Privacy and data protection Books
Quarto Publishing Group USA Inc Internet Password Logbook (Cognac Leatherette):
Book SynopsisJust say “no” to piles of sticky notes and scraps of paper with your passwords and logins! Keep track of them in this elegant, yet inconspicuous, alphabetically tabbed cognac leatherette notebook. In this 4” × 6” hardcover notebook with removable cover band, record the necessarily complex passwords and user login names required to thwart hackers. You’ll find: Internet password safety and naming tips A to Z tabbed pages with space to list website, username, and five passwords for each Dedicated pages to record software license information, with spaces for license number, purchase date, renewal date, and monthly fee Dedicated pages to record network settings and passwords, including for modem, router, WAN, LAN, and wireless A notes section with blank lined pages This internet password logbook provides an easy way to keep track of website addresses, usernames, and passwords in one discreet and convenient location.
£7.97
Quarto Publishing Group USA Inc Password Logbook (Hip Floral): Keep Track of
Book SynopsisKeep track of your online passwords in this gorgeous, alphabetically tabbed notebook featuring a modern floral design. In this 4 × 5.75–inch, 128-page hardcover notebook with removable cover band, record the necessarily complex passwords and user login names required to thwart hackers. You’ll find: Internet password safety and naming tips A to Z tabbed pages with space to list website, username, and five passwords for each Dedicated pages to record software license information, with spaces for license number, purchase date, renewal date, and monthly fee Dedicated pages to record network settings and passwords, including for modem, router, WAN, LAN, and wireless A notes section with blank lined pages Just say “no” to piles of sticky notes and scraps of paper with your passwords and logins! This internet password logbook provides an easy way to keep track of website addresses, usernames, and passwords in one discreet and convenient location.
£8.63
Princeton University Press Understanding the Digital World
Book Synopsis
£25.50
John Wiley & Sons Inc The Art of Deception
Book SynopsisFocusing on the human factors involved with information security, this book explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system.Trade Review“…a fascinating read…” (ForTean Times, June 2004) "...a lot of interesting cautionary tales..." (New Scientist, January 2004)Table of ContentsForeword. Preface. Introduction. Part 1: Behind the Scenes. Chapter 1: Security's Weakest Link. Part 2: The Art of the Attacker. Chapter 2: When Innocuous Information Isn't. Chapter 3: The Direct Attack: Just Asking for It. Chapter 4: Building Trust. Chapter 5: "Let Me Help You". Chapter 6: "Can You Help Me?". Chapter 7: Phony Sites and Dangerous Attachments. Chapter 8: Using Sympathy, Guilt, and Intimidation. Chapter 9: The Reverse Sting. Part 3: Intruder Alert. Chapter 10: Entering the Premises. Chapter 11: Combining Technology and Social Engineering. Chapter 12: Attacks on the Entry-Level Employee. Chapter 13: Clever Cons. Chapter 14: Industrial Espionage. Part 4: Raising the Bar. Chapter 15: Information Security Awareness and Training. Chapter 16: Recommended Corporate Information Security Policies. Security at a Glance. Sources. Acknowledgments. Index.
£9.50
John Murray Press The Age of AI: THE BOOK WE ALL NEED
Book SynopsisTHE WAY HUMANS NAVIGATE THE WORLD IS ALTERING, FOREVER. THIS IS YOUR ESSENTIAL AI ROADMAP. AI is revolutionizing how we approach security, economics, order and even knowledge itself. It is changing how we experience reality, and our role within it. Three of our most accomplished and deep thinkers explore what this means for our present and our future, tackling the questions that will affect as all: What will it mean to be human? What are the key frontier risks? What AI ethics are we going to need? How is AI impacting politics, defence, medicine and education? 'Absolutely masterful . . . the book we all need' Fareed Zakaria 'A muscular contribution to one of the 21st century's most pressing debates' The Economist Henry Kissinger was the 56th Secretary of State and winner of the Nobel Peace Prize; Eric Schmidt, Google's former CEO, lead the company's growth for over a decade and Daniel Huttenlocher is dean of the MIT Schwarzman College of Computing.Trade ReviewIt should be read by anyone trying to make sense of geopolitics todayIt should be read by anyone trying to make sense of geopolitics todayA muscular contribution to one of the 21st century's most pressing debatesA muscular contribution to one of the 21st century's most pressing debatesWhat it does - and does brilliantly - is illuminate the new problem we have created for ourselvesWhat it does - and does brilliantly - is illuminate the new problem we have created for ourselvesAbsolutely masterful . . . the book we all needAbsolutely masterful . . . the book we all need
£10.44
McGraw-Hill Education CIPM Certified Information Privacy Manager
Book Synopsis This self-study guide covers every topic on the Certified Information Privacy Manager examThis resource offers complete, up-to-date coverage of all the material included in the current release of the Certified Information Privacy Manager exam. Written by an IT security and privacy expert, CIPM Certified Information Privacy Manager All-in-One Exam Guide covers the exam domains and associated job practices developed by IAPP . Youâll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the CIPM exam, this comprehensive guide also serves as an essential on-the-job reference for new and established privacy and security professionals.COVERS ALL EXAM TOPICS, INCLUDING: Developing a Privacy Program Privacy Program Framework Privacy Operational Lifecycle: Assess Privacy Operational Lifecycle: Protect Privacy Operational LiTable of ContentsIntroductionChapter 1 Developing a Privacy Program The Privacy Vision Establish a Data Governance Model Establish a Privacy Program Structure the Privacy Team Privacy Program Communications Chapter ReviewChapter 2 Privacy Program Framework Develop the Privacy Program Framework Implement the Privacy Program Framework Privacy Program Metrics Online Tracking and Behavioral Profiling Chapter ReviewChapter 3 Privacy Operational Lifecycle: Assess Privacy Program Baseline Third-Party Risk Management Physical Assessments Mergers, Acquisitions, and Divestitures Privacy Impact Assessments and Data Privacy Impact Assessments Chapter ReviewChapter 4 Privacy Operational Lifecycle: Protect Information Security Practices Integrating Privacy into Organization Operations Other Protection Measures Chapter Review Quick ReviewChapter 5 Privacy Operational Lifecycle: Sustain Monitoring a Privacy Program Auditing Privacy Programs Chapter ReviewChapter 6 Privacy Operational Lifecycle: Respond Data Subject Requests and Privacy Rights Privacy Incident Response Privacy Continuous Improvement Chapter ReviewAppendix A The Risk Management Life Cycle The Risk Management Process Risk Management Methodologies Asset Identification Asset Classification Asset Valuation Threat Identification Vulnerability Identification Risk Identification Risk, Likelihood, and Impact Likelihood Impact Risk Analysis Techniques and ConsiderationsAppendix B About the Online Content System Requirements Your Total Seminars Training Hub Account Single User License Terms and Conditions TotalTester Online Technical SupportGlossaryIndex
£35.99
McGraw-Hill Education CDPSE Certified Data Privacy Solutions Engineer
Book SynopsisPublisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.This study guide offers 100% coverage of every objective for the Certified Data Privacy Solutions Engineer Exam This resource offers complete, up-to-date coverage of all the material included on the current release of the Certified Data Privacy Solutions Engineer exam. Written by an IT security and privacy expert, CDPSE Certified Data Privacy Solutions Engineer All-in-One Exam Guide covers the exam domains and associated job practices developed by ISACA . Youâll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the CDPSE exam, this comprehensive guide also serves as an essential on-the-job reference for new and established privacy and secur
£35.99
Quarto Publishing Group USA Inc Password Logbook (Black & Gold): Keep Track of
Book SynopsisKeep track of your online passwords in this elegant, yet inconspicuous, alphabetically tabbed notebook featuring a modern black-and-gold design. In this 4 × 5.75–inch, 128-page hardcover notebook with removable cover band, record the necessarily complex passwords and user login names required to thwart hackers. You’ll find: Internet password safety and naming tips A to Z tabbed pages with space to list website, username, and five passwords for each Dedicated pages to record software license information, with spaces for license number, purchase date, renewal date, and monthly fee Dedicated pages to record network settings and passwords, including for modem, router, WAN, LAN, and wireless A notes section with blank lined pages Just say “no” to piles of sticky notes and scraps of paper with your passwords and logins! This internet password logbook provides an easy way to keep track of website addresses, usernames, and passwords in one discreet and convenient location.
