0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (169)
  • R250 - R500 (202)
  • R500+ (862)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

Proceedings of the Ninth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2015) (Paperback):... Proceedings of the Ninth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2015) (Paperback)
Steven Furnell, Nathan Clarke
R604 Discovery Miles 6 040 Ships in 10 - 15 working days
Managing Data for Patron Privacy - Comprehensive Strategies for Libraries (Paperback): Kristin Briney, Becky Yoose Managing Data for Patron Privacy - Comprehensive Strategies for Libraries (Paperback)
Kristin Briney, Becky Yoose
R2,114 Discovery Miles 21 140 Ships in 10 - 15 working days

Build trust with your library's users by securing their data privacy. Taking a holistic approach, this guide presents practical ways to implement privacy ethics into data practices. Libraries are not exempt from the financial costs of data breaches or leaks, no matter the size. Whether from a library worker unwittingly sharing a patron's address with a perpetrator of domestic violence to leaving sensitive patron data unprotected, patrons can also pay a hefty price when libraries fail to manage patron data securely and ethically. In this guide, readers will learn concrete action steps for putting the ethical management of data into practice, following two common public and academic library cumulative case studies. The authors explore such key topics as succinct summaries of major U.S. laws and other regulations and standards governing patron data management; information security practices to protect patrons and libraries from common threats; how to navigate barriers in organizational culture when implementing data privacy measures; sources for publicly available, customizable privacy training material for library workers; the data life cycle from planning and collecting to disposal; how to conduct a data inventory; understanding the associated privacy risks of different types of library data; why the current popular model of library assessment can become a huge privacy invasion; addressing key topics while keeping your privacy policy clear and understandable to patrons; and data privacy and security provisions to look for in vendor contracts.

The Complete Guide to Personal Computer Password Security (Paperback): Doug Felteau, Khalid J Hosein The Complete Guide to Personal Computer Password Security (Paperback)
Doug Felteau, Khalid J Hosein
R226 Discovery Miles 2 260 Ships in 10 - 15 working days
Protecting Our Future, Volume 1 - Educating a Cybersecurity Workforce (Paperback): Jane LeClair Protecting Our Future, Volume 1 - Educating a Cybersecurity Workforce (Paperback)
Jane LeClair; Foreword by Donald Rumsfeld
R790 R651 Discovery Miles 6 510 Save R139 (18%) Ships in 10 - 15 working days

In the world of technology, cybersecurity is, without a doubt, one of the most dynamic topics of our times. Protecting Our Future brings together a range of experts from across the cybersecurity spectrum and shines a spotlight on operational challenges and needs across the workforce: in military, health care, international relations, telecommunications, finance, education, utilities, government, small businesses, and nonprofits. Contributors offer an assessment of strengths and weaknesses within each subfield, and, with deep subject-matter expertise, they introduce practitioners, as well as those considering a future in cybersecurity, to the challenges and opportunities when building a cybersecurity workforce.

The Algorithmic Foundations of Differential Privacy (Paperback): Cynthia Dwork, Aaron Roth The Algorithmic Foundations of Differential Privacy (Paperback)
Cynthia Dwork, Aaron Roth
R2,391 Discovery Miles 23 910 Ships in 10 - 15 working days

The problem of privacy-preserving data analysis has a long history spanning multiple disciplines. As electronic data about individuals becomes increasingly detailed, and as technology enables ever more powerful collection and curation of these data, the need increases for a robust, meaningful, and mathematically rigorous definition of privacy, together with a computationally rich class of algorithms that satisfy this definition. Differential Privacy is such a definition. The Algorithmic Foundations of Differential Privacy starts out by motivating and discussing the meaning of differential privacy, and proceeds to explore the fundamental techniques for achieving differential privacy, and the application of these techniques in creative combinations, using the query-release problem as an ongoing example. A key point is that, by rethinking the computational goal, one can often obtain far better results than would be achieved by methodically replacing each step of a non-private computation with a differentially private implementation. Despite some powerful computational results, there are still fundamental limitations. Virtually all the algorithms discussed herein maintain differential privacy against adversaries of arbitrary computational power - certain algorithms are computationally intensive, others are efficient. Computational complexity for the adversary and the algorithm are both discussed. The monograph then turns from fundamentals to applications other than query-release, discussing differentially private methods for mechanism design and machine learning. The vast majority of the literature on differentially private algorithms considers a single, static, database that is subject to many analyses. Differential privacy in other models, including distributed databases and computations on data streams, is discussed. The Algorithmic Foundations of Differential Privacy is meant as a thorough introduction to the problems and techniques of differential privacy, and is an invaluable reference for anyone with an interest in the topic.

