0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R250 - R500 (4)
  • R500 - R1,000 (1)
  • R1,000 - R2,500 (1)
  • -
Status
Brand

Showing 1 - 6 of 6 matches in All Departments

Privacy in the Age of Big Data - Recognizing Threats, Defending Your Rights, and Protecting Your Family (Hardcover, Second... Privacy in the Age of Big Data - Recognizing Threats, Defending Your Rights, and Protecting Your Family (Hardcover, Second Edition)
Theresa Payton, Ted Claypoole
R1,272 R899 Discovery Miles 8 990 Save R373 (29%) Ships in 12 - 17 working days

A thorough update to a classic in the field of privacy and big data. We have a global privacy problem. The average person provides more information about themselves to more outsiders than any time in history. Corporations, governments and even our neighbors can know where we are at times, can quickly learn our preferences and priorities and see who we meet. The past decade has brought deep changes in the collection of our private information, the regulation of that collection, and in people's sensitivity to loss of privacy. The nascent privacy-threatening technology trends of a decade ago have blossomed into relentless data-capturing systems that police and companies have come to rely on. To address the expansion of personal data capture, entire data regulatory regimes have arisen throughout the world, with new regulations added each year. People are more concerned, regulators are more aggressive, yet data collection continues to increase with consequences around the world. Social media use has fragmented in the past five years, spreading personal information over dozens of platforms. Even most of our new televisions have started collecting second-by-second information about our households recently, and some of those televisions can recognize the individuals watching and the devices they carry. Amazon just activated a new worldwide network using bandwidth from personal wifi of Echo devices and Ring security systems. The beat of new intrusions never seems to end. These data trends are relentless, and yet response to the pandemic accelerated them. Rapid development of "contactless everything" became the norm. Contact tracing apps became acceptable. QR codes for everything from menus to contact information were created quickly. Businesses are faced with hybrid in office and remote workforces. More people are dependent on online and mobile technologies for food, medicine, and even human connection. And each of these contacts can be captured somewhere and logged in a file for marketing or surveillance. People want to keep their lives private, but they don't know how. The second edition of Privacy in the Age of Big Data addresses the significant advances in data-driven technology, their intrusion deeper in our lives, the limits on data collection newly required by governments in North America and Europe, and the new security challenges of world rife with ransomware and hacking. This thoroughly updated edition demonstrates personal privacy vulnerabilities and shows ways to live a safer, more private life. Other privacy books tend to focus deeply on the evils of large tech companies or more academic and technical concerns. But Privacy in the Age of Big Data, second edition, helps regular people understand the privacy threats and vulnerabilities in their daily lives and will provide solutions for maintaining better privacy while enjoying a modern life. Unlike other books, this one shows what you can do to make a difference to understand your current digital footprint and what you need to do to claw back your privacy and secure it in the future. While PRIVACY IN THE AGE OF BIG DATA will have cross-sectional appeal to many demographics, working adults 25-60 and CEOs and Boards of businesses are the primary demographic--young enough to know we need to do something to protect privacy and old enough to remember what happens when we haven't in the past. With down-to-earth prose and examples pulled from daily life, the writing style will attract buyers of all education levels.

Privacy in the Age of Big Data - Recognizing Threats, Defending Your Rights, and Protecting Your Family (Paperback): Theresa... Privacy in the Age of Big Data - Recognizing Threats, Defending Your Rights, and Protecting Your Family (Paperback)
Theresa Payton, Ted Claypoole; Foreword by Howard A. Schmidt
R419 R395 Discovery Miles 3 950 Save R24 (6%) Ships in 12 - 17 working days

Digital data collection and surveillance gets more pervasive and invasive by the day; but the best ways to protect yourself and your data are all steps you can take yourself. The devices we use to get just-in-time coupons, directions when we're lost, and maintain connections with loved ones no matter how far away they are, also invade our privacy in ways we might not even be aware of. Our devices send and collect data about us whenever we use them, but that data is not safeguarded the way we assume it would be. Privacy is complex and personal. Many of us do not know the full extent to which data is collected, stored, aggregated, and used. As recent revelations indicate, we are subject to a level of data collection and surveillance never before imaginable. While some of these methods may, in fact, protect us and provide us with information and services we deem to be helpful and desired, others can turn out to be insidious and over-arching. Privacy in the Age of Big Data highlights the many positive outcomes of digital surveillance and data collection while also outlining those forms of data collection to which we may not consent, and of which we are likely unaware. Payton and Claypoole skillfully introduce readers to the many ways we are 'watched,' and how to adjust our behaviors and activities to recapture our privacy. The authors suggest the tools, behavior changes, and political actions we can take to regain data and identity security. Anyone who uses digital devices will want to read this book for its clear and no-nonsense approach to the world of big data and what it means for all of us.

