![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
Showing 1 - 5 of 5 matches in All Departments
Around the world, SCADA (supervisory control and data acquisition)
systems and other real-time process control networks run
mission-critical infrastructure--everything from the power grid to
water treatment, chemical manufacturing to transportation. These
networks are at increasing risk due to the move from proprietary
systems to more standard platforms and protocols and the
interconnection to other networks. Because there has been limited
attention paid to security, these systems are seen as largely
unsecured and very vulnerable to attack.
A thorough update to a classic in the field of privacy and big data. We have a global privacy problem. The average person provides more information about themselves to more outsiders than any time in history. Corporations, governments and even our neighbors can know where we are at times, can quickly learn our preferences and priorities and see who we meet. The past decade has brought deep changes in the collection of our private information, the regulation of that collection, and in people's sensitivity to loss of privacy. The nascent privacy-threatening technology trends of a decade ago have blossomed into relentless data-capturing systems that police and companies have come to rely on. To address the expansion of personal data capture, entire data regulatory regimes have arisen throughout the world, with new regulations added each year. People are more concerned, regulators are more aggressive, yet data collection continues to increase with consequences around the world. Social media use has fragmented in the past five years, spreading personal information over dozens of platforms. Even most of our new televisions have started collecting second-by-second information about our households recently, and some of those televisions can recognize the individuals watching and the devices they carry. Amazon just activated a new worldwide network using bandwidth from personal wifi of Echo devices and Ring security systems. The beat of new intrusions never seems to end. These data trends are relentless, and yet response to the pandemic accelerated them. Rapid development of "contactless everything" became the norm. Contact tracing apps became acceptable. QR codes for everything from menus to contact information were created quickly. Businesses are faced with hybrid in office and remote workforces. More people are dependent on online and mobile technologies for food, medicine, and even human connection. And each of these contacts can be captured somewhere and logged in a file for marketing or surveillance. People want to keep their lives private, but they don't know how. The second edition of Privacy in the Age of Big Data addresses the significant advances in data-driven technology, their intrusion deeper in our lives, the limits on data collection newly required by governments in North America and Europe, and the new security challenges of world rife with ransomware and hacking. This thoroughly updated edition demonstrates personal privacy vulnerabilities and shows ways to live a safer, more private life. Other privacy books tend to focus deeply on the evils of large tech companies or more academic and technical concerns. But Privacy in the Age of Big Data, second edition, helps regular people understand the privacy threats and vulnerabilities in their daily lives and will provide solutions for maintaining better privacy while enjoying a modern life. Unlike other books, this one shows what you can do to make a difference to understand your current digital footprint and what you need to do to claw back your privacy and secure it in the future. While PRIVACY IN THE AGE OF BIG DATA will have cross-sectional appeal to many demographics, working adults 25-60 and CEOs and Boards of businesses are the primary demographic--young enough to know we need to do something to protect privacy and old enough to remember what happens when we haven't in the past. With down-to-earth prose and examples pulled from daily life, the writing style will attract buyers of all education levels.
People research everything online - shopping, school, jobs, travel - and other people. Your online persona is your new front door. It is likely the first thing that new friends and colleagues learn about you. In the years since this book was first published, the Internet profile and reputation have grown more important in the vital human activities of work, school and relationships. This updated edition explores the various ways that people may use your Internet identity, including the ways bad guys can bully, stalk or steal from you aided by the information they find about you online. The authors look into the Edward Snowden revelations and the government's voracious appetite for personal data. A new chapter on the right to be forgotten explores the origins and current effects of this new legal concept, and shows how the new right could affect us all. Timely information helping to protect your children on the Internet and guarding your business's online reputation has also been added. The state of Internet anonymity has been exposed to scrutiny lately, and the authors explore how anonymous you can really choose to be when conducting activity on the web. The growth of social networks is also addressed as a way to project your best image and to protect yourself from embarrassing statements. Building on the first book, this new edition has everything you need to know to protect yourself, your family, and your reputation online.
|
You may like...
Financial Analysis With Microsoft Excel
Timothy Mayes
Paperback
Handbook of Mathematical Fluid Dynamics
S Friedlander, D. Serre
Hardcover
R5,593
Discovery Miles 55 930
Manual of Engineering Drawing - British…
Colin Simmons, Dennis Maguire, …
Paperback
R1,505
Discovery Miles 15 050
|