£8.63
Pan Macmillan Strangers and Intimates
Book SynopsisDr Tiffany Jenkins is a writer, cultural historian and broadcaster. She is the author of the acclaimed Keeping Their Marbles: How Treasures of the Past Ended Up in Museums and Why They Should Stay There. She's a former honorary fellow in the History of Art at the University of Edinburgh and a former visiting fellow in the Department of Law at the London School of Economics. She wrote and presented the BBC Radio 4 series A History of Secrecy' and Contracts of Silence', about the rise of non-disclosure agreements, and has appeared regularly as a critic on Saturday Review and Front Row. Her opinion pieces have appeared in The Guardian, The Observer, the Financial Times, the Scotsman and The Spectator. She divides her time between London and Sussex. Strangers and Intimates is her third book.
£17.00
MIT Press Ltd Obfuscation A Users Guide for Privacy and Protest
Book SynopsisHow we can evade, protest, and sabotage today's pervasive digital surveillance by deploying more data, not less—and why we should.With Obfuscation, Finn Brunton and Helen Nissenbaum mean to start a revolution. They are calling us not to the barricades but to our computers, offering us ways to fight today's pervasive digital surveillance—the collection of our data by governments, corporations, advertisers, and hackers. To the toolkit of privacy protecting techniques and projects, they propose adding obfuscation: the deliberate use of ambiguous, confusing, or misleading information to interfere with surveillance and data collection projects. Brunton and Nissenbaum provide tools and a rationale for evasion, noncompliance, refusal, even sabotage—especially for average users, those of us not in a position to opt out or exert control over data about ourselves. Obfuscation will teach users to push back, software developers to keep their user data safe
£12.74
Manning Publications Grokking Bitcoin
Book SynopsisDescription The modern world turns on universally-accepted ideas of currency and ownership. Bitcoin, and its underlying technology, offer the potential to move control of these key institutions from change-prone governments to a secure storage system that independently records value and ownership in a distributed public ledger called "the blockchain." Grokking Bitcoin opens up this powerful distributed ledger system, exploring the technology that enables applications both for Bitcoinbased financial transactions and using the blockchain for registering physical property ownership. Key features · Jargon-free · Step-by-step guide · Real-world examples Audience This book provides a jargon-free introduction to Bitcoin for any technically interested reader. Some chapters address technical concepts that require basic knowledge of networking and programming. About the technologyBitcoin is an electronic cash system. It allows for people to move bitcoins, the currency of Bitcoin, between each other without using a bank or any other trusted third party.
£28.79
BIS Publishers B.V. Design My Privacy: 8 Principles for Better
Book SynopsisHow can we protect our privacy in this digital era? Because of the emerging of ‘The internet of things’ this question becomes more and more relevant to designers. Technology becomes part of our daily used products. Watches, clothing, cars, houses are becoming ‘smart’, all being connected to the ‘cloud’. This book gives you guidance on how to design for privacy. This book is written to encourage designers to think about and to design for privacy issues. The technology behind the smart products and systems are so complex, that for the consumer it is difficult to understand what the consequences are for everyday life. Designers have to start thinking about transparency and accessibility in the design of privacy-sensitive products and services. This book offers the designer guidance, in the form of eight design principles, that help with designing products and services.
£11.69
Manning Publications Privacy Engineering
Book SynopsisPrivacyEngineering is a hands-on guide to building a modern and flexible privacy program for your organization. It helps map essential legal requirements into practical engineering techniques that you can implement right away. The book develops your strategic understanding of data governance and helps you navigate the tricky trade-offs between privacy and business needs. You'll learn to spot risks in your own data management systems and prepare to satisfy both internal and external privacy audits. There's no bureaucratic new processes or expensive new software necessary. You'll learn how to repurpose the data and security tools you already use to achieve your privacy goals. Preserving the privacy of your users is essential for any successful business. Well-designed processes and data governance ensure that privacy is built into your systems from the ground up, keeping your users safe and helping your organization maintain compliance with the law. Trade Review“A great high-level resource on privacy as it relates to the data collected by business software systems.” Joe Ivans “Provides a clear and thorough explanation of the how and the why of data privacy pitched at a level which isn't too technical, yet has a sufficient level of detail to allow for interpretation of implementation.” Matthew Todd “Really interesting subject matter. The author provides relevant examples and obviously has a lot of direct experience.” John Tyler “A great resource on approaching data privacy.” Doniyor Ulmasov “The best parts are the personal elements added to the narrative. I also enjoyed the case studies that help to illustrate the examples provided throughout.” Ayana Miller
£36.09
Edward Elgar Publishing Dictionary of Privacy Data Protection and
Book Synopsis
£199.50
HarperCollins Dont Trust Your Gut
Book Synopsis
£35.72
HarperCollins Publishers Inc Dont Trust Your Gut
Book Synopsis
£15.19
HarperCollins Publishers Inc Spooked
Book Synopsis
£21.74
Elsevier Science Cybercrime and Business
Book SynopsisTable of Contents1. Introduction2. Globalization, Business and Cybercrime3. The Environment for Cybercrime4. The Start Up Firm5. Small and Medium-sized Businesses6. The large Corporation7. The Joint Venture and Partnership8. IP and the Licensee9. Franchises10. The Subsidiary11. Mergers and Acquisitions12. Outsourcing 13. Conclusion: Strategic Directions for Global Business in a Cyber World
£53.06
Elsevier Science & Technology Computer and Information Security Handbook
Book SynopsisTrade Review"The editor, John Vacca, has pulled together contributions from a large number of experts into a massive tome that touches on pretty much every angle of security and privacy. ...it’s hard to think of anyone with any interest in infosecurity who wouldn’t get something out of it. This is the reference work you want on your bookshelf when you need to quickly get a grounding in some new aspect of security." --Network Security NewsletterTable of Contents1. Information Security in the Modern Enterprise 2. Building a Secure Organization 3. A Cryptography Primer 4. Verifying User and Host Identity 5. Detecting System Intrusions 6. Intrusion Detection in Contemporary Environments 7. Preventing System Intrusions 8. Guarding Against Network Intrusions 9. Fault Tolerance and Resilience in Cloud Computing Environments 10. Securing Web Applications, Services and Servers 11. Unix and Linux Security 12. Eliminating the Security Weakness of Linux and Unix Operating Systems 13. Internet Security 14. The Botnet Problem 15. Intranet Security 16. Wireless Network Security 17. Wireless Sensor Network Security 18. Security for the Internet of Things 19. Cellular Network Security 20. RFID Security 21. Information Security Essentials for IT Managers, Protecting Mission-Critical Systems 22. Security Management Systems 23. Policy-Driven System Management 24. Social Engineering Deceptions and Defenses 25. Ethical Hacking 26. What Is Vulnerability Assessment? 