IT-Sicherheitsmanagement nach der neuen ISO 27001 - ISMS, Risiken, Kennziffern, Controls (German, Paperback, 2., akt. Aufl.... IT-Sicherheitsmanagement nach der neuen ISO 27001 - ISMS, Risiken, Kennziffern, Controls (German, Paperback, 2., akt. Aufl. 2020)
Heinrich Kersten, Gerhard Klett, Jurgen Reuter, Klaus-Werner Schroeder
R1,030 Discovery Miles 10 300 Ships in 18 - 22 working days

Dieses Buch behandelt das Management der Informationssicherheit auf der Basis der Norm ISO/IEC 27001. Mit der 2. Auflage wurden die Inhalte des Fachbuches umfassend aktualisiert und den Neuerungen der Norm angepasst. Die Autoren erlautern kompetent den Standard und seine organisatorisch-technische Umsetzung. Dies betrifft die Anforderungen an das Informationssicherheits-Managementsystem (ISMS) genauso wie die 114 Controls aus dem Anhang der Norm. Die ausfuhrlich kommentierten Controls unterstutzen Sicherheitsverantwortliche bei der Auswahl geeigneter Sicherheitsmassnahmen in allen Bereichen. Die Normenreihe ISO 27000 ist ein wichtiges Hilfsmittel fur Unternehmen und Behoerden, die ein IT-Sicherheitsmanagement in ihrer Organisation einfuhren und betreiben wollen. Im internationalen Kontext ist die Anwendung der ISO 27001 fur viele Organisationen nahezu unverzichtbar. Nicht zuletzt mit dem deutschen IT-Sicherheitsgesetz erhalt dieser Standard auch national eine hohe Bedeutung. Seit der Neufassung der Norm im Jahr 2015 (deutsche Version) und AEnderungen in 2017 mussen sich alle Organisationen entsprechend umstellen und ihr ISMS anpassen. Hierfur enthalt das Buch entsprechende "Fahrplane".

Data Protection and Privacy, Volume 12 - Data Protection and Democracy (Hardcover): Dara Hallinan, Ronald Leenes, Serge... Data Protection and Privacy, Volume 12 - Data Protection and Democracy (Hardcover)
Dara Hallinan, Ronald Leenes, Serge Gutwirth, Paul De Hert
R2,591 Discovery Miles 25 910 Ships in 18 - 22 working days

The subjects of this volume are more relevant than ever, especially in light of the raft of electoral scandals concerning voter profiling. This volume brings together papers that offer conceptual analyses, highlight issues, propose solutions, and discuss practices regarding privacy and data protection. It is one of the results of the twelfth annual International Conference on Computers, Privacy and Data Protection, CPDP, held in Brussels in January 2019. The book explores the following topics: dataset nutrition labels, lifelogging and privacy by design, data protection iconography, the substance and essence of the right to data protection, public registers and data protection, modelling and verification in data protection impact assessments, examination scripts and data protection law in Cameroon, the protection of children's digital rights in the GDPR, the concept of the scope of risk in the GDPR and the ePrivacy Regulation. This interdisciplinary book has been written at a time when the scale and impact of data processing on society - not only on individuals, but also on social systems - is becoming ever starker. It discusses open issues as well as daring and prospective approaches, and will serve as an insightful resource for readers with an interest in computers, privacy and data protection.

What Do We Know and What Should We Do About Internet Privacy? (Paperback): Paul Bernal What Do We Know and What Should We Do About Internet Privacy? (Paperback)
Paul Bernal
R738 Discovery Miles 7 380 Ships in 18 - 22 working days

