0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (126)
  • R250 - R500 (244)
  • R500+ (794)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

Cyber Storm III (Paperback): Department of Homeland Security Cyber Storm III (Paperback)
Department of Homeland Security
R296 Discovery Miles 2 960 Ships in 18 - 22 working days
Digital Assassination - Protecting Your Reputation, Brand, or Business Against Online Attacks (Paperback): Richard Torrenzano,... Digital Assassination - Protecting Your Reputation, Brand, or Business Against Online Attacks (Paperback)
Richard Torrenzano, Mark Davis
R544 R508 Discovery Miles 5 080 Save R36 (7%) Ships in 18 - 22 working days

"Two leading reputation experts reveal how the internet is being used to destroy brands, reputations and even lives, and how to fight back.
"From false Wikipedia entries, to fake YouTube videos, to Facebook lynch mobs, everyone from CEOs to fashion models, journalists to politicians, restaurateurs to doctors, is open to character assassination in the burgeoning realm of digital media.
Two top media experts recount vivid tales of character attacks, provide specific advice on how to counter them, and how to turn the tables on the attackers. Having spent decades preparing for and coping with these issues, Richard Torrenzano and Mark Davis share their secrets on dealing with problems at the top of today's news.
Torrenzano and Davis also take a step back to look at how the past might inform our future thinking about character assassination, from the slander wars between Thomas Jefferson and Alexander Hamilton, to predictions on what the end of privacy will mean for civilization.

Our Data, Ourselves - A Personal Guide to Digital Privacy (Hardcover): Jacqueline D. Lipton Our Data, Ourselves - A Personal Guide to Digital Privacy (Hardcover)
Jacqueline D. Lipton
R1,820 Discovery Miles 18 200 Ships in 10 - 15 working days

A practical, user-friendly handbook for understanding and protecting our personal data and digital privacy. Our Data, Ourselves addresses a common and crucial question: What can we as private individuals do to protect our personal information in a digital world? In this practical handbook, legal expert Jacqueline D. Lipton guides readers through important issues involving technology, data collection, and digital privacy as they apply to our daily lives. Our Data, Ourselves covers a broad range of everyday privacy concerns with easily digestible, accessible overviews and real-world examples. Lipton explores the ways we can protect our personal data and monitor its use by corporations, the government, and others. She also explains our rights regarding sensitive personal data like health insurance records and credit scores, as well as what information retailers can legally gather, and how. Who actually owns our personal information? Can an employer legally access personal emails? What privacy rights do we have on social media? Answering these questions and more, Our Data, Ourselves provides a strategic approach to assuming control over, and ultimately protecting, our personal information.

The Data Governance Imperative - A Business Strategy for Corporate Data (Paperback, New): Steve Sarsfield The Data Governance Imperative - A Business Strategy for Corporate Data (Paperback, New)
Steve Sarsfield
R1,064 Discovery Miles 10 640 Ships in 18 - 22 working days

Attention to corporate information has never been more important than now. The ability to generate accurate business intelligence, accurate financial reports and to understand your business relies on better processes and personal commitment to clean data. Every byte of data that resides inside your company, and some that resides outside its walls, has the potential to make you stronger by giving you the agility, speed and intelligence that none of your competitors yet have. Data governance is the term given to changing the hearts and minds of your company to see the value of such information quality. The Data Governance Imperative is a business person's view of data governance. This practical book covers both strategies and tactics around managing a data governance initiative. The author, Steve Sarsfield, works for a major enterprise software company and is a leading expert in data quality and data governance, focusing on the business perspectives that are important to data champions, front-office employees, and executives. Steve runs an award-winning and world-recognized blog called the Data Governance and Data Quality Insider, offering practical wisdom.

Protectors of Privacy - Regulating Personal Data in the Global Economy (Hardcover): Abraham L. Newman Protectors of Privacy - Regulating Personal Data in the Global Economy (Hardcover)
Abraham L. Newman
R1,247 Discovery Miles 12 470 Ships in 10 - 15 working days

From credit-card purchases to electronic fingerprints, the amount of personal data available to government and business is growing exponentially. All industrial societies face the problem of how to regulate this vast world of information, but their governments have chosen distinctly different solutions. In Protectors of Privacy, Abraham L. Newman details how and why, in contrast to the United States, the nations of the European Union adopted comprehensive data privacy for both the public and the private sectors, enforceable by independent regulatory agencies known as data privacy authorities. Despite U.S. prominence in data technology, Newman shows, the strict privacy rules of the European Union have been adopted far more broadly across the globe than the self-regulatory approach championed by the United States. This rift has led to a series of trade and security disputes between the United States and the European Union.Based on many interviews with politicians, civil servants, and representatives from business and NGOs, and supplemented with archival sources, statistical analysis, and examples, Protectors of Privacy delineates the two principal types of privacy regimes-comprehensive and limited. The book presents a theory of regulatory development that highlights the role of transgovernmental networks not only in implementing rules but also in actively shaping the political process surrounding policymaking. More broadly, Newman explains how Europe's institutional revolution has created in certain sectors the regulatory capacity that allows it to challenge U.S. dominance in international economic governance.