27. Security Education, Training, and Awareness 28. Risk Management 29. Insider Threats 30. Disaster Recovery 31. Disaster Recovery Plans for Small and Medium Business (SMB) 32. Security Certification And Standards Implementation 33. Security Policies And Plans Development 34. Cyber Forensics 35. Cyber Forensics and Incident Response 36. Securing eDiscovery 37. Microsoft Office and Metadata Forensics: A Deeper Dive 38. Hard Drive Imaging 39. Satellite Encryption 40. Public Key Infrastructure 41. Context-Aware Multi-Factor Authentication 42. Instant-Messaging Security 43. Online Privacy 44. Privacy-enhancing Technologies 45. Detection Of Conflicts In Security Policies 46. Supporting User Privacy Preferences in Digital Interactions 47. Privacy and Security in Environmental Monitoring Systems: Issues and Solutions 48. Virtual Private Networks 49. VoIP Security 50. Storage Area Networking Devices Security 51. Securing Cloud Computing Systems 52. Cloud Security 53. Private Cloud Security 54. Virtual Private Cloud Security 55. Protecting Virtual Infrastructure 56. SDN and NFV Security 57. Physical Security Essentials 58. Online Identity and User Management Services 59. Intrusion Prevention and Detection Systems 60. Penetration Testing 61. Access Controls 62. Endpoint Security 63. Fundamentals of Cryptography 64. Securing the Infrastructure 65. Cyber Warfare 66. Security Through Diversity 67. Online e-Reputation Management Services 68. Data Loss Protection 69. Satellite Cyber Attack Search and Destroy 70. Advanced Data Encryption Appendices (Online only)
£91.80
Pearson Education (US) My Online Privacy for Seniors
Book SynopsisJason R. Rich is an accomplished author, journalist, and photographer. Some of his recently published books include: My Digital Photography for Seniors, My Digital Entertainment for Seniors, Working in the Cloud: Using Web-Based Applications and Tools to Collaborate Online, and The Ultimate Guide to YouTube for Business. He's also written an unofficial series of strategy guides, targeted to kids, focusing on the popular Fortnite: Battle Royale video game. Through his work as an enrichment lecturer, he often offers workshops and classes about digital photography, the Internet, and consumer technology aboard cruise ships operated by Carnival Cruise Lines, Royal Caribbean, Princess Cruises Lines, Norwegian Cruise Lines, and Celebrity Cruise Lines, as well as through Adult Education programs in the New England area. Table of ContentsChapter 1 Online Security Basics 3 Protecting Yourself Online 5 Simple Steps to Protect Your Privacy 5 Improving Internet Security in Your Home 6 Set Up a Firewall 7 Password-Protect Your Wireless (Wi-Fi) Internet Connection 8 Secure Your Computers 9 Set Up and Manage User Accounts on a Windows 10 PC 10 Set Up and Manage User Accounts on a Mac (Running MacOS) 13 Secure Your Computer’s Web Browser 16 Customize the Security Settings When Using the Microsoft Edge Web Browser 17 Customize the Security Settings When Using the Safari Web Browser 19 Take Advantage of Web Browser Plug-Ins (Extensions) 20 Take Advantage of Security Tools Offered by Your Mobile Devices 21 Adjust the Security Settings on Your iPhone or iPad (running iOS 12) 22 Adjust the Security Settings on Your Android Mobile Device 27 Manage Your Account Passwords 30 Use Tools to Manage and Remember Your Passwords 31 Tips for Creating Secure Passwords 32 Apply Multiple Strategies to Protect Yourself Online 33 Chapter 2 Safely Surf the Internet 37 Using Your Favorite Web Browser 38 Choosing a Web Browser for Your Computer or Mobile Device 40 Acquiring a Web Browser42 Consider a Specialty Web Browser Built for Privacy 43 Looking at Cookies 44 Manage Microsoft Edge’s Cookie-Related Features 47 Manage Safari’s Cookie-Related Feature(s) 50 Manage Chrome’s Cookie-Related Feature(s) 51 Turning on Your Web Browser’s Privacy or Incognito Mode 55 Turn On Privacy (InPrivate) Mode Using Microsoft Edge 56 Turn On Private Mode Using Safari 57 Go Incognito Mode Using Chrome 58 Turn on Privacy Mode on Your iPhone’s Safari Web Browser 59 Turn on Privacy Mode on Your iPad’s Safari Web Browser 60 Turn on Privacy Mode on Your Android’s Chrome Web Browser 61 Managing Your Web Browser’s History Folder 63 Work with Microsoft Edge’s History Folder 64 Work with Safari’s History Folder 65 Work with Chrome’s History Folder 66 Managing Bookmarks and Other Information 70 Create a New Bookmark 71 Bookmark with Google Chrome 71 Bookmark with Microsoft Edge 71 Bookmark with Apple Safari 72 Access Your Bookmarks 73 Expanding Your Web Browser’s Functionality Using Optional Plug-Ins 75 How to Find, Download, and Install Plug-Ins 76 Learning the Benefits of Using a Virtual Private Network or Two-Factor Authentication 77 Using Apps on Your Mobile Device to Better Handle Many Online Activities 79 Chapter 3 Protect Your Security When Working with Emails 83 Email Options 83 Determining Where Email Vulnerabilities Can Happen 85 Preventing Unauthorized Physical Access to Your Computer or Mobile Device 85 Protecting Your Computer Against Viruses and Malware 86 Maintaining an Up-to-Date and Reliable Backup 87 Create a Backup Using a Windows 10 PC 88 Create a Backup Using MacOS’s Time Machine Feature 92 Choosing Additional Online Backup Solutions 95 Protecting Email Content as It’s Moving 96 Avoiding Phishing Schemes and Spam 96 Adjusting the Security and Privacy Features When Using Mail 99 Use the Email Security Features Built in to Mail for Windows 10 PCs 99 Use the Junk Mail Settings in Mail for the Mac 101 Use the Email Security Settings for Gmail 102 Use the Email Security Settings for Yahoo! Mail 109 Identifying and Avoiding Phishing Schemes 112 Dealing with a Phishing Scheme Email 115 Calling a Legitimate Phone Number for a Bank or Credit Card Issuer 116 Identifying Phishing Scheme Email Messages 117 Avoiding Email Security Problems Related to Human Error 119 Chapter 4 Handling Online Banking Tasks Securely 123 Sending or Receiving Money Electronically 126 Addressing Online or Mobile Banking Security Concerns 127 Protecting Your Online Accounts 127 Creating a Secure Password and Keeping It a Secret 127 Changing Your Password Periodically 128 Using a Credit Card, not a Debit Card, to Make Online Purchases 128 Using Electronic Payments at Retail Locations or Online 128 Setting Up and Using Apple Pay 130 Set Up Apple Pay to Work with Your iPhone 131 Make a Purchase Using Apple Pay, Google Pay, or Samsung Pay 137 Using a Virtual Private Network for Online Banking via Wi-Fi 139 Download and Install a VPN to Your Computer 141 Download and Install a VPN to Your Mobile Device 147 Being Aware of Banking-Related Phishing Schemes 152 Signing Off from Your Online Banking Service When You’re Finished 153 Reporting a Suspected Problem Immediately 153 Turning On Two-Factor Authentication for Your Online Accounts 154 Turn On Two-Factor Authentication for Your Bank’s Website 154 Managing Credit Card Accounts Online 157 Chapter 5 Protect Your Privacy and Security When Shopping Online 159 Avoiding Online Shopping Security Risks 161 Being Aware of Fake Websites 162 Paying Attention to Product Descriptions 163 Watching Out for Counterfeit Goods 164 Ignoring Requests for Too Much Personal Information 166 Being Careful What You Sign Up For 166 Understanding Ratings and Reviews 168 Permitting Cookies When Shopping Online 169 Verifying the Return Policy 170 Looking for Free Shipping Offers 170 Ensuring a Secure Internet Connection 172 Comparing Prices on Websites 173 Use a Price Comparison Website from a Computer 174 Use a Price Comparison Website from a Mobile App 177 Taking Advantage of Electronic Payment Options for Added