0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (155)
  • R250 - R500 (191)
  • R500+ (829)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

How to Disappear from the Internet Completely While Leaving False Trails - How to Be Anonymous Online (Paperback): Raymond... How to Disappear from the Internet Completely While Leaving False Trails - How to Be Anonymous Online (Paperback)
Raymond Phillips
R293 Discovery Miles 2 930 Ships in 10 - 15 working days
Hack Proof - Protecting your privacy and personal data in the Digital Economy (Paperback): John Berry Hack Proof - Protecting your privacy and personal data in the Digital Economy (Paperback)
John Berry
R443 Discovery Miles 4 430 Ships in 10 - 15 working days
Big Book of Spyware (Paperback): Pierre Zollo Big Book of Spyware (Paperback)
Pierre Zollo
R969 Discovery Miles 9 690 Ships in 10 - 15 working days
Web Security Exploits (Paperback): Bryant Wan, Nicholas Dworak, Elden Federgreen Web Security Exploits (Paperback)
Bryant Wan, Nicholas Dworak, Elden Federgreen
R940 Discovery Miles 9 400 Ships in 10 - 15 working days
Cybersecurity - Setting the Rules for Responsible Global Cyber Behavior (Paperback): The Pacific Subcommittee on East Asia Cybersecurity - Setting the Rules for Responsible Global Cyber Behavior (Paperback)
The Pacific Subcommittee on East Asia
R455 Discovery Miles 4 550 Ships in 10 - 15 working days
Strategies for Media Reform - International Perspectives (Hardcover): Des Freedman Strategies for Media Reform - International Perspectives (Hardcover)
Des Freedman; Jonathan A. Obar, Cheryl Martens, Robert W. McChesney
R3,444 Discovery Miles 34 440 Ships in 10 - 15 working days

Media reform plays an increasingly important role in the struggle for social justice. As battles are fought over the future of investigative journalism, media ownership, spectrum management, speech rights, broadband access, network neutrality, the surveillance apparatus, and digital literacy, what effective strategies can be used in the pursuit of effective media reform? Prepared by thirty-three scholars and activists from more than twenty-five countries, Strategies for Media Reform focuses on theorizing media democratization and evaluating specific projects for media reform. This edited collection of articles offers readers the opportunity to reflect on the prospects for and challenges facing campaigns for media reform and gathers significant examples of theory, advocacy, and activism from multinational perspectives.