Cybercrime - Secure It or Lose It (Paperback): Denise M Chatam Cybercrime - Secure It or Lose It (Paperback)
Denise M Chatam
R416 R390 Discovery Miles 3 900 Save R26 (6%) Ships in 18 - 22 working days

"Cybercrime: Secure IT or Lose IT" looks at the who, what, why, when, and where of Internet crime from the perspective of businesspeople. Information security and audit personnel will find value in the materials provided in this book to establish and maintain a comprehensive information security program and to aid in satisfying regulatory compliance requirements.

The Governance of Privacy - Policy Instruments in Global Perspective (Paperback, New Ed): Colin J. Bennett, Charles Raab The Governance of Privacy - Policy Instruments in Global Perspective (Paperback, New Ed)
Colin J. Bennett, Charles Raab
R1,185 Discovery Miles 11 850 Ships in 18 - 22 working days

Analyzes privacy policy instruments available to contemporary industrial states, from government regulations and transnational regimes to self-regulation and privacy enhancing technologies. Privacy protection, according to Colin Bennett and Charles Raab, involves politics and public policy as much as it does law and technology. Moreover, the protection of our personal information in a globalized, borderless world means that privacy-related policies are inextricably interdependent. In this updated paperback edition of The Governance of Privacy, Bennett and Raab analyze a broad range of privacy policy instruments available to contemporary advanced industrial states, from government regulations and transnational regimes to self-regulation and privacy-enhancing technologies. They consider two possible dynamics of privacy regulation-a "race to the bottom," with competitive deregulation by countries eager to attract global investment in information technology, versus "a race to the top," with the progressive establishment of global privacy standards. Bennett and Raab begin by discussing the goals of privacy protection, the liberal and individualist assumptions behind it, and the neglected relationship between privacy and social equity. They describe and evaluate different policy instruments, including the important 1995 Directive on Data Protection from the European Union, as well as the general efficacy of the "top-down" statutory approach and self-regulatory and technological alternatives to it. They evaluate the interrelationships of these policy instruments and their position in a global framework of regulation and policy by state and non-state actors. And finally, they consider whether all of this policy activity at international, national, and corporate levels necessarily means higher levels of privacy protection.

RSA Security's Official Guide to XML Security (Paperback, Ed): Blake Dournee RSA Security's Official Guide to XML Security (Paperback, Ed)
Blake Dournee
R1,622 R1,334 Discovery Miles 13 340 Save R288 (18%) Ships in 18 - 22 working days

Use this book as both an XML primer and to get up to speed on XML-related security issues. Written by the experts at RSA Security, Inc., you’ll get inside tips on how to prevent denial of service attacks, and how to implement security measures to keep your XML programs protected.

The Digital Person - Technology and Privacy in the Information Age (Hardcover): Daniel J. Solove The Digital Person - Technology and Privacy in the Information Age (Hardcover)
Daniel J. Solove
R2,166 Discovery Miles 21 660 Ships in 10 - 15 working days

View the Table of Contents.
Read the Introduction.

aThis comprehensive analysis of privacy in the information age challenges traditional assumptions that breeches of privacy through the development of electronic dossiers involve the invasion of oneas private space.a
--"Choice"

"The Digital Person challenges the existing ways in which law and legal theory approach the social, political, and legal implications of the collection and use of personal information in computer databases. Solove's book is ambitious, and represents the most important publication in the field of information privacy law for some years."
--"Georgetown Law Journal"

"Anyone concerned with preserving privacy against technology's growing intrusiveness will find this book enlightening."
--"Publishers Weekly"

"Solove . . . truly understands the intersection of law and technology. This book is a fascinating journey into the almost surreal ways personal information is hoarded, used, and abused in the digital age."
--"The Wall Street Journal"