Myjot (Paperback): Chris Hunter, Lisa Hunter Myjot (Paperback)
Chris Hunter, Lisa Hunter
R148 Discovery Miles 1 480 Ships in 10 - 15 working days

Can't remember your passwords? Tired of resetting your passwords? myJot is a convenient tool for jotting down important information we use on a daily basis for work, online accounts, social media, & email. myJot provides a convenient and organized way to keep usernames, passwords & account information centrally located.

Cyber Storm III (Paperback): Department of Homeland Security Cyber Storm III (Paperback)
Department of Homeland Security
R307 Discovery Miles 3 070 Ships in 10 - 15 working days
Cyber Security, Privacy and Networking - Proceedings of ICSPN 2021 (Paperback, 1st ed. 2022): Dharma P. Agrawal, Nadia Nedjah,... Cyber Security, Privacy and Networking - Proceedings of ICSPN 2021 (Paperback, 1st ed. 2022)
Dharma P. Agrawal, Nadia Nedjah, Bb Gupta, Gregorio Martinez Perez
R6,229 Discovery Miles 62 290 Ships in 12 - 17 working days

This book covers selected high-quality research papers presented in the International Conference on Cyber Security, Privacy and Networking (ICSPN 2021), organized during 17-19 September 2021 in India in Online mode. The objectives of ICSPN 2021 is to provide a premier international platform for deliberations on strategies, recent trends, innovative approaches, discussions and presentations on the most recent cyber security, privacy and networking challenges and developments from the perspective of providing security awareness and its best practices for the real world. Moreover, the motivation to organize this conference is to promote research by sharing innovative ideas among all levels of the scientific community, and to provide opportunities to develop creative solutions to various security, privacy and networking problems.

Basic Politics of Movement Security - A Talk of Security with J. Sakai & G20 Repression & Infiltration in Toronto: An Interview... Basic Politics of Movement Security - A Talk of Security with J. Sakai & G20 Repression & Infiltration in Toronto: An Interview with Mandy Hiscocks (Paperback)
J Sakai, Mandy Hiscocks
R214 R193 Discovery Miles 1 930 Save R21 (10%) Ships in 10 - 15 working days

Here are two "live" discussions by radical activists introducing the issues of movement security: u.s. activist and author J. Sakai & long-time Canadian organizer Mandy Hiscocks.


There are many books and articles reporting state repression, but not on that subject's more intimate relative, movement security. It is general practice to only pass along knowledge about movement security privately, in closed group lectures or by personal word-of-mouth. In fact, when new activists have questions about security problems, they quickly discover that there is no "Security for Dummies" to explore the basics. Adding to the confusion, the handful of available left security texts are usually about underground or illegal groups, not the far larger public movements that work on a more or less legal level.


During Montreal's 2013 Festival of Anarchy, J. Sakai gave a workshop about the politics of movement security, sharing the results of typical incidents of both the movement's successes and the movement's failures in combating the "political police" or state security agencies. He also discussed the nature of those state sub-cultures. This booklet contains a transcript of that talk, and of the subsequent lively question and answer period; along with several after-the-workshop observations by Sakai.


As he explains, "The key thing is, to start with, security is not about being macho vigilantes or having techniques of this or that. It's not some spy game. Security is about good politics. That's exactly why it's so difficult. But everyone will say that they have good politics. So this has to be broken down, this has to be explained." Which is what he does in this unusual talk.