Privacy on the internet is challenged in a wide variety of ways - from large social media companies, whose entire business models are based on privacy invasion, through the developing technologies of facial recognition, to the desire of governments to monitor our every activity online. But the impact these issues have on our daily lives is often underplayed or misunderstood. In this book, Paul Bernal analyses how the internet became what it is today, exploring how the current manifestation of the internet works for people, for companies and even for governments, with reference to the new privacy battlefields of location and health data, the internet of things and the increasingly contentious issue of personal data and political manipulation. The author then proposes what we should do about the problems surrounding internet privacy, such as significant changes in government policy, a reversal of the current 'war' on encryption, being brave enough to take on the internet giants, and challenging the idea that 'real names' would improve the discourse on social networks. ABOUT THE SERIES: The 'What Do We Know and What Should We Do About...?' series offers readers short, up-to-date overviews of key issues often misrepresented, simplified or misunderstood in modern society and the media. Each book is written by a leading social scientist with an established reputation in the relevant subject area. The Series Editor is Professor Chris Grey, Royal Holloway, University of London

The Ultimate Privacy Field Guide - A Workbook of Best Practices (Paperback): Erin Berman, Bonnie Tijerina The Ultimate Privacy Field Guide - A Workbook of Best Practices (Paperback)
Erin Berman, Bonnie Tijerina
R729 Discovery Miles 7 290 Ships in 10 - 15 working days

Privacy is a core value of librarianship, yet it often feels like an overwhelming and onerous undertaking. With the creation of ever larger datasets and methods to track users' every movement, library workers need to have a deep understanding of privacy, confidentiality, and security. Written by library privacy experts and based on input and guidance from a wide cross-section of stakeholders, this resource is structured to give library workers the tools needed to create and be advocates for privacy-protecting practices and policies. Complete with an introduction to each topic and several exercises for you to implement privacy changes at your library, with the help of this guide you will learn about creating strong passwords, multifactor authentication, how to avoid malware, and other basic digital security concepts as well as where to go for more help; be able to communicate the importance of privacy and why libraries should care by understanding the people you are trying to reach; navigate areas in your physical library space to help protect users' privacy; see how user data travels through the library and what you can do to protect it; build an audit framework, perform an audit, and tell the audit story; read, understand, and write privacy policies applicable to your library; and gain key strategies to employ while protecting user privacy when engaging vendors.

Die Fortentwicklung des Datenschutzes - Zwischen Systemgestaltung und Selbstregulierung (German, Paperback, 1. Aufl. 2018):... Die Fortentwicklung des Datenschutzes - Zwischen Systemgestaltung und Selbstregulierung (German, Paperback, 1. Aufl. 2018)
Alexander Rossnagel, Michael Friedewald, Marit Hansen
R2,442 Discovery Miles 24 420 Ships in 18 - 22 working days

Der Datenschutz ist nicht ausreichend auf die Herausforderungen moderner Informationstechnik mit Ubiquitous Computing, Big Data, kunstlicher Intelligenz und lernenden Systemen eingestellt. Dies gilt auch fur die Datenschutz-Grundverordnung. Die Beitrage des Sammelbandes untersuchen die Anforderungen des digitalen Wandels an Konzepte, Instrumente und Institutionen des Datenschutzes; sie eroertern Loesungen fur bisher ungeregelte Datenschutzprobleme, entwerfen Konzepte fur einen modernen Grundrechts- und Datenschutz und entwickeln Modelle fur eine Evolution des Datenschutzes in der kunftigen digitalen Welt.

Der Grundsatz Der Verfugbarkeit - Ziel, Rechtsstand Und Perspektiven Des Strafrechtlichen Informationsaustauschs in Der... Der Grundsatz Der Verfugbarkeit - Ziel, Rechtsstand Und Perspektiven Des Strafrechtlichen Informationsaustauschs in Der Europaischen Union (German, Paperback, 1. Aufl. 2018 ed.)
Magdalena Schmidt
R1,616 Discovery Miles 16 160 Ships in 18 - 22 working days
Informationelle Selbstbestimmung Im Digitalen Wandel (German, Paperback, 1. Aufl. 2017 ed.): Michael Friedewald, Joern Lamla,... Informationelle Selbstbestimmung Im Digitalen Wandel (German, Paperback, 1. Aufl. 2017 ed.)
Michael Friedewald, Joern Lamla, Alexander Rossnagel
R2,193 Discovery Miles 21 930 Ships in 18 - 22 working days
Datenschutz - Einfuhrung in technischen Datenschutz, Datenschutzrecht und angewandte Kryptographie (German, Paperback, 2. Aufl.... Datenschutz - Einfuhrung in technischen Datenschutz, Datenschutzrecht und angewandte Kryptographie (German, Paperback, 2. Aufl. 2022)
Ronald Petrlic, Christoph Sorge, Wolfgang Ziebarth
R983 Discovery Miles 9 830 Ships in 10 - 15 working days