Security 178 Use PayPal to Pay for Online Purchases 180 Chapter 6 Use Social Media Safely 185 Your Information on Social Media Is Typically Public 185 Becoming Active on Social Media 187 Socializing (and More) on Facebook 188 Discerning Fake News from Real News 189 Addressing Privacy Concerns on Facebook 191 Getting Started Using and Staying Secure on Facebook 194 Set Up a Free Facebook Account 195 Create Your Public Facebook Profile 198 Adjust Your Account’s Privacy and Security Settings 204 Customize Face Recognition 207 Adjust Facebook’s Advertising-Related Settings 209 Adding Friends to Your Facebook Account 213 Manage Your Facebook Friends 214 Delete Your Facebook Account 215 Staying Safe on Twitter and Instagram 217 Adjusting Twitter and Instagram Privacy and Security Settings 218 Customize Twitter’s Settings 219 Customize Instagram’s Settings 224 Understanding What You’re Posting and Who Will See It 227 Using LinkedIn and Other Social Media Services Securely 227 Thinking Before You Post 228 Understanding the Pros and Cons of Geotagging 229 Turn Off Geotagging from Your iPhone/iPad 230 Turn Off Geotagging from Your Android-Based Mobile Device 233 Turn Off Geotagging on a Case-by-Case Basis 236 Weighing the Pros and Cons of Tagging Yourself and Others in Photos 237 Chapter 7 Protect Your Privacy When Publishing and Sharing Photos Online 241 Organizing Your Digital Image Library Can Take Time 244 Storing, Editing, Organizing, and Sharing Your Digital Images via the Cloud 247 Using Platform-Related Cloud Photo Storage and Sharing Options 247 Using Third-Party Cloud Photo Storage and Sharing Options 250 Use Shutterfly’s Share Sites Feature 251 Choosing a Cloud-Based Photo Storage and Sharing Service 253 Sharing Photos via Social Media 255 Uploading a Photo to Your Instagram Account 257 Create a Personalized Online Album on Facebook 264 Chapter 8 Safely Store Data, Documents, and Files in the Cloud 277 Benefits of Using Cloud Storage 278 Understanding Important Cloud Computing Concepts 280 Configuring Cloud-Based Services 282 Set Up OneDrive Functionality on Your Windows PCs 283 Set Up iCloud Functionality on Your Macs 286 Sharing Content with Others from iCloud Drive 289 Using iCloud with Other MacOS Apps 289 Using a Cross-Platform Cloud-Based Service 294 Sharing Large Files Using Dropbox 295 Perform a Dropbox Security Checkup 299 Using Cloud-Based File Sharing Services Safely 301 Chapter 9 Customize the Security Settings on Your Smartphone or Tablet 307 Preventing Unauthorized People from Using Your Mobile Device 308 Setting Up the Passcode Feature 310 Set the Passcode (iPhone or iPad) 311 Set the PIN (Android) 313 Turning On the Touch ID (iOS) or Finger Scanner (Android) 316 Activating Touch ID (iPhone or iPad) 316 Activating Fingerprint Scan (Android) 316 Taking Advantage of Face ID (iOS) 317 Restricting Access to Apps and Content 318 Taking Advantage of Parental Controls 318 Adjusting the App-Specific Privacy Settings on Your Mobile Device 319 Keeping Your Mobile Device’s Operating System and Apps Up to Date 322 Updating Your iPhone or iPad’s Operating System and Apps 322 Updating Your Android Mobile Device Operating System and Apps 324 Managing Your Mobile Device’s Wireless Connections 325 Turning On Bluetooth Settings 327 Using AirDrop (iPhone/iPad) 329 Send App-Specific Content Using AirDrop 330 Blocking and Managing Unwanted Calls to Your Smartphone 333 Block Specific Incoming Calls on Your iPhone 335 Block Specific Incoming Calls on an Android Smartphone 337 Glossary 339Index 345Bonus Online Chapters Bonus 1 How Web Surfing Affects the Online Ads You See (ONLINE) Bonus 2 Work with Smart Appliances, Smart Speakers, and Home Security Tools (ONLINE) Bonus 3 Protect Your Kids and Grandchildren Online (ONLINE)
£17.99
Taylor & Francis Ltd Data Science and Big Data Analytics in Smart
Book SynopsisMost applications generate large datasets, like social networking and social influence programs, smart cities applications, smart house environments, Cloud applications, public web sites, scientific experiments and simulations, data warehouse, monitoring platforms, and e-government services. Data grows rapidly, since applications produce continuously increasing volumes of both unstructured and structured data. Large-scale interconnected systems aim to aggregate and efficiently exploit the power of widely distributed resources. In this context, major solutions for scalability, mobility, reliability, fault tolerance and security are required to achieve high performance and to create a smart environment. The impact on data processing, transfer and storage is the need to re-evaluate the approaches and solutions to better answer the user needs. A variety of solutions for specific applications and platforms exist so a thorough and systematic analysis of existing solutions for data science, data analytics, methods and algorithms used in Big Data processing and storage environments is significant in designing and implementing a smart environment.Fundamental issues pertaining to smart environments (smart cities, ambient assisted leaving, smart houses, green houses, cyber physical systems, etc.) are reviewed. Most of the current efforts still do not adequately address the heterogeneity of different distributed systems, the interoperability between them, and the systems resilience. This book will primarily encompass practical approaches that promote research in all aspects of data processing, data analytics, data processing in different type of systems: Cluster Computing, Grid Computing, Peer-to-Peer, Cloud/Edge/Fog Computing, all involving elements of heterogeneity, having a large variety of tools and software to manage them. The main role of resource management techniques in this domain is to create the suitable frameworks for development of applications and deployment in smart environments, with respect to high performance. The book focuses on topics covering algorithms, architectures, management models, high performance computing techniques and large-scale distributed systems.Table of ContentsPreface. Contributors. Mobility-Aware Solutions for Edge Data Center Deployment in Urban Environments. Effective Data Assimilation with Machine Learning. Semantic Data Model for Energy Efficient Integration of Data Centres in Energy Grids. Managing the safety in smart buildings using semantically-enriched BIM and occupancy data approach. Belief Rule-Based Adaptive Particle Swarm Optimization. NoSQL Environments and Big Data Analytics for Time Series. A Territorial Intelligence-based Approach for Smart Emergency Planning. Big Data Analysis and Applications for Energy Performant Buildings and Smart Cities. Selecting Suitable Plants for a Given Area using Data Analysis Approaches. Ontology-Based Security Requirements Framework for Current and Future Vehicles. Dynamic Resource Provisioning Using Cognitive Intelligent Networks based on Stochastic Markov Decision Process. Data model for water resource management. References.
£142.50
WW Norton & Co Click Here to Kill Everybody
Book SynopsisA best-selling author and renowned security expert reveals the rise and risks of a new goliath: our massively networked, world-sized web.Trade Review"Schneier skilfully guides readers through serious attacks that have happened already — and moves on to those he believes are just over the horizon... This book is convincing, but not comforting." -- Financial Times"Schneier’s book is sober, lucid and often wise in diagnosing how the security challenges posed by the expanding Internet came about, and in proposing what should (but probably won’t) be done about them." -- Nature"... excellent work..." -- The Catholic Herald
£13.29
WW Norton & Co Cryptography
Book SynopsisA nuts-and-bolts explanation of cryptography from a leading expert in information security.