Mandy Hiscocks comes at the topic from her personal experiences organizing against the 2010 G20 Summit in Toronto. In this in-depth interview, Hiscocks describes how her political scene and groups she worked with were infiltrated by undercover agents over a year before the summit even occurred. These police infiltrators provided information used in the prosecution of anti-Globalization organizers and participants. Hiscocks provides an honest and sobering appraisal of the practical challenge of State infiltration, and of how subsequent decisions played out in regards to the anti-G20 organizing and the repression that resulted. Hiscocks spent a year in prison as a result of these experiences, shortly after this interview was conducted.


Privacy - Select Issues & Laws for the 21st Century (Hardcover): Doris B Delrio Privacy - Select Issues & Laws for the 21st Century (Hardcover)
Doris B Delrio
R5,395 Discovery Miles 53 950 Ships in 12 - 17 working days

This book is a study of select issues and laws relating to privacy in the 21st century. Topics examined include an overview of federal law governing wiretapping and electronic eavesdropping under the Electronic Communications Privacy Act (ECPA); background and issues related to the USA PATRIOT Act reauthorisation on government collection of private information; the United States v. Jones court case involving GPS monitoring, property and privacy; Fourth Amendment implications and legislative responses to drones in domestic surveillance operations; and the privacy and security concerns surrounding smart meter technology.

Information Security Management-Global Challenges In The New Millennium (Paperback): Gurpreet Dhillon Information Security Management-Global Challenges In The New Millennium (Paperback)
Gurpreet Dhillon
R2,059 Discovery Miles 20 590 Ships in 10 - 15 working days

Information security is moving much higher up the agenda of corporate concerns. The pitfalls lying in wait of corporate information are legion. If information is our most important asset, then we must fortify ourselves for the task of protecting it properly. This book is a compilation of contributed chapters by researches and practitioners addressing issues, trends and challenges facing the management of information security in this new millennium. Information Security Management: Global Challenges in the New Millennium focuses on aspects of information security planning, evaluation, design and implementation.

Understanding the Digital World - What You Need to Know about Computers, the Internet, Privacy, and Security, Second Edition... Understanding the Digital World - What You Need to Know about Computers, the Internet, Privacy, and Security, Second Edition (Hardcover)
Brian W. Kernighan
R2,519 Discovery Miles 25 190 Ships in 12 - 17 working days

A brand-new edition of the popular introductory textbook that explores how computer hardware, software, and networks work Computers are everywhere. Some are highly visible, in laptops, tablets, cell phones, and smart watches. But most are invisible, like those in appliances, cars, medical equipment, transportation systems, power grids, and weapons. We never see the myriad computers that quietly collect, share, and sometimes leak personal data about us. Governments and companies increasingly use computers to monitor what we do. Social networks and advertisers know more about us than we should be comfortable with. Criminals have all-too-easy access to our data. Do we truly understand the power of computers in our world? In this updated edition of Understanding the Digital World, Brian Kernighan explains how computer hardware, software, and networks work. Topics include how computers are built and how they compute; what programming is; how the Internet and web operate; and how all of these affect security, privacy, property, and other important social, political, and economic issues. Kernighan touches on fundamental ideas from computer science and some of the inherent limitations of computers, and new sections in the book explore Python programming, big data, machine learning, and much more. Numerous color illustrations, notes on sources for further exploration, and a glossary explaining technical terms and buzzwords are included. Understanding the Digital World is a must-read for readers of all backgrounds who want to know more about computers and communications.

Corporate Cyberwar (Paperback): Dr Michael Teng Corporate Cyberwar (Paperback)
Dr Michael Teng
R489 Discovery Miles 4 890 Ships in 10 - 15 working days

Corporate Cyberwar chronicles the daily battle between technical criminals and law enforcement. As new and advanced ways to cheat and financially ruin companies are discovered, many authorities not only have to figure out ways to stop it, but they also have to create new laws in order to prosecute the perpetrators. This book addresses how businesses/corporations can protect themselves against this increasingly vicious attack. To help convey the importance of protection and awareness, Cyberwar explores two very important cases, WikiLeaks and Stuxnet. Businesses/corporations are given a better understanding of such similar attacks in the future. Corporate Cyberwar does not only focus on problems, it also provides solutions. There is a point by point explanation of how Crimeware, Bot Networks and DDoS (Distributed Denial of Service) take place, which helps businesses/corporations understand exactly what needs to be done in order to prevent the attacks. Cyberwar is not only for those with a moderate understanding of technology, it is also for those with limited understanding of this threat and its devastating effects.