"Daniel Solove is one of the most energetic and creative scholars writing about privacy today. The Digital Person is an important contribution to the privacy debate, and Solove's discussion of the harms of what he calls 'digital dossiers' is invaluable."
--Jeffrey Rosen, author of "The Unwanted Gaze" and "The Naked Crowd"

"Powerful theme."
--"Privacy Journal"

"This is not only a book you should read, but you should make sure your friends read it."
--"IEEE Review"

"Solove offers a book that is both comprehensive and easy to understand, discussing the changes that technology has brought to our concept of privacy. An excellentstarting point for much needed discussion."
--"Law Technology News"

"An unusually perceptive discussion of one of the most vexing problems of the digital age--our loss of control over our personal information. It's a fascinating journey into the almost surreal ways personal information is hoarded, used, and abused in the digital age. I recommend his book highly."
--Bruce Schneier

"Solove's book is the best exposition thus far about the threat that computer databases containing personal data about millions of Americans poses for information privacy."
--Pamela Samuelson, Chancellor's Professor of Law and Information Management at the University of California, Berkeley

"Solove drives his points home through considerable reconfiguration of the basic argument. Rather than casting blame or urging retreat to a precomputer database era, the solution is seen in informing individuals, challenging data collectors, and bringing the law up-to-date."
--"Choice"

"If you want to find out what a mess the law of privacy is, how it got that way, and whether there is hope for the future, then read this book."
--"Legal Times"

"Solove evaluates the shortcomings of current approaches to privacy as well as some useful and controversial ideas for striking a new balance. Anyone who deals with privacy matters will find a lot ot consider."
--"DM News"

"Solove's treatment of this particular facet is thoughtful, thorough, concise, and occasionally laced with humor. The present volume gives us reason to look forward to his future contributions."
--"The Law and Politics Book Review"

"Solove's book is useful, particularly as an overview on how these private and governmentdatabases grew in sophistication and now interact with one another."
--"Christian Science Monitor"

"A far-reaching examination of how digital dossiers are shaping our lives. Daniel Solove has persuasively reconceptualized privacy for the digital age. A must-read."
--Paul Schwartz, Brooklyn Law School

"The Digital Person is a detailed and approachable resource on privacy issues and the laws that affect them."
--"IT Conversations"

Seven days a week, twenty-four hours a day, electronic databases are compiling information about you. As you surf the Internet, an unprecedented amount of your personal information is being recorded and preserved forever in the digital minds of computers. For each individual, these databases create a profile of activities, interests, and preferences used to investigate backgrounds, check credit, market products, and make a wide variety of decisions affecting our lives. The creation and use of these databases--which Daniel J. Solove calls "digital dossiers"--has thus far gone largely unchecked. In this startling account of new technologies for gathering and using personal data, Solove explains why digital dossiers pose a grave threat to our privacy.

The Digital Person sets forth a new understanding of what privacy is, one that is appropriate for the new challenges of the Information Age. Solove recommends how the law can be reformed to simultaneously protect our privacy and allow us to enjoy the benefits of our increasingly digital world.

The first volume in the series EX MACHINA: LAW, TECHNOLOGY, AND SOCIETY

Cyber Security, Privacy and Networking - Proceedings of ICSPN 2021 (Paperback, 1st ed. 2022): Dharma P. Agrawal, Nadia Nedjah,... Cyber Security, Privacy and Networking - Proceedings of ICSPN 2021 (Paperback, 1st ed. 2022)
Dharma P. Agrawal, Nadia Nedjah, Bb Gupta, Gregorio Martinez Perez
R5,901 Discovery Miles 59 010 Ships in 10 - 15 working days

This book covers selected high-quality research papers presented in the International Conference on Cyber Security, Privacy and Networking (ICSPN 2021), organized during 17-19 September 2021 in India in Online mode. The objectives of ICSPN 2021 is to provide a premier international platform for deliberations on strategies, recent trends, innovative approaches, discussions and presentations on the most recent cyber security, privacy and networking challenges and developments from the perspective of providing security awareness and its best practices for the real world. Moreover, the motivation to organize this conference is to promote research by sharing innovative ideas among all levels of the scientific community, and to provide opportunities to develop creative solutions to various security, privacy and networking problems.