£12.34
Basic Books Data for the People
Book SynopsisA long-time chief data scientist at Amazon shows how open data can make everyone, not just corporations, richer Every time we Google something, Facebook someone, Uber somewhere, or even just turn on a light, we create data that businesses collect and use to make decisions about us. In many ways this has improved our lives, yet, we as individuals do not benefit from this wealth of data as much as we could. Moreover, whether it is a bank evaluating our credit worthiness, an insurance company determining our risk level, or a potential employer deciding whether we get a job, it is likely that this data will be used against us rather than for us. In Data for the People, Andreas Weigend draws on his years as a consultant for commerce, education, healthcare, travel and finance companies to outline how Big Data can work better for all of us. As of today, how much we benefit from Big Data depends on how closely the interests of big companies align with our own. Too often, outdated standards of control and privacy force us into unfair contracts with data companies, but it doesn''t have to be this way. Weigend makes a powerful argument that we need to take control of how our data is used to actually make it work for us. Only then can we the people get back more from Big Data than we give it. Big Data is here to stay. Now is the time to find out how we can be empowered by it.Trade Review"[Weigend] makes a strong case for what we need-the right to amend or blur the data that pertains to us, the freedom to experiment with it and take it with us to other sites and services, and the ability to insist that data refineries be clear about how they're using our information." -Wall Street Journal "A hugely interesting read, packed to bursting with intriguing examples... The depth and breadth of Weigend's experience is clear in the sheer range of technologies and business models he describes. He explains critical concepts clearly and concisely, at a pace that should keep both experts and those new to the field hooked." -New Scientist "Weigend is a bold explorer of the technological future. His compelling book maps the opportunities of a world without secrets." -Daniel Kahneman, author of Thinking Fast and Slow "Data for the People asks us to think seriously about the data we generate in our online world, and how we are increasingly losing control over it. These products and services that generate data are not going away. And with advances in artificial intelligence enabling computers to do traditionally human tasks in a scalable manner, this data can and will continue to be utilized across the majority of decisions by institutions. Andreas acknowledges and embraces this future, and provides a framework and a call to action to ensure that in this world, as consumers, we can use and control our data in ways that are both transparent and beneficial to us." -Vinod Khosla, Partner at Khosla Venture "The author maintains the intellectual complexity of his subject while remaining accessible to readers searching for the truth about the salability of their privacy, the nuances of data sharing, and the ways to cloak their digital footprints. A cautionary, cohesively delivered update on the scope and science of human quantification." -Kirkus Reviews "Data-abundant, ubiquitous, personal-is restructuring our competing values of privacy, convenience, identity, and control. No one understands this better than Weigend, and with Data For the People, he helps the rest of us understand it as well." -Clay Shirky, author of Here Comes Everybody "Andreas Weigend is the preeminent thinker on the economic power of social data. Data for the People is a brilliant guide for how individuals, companies and policymakers can tap data's value while retaining our human values. Thought provoking-and action-inspiring!" -Kenneth Cukier, Senior Editor, The Economist and coauthor of Big Data "Data is the new oil-the key means of production in modern capitalism. Big data refineries such as Google, Amazon, Facebook, and OKCupid influence where we work, what we buy, who we marry, and how we vote-in ways that very few people understand, much less control. This is an excellent book about the biggest ever challenge to human privacy and autonomy. Social data expert Andreas Weigend explains the incredibly detailed data we give to these companies, how it's used to nudge our decisions, and how we can take back control so our data empower us rather than exploiting us."-Geoffrey Miller, associate professor of psychology at the University of New Mexico "Finally a highly readable and heartfelt book about data by a leading technologist! Andreas Weigend writes with superb clarity about the most important issue of the early 20th century-the data economy and its threat to our privacy and individual rights. The narrative of his own personal journey from East Germany to becoming the Chief Scientist at Amazon.com is also compelling. Overall a major work by one of the world's leading authorities on data." -Andrew Keen, author of The Internet Is Not the Answer "This book is a landmark in the debate on privacy and data sharing. Everyone whose data is being captured and mined-in other words, everyone-should heed Weigend's call for data literacy and support his 'Data Bill of Rights.'" -Pedro Domingos, author of The Master Algorithm and professor of computer science at the University of Washington
£30.40
John Wiley & Sons Inc Practical Cryptography
Book SynopsisSecurity is the number one concern for businesses worldwide. The gold standard for attaining security is cryptography because it provides the most reliable tools for storing or transmitting digital information.Table of ContentsPreface. 1. Our Design Philosophy. 2. The Context of Cryptography. 3. Introduction to Cryptography. I Message Security. 4. Block Ciphers. 5. Block Cipher Modes. 6. Hash Functions. 7. Message Authentication Codes. 8. The Secure Channel. 9. Implementation. Issues (I). II Key Negotiation. 10. Generating Randomness. 11. Primes. 12. Diffie-Hellman. 13. RSA. 14. Introduction to Cryptographic Protocols. 15. Negotiation Protocol. 16. Implementation Issues. III Key Management. 17. The Clock. 18. Key Servers. 19. The Dream of PKI. 20. PKI Reality. 21. PKI Practicalities. 22. Storing Secrets. IV Miscellaneous. 23. Standards. 24. Patents. 25. Involving Experts. Acknowledgments. Bibliography. Index.
£27.96
John Wiley & Sons Inc Secrets and Lies
Book SynopsisBestselling author Bruce Schneier offers his expert guidance on achieving security on a network Internationally recognized computer security expert Bruce Schneier offers a practical, straightforward guide to achieving security throughout computer networks. Schneier uses his extensive field experience with his own clients to dispel the myths that often mislead IT managers as they try to build secure systems. This practical guide provides readers with a better understanding of why protecting information is harder in the digital world, what they need to know to protect digital information, how to assess business and corporate security needs, and much more. * Walks the reader through the real choices they have now for digital security and how to pick and choose the right one to meet their business needs * Explains what cryptography can and can''t do in achieving digital securityTrade Review“…The security technologies available are described in a user-friendly way without going into depth...” (Computer Bulletin, January 2005) “…peppered with lively anecdotes and aphorisms, making it a really accessible read...” (The ISSG Magazine, Autumn, 2004) “…fascinating read…peppered with lively anecdotes…” (The ISSG Magazine, October 2004) "...make yourself better informed. Read this book." (CVu, The Journal of the ACCU, Vol 16(3), June 2004)Table of ContentsPreface xi 1. Introduction 1 Part 1: The Landscape 11 2. Digital Threats 14 3. Attacks 23 4. Adversaries 42 5. Security Needs 59 Part 2: Technologies 83 6. Cryptography 85 7. Cryptography in Context 102 8. Computer Security 120 9. Identification and Authentication 135 10. Networked-computer Security 151 11. Network Security 176 12. Network Defenses 188 13. Software Reliability 202 14. Secure Hardware 212 15. Certificates and Credentials 225 16. Security Tricks 240 17. The Human Factor 255 Part 3: Strategies 271 18. Vulnerabilities and the Vulnerability Landscape 274 19. Threat Modeling and Risk Assessment 288 20. Security Policies and Countermeasures 307 21. Attack Trees 318 22. Product Testing and Verification 334 23. The Future of Products 353 24. Security Processes 367 25. Conclusion 389 Afterword 396 Resources 399 Acknowledgments 401 Index 403
£16.15
John Wiley & Sons Inc Bulletproofing TCPIPbased Windows NT2000 Networks
Book SynopsisFind out about TCP/IP--based network attack methods and threats to Windows NT/2000 computers and the preventive measures you can use to protect your infrastructure. Bulletproofing TCP/IP--based Windows NT/2000 Networks details the use of router access lists, firewalls, virus scanners and encryption.Table of ContentsPreface. Acknowledgements. Introduction. The TCP/IP Protocol Suite. Network Attack Methods. The Security Role of the Router. The Role of the Firewall. The Role of the Virus Scanner and Encryption. Host Attack Methods. Working with Windows. The Role of the Scanner. Index.