Consumer Privacy in the 21st Century - Best Practices for Businesses & Policymakers (Hardcover): Larry A Schwartz Consumer Privacy in the 21st Century - Best Practices for Businesses & Policymakers (Hardcover)
Larry A Schwartz
R3,849 Discovery Miles 38 490 Ships in 12 - 17 working days

In today's world of smart phones, smart grids, and smart cars, companies are collecting, storing, and sharing more information about consumers than ever before. Although companies use this information to innovate and deliver better products and services to consumers, they should not do so at the expense of consumer privacy. This book provides an overview for how companies can act now to implement best practices to protect consumers' private information. These best practices would include making privacy the "default setting" for commercial data practices and give consumers greater control over the collection and use of their personal data through simplified choices and increased transparency. Implementing these best practices will enhance trust and stimulate commerce.

Mobile Device Security - Threats & Controls (Paperback): Willliam R O'Connor Mobile Device Security - Threats & Controls (Paperback)
Willliam R O'Connor
R1,710 Discovery Miles 17 100 Ships in 12 - 17 working days

Millions of Americans currently use mobile devices (eg: cellphones, smartphones, and tablet computers) on a daily basis to communicate, obtain internet-based information, and share their own information, photographs, and videos. Given the extent of consumer reliance on mobile interactions, it is increasingly important that these devices be secured from expanding threats to the confidentiality, integrity, and availability of the information they maintain and share. This book explores the current challenge of threats and controls to mobile device security with a focus on cyber threats to mobile devices; wireless device theft; and how to protect the data on your phone.

Cyber Security Standards, Practices and Industrial Applications - Systems and Methodologies (Hardcover): Junaid Ahmed Zubairi,... Cyber Security Standards, Practices and Industrial Applications - Systems and Methodologies (Hardcover)
Junaid Ahmed Zubairi, Athar Mahboob
R5,528 Discovery Miles 55 280 Ships in 10 - 15 working days

Cyber security, encompassing both information and network security, is of utmost importance in today s information age. Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies details the latest and most important advances in security standards. First, it introduces the differences between information security (covers the understanding of security requirements, classification of threats, attacks and information protection systems and methodologies) and network security (includes both security protocols as well as systems which create a security perimeter around networks for intrusion detection and avoidance). In addition, the book serves as an essential reference to students, researchers, practitioners and consultants in the area of social media, cyber security and information and communication technologies (ICT).

Data Security Breaches - Notification Laws, Legislation & Identity Theft (Hardcover): Patricia Diaz, William C. Long Data Security Breaches - Notification Laws, Legislation & Identity Theft (Hardcover)
Patricia Diaz, William C. Long
R3,104 R2,816 Discovery Miles 28 160 Save R288 (9%) Ships in 12 - 17 working days

A data security breach occurs when there is a loss or theft of, or other unauthorized access to, sensitive personally identifiable information that could result in the potential compromise of the confidentiality or integrity of data. This book provides an overview of state security breach notification laws applicable to entities that collect, maintain, own, possess, or license personal information. This book describes information security and security breach notification requirements in the Office of Management and Budget's "Breach Notification Policy," the Health Insurance Portability and Accountability Act (HIPAA), the Health Information Technology for Economic and Clinical Health Act (HITECH), and the Gramm-Leach-Bliley Act (GLBA).