The Personal Internet Security Guidebook - Keeping Hackers and Crackers out of Your Home (Paperback): Tim Speed, Juanita Ellis,... The Personal Internet Security Guidebook - Keeping Hackers and Crackers out of Your Home (Paperback)
Tim Speed, Juanita Ellis, Steffano Korper
R2,256 Discovery Miles 22 560 Ships in 18 - 22 working days

The Personal Internet Security Guidebook is a complete guide to protecting your computer(s) on the Internet. The newest attack point for hackers is home computers on DSL and/or cable modems. This book will show you how to set up a home network and protect it from the "bad dudes." Also covered in this book is how to protect your computer on the road. Many hotels are now offering high-speed Internet access and this book will show you how to keep your computer safe in the hotel room as well as on the hotel network.
This is a how-to guide to keeping your personal computer safe on the Internet. Following the success of The Internet Security Guidebook, the authors have used their expertise to create a book specifically addressing home computers and traveling notebooks. Included in this book is a comprehensive list of vendors and services. Included are these key elements: protecting your PC on the Internet, home firewall software, how to set up a home network, protecting your PC on the road, and protecting your PC via DSL and/or cable modem.
A comprehensive list of vendors and services that you can download or purchase
Key elements such as: protecting your PC on the internet
How to fully utilise home firewall software
How to set-up a home network
Information on protecting you PC on the road
Information on protecting your PC via DSL and cable modems

Rethinking Public Key Infrastructures and Digital Certificates - Building in Privacy (Paperback): Stefan Brands Rethinking Public Key Infrastructures and Digital Certificates - Building in Privacy (Paperback)
Stefan Brands
R1,177 Discovery Miles 11 770 Ships in 18 - 22 working days

Stefan Brands proposes cryptographic building blocks for the design of digital certificates that preserve privacy without sacrificing security. As paper-based communication and transaction mechanisms are replaced by automated ones, traditional forms of security such as photographs and handwritten signatures are becoming outdated. Most security experts believe that digital certificates offer the best technology for safeguarding electronic communications. They are already widely used for authenticating and encrypting email and software, and eventually will be built into any device or piece of software that must be able to communicate securely. There is a serious problem, however, with this unavoidable trend: unless drastic measures are taken, everyone will be forced to communicate via what will be the most pervasive electronic surveillance tool ever built. There will also be abundant opportunity for misuse of digital certificates by hackers, unscrupulous employees, government agencies, financial institutions, insurance companies, and so on.In this book Stefan Brands proposes cryptographic building blocks for the design of digital certificates that preserve privacy without sacrificing security. Such certificates function in much the same way as cinema tickets or subway tokens: anyone can establish their validity and the data they specify, but no more than that. Furthermore, different actions by the same person cannot be linked. Certificate holders have control over what information is disclosed, and to whom. Subsets of the proposed cryptographic building blocks can be used in combination, allowing a cookbook approach to the design of public key infrastructures. Potential applications include electronic cash, electronic postage, digital rights management, pseudonyms for online chat rooms, health care information storage, electronic voting, and even electronic gambling.

Genetic Testing and the Use of Information (Paperback): Clarisa Long Genetic Testing and the Use of Information (Paperback)
Clarisa Long
R381 R355 Discovery Miles 3 550 Save R26 (7%) Ships in 18 - 22 working days

We are in the early years of a technological revolution arising from our understanding of the genetic meaning of life. Scientists' ability to manipulate and decode genes is advancing at an extraordinary pace - so fast we are often unprepared to handle the many vexing legal, economic, ethical and social issues they raise. The combination of genetic research and information technology raises often chilling questions of privacy and genetic discrimination. Should individuals be allowed personal property rights to their DNA, cells or tissues? How should policymakers regulate the biotechnology industry to maximize safety without stifling innovation? What are the appropriate uses of gene therapy and other genetic manipulations? In "Genetic Testing and the Use of Information", leading scholars grapple with issues of genetic privacy, the regulation of genetic testing and genetic discrimination. They consider such questions as: Who should have access to information derived from a genetic test? Should one be obligated to tell a spouse or a child test results? Should governments ever appropriately mandate individual genetic testing or community-wide genetic screening? Will employers be able to require the release of genetic records as a condition of employment? Will insurance companies be allowed to use genetic information to determine risk? At what point does a genetic condition qualify as a disability under the American with Disabilities Act?