£100.76
John Wiley & Sons Inc Secure Communications
Book SynopsisThis book explores the practicalities of secure voice communication management. The author discusses various communication mediums, highlighting their technical aspects and their security risks. Readers will also find solutions to the problems facing the security systems designer, buyer, or manager.Trade Review"...well-written and accessible..." (Electronics Communication Engineering Journal, December 2002)Table of ContentsPreface Acknowledgement Glossary Acronyms and Abbreviations 1. Threats and Solutions The Technical Threats to Communications Security Authentication Confidentiality Integrity Availability Compromising Emanation/Tempest Threats 2. An Introduction to Encryption and Security Management Analogue Scrambling Algorithms Goodbye DES, Hello DES Fundamentals in Key Management Evaluating Encryption Equipment 3. Voice Security in Military Applications Analogue Encryption of Naval Long range, HF Radio Communications Stand-alone Digital Cipher Units in Land-based Operations Radio Integrated Cipher Module 4. Telephone Security Specific Threats to Telephone Operations Network Technologies Telephone Security Solutions Key and Access Management Network Implementation Key Distribution Summary 5. Secure GSM Systems The Basic GSM Architecture Standard GSM Secuirty Features Custom Security for GSM Users Key Management and Tools GRPS General Packet Radio Systems 6. Security in Private VHF/UHF Radio Networks Applications and Features Threats Countermeasures Communications Network Design and Architecture Hardware Components and Functions Security and Key Management Other Security Features 7. Electronic Protection Measures - Frequency Hopping Electronic Warfare (EW) Electronic Protection Measures (EPM) Military Applications Network Architecture and Management Characteristics of Frequency Hopping Networks Key/Data Management and Tools Hardware components 8. Link and Bulk Encryption Basic Technology of Link Encryption The Ciphering Process Cryptographic Parameters Key and Network Management Military Link Security 9. Secure Fax Networks Basic Facsimile Technology Manual/Automatic Key Selection Network Architecture Key Management and Tools Fax Over Satellite Links 10. PC Security Security Threats and Risks Implementation of Solutions Access Protection Boot-up Protection by On-Board Hardware with Smart Card LAN Security Model Application of PC Security System Administration 11. Secure E-mail The E-mail Scenario Threats Type and Motivation of Attackers Methods of Attack Countermeasures Guidelines for E-mail Security 12. Secure Virtual Private Networks Scenario Definition VPN Protocols Packet Header Formats Security Association List Tunnel Table Routing Tables Packet Filtering Threats and Countermeasures Attacks within the Public Network 13. Military Data Communication Applications Data Terminals and their Operating Features Technical Parameters Security Management Key Management Combat Packet Data Networks 14. Managment, Support and Training Environments of Security Management Infrastructure and Planning Operational Hierarchies Training Customer Support Troubleshooting References Index
£117.85
University of California Press Our Data Ourselves
Book SynopsisTrade Review"Reading this book will benefit anyone interested in how their information is used in the contemporary digital world. . . . Readers will come away with a deeper appreciation for the complexity of this issue and gain practical tips they can employ online to safeguard their personal data. Highly recommended." * CHOICE *Table of ContentsContents Introduction: What Is Data Privacy and Why Is It Important? 1. Who Owns Our Data? 2. Our Data at Home 3. Our Data at Work 4. Our Data on Social Media 5. Our Children’s Data 6. Our Data at School 7. Our Data in the Digital Marketplace 8. Our Data across the Pond 9. Our Data and Our Health 10. Our Data and Our Money 11. Our Data and the Government 12. Our Data into the Future Acknowledgments Notes Further Reading Index
£64.00
University of California Press Our Data Ourselves
Book SynopsisTrade Review"Reading this book will benefit anyone interested in how their information is used in the contemporary digital world. . . . Readers will come away with a deeper appreciation for the complexity of this issue and gain practical tips they can employ online to safeguard their personal data. Highly recommended." * CHOICE *Table of ContentsContents Introduction: What Is Data Privacy and Why Is It Important? 1. Who Owns Our Data? 2. Our Data at Home 3. Our Data at Work 4. Our Data on Social Media 5. Our Children’s Data 6. Our Data at School 7. Our Data in the Digital Marketplace 8. Our Data across the Pond 9. Our Data and Our Health 10. Our Data and Our Money 11. Our Data and the Government 12. Our Data into the Future Acknowledgments Notes Further Reading Index
£18.90
Princeton University Press Understanding the Digital World
Book Synopsis
£84.00
Quarto Publishing Group USA Inc Internet Password Book Keep Track of Usernames
Book SynopsisIn our modern, digital age, data security experts advise a hard copy of all difficult passwords; and this Internet Password Book is the perfect record for them.
£7.97
Pearson Education CompTIA Security SY0501 Pearson uCertify Course
Book Synopsis
£126.00
Pearson It Certification Comptia Security Sy0501 Pearson Ucertify Course
Book Synopsis
£144.00
Stanford University Press Privacy in Context
Book SynopsisAs use of information technology increases, we worry that our personal information is being shared inappropriately, violating key social norms and irreversibly eroding privacy. This book describes how societies ought to go about deciding when to allow technology to lead change and when to resist it in the name of privacy.Trade Review"Privacy in Context is a major achievement. It is rare for anyone to come into a field so well plowed and make a genuine contribution. Grounded in extensive knowledge of the theoretical literature and a real engagement with the practicalities of informational instability that surround us, Nissenbaum's new framing of the tensions raised by surveillance and processing of information is important. Practical and oriented to the world and its social practices, rather than to abstractions or formal claims, contextual integrity is a concept both rich and detailed, with which any serious debate about privacy in the networked environment must now engage." -- Yochai Benkler * Harvard University *"[S]ubtle and important . . . There is no doubt that Nissenbaum thinks with the learned . . Before the book appeared Nissenbaum's work on privacy was already well respected and widely cited. The present book should seal her reputation as one of a handful of leading privacy theorists today. My guess is that the book will be required reading for a long while to come for all who want to make significant contributions to the debate about the ethics of privacy." -- Tony Doyle * Journal of Value Inquiry *"This much anticipated book, written by one of the world's most brilliant, dynamic philosophers of technology, offers a model for predicting and explaining privacy breaches. It also furnishes pragmatic solutions for resolving policy disputes about newly proposed socio-technical information systems. It solves puzzles not easily resolved by traditional privacy theory, advances a coherent framework for rejecting the private/public dichotomy as the basis for the right to privacy, and contributes to a deeper understanding of judicial constructs used to resolve hard cases. Helen Nissenbaum has achieved what many of us have yearned for." -- Ian Kerr, Canada Research Chair in Ethics, Law and Technology * University of Ottawa *"This book provides a refreshing, contemporary look at information privacy in the twenty-first century. Nissenbaum persuasively argues that privacy must be understood in its social context, and she provides an insightful and illuminating account of how to do so. For anyone considering the burgeoning problems of information privacy, Privacy in Context is essential reading." -- Daniel J. Solove * George Washington University Law School and author of Understanding Privacy *"Nissenbaum has written a badly needed and accessible book that can serve as a guide through the emerging digital maze without demanding that we surrender our right to privacy in return... Her book offers a straightforward and articulate account of the role that privacy plays in a democratic society, the ways in which technology undermines it, and the steps we need to take to ensure that we don't succumb to the faulty logic of data-hungry corporations." -- Evgeny Morozov * Times Literary Supplement *"[Privacy in Context] takes the privacy discourse several steps ahead. Nissenbaum sets an ambitious goal and accomplishes it in grand fashion. She proposes a detailed framework to better understand privacy issues and assist in prescribing privacy policies that meets the needs of the 21st century . . . [T]he book breaks new paths. It signals the beginning of a new privacy paradigm (an assessment that will be easier judged in hindsight) and is an important contribution to the growing law and technology literature." -- Michael D. Birnhack * Jurimetrics *