Wiretaps & Electronic Eavesdropping - Federal Law & Legal Ethics (Hardcover, New): Laurel Jennings, Richard M. Eastman Wiretaps & Electronic Eavesdropping - Federal Law & Legal Ethics (Hardcover, New)
Laurel Jennings, Richard M. Eastman
R3,112 R2,824 Discovery Miles 28 240 Save R288 (9%) Ships in 12 - 17 working days

It is a federal crime to wiretap or to use a machine to capture the communications of others without court approval, unless one of the parties has given his prior consent. It is likewise a federal crime to use or disclose any information acquired by illegal wiretapping or electronic eavesdropping. Violations can result in imprisonment for not more than five years; fines up to $250,000; in civil liability for damages, attorney's fees and possibly punitive damages; in disciplinary action against any attorneys involved; and in suppression of any derivative evidence. This book provides an overview of federal law governing wiretapping and electronic eavesdropping under the Electronic Communications Privacy Act (ECPA).

Digital Assassination - Protecting Your Reputation, Brand, or Business Against Online Attacks (Paperback): Richard Torrenzano,... Digital Assassination - Protecting Your Reputation, Brand, or Business Against Online Attacks (Paperback)
Richard Torrenzano, Mark Davis
R637 R534 Discovery Miles 5 340 Save R103 (16%) Ships in 10 - 15 working days

"Two leading reputation experts reveal how the internet is being used to destroy brands, reputations and even lives, and how to fight back.
"From false Wikipedia entries, to fake YouTube videos, to Facebook lynch mobs, everyone from CEOs to fashion models, journalists to politicians, restaurateurs to doctors, is open to character assassination in the burgeoning realm of digital media.
Two top media experts recount vivid tales of character attacks, provide specific advice on how to counter them, and how to turn the tables on the attackers. Having spent decades preparing for and coping with these issues, Richard Torrenzano and Mark Davis share their secrets on dealing with problems at the top of today's news.
Torrenzano and Davis also take a step back to look at how the past might inform our future thinking about character assassination, from the slander wars between Thomas Jefferson and Alexander Hamilton, to predictions on what the end of privacy will mean for civilization.

Smart Meters & the Smart Grid - Privacy & Cybersecurity Considerations (Hardcover): Irwin E. Reid, Hale A. Stevens Smart Meters & the Smart Grid - Privacy & Cybersecurity Considerations (Hardcover)
Irwin E. Reid, Hale A. Stevens
R3,847 Discovery Miles 38 470 Ships in 12 - 17 working days

Electric utilities have accelerated their deployment of smart meters to millions of homes across the United States with help from the Department of Energy's Smart Grid Investment Grant program. As the meters multiply, so do issues concerning the privacy and security of the data collected by the new technology. This Advanced Metering Infrastructure (AMI) promises to increase energy efficiency, bolster electric power grid reliability, and facilitate demand response, among other benefits. However, to fulfil these ends, smart meters must record near-real time data on consumer electricity usage and transmit the data to utilities over great distances via communications networks that serve the smart grid. This book examines the privacy and cybersecurity considerations of smart meters and the smart grid.

Using Automated Fix Generation (Paperback): Stephen Thomas Using Automated Fix Generation (Paperback)
Stephen Thomas
R1,287 Discovery Miles 12 870 Ships in 10 - 15 working days
Personal Data Privacy and Protection in a Surveillance Era - Technologies and Practices (Hardcover, New): Christina Akrivopoulou Personal Data Privacy and Protection in a Surveillance Era - Technologies and Practices (Hardcover, New)
Christina Akrivopoulou
R5,156 Discovery Miles 51 560 Ships in 10 - 15 working days

Personal Data Privacy and Protection in a Surveillance Era: Technologies and Practices spans a number of interdependent and emerging topics in the area of legal protection of privacy and technology. This book explores the new threats that cyberspace poses to the privacy of individuals, as well as the threats that surveillance technologies generate in public spaces and in digital communication. It examines media practices and privacy frameworks in the fields of copyright, digital management and genetic information. New models of data protection are proposed along with their advantages and disadvantages.