The Limits Of Privacy (Paperback): Amitai Etzioni The Limits Of Privacy (Paperback)
Amitai Etzioni
R686 Discovery Miles 6 860 Ships in 18 - 22 working days

Privacy is perhaps the most hallowed of American rights--and most people are concerned that new technologies available to governments and corporations threaten to erode this most privileged of rights. But in The Limits of Privacy, Amitai Etzioni offers a decidedly different point of view, in which the right to privacy is balanced against concern for public safety and health. Etzioni looks at five flashpoint issues: Megan's Laws, HIV testing of infants, deciphering of encrypted messages, national identification cards, and medical records, and concludes that there are times when Amricans' insistence on privacy is not in the best interests of society at large. He offers four clear and concise criteria which, when applied jointly, help us to determine when the right to privacy should be overridden for the greater public good.Almost every week headlines warn us that our cell phones are being monitored, our e-mails read, and our medical records traded on the open market. Public opinion polls show that Americans are dismayed about incursions against personal privacy. Congress and state legislatures are considering laws designed to address their concerns.Focusing on five flashpoint issues--Megan's Law, mandatory HIV testing of infants, encryption of electronic documents, national identification cards and biometric identifiers, and medical records--The Limits of Privacy argues counterintuitively that sometimes major public health and safety concerns should outweigh the individual's right to privacy. Presenting four concise criteria to determine when the right to privacy should be preserved and when it should be overridden in the interests of the wider community, Etzioni argues that, in somecases, we would do well to sacrifice the privacy of the individual in the name of the common good.

Digitale Kompetenz - Grundlagen der Kunstlichen Intelligenz, Blockchain-Technologie, Quanten-Computing und deren Anwendungen... Digitale Kompetenz - Grundlagen der Kunstlichen Intelligenz, Blockchain-Technologie, Quanten-Computing und deren Anwendungen fur die Digitale Transformation (German, Paperback, 1. Aufl. 2022)
Volker Lang
R795 R699 Discovery Miles 6 990 Save R96 (12%) Ships in 18 - 22 working days

Wenn Sie neugierig auf die Grundlagen der kunstlichen Intelligenz, der Blockchain-Technologie und des Quantencomputings sind, die fur die digitale Transformation und Innovation von entscheidender Bedeutung sind, ist Digital Fluency Ihr praktischer Leitfaden. Die realen Anwendungen dieser Spitzentechnologien nehmen rapide zu, und Ihr tagliches Leben wird weiterhin von jeder dieser Technologien beeinflusst werden. Es gibt keinen besseren Zeitpunkt als jetzt, um anzufangen und sich digital fit zu machen. Sie mussen keine Vorkenntnisse uber diese vielseitigen Technologien haben, denn der Autor Volker Lang fuhrt Sie kompetent durch das digitale Zeitalter. In zahlreichen Praxisbeispielen und mehr als 48 einpragsamen Abbildungen veranschaulicht er in Digital Fluency zentrale Konzepte und Anwendungen. Am Ende jedes Kapitels finden Sie eine hilfreiche Checkliste zur Umsetzung der zentralen Lektionen, bevor Sie zum nachsten Kapitel ubergehen. Dieses Buch geht den digitalen Schlagwoertern und Konzepten auf den Grund und sagt Ihnen, was sie wirklich bedeuten. Das Aufschlusseln von Themen wie automatisiertes Fahren und intelligente Robotik mit kunstlicher Intelligenz, Blockchain-basierte Kryptowahrungen und Smart Contracts, Medikamentenentwicklung und Optimierung von Finanzinvestitionsportfolios durch Quantencomputing und vieles mehr ist unerlasslich, um fur die Zukunft der Industrie gerustet zu sein. Unabhangig davon, ob Ihre eigene digitale Transformation in Ihrem privaten oder oeffentlichen Unternehmen, in Ihrem Studium oder in Ihrem Privathaushalt stattfindet, Digital Fluency erstellt einen konkreten digitalen Aktionsplan fur alle Ihre Anforderungen an Technologie- und Innovationsstrategien. Was Sie lernen werden Sich im digitalen Zeitalter orientieren, ohne Vorkenntnisse uber digitale Technologien und digitale Transformation zu benoetigen Lernen Sie die beliebtesten aktuellen und zukunftigen Anwendungen von kunstlicher Intelligenz, Blockchain-Technologie und Quantencomputing in einer Vielzahl von Branchen kennen, darunter das Gesundheitswesen, Finanzdienstleistungen und die Automobilindustrie Machen Sie sich mit den digitalen Innovationsmodellen von Amazon, Google, Microsoft, IBM und anderen weltweit fuhrenden Unternehmen vertraut. Setzen Sie Ihre eigene digitale Transformation entlang der acht Kerndimensionen eines konkreten digitalen Aktionsplans erfolgreich um. Fur wen dieses Buch bestimmt ist Vordenker, Fuhrungskrafte und Industriestrategen, Management- und Strategieberater, Politiker und Entscheidungstrager, Unternehmer, Finanzanalysten, Investoren und Risikokapitalgeber, Studenten und Forscher sowie allgemeine Leser, die sich digital fit machen wollen.