Commercial Cyber Espionage and Barriers to Digital Trade in China (Paperback): U S -China Economic and Security Review Commercial Cyber Espionage and Barriers to Digital Trade in China (Paperback)
U S -China Economic and Security Review
R496 Discovery Miles 4 960 Ships in 10 - 15 working days
Federal Cybersecurity Research and Development Strategic Plan - 2016 (Paperback): National Science and Technology Council Federal Cybersecurity Research and Development Strategic Plan - 2016 (Paperback)
National Science and Technology Council
R404 Discovery Miles 4 040 Ships in 10 - 15 working days
Privacy in the Digital Age - Preventing Data Breaches and Combating Cyber Crime (Paperback): Committee on the Judiciary United... Privacy in the Digital Age - Preventing Data Breaches and Combating Cyber Crime (Paperback)
Committee on the Judiciary United States
R635 Discovery Miles 6 350 Ships in 10 - 15 working days
Cyber Conflict After Stuxnet - Essays from the Other Bank of the Rubicon (Paperback): Adam Segal Cyber Conflict After Stuxnet - Essays from the Other Bank of the Rubicon (Paperback)
Adam Segal; Edited by Hannah Pitts, Karl Grindal
R485 Discovery Miles 4 850 Ships in 10 - 15 working days
Tackling the SPAM Menace (Paperback): John Davidson Tackling the SPAM Menace (Paperback)
John Davidson; Edited by Mendon Cottage Books; Dueep Jyot Singh
R190 Discovery Miles 1 900 Ships in 10 - 15 working days
Cyber Warfare - Prepping for Tomorrow (Paperback): Freedom Preppers Cyber Warfare - Prepping for Tomorrow (Paperback)
Freedom Preppers; Bobby Akart
R311 Discovery Miles 3 110 Ships in 10 - 15 working days
Emerging Threats and Technologies to Protect the Homeland (Paperback): Infrastru Subcommittee on Cybersecurity Emerging Threats and Technologies to Protect the Homeland (Paperback)
Infrastru Subcommittee on Cybersecurity
R432 Discovery Miles 4 320 Ships in 10 - 15 working days
Hacking - Basic Security, Penetration Testing and How to Hack (Paperback): Isaac Sharpe Hacking - Basic Security, Penetration Testing and How to Hack (Paperback)
Isaac Sharpe
R415 Discovery Miles 4 150 Ships in 10 - 15 working days
What Happens on Campus Stays on YouTube - The NEW rules for your reputation on campus, online, and beyond. (Paperback): Paul... What Happens on Campus Stays on YouTube - The NEW rules for your reputation on campus, online, and beyond. (Paperback)
Paul Gordon Brown, Jason L Meriwether, Courtney O'Connell
R464 Discovery Miles 4 640 Ships in 10 - 15 working days
HIDE ME NOW! My Internet and Wi-Fi Passwords book (Paperback): Edward C. Jones HIDE ME NOW! My Internet and Wi-Fi Passwords book (Paperback)
Edward C. Jones
R278 Discovery Miles 2 780 Ships in 10 - 15 working days
Hacking for Beginners - Learn How to Hack! a Complete Beginners Guide to Hacking! Learn the Secrets That the Professional... Hacking for Beginners - Learn How to Hack! a Complete Beginners Guide to Hacking! Learn the Secrets That the Professional Hackers Are Using Today! (Paperback)
Kevin Donaldson 1
R291 Discovery Miles 2 910 Ships in 10 - 15 working days
The Complete Guide to Personal Computer Password Security (Paperback): Doug Felteau, Khalid J Hosein The Complete Guide to Personal Computer Password Security (Paperback)
Doug Felteau, Khalid J Hosein
R238 Discovery Miles 2 380 Ships in 10 - 15 working days
Bit Wars - Cyber Crime, Hacking & Information Warfare (Paperback): Thomas S Hyslip Bit Wars - Cyber Crime, Hacking & Information Warfare (Paperback)
Thomas S Hyslip
R169 Discovery Miles 1 690 Ships in 10 - 15 working days
Memory Dump Analysis Anthology, Volume 8B (Paperback): Dmitry Vostokov, Software Diagnostics Institute Memory Dump Analysis Anthology, Volume 8B (Paperback)
Dmitry Vostokov, Software Diagnostics Institute
R1,127 Discovery Miles 11 270 Ships in 10 - 15 working days
Cunningly Smart Phones - Deceit, Manipulation, and Private Thoughts Revealed (Paperback): Jack M Wedam Cunningly Smart Phones - Deceit, Manipulation, and Private Thoughts Revealed (Paperback)
Jack M Wedam
R622 Discovery Miles 6 220 Ships in 10 - 15 working days
Your Privacy & Security (Paperback): John Minges Your Privacy & Security (Paperback)
John Minges
R361 Discovery Miles 3 610 Ships in 10 - 15 working days
Safe Computing is Like Safe Sex - You have to practice it to avoid infection (Paperback): Ken Cureton, Steve Levinson Safe Computing is Like Safe Sex - You have to practice it to avoid infection (Paperback)
Ken Cureton, Steve Levinson; Richard Lowe
R425 Discovery Miles 4 250 Ships in 10 - 15 working days
The Smart Girl's Guide To Privacy (Paperback): Violet Blue The Smart Girl's Guide To Privacy (Paperback)
Violet Blue
R442 R412 Discovery Miles 4 120 Save R30 (7%) Ships in 10 - 15 working days