£19.79
Scarecrow Press Privacy in America
Book SynopsisArranged in three sections—Law and Policy, Information Technology, and Other Perspectives—this collection of essays by respected scholars address a number of privacy issues.Trade ReviewThe chapters are all well-written, thought-provoking pieces with extensive lists of references. It includes an adequate index. This work is recommended as stimulating reading for postgraduate students interested in privacy from an American perspective. * Online Information Review *
£75.60
Rowman & Littlefield Publishers None of Your Business
Book Synopsis
£18.99
Fordham University Press Advances in Cyber Security Technology Operations
Book SynopsisEnables citizens and cyber professionals alike to conceive novel ideas and construct practical solutions for defending against all kinds of adversaries and attacksTrade Review"Captures the thought of cyber security leaders from government, industry, and academia, who have practical and hands-on experience in various aspect of cyberspace ecosystems. Thought and experience cover the life cycle of security mechanisms including the design, development, management, and most importantly sustainment of these mechanisms. Well done, practical, and resourceful." -- -Simon Y. Liu Editor-in-Chief of IT Professional Magazine "Addresses a rapidly changing field to an audience looking for a snapshot of the current state of cyber security regulations, international legal framework, and cyber security technologies." -- -Marek Rusinkiewicz Telcordia TechnologiesTable of ContentsContributors: Hira Agrawal, Preet Bharara, Tom Bowen, Dyann Bradbury, Vincent Buskens, D. Frank Hsu, Kuan-Tsae Huang, Kevin Kelly, Kathleen Kiernan, Ruby Lee, Andrew Lewman, Nick Mankovich, Dorothy Marinucci, Eileen Monsma, Robert Mueller III, Sanjai Narain, Paul Niewbeerta, Adam Palmer, Howard Schmidt, Melvin Soudijn, Edward Stroz, Akio Sugeno, Paul Syverson, Kazuo Takaragi, Kwai-Jan Wu
£19.79
Fordham University Press Strategies for Media Reform
Book SynopsisThis collection brings together strategies for advancing media reform, prepared by 33 scholars and activists from around the world. Chapters consider how best to secure change in areas including media ownership, media literacy, net neutrality, community radio, online surveillance and public service broadcasting.Trade Review"Uniquely informed activist-researcher evaluations of very current media and Internet reform initiatives, especially of the U.S. scenario, but spanning Canada, Mexico, Burma, Thailand, the Philippines, Taiwan, Egypt, Israel, West African states, Argentina, Venezuela and Switzerland. A treasure trove for media change, including notable think-pieces, and lessons learned from both failures and achievements." -- -John D.H. Downing editor of Encyclopedia of Social Movement MediaTable of ContentsPart One: Introduction Preface Robert W. McChesney 1. Media Reform: An Overview Des Freedman and Jonathan A. Obar 2. Media Policy Literacy: A Foundation for Media Reform Becky Lentz Part Two: Internet Activism For Media Reform 3. Activating the Fifth Estate: Bill C-30 and the Digitally-Mediated Public Watchdog Jonathan A. Obar and Leslie Regan Shade 4. WikiLeaks and 'Indirect' Media Reform Christian Christensen 5. Mobilizing for Net Rights: The Charter of Human Rights and Principles for the Internet M. I. Franklin INTERNET ACTIVISM: Commentary From Media Reform Organizations 6. ELECTRONIC FRONTIER FOUNDATION: The Largest Internet Protest in History Isn't the Important Part: Lessons from the SOPA Fight Rainey Reitman 7. FREE PRESS: Internet Freedom from the Outside-in: Upending Big-Money Politics to Win Better Media Policy Craig Aaron and Timothy Karr 8. NEW AMERICA FOUNDATION: A Victory for Digital Justice (Your Tax Dollars at Work) Joshua Breitbart 9. OPENMEDIA.CA: Working Toward an Open Connected Future David Christopher Part Three: The Power of the Media Reform Movement 10. A Perfect Storm for Media Reform: Activist Strategies and Socio-political Circumstances behind Telecommunication Reforms in Mexico Alejandro Abraham-Hamanoiel 11. Between Philosophy and Action: The Story of the Media Reform Coalition Benedetta Brevini and Justin Schlosberg 12. Media Reform Movements in Taiwan Hsin-yi Sandy Tsai and Shih-Hung Lo 13. Organizing for Media Reform in Canada: The Cases of Media Democracy Day, OpenMedia.ca, and Reimagine CBC Kathleen Cross and David Skinner THE POWER OF THE MEDIA REFORM MOVEMENT: Commentary from Media Reform Organizations 14. PROMETHEUS RADIO PROJECT: Winning A Big Fight For Little Radio Stations: The Battle Over Low Power FM in the US Hannah Sassaman and Pete Tridish 15. PROMETHEUS RADIO PROJECT: 90 per cent Community, 10 per cent Radio: Media Reform, Radio Justice, and the Proliferation of Low Power FM Sanjay Jolly 16. MEDIA FOUNDATION FOR WEST AFRICA: A Case Study of Media Reform Initiatives in West Africa Kwame Karikari Part Four: Media Reform as Democratic Reform 17. Waves of Struggle: The History and Future of American Media Reform Victor Pickard 18. Policy Hacking: Citizen-Based Policymaking and Media Reform Arne Hintz 19. Reforming or Conforming? The Contribution of Communication Studies to Media Policy in Switzerland Manuel Puppis and Matthias Kunzler 20. "... please grant success to the journey on which I have come': successful and unsuccessful media reform strategies in Israel Noam Tirosh and Amit Schejter 21. Legislating for a More Participatory Media System: Reform Strategies in South America Cheryl Martens Oliver Reina and Ernesto Vivares 22. Public Service Broadcasting in Egypt: Strategies for Media Reform Rasha Abdulla 23. Impunity, Inclusion and Implementation: Media Reform Challenges in Thailand, Burnma/Myanmar and the Philippines Lisa Brooten MEDIA REFORM AS DEMOCRATIC REFORM: Commentary from Media Reform Organizations 24. DOHA CENTRE FOR MEDIA FREEDOM: Media reform through capacity building: Media and Information Literacy and Journalist Training Peter Townson 25. CULTURAL SURVIVAL (GUATEMALA): Organization and Mission Mark Camp 26. OPEN SOCIETY FOUNDATIONS: Media Reform in Mexico: Civil Society Making Law Marius Dragomir
£103.00
Fordham University Press Strategies for Media Reform
Book SynopsisThis collection brings together strategies for advancing media reform, prepared by 33 scholars and activists from around the world. Chapters consider how best to secure change in areas including media ownership, media literacy, net neutrality, community radio, online surveillance and public service broadcasting.Trade Review"Uniquely informed activist-researcher evaluations of very current media and Internet reform initiatives, especially of the U.S. scenario, but spanning Canada, Mexico, Burma, Thailand, the Philippines, Taiwan, Egypt, Israel, West African states, Argentina, Venezuela and Switzerland. A treasure trove for media change, including notable think-pieces, and lessons learned from both failures and achievements." -- -John D.H. Downing editor of Encyclopedia of Social Movement MediaTable of ContentsPart One: Introduction Preface Robert W. McChesney 1. Media Reform: An Overview Des Freedman and Jonathan A. Obar 2. Media Policy Literacy: A Foundation for Media Reform Becky Lentz Part Two: Internet Activism For Media Reform 3. Activating the Fifth Estate: Bill C-30 and the Digitally-Mediated Public Watchdog Jonathan A. Obar and Leslie Regan Shade 4. WikiLeaks and 'Indirect' Media Reform Christian Christensen 5. Mobilizing