Surviving in the Security Alarm Business (Paperback): Lou Sepulveda Surviving in the Security Alarm Business (Paperback)
Lou Sepulveda
R1,551 Discovery Miles 15 510 Ships in 18 - 22 working days

In the very competitive security alarm business, companies are finding themselves more and more burdened with the responsibility of preparing corporate mission statements, paradigm analyses, and corporate reengineering plans. Surviving in the Security Alarm Business will help explain their importance, how to perform them, and what the expected result will be.

Teaches alarm professionals how to recreate their business "from scratch" for greater selling success
Illustrates how to do business in the future in response to market changes and trends
Suggests techniques for willing recurring revenue rather than single-sale profit

Understanding Digital Signature - Establishing Trust Over the Internet and Other Networks (Paperback): Gail Grant Understanding Digital Signature - Establishing Trust Over the Internet and Other Networks (Paperback)
Gail Grant
R945 R813 Discovery Miles 8 130 Save R132 (14%) Ships in 18 - 22 working days

This volume explains the technology behind digital signatures and key infrastructures (PKI). These are the standards that make it absolutely safe to buy, sell, sign documents and exchange sensitive financial data on the Internet.

Datenanonymisierung im Kontext von Kunstlicher Intelligenz und Big Data - Grundlagen - Elementare Techniken - Anwendung... Datenanonymisierung im Kontext von Kunstlicher Intelligenz und Big Data - Grundlagen - Elementare Techniken - Anwendung (German, Paperback, 1. Aufl. 2022)
Heinz-Adalbert Krebs, Patricia Hagenweiler
R918 Discovery Miles 9 180 Ships in 18 - 22 working days

Die fortschreitende Digitalisierung, die immer hoehere Verfugbarkeit des Internets in Echtzeit sowie die progressive Entwicklung der IT ermoeglichen es Unternehmen und Organisationen, Daten in einem nie zuvor dagewesenen Umfang zu erzeugen und zu verarbeiten, wodurch sie einen enormen Stellen- und Marktwert erhalten haben. Zudem kann mithilfe der kunstlichen Intelligenz (KI) das in den Daten enthaltene Wissen extrahiert werden. Oft handelt es sich dabei um gesammelte Daten von Personen, mit denen Vorhersagen uber verschiedene Aspekte der Personen getroffen werden koennen.Das Buch befasst sich mit der Anonymisierung im Kontext der KI und Big Data. Dazu werden die wesentlichen Grundlagen dargestellt sowie pseudonymisierte und anonymisierte Daten mit Personenbezug im Rahmen der Datenschutz-Grundverordnung (DSGVO) und des Bundesdatenschutzgesetzes (BDSG) beleuchtet. Es werden Moeglichkeiten zur Pseudonymisierung, zu den jeweiligen Techniken und Verfahren der Anonymisierung sowie entsprechende Risikobetrachtungen behandelt. Abschliessend wird die Vorgehensweise der Anonymisierung aus rechtlicher und technischer Sicht unter Anwendung entsprechender Software behandelt.

The Hacked World Order - How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age (Paperback): Adam Segal The Hacked World Order - How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age (Paperback)
Adam Segal
R540 Discovery Miles 5 400 Ships in 18 - 22 working days

For more than three hundred years, the world wrestled with conflicts that arose between nation-states. Nation-states wielded military force, financial pressure, and diplomatic persuasion to create "world order." Even after the end of the Cold War, the elements comprising world order remained essentially unchanged. But 2012 marked a transformation in geopolitics and the tactics of both the established powers and smaller entities looking to challenge the international community. That year, the US government revealed its involvement in Operation "Olympic Games," a mission aimed at disrupting the Iranian nuclear program through cyberattacks; Russia and China conducted massive cyber-espionage operations; and the world split over the governance of the Internet. Cyberspace became a battlefield. Cyber conflict is hard to track, often delivered by proxies, and has outcomes that are hard to gauge. It demands that the rules of engagement be completely reworked and all the old niceties of diplomacy be recast. Many of the critical resources of statecraft are now in the hands of the private sector, giant technology companies in particular. In this new world order, cybersecurity expert Adam Segal reveals, power has been well and truly hacked.