The whirlwind of social media, online dating, and mobile apps can make life a dream or a nightmare. For every trustworthy website, there are countless jerks, bullies, and scam artists who want to harvest your personal information for their own purposes. But you can fight back, right now. In The Smart Girl s Guide to Privacy, award-winning author and investigative journalist Violet Blue shows you how women are targeted online and how to keep yourself safe. Blue s practical, user-friendly advice will teach you how to: Delete personal content from websites Use website and browser privacy controls effectively Recover from and prevent identity theft Figure out where the law protects you and where it doesn t Set up safe online profiles Remove yourself from people-finder websites Even if your privacy has already been compromised, don t panic. It s not too late to take control. Let The Smart Girl s Guide to Privacy help you cut through the confusion and start protecting your online life

The Algorithmic Foundations of Differential Privacy (Paperback): Cynthia Dwork, Aaron Roth The Algorithmic Foundations of Differential Privacy (Paperback)
Cynthia Dwork, Aaron Roth
R2,327 Discovery Miles 23 270 Ships in 10 - 15 working days

The problem of privacy-preserving data analysis has a long history spanning multiple disciplines. As electronic data about individuals becomes increasingly detailed, and as technology enables ever more powerful collection and curation of these data, the need increases for a robust, meaningful, and mathematically rigorous definition of privacy, together with a computationally rich class of algorithms that satisfy this definition. Differential Privacy is such a definition. The Algorithmic Foundations of Differential Privacy starts out by motivating and discussing the meaning of differential privacy, and proceeds to explore the fundamental techniques for achieving differential privacy, and the application of these techniques in creative combinations, using the query-release problem as an ongoing example. A key point is that, by rethinking the computational goal, one can often obtain far better results than would be achieved by methodically replacing each step of a non-private computation with a differentially private implementation. Despite some powerful computational results, there are still fundamental limitations. Virtually all the algorithms discussed herein maintain differential privacy against adversaries of arbitrary computational power - certain algorithms are computationally intensive, others are efficient. Computational complexity for the adversary and the algorithm are both discussed. The monograph then turns from fundamentals to applications other than query-release, discussing differentially private methods for mechanism design and machine learning. The vast majority of the literature on differentially private algorithms considers a single, static, database that is subject to many analyses. Differential privacy in other models, including distributed databases and computations on data streams, is discussed. The Algorithmic Foundations of Differential Privacy is meant as a thorough introduction to the problems and techniques of differential privacy, and is an invaluable reference for anyone with an interest in the topic.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Blockchain Technology: Applications and…
Sandeep Kumar Panda, Ajay Kumar Jena, … Hardcover R5,123 Discovery Miles 51 230
Recent Advances in Technology Acceptance…
Mostafa Al-Emran, Khaled Shaalan Hardcover R5,645 Discovery Miles 56 450
Systematic Complex Problem Solving in…
Denis Cavallucci, Stelian Brad, … Hardcover R2,957 Discovery Miles 29 570
Employing Recent Technologies for…
Vasaki Ponnusamy, Khalid Rafique, … Hardcover R5,815 Discovery Miles 58 150
Artificial Intelligence Applications and…
Ilias Maglogiannis, John MacIntyre, … Hardcover R3,459 Discovery Miles 34 590
Towards the Wireless Information…
Ramjee Prasad Hardcover R4,331 Discovery Miles 43 310
Automating Cities - Design…
Brydon T. Wang, C.M. Wang Hardcover R4,647 Discovery Miles 46 470
Nonlinear PDEs - Mathematical Models in…
Marius Ghergu, Vicentiu Radulescu Hardcover R2,938 Discovery Miles 29 380
Wireless Sensor Networks - Deployments…
Elena Gaura, Lewis Girod, … Hardcover R4,523 Discovery Miles 45 230
Nonautonomous Dynamics - Nonlinear…
David N Cheban Hardcover R3,442 Discovery Miles 34 420

 

Partners