for Net Rights: The Charter of Human Rights and Principles for the Internet M. I. Franklin INTERNET ACTIVISM: Commentary From Media Reform Organizations 6. ELECTRONIC FRONTIER FOUNDATION: The Largest Internet Protest in History Isn't the Important Part: Lessons from the SOPA Fight Rainey Reitman 7. FREE PRESS: Internet Freedom from the Outside-in: Upending Big-Money Politics to Win Better Media Policy Craig Aaron and Timothy Karr 8. NEW AMERICA FOUNDATION: A Victory for Digital Justice (Your Tax Dollars at Work) Joshua Breitbart 9. OPENMEDIA.CA: Working Toward an Open Connected Future David Christopher Part Three: The Power of the Media Reform Movement 10. A Perfect Storm for Media Reform: Activist Strategies and Socio-political Circumstances behind Telecommunication Reforms in Mexico Alejandro Abraham-Hamanoiel 11. Between Philosophy and Action: The Story of the Media Reform Coalition Benedetta Brevini and Justin Schlosberg 12. Media Reform Movements in Taiwan Hsin-yi Sandy Tsai and Shih-Hung Lo 13. Organizing for Media Reform in Canada: The Cases of Media Democracy Day, OpenMedia.ca, and Reimagine CBC Kathleen Cross and David Skinner THE POWER OF THE MEDIA REFORM MOVEMENT: Commentary from Media Reform Organizations 14. PROMETHEUS RADIO PROJECT: Winning A Big Fight For Little Radio Stations: The Battle Over Low Power FM in the US Hannah Sassaman and Pete Tridish 15. PROMETHEUS RADIO PROJECT: 90 per cent Community, 10 per cent Radio: Media Reform, Radio Justice, and the Proliferation of Low Power FM Sanjay Jolly 16. MEDIA FOUNDATION FOR WEST AFRICA: A Case Study of Media Reform Initiatives in West Africa Kwame Karikari Part Four: Media Reform as Democratic Reform 17. Waves of Struggle: The History and Future of American Media Reform Victor Pickard 18. Policy Hacking: Citizen-Based Policymaking and Media Reform Arne Hintz 19. Reforming or Conforming? The Contribution of Communication Studies to Media Policy in Switzerland Manuel Puppis and Matthias Kunzler 20. "... please grant success to the journey on which I have come': successful and unsuccessful media reform strategies in Israel Noam Tirosh and Amit Schejter 21. Legislating for a More Participatory Media System: Reform Strategies in South America Cheryl Martens Oliver Reina and Ernesto Vivares 22. Public Service Broadcasting in Egypt: Strategies for Media Reform Rasha Abdulla 23. Impunity, Inclusion and Implementation: Media Reform Challenges in Thailand, Burnma/Myanmar and the Philippines Lisa Brooten MEDIA REFORM AS DEMOCRATIC REFORM: Commentary from Media Reform Organizations 24. DOHA CENTRE FOR MEDIA FREEDOM: Media reform through capacity building: Media and Information Literacy and Journalist Training Peter Townson 25. CULTURAL SURVIVAL (GUATEMALA): Organization and Mission Mark Camp 26. OPEN SOCIETY FOUNDATIONS: Media Reform in Mexico: Civil Society Making Law Marius Dragomir
£27.90
MP-ALA American Library Assoc Managing Data for Patron Privacy Comprehensive
Book SynopsisBuild trust with your library's users by securing their data privacy. Taking a holistic approach, this guide presents practical ways to implement privacy ethics into data practices.Table of Contents Acknowledgments Chapter 1 — The Value of Data and Privacy Chapter 2 — The Data Landscape Chapter 3 — Data Inventory Chapter 4 — Risk Assessment Chapter 5 — Library Data Privacy Policy and Operations Chapter 6 — Security 101 Chapter 7 — Vendor Relations Chapter 8 — Library Assessment Chapter 9 — Library Worker Privacy Training Chapter 10 — Developing and Sustaining a Culture of Privacy Index
£59.62
Artech House Publishers Electronic Warfare in the Information Age Radar Library
Book SynopsisThis is an advanced practitioner's guide to current concepts and threats associated with modern electronic warfare (EW). It identifies and explains the newest radar communications threats, and provides practical, "how-to" information on designing and implementing ECM and ECCM systems.Table of Contents: EW -- Threats, Requirements, and Principles. Modern ECM Systems -- Architectures, Types, and Technologies. Advanced Threat Radars and Missile Systems. ECM Receiving and Process System Design. ECM Applications -- System Design and Technique Solution. Advanced ECM Technology. Radar ECCM.
£141.46
Cambridge University Press Privacypreserving Computing
Book SynopsisPrivacy-preserving computing aims to protect the personal information of users while capitalizing on the possibilities offered by big data. This practical introduction for students, researchers, and industry practitioners presents a systematic tour of recent advances in privacy-preserving methods for real-world problems in analytics and AI.Trade Review'While we are witnessing revolutionary changes in AI technology empowered by deep learning and large-scale computing, data privacy for trusted machine learning plays an essential role in safe and reliable AI deployment. This book introduces fundamental concepts and advanced techniques for privacy-preserving computation for data mining and machine learning, which serve as a foundation for safe and secure AI development and deployment.' Pin-Yu Chen, IBM ResearchTable of Contents1. Introduction to privacy-preserving computing; 2. Secret sharing; 3. Homomorphic encryption; 4. Oblivious transfer; 5. Garbled circuit; 6. Differential privacy; 7. Trusted execution environment; 8. Federated learning; 9. Privacy-preserving computing platforms; 10. Case studies of privacy-preserving computing; 11. Future of privacy-preserving computing; References; Index.
£47.49
Taylor & Francis Ltd Cybersecurity for Coaches and Therapists
Book SynopsisThis groundbreaking book filters down the wealth of information on cybersecurity to the most relevant and highly applicable aspects for coaches, therapists, researchers and all other practitioners handling confidential client conversations and data. Whether working with clients online or face to face, practitioners today increasingly rely on the cyberspace as part of their practice. Through a solutions-focused lens, the book provides easy-to-apply practical advice and guidelines using non-technical language, enabling practitioners to mitigate the rising threat of cybercrime, which can no longer be ignored. By the last page the reader will have knowledge and awareness towards: securing devices, spotting financial fraud, mitigating the risks of online communications, operating more securely from a home office and handling a cyber event if one occurs.Clear, concise, and easy to follow, this guide is a pivotal resource for coaches, therapists, researcheTrade Review"Rapid technological change is fast-tracking the development and utilisation of digital innovations in applied psychological practice. The past five years have dramatically increased the digitisation of traditional psychological acts and services ranging from psychodiagnostics to e-Therapy/Coaching. These innovations aim to scale the availability of psychological services and increase accessibility for traditionally marginalised communities. COVID-19 has made these digital psychological services more than a novelty but established such as the norm. Psychological practitioners have adopted new technological approaches to their assessment and development practices to compensate for the barriers COVID-19 restrictions have placed on their traditional approaches to practice. However, are we aware of the challenges this new way of work poses to our practices and our clients? Do we know the risks that this new way of work poses for our clients' safety, security, and psychological well-being? And are our practices prepared for managing the risks associated with digital mental health services? In her new book, Alexandra explores the contemporary challenges, risks, and ethical dilemmas that digital mental health services pose to data security and client welfare. Specifically, she provides a practitioner friendly guide for managing digital client data, mitigating risks and securing your practice against cybercrime. Her book further attempts to enhance practitioners’ digital competence to ensure that you have a future-fit, resilient and digitally secured practice. This book is a ‘must’ for any therapist, psychologist, or coach venturing into the world of digital mental health."Prof Dr Llewellyn van Zyl, Extraordinary Professor in Positive Psychology, NWU"