Data Protection and Privacy, Volume 12 - Data Protection and Democracy (Hardcover): Dara Hallinan, Ronald Leenes, Serge... Data Protection and Privacy, Volume 12 - Data Protection and Democracy (Hardcover)
Dara Hallinan, Ronald Leenes, Serge Gutwirth, Paul De Hert
R2,465 Discovery Miles 24 650 Ships in 18 - 22 working days

The subjects of this volume are more relevant than ever, especially in light of the raft of electoral scandals concerning voter profiling. This volume brings together papers that offer conceptual analyses, highlight issues, propose solutions, and discuss practices regarding privacy and data protection. It is one of the results of the twelfth annual International Conference on Computers, Privacy and Data Protection, CPDP, held in Brussels in January 2019. The book explores the following topics: dataset nutrition labels, lifelogging and privacy by design, data protection iconography, the substance and essence of the right to data protection, public registers and data protection, modelling and verification in data protection impact assessments, examination scripts and data protection law in Cameroon, the protection of children's digital rights in the GDPR, the concept of the scope of risk in the GDPR and the ePrivacy Regulation. This interdisciplinary book has been written at a time when the scale and impact of data processing on society - not only on individuals, but also on social systems - is becoming ever starker. It discusses open issues as well as daring and prospective approaches, and will serve as an insightful resource for readers with an interest in computers, privacy and data protection.

What Do We Know and What Should We Do About Internet Privacy? (Paperback): Paul Bernal What Do We Know and What Should We Do About Internet Privacy? (Paperback)
Paul Bernal
R463 Discovery Miles 4 630 Ships in 18 - 22 working days

Privacy on the internet is challenged in a wide variety of ways - from large social media companies, whose entire business models are based on privacy invasion, through the developing technologies of facial recognition, to the desire of governments to monitor our every activity online. But the impact these issues have on our daily lives is often underplayed or misunderstood. In this book, Paul Bernal analyses how the internet became what it is today, exploring how the current manifestation of the internet works for people, for companies and even for governments, with reference to the new privacy battlefields of location and health data, the internet of things and the increasingly contentious issue of personal data and political manipulation. The author then proposes what we should do about the problems surrounding internet privacy, such as significant changes in government policy, a reversal of the current 'war' on encryption, being brave enough to take on the internet giants, and challenging the idea that 'real names' would improve the discourse on social networks. ABOUT THE SERIES: The 'What Do We Know and What Should We Do About...?' series offers readers short, up-to-date overviews of key issues often misrepresented, simplified or misunderstood in modern society and the media. Each book is written by a leading social scientist with an established reputation in the relevant subject area. The Series Editor is Professor Chris Grey, Royal Holloway, University of London

IT-Sicherheitsmanagement nach der neuen ISO 27001 - ISMS, Risiken, Kennziffern, Controls (German, Paperback, 2., akt. Aufl.... IT-Sicherheitsmanagement nach der neuen ISO 27001 - ISMS, Risiken, Kennziffern, Controls (German, Paperback, 2., akt. Aufl. 2020)
Heinrich Kersten, Gerhard Klett, Jurgen Reuter, Klaus-Werner Schroeder
R1,030 Discovery Miles 10 300 Ships in 18 - 22 working days

Dieses Buch behandelt das Management der Informationssicherheit auf der Basis der Norm ISO/IEC 27001. Mit der 2. Auflage wurden die Inhalte des Fachbuches umfassend aktualisiert und den Neuerungen der Norm angepasst. Die Autoren erlautern kompetent den Standard und seine organisatorisch-technische Umsetzung. Dies betrifft die Anforderungen an das Informationssicherheits-Managementsystem (ISMS) genauso wie die 114 Controls aus dem Anhang der Norm. Die ausfuhrlich kommentierten Controls unterstutzen Sicherheitsverantwortliche bei der Auswahl geeigneter Sicherheitsmassnahmen in allen Bereichen. Die Normenreihe ISO 27000 ist ein wichtiges Hilfsmittel fur Unternehmen und Behoerden, die ein IT-Sicherheitsmanagement in ihrer Organisation einfuhren und betreiben wollen. Im internationalen Kontext ist die Anwendung der ISO 27001 fur viele Organisationen nahezu unverzichtbar. Nicht zuletzt mit dem deutschen IT-Sicherheitsgesetz erhalt dieser Standard auch national eine hohe Bedeutung. Seit der Neufassung der Norm im Jahr 2015 (deutsche Version) und AEnderungen in 2017 mussen sich alle Organisationen entsprechend umstellen und ihr ISMS anpassen. Hierfur enthalt das Buch entsprechende "Fahrplane".