Dieses Lehrbuch behandelt im ersten Teil schwerpunktmassig technische Massnahmen, die den Schutz personenbezogener Daten sicherstellen. Dazu werden grundlegende Verfahren der Anonymisierung und der Gewahrleistung von Anonymitat im Internet (z. B. Tor) vorgestellt. Das Buch gibt einen UEberblick uber gangige Verfahren des Identitatsmanagements (z. B. OpenID Connect) und die in elektronischen Ausweisdokumenten (z. B. im Personalausweis) verwendeten Sicherheitsmassnahmen. Die Datenschutz-Garantien der vermittelten Ansatze werden im Detail behandelt. Im Bereich des World Wide Web erfahrt der Leser, wo die Probleme aus Sicht des Datenschutzes liegen und wie diese Lucken geschlossen werden koennen. Anonyme Bezahlverfahren und eine Untersuchung von Bitcoin runden den technischen Teil des Buches ab. Der Leser lernt Ansatze aus der Praxis kennen, um so je nach Anforderungen in der Systementwicklung das passende Verfahren auswahlen zu koennen. Im zweiten Teil werden die Grundlagen des Datenschutzrechts behandelt. Denn technische Massnahmen sollen unerlaubte Datenverarbeitung verhindern; das Recht bestimmt, welche Datenverarbeitungen erlaubt sind. Ohne Kenntnisse im Datenschutzrecht koennen technische Massnahmen nicht richtig implementiert werden. Zum besseren Verstandnis erfolgt ein UEberblick uber die Rechtsordnung insgesamt, in die das Datenschutzrecht eingeordnet wird. Betrachtet werden die europaische und die verfassungsrechtliche Dimension des Datenschutzes. Der Schwerpunkt liegt auf den Regelungen der Datenschutz-Grundverordnung. Dabei werden auch besonders haufig vorkommende und Fragen aufwerfende Verarbeitungssituationen wie das Webtracking eroertert. Beispielhaft werden datenschutzrechtliche Falle bearbeitet.

Federal Cybersecurity - Strategy & Implementation for Research & Development (Paperback): Cory Medina Federal Cybersecurity - Strategy & Implementation for Research & Development (Paperback)
Cory Medina
R3,944 Discovery Miles 39 440 Ships in 10 - 15 working days

Computers and computer networking provide major benefits to modern society, yet the growing costs of malicious cyber activities and cybersecurity itself diminish these benefits. Advances in cybersecurity are urgently needed to preserve the Internets growing social and economic benefits by thwarting adversaries and strengthening public trust of cyber systems. On December 18, 2014 the President signed into law the Cybersecurity Enhancement Act of 2014. This law requires the National Science and Technology Council (NSTC) and the Networking and Information Technology Research and Development (NITRD) Program to develop and maintain a cybersecurity research and development (R&D) strategic plan (the Plan) using an assessment of risk to guide the overall direction of Federally-funded cybersecurity R&D. This plan satisfies that requirement and establishes the direction for the Federal R&D enterprise in cybersecurity science and technology (S&T) to preserve and expand the Internets wide-ranging benefits. This book reviews the strategy and implementation for research and development of federal cybersecurity.

Federal Cybersecurity - Identification & Mitigation Efforts of Sector-Specific Agencies (Paperback): Jeffery H. Matthews Federal Cybersecurity - Identification & Mitigation Efforts of Sector-Specific Agencies (Paperback)
Jeffery H. Matthews
R1,847 Discovery Miles 18 470 Ships in 10 - 15 working days

U. S. critical infrastructures, such as financial institutions, commercial buildings, and energy production and transmission facilities, are systems and assets, whether physical or virtual, vital to the nations security, economy, and public health and safety. To secure these systems and assets, federal policy and the National Infrastructure Protection Plan (NIPP) establish responsibilities for federal agencies designated as Sector-specific agencies (SSAs), including leading, facilitating, or supporting the security and resilience programs and associated activities of their designated critical infrastructure sectors. The objectives of this book are to determine the extent to which SSAs have identified the significance of cyber risks to their respective sectors networks and industrial control systems; taken actions to mitigate cyber risks within their respective sectors; collaborated across sectors to improve cybersecurity; and established performance metrics to monitor improvements in their respective sectors.