Scams, Security and Over-Sharing - Controlling your information and staying safe online (Paperback): Jon White Scams, Security and Over-Sharing - Controlling your information and staying safe online (Paperback)
Jon White
R413 R339 Discovery Miles 3 390 Save R74 (18%) Ships in 9 - 15 working days

This book isn't about cybersecurity, it's about life. Specifically, connected life in the 21st century. It's about the behaviours we need to change and the threats we need to be aware of to ensure that we can keep ourselves and our families as safe as possible in the new connected world. We are the pioneers in connectivity and this world is evolving in a way that none of us has ever seen before. This book will cover elements of 21st century life which will be familiar to all consumers - from social media, to email hacking, to content theft, to connected devices and even connected cars. It will steer clear of just dryly delivering facts but will use true anecdotes to tell stories of the dangers of connectivity to us all, every day, and how we can make simple changes to live our connected lives more safely. * Honest, jargon-free advice on how to keep your data safe in an increasingly complex digital world * Topical and engaging examples from across the consumer, digital and corporate worlds * Covers everything from passwords to talking assistants, phishing to social media

Social Implications of Data Mining and Information Privacy - Interdisciplinary Frameworks and Solutions (Hardcover): Ephrem Eyob Social Implications of Data Mining and Information Privacy - Interdisciplinary Frameworks and Solutions (Hardcover)
Ephrem Eyob
R5,531 Discovery Miles 55 310 Ships in 10 - 15 working days

As data mining is one of the most rapidly changing disciplines with new technologies and concepts continually under development, academicians, researchers, and professionals of the discipline need access to the most current information about the concepts, issues, trends, and technologies in this emerging field.""Social Implications of Data Mining and Information Privacy: Interdisciplinary Frameworks and Solutions"" serves as a critical source of information related to emerging issues and solutions in data mining and the influence of political and socioeconomic factors. An immense breakthrough, this essential reference provides concise coverage of emerging issues and technological solutions in data mining, and covers problems with applicable laws governing such issues.

Privacy - An Overview of Federal Law Governing Wiretapping & Electronic Eavesdropping (Hardcover, New): Alderic Jimenez Privacy - An Overview of Federal Law Governing Wiretapping & Electronic Eavesdropping (Hardcover, New)
Alderic Jimenez
R2,800 R2,161 Discovery Miles 21 610 Save R639 (23%) Ships in 12 - 17 working days

It is a federal crime to wiretap or to use a machine to capture the communications of others without court approval, unless one of the parties has given their prior consent. It is likewise a federal crime to use or disclose any information acquired by illegal wiretapping or electronic eavesdropping. Violations can result in imprisonment for up to five years and fines up to $250,000 (and up to $500,000 for organisations). This book provides an overview of federal law governing wiretapping and electronic eavesdropping and the procedures they establish for law enforcement and foreign intelligence gathering purposes. It also appends citations to state law and contains a bibliography of legal commentary as well as the text of the Electronic Communications Privacy Act (ECPA) and the Foreign Intelligence Surveillance Act (FISA). This book consists of public domain documents which have been located, gathered, combined, reformatted, and enhanced with a subject index, selectively edited and bound to provide easy access.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Information And Communications…
Dana van der Merwe Paperback R1,119 R1,000 Discovery Miles 10 000
Im Abbreviations, Texting & Emoticons
BarCharts Inc Fold-out book or chart R675 Discovery Miles 6 750
Broken Code - Inside Facebook And The…
Jeff Horwitz Paperback R420 R328 Discovery Miles 3 280
Identified, Tracked, and Profiled - The…
Peter Dauvergne Hardcover R2,266 Discovery Miles 22 660
Smart-Tech Society - Convenience…
Mark Whitehead, William G.A. Collier Hardcover R2,911 Discovery Miles 29 110
Research Handbook on Privacy and Data…
Gloria Gonzalez, Rosamunde van Brakel, … Hardcover R6,507 Discovery Miles 65 070
Pandemic Surveillance - Privacy…
Margaret Hu Hardcover R3,053 Discovery Miles 30 530
What To Do When You Get Hacked - A…
Shimon Brathwaite Paperback R1,202 Discovery Miles 12 020
Permanent Record
Edward Snowden Paperback R299 R234 Discovery Miles 2 340
PCI Compliance - Understand and…
Branden Williams, James Adamson Paperback R1,370 Discovery Miles 13 700

 

Partners