Die Fortentwicklung des Datenschutzes - Zwischen Systemgestaltung und Selbstregulierung (German, Paperback, 1. Aufl. 2018):... Die Fortentwicklung des Datenschutzes - Zwischen Systemgestaltung und Selbstregulierung (German, Paperback, 1. Aufl. 2018)
Alexander Rossnagel, Michael Friedewald, Marit Hansen
R2,442 Discovery Miles 24 420 Ships in 18 - 22 working days

Der Datenschutz ist nicht ausreichend auf die Herausforderungen moderner Informationstechnik mit Ubiquitous Computing, Big Data, kunstlicher Intelligenz und lernenden Systemen eingestellt. Dies gilt auch fur die Datenschutz-Grundverordnung. Die Beitrage des Sammelbandes untersuchen die Anforderungen des digitalen Wandels an Konzepte, Instrumente und Institutionen des Datenschutzes; sie eroertern Loesungen fur bisher ungeregelte Datenschutzprobleme, entwerfen Konzepte fur einen modernen Grundrechts- und Datenschutz und entwickeln Modelle fur eine Evolution des Datenschutzes in der kunftigen digitalen Welt.

Der Grundsatz Der Verfugbarkeit - Ziel, Rechtsstand Und Perspektiven Des Strafrechtlichen Informationsaustauschs in Der... Der Grundsatz Der Verfugbarkeit - Ziel, Rechtsstand Und Perspektiven Des Strafrechtlichen Informationsaustauschs in Der Europaischen Union (German, Paperback, 1. Aufl. 2018 ed.)
Magdalena Schmidt
R1,616 Discovery Miles 16 160 Ships in 18 - 22 working days
Online Danger - How to Protect Yourself and Your Loved Ones From the Evil Side of the Internet (Paperback): Eric Cole Online Danger - How to Protect Yourself and Your Loved Ones From the Evil Side of the Internet (Paperback)
Eric Cole
R404 R377 Discovery Miles 3 770 Save R27 (7%) Ships in 18 - 22 working days

Cyberspace is an informative, fun, and educational place for the entire family, but danger lurks everywhere you turn online. From phishing to cyber bullying to identity theft, there are a myriad of ways that you and your loved ones could be harmed online, often with irreparable damage. Fortunately, there are precautions that everyone can take to protect themselves, their families, and their businesses that don't require advanced (or even any) technical knowledge. In this book, cyber security expert, Dr. Eric Cole, provides a layman's look at how to protect yourself online. Dr. Cole makes the case that everyone is a potential target, not just the rich and famous. And we all have the ability to make it more difficult for cyber criminals to make us their next victim. He explains in plain language how to make your computer safer, protect your email, and guard your online accounts. Online Danger: How to Protect Yourself and Your Loved Ones from the Evil Side of the Internet applies to organizations as well as individuals, and across professions. Doctors, lawyers, and teachers - anyone responsible for safeguarding a client's or student's data - will learn something they can use right away. Whether you're a parent wanting to know how to keep your children safe as they use the Internet, or a senior citizen who doesn't want to fall prey to an online scammer, or a daily technology user who wants to learn more about how to protect themselves in cyberspace, this book is for you.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Sheep and Its Cousins
Richard 1849-1915 Lydekker Hardcover R923 Discovery Miles 9 230
Rigorous Time Slicing Approach to…
Daisuke Fujiwara Hardcover R4,094 Discovery Miles 40 940
The Rise and Reign of the Mammals - A…
Steve Brusatte Paperback R356 R333 Discovery Miles 3 330
Gapenski's Healthcare Finance - An…
Kristin L. Reiter, Paula H. Song Hardcover R2,593 Discovery Miles 25 930
Formation of Character - Volume V of…
Charlotte Mason Hardcover R737 Discovery Miles 7 370
Blood Banking and Transfusion Medicine…
Christopher D. Hillyer, Leslie E. Silberstein, … Hardcover R4,389 Discovery Miles 43 890
Shakespeare's Julius Caesar for Kids - 3…
Brendan P. Kelso Hardcover R463 Discovery Miles 4 630
Modernism's Second Act: A Cultural…
I. Nadel Hardcover R1,733 Discovery Miles 17 330
Mechanics Of Materials - SI Edition
Barry Goodno, James Gere Paperback R1,376 R1,283 Discovery Miles 12 830
Words on Pictures - Romana Javitz and…
Anthony T Troncale, Jessica Cline Hardcover R926 R845 Discovery Miles 8 450

 

Partners