Die Zukunft der Datenoekonomie - Zwischen Geschaftsmodell, Kollektivgut und Verbraucherschutz (German, Paperback, 1. Aufl.... Die Zukunft der Datenoekonomie - Zwischen Geschaftsmodell, Kollektivgut und Verbraucherschutz (German, Paperback, 1. Aufl. 2019)
Carsten Ochs, Michael Friedewald, Thomas Hess, Joern Lamla
R1,557 Discovery Miles 15 570 Ships in 10 - 15 working days

Digitale Daten gelten sowohl als Quelle fur Wirtschaftswachstum, Innovation und Arbeitsplatze wie auch als Treiber der datenbasierten Reorganisation praktisch aller gesellschaftlichen Bereiche ("Datafizierung"). Die datenoekonomisch befeuerten Transformationsprozesse des Sozialen werfen dementsprechend vielfaltige Fragen auf: Welche Daten sollen von wem wie verwertbar sein? Wie lasst sich legitime Verfugungsmacht gestalten? Usw. Der Band behandelt diese Fragen aus interdisziplinarer Perspektive.

Grundrechtsschutz Im Smart Car - Kommunikation, Sicherheit Und Datenschutz Im Vernetzten Fahrzeug (German, Paperback, 1. Aufl.... Grundrechtsschutz Im Smart Car - Kommunikation, Sicherheit Und Datenschutz Im Vernetzten Fahrzeug (German, Paperback, 1. Aufl. 2019 ed.)
Alexander Rossnagel, Gerrit Hornung
R1,958 Discovery Miles 19 580 Ships in 10 - 15 working days
Privacy - Select Issues & Laws for the 21st Century (Hardcover): Doris B Delrio Privacy - Select Issues & Laws for the 21st Century (Hardcover)
Doris B Delrio
R5,113 Discovery Miles 51 130 Ships in 10 - 15 working days

This book is a study of select issues and laws relating to privacy in the 21st century. Topics examined include an overview of federal law governing wiretapping and electronic eavesdropping under the Electronic Communications Privacy Act (ECPA); background and issues related to the USA PATRIOT Act reauthorisation on government collection of private information; the United States v. Jones court case involving GPS monitoring, property and privacy; Fourth Amendment implications and legislative responses to drones in domestic surveillance operations; and the privacy and security concerns surrounding smart meter technology.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Managing Festivals for Destination…
Sharad Kumar Kulshreshtha Hardcover R6,797 Discovery Miles 67 970
The Judgment of Jerusalem - Predicted in…
William Patton Paperback R497 Discovery Miles 4 970
Lost On The Map - A Memoir Of Colonial…
Bryan Rostron Paperback R340 R314 Discovery Miles 3 140
Design of Energy-Efficient…
Tilman Gloekler, Heinrich Meyr Hardcover R2,788 Discovery Miles 27 880
Lore Of Nutrition - Challenging…
Tim Noakes, Marika Sboros Paperback  (4)
R350 R323 Discovery Miles 3 230
Ultra Low-Power Integrated Circuit…
Jeremy Holleman, Fan Zhang, … Hardcover R2,717 Discovery Miles 27 170
A History Of South Africa - From The…
Fransjohan Pretorius Paperback R724 Discovery Miles 7 240
Stochastic Dynamics of Crystal Defects
Thomas D Swinburne Hardcover R2,653 Discovery Miles 26 530
Years Of Fire And Ash - South African…
Wamuwi Mbao Paperback R521 Discovery Miles 5 210
Topics in Clifford Analysis - Special…
Swanhild Bernstein Hardcover R3,422 Discovery Miles 34 220

 

Partners