Protecting Your Internet Identity - Are You Naked Online? (Paperback, Updated Edition): Ted Claypoole, Theresa Payton Protecting Your Internet Identity - Are You Naked Online? (Paperback, Updated Edition)
Ted Claypoole, Theresa Payton; Foreword by Chris Swecker
R411 R386 Discovery Miles 3 860 Save R25 (6%) Ships in 12 - 17 working days

People research everything online - shopping, school, jobs, travel - and other people. Your online persona is your new front door. It is likely the first thing that new friends and colleagues learn about you. In the years since this book was first published, the Internet profile and reputation have grown more important in the vital human activities of work, school and relationships. This updated edition explores the various ways that people may use your Internet identity, including the ways bad guys can bully, stalk or steal from you aided by the information they find about you online. The authors look into the Edward Snowden revelations and the government's voracious appetite for personal data. A new chapter on the right to be forgotten explores the origins and current effects of this new legal concept, and shows how the new right could affect us all. Timely information helping to protect your children on the Internet and guarding your business's online reputation has also been added. The state of Internet anonymity has been exposed to scrutiny lately, and the authors explore how anonymous you can really choose to be when conducting activity on the web. The growth of social networks is also addressed as a way to project your best image and to protect yourself from embarrassing statements. Building on the first book, this new edition has everything you need to know to protect yourself, your family, and your reputation online.

Techno Security's Guide to Securing SCADA - A Comprehensive Handbook On Protecting The Critical Infrastructure... Techno Security's Guide to Securing SCADA - A Comprehensive Handbook On Protecting The Critical Infrastructure (Paperback)
Jack Wiles, Ted Claypoole, Phil Drake, Paul A. Henry, Lester J. Johnson Jr., …
R1,550 R1,420 Discovery Miles 14 200 Save R130 (8%) Ships in 12 - 17 working days

Around the world, SCADA (supervisory control and data acquisition) systems and other real-time process control networks run mission-critical infrastructure--everything from the power grid to water treatment, chemical manufacturing to transportation. These networks are at increasing risk due to the move from proprietary systems to more standard platforms and protocols and the interconnection to other networks. Because there has been limited attention paid to security, these systems are seen as largely unsecured and very vulnerable to attack.
This book addresses currently undocumented security issues affecting SCADA systems and overall critical infrastructure protection. The respective co-authors are among the leading experts in the world capable of addressing these related-but-independent concerns of SCADA security. Headline-making threats and countermeasures like malware, sidejacking, biometric applications, emergency communications, security awareness llanning, personnel & workplace preparedness and bomb threat planning will be addressed in detail in this one of a kind book-of-books dealing with the threats to critical infrastructure protection. They collectivly have over a century of expertise in their respective fields of infrastructure protection. Included among the contributing authors are Paul Henry, VP of Technology Evangelism, Secure Computing, Chet Hosmer, CEO and Chief Scientist at Wetstone Technologies, Phil Drake, Telecommunications Director, The Charlotte Observer, Patrice Bourgeois, Tenable Network Security, Sean Lowther, President, Stealth Awareness and Jim Windle, Bomb Squad Commander, CMPD.
* Internationally known experts provide a detailed discussion of the complexities of SCADA security and its impact on critical infrastructure
* Highly technical chapters on the latest vulnerabilities to SCADA and critical infrastructure and countermeasures
* Bonus chapters on security awareness training, bomb threat planning, emergency communications, employee safety and much more
* Companion Website featuring video interviews with subject matter experts offer a "sit-down" with the leaders in the field

False Consolation (Paperback): Ted Claypoole False Consolation (Paperback)
Ted Claypoole
R307 Discovery Miles 3 070 Ships in 10 - 15 working days
Fistfull of Truth (Paperback): Ted Claypoole Fistfull of Truth (Paperback)
Ted Claypoole
R323 Discovery Miles 3 230 Ships in 10 - 15 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Beauty And The Beast - Blu-Ray + DVD
Emma Watson, Dan Stevens, … Blu-ray disc R326 Discovery Miles 3 260
Datadart JW Rings
R13 R9 Discovery Miles 90
Russell Hobbs Toaster (2 Slice…
R707 Discovery Miles 7 070
Professor Dumbledore Wizard Wand - In…
 (7)
R839 Discovery Miles 8 390
Snookums Baby Honey Dummies (6 Months)
R75 R38 Discovery Miles 380
Microwave Egg Poacher (Yellow)
 (1)
R69 R63 Discovery Miles 630
Alkaline Battery Size AAA - 4 Pieces Per…
R699 Discovery Miles 6 990
Jabra Elite 5 Hybrid ANC True Wireless…
R2,899 R2,253 Discovery Miles 22 530
A Crown That Lasts - You Are Not Your…
Demi-Leigh Tebow Paperback R320 R235 Discovery Miles 2 350
Bestway Hydro-Swim Squiggle Wiggle Dive…
R62 Discovery Miles 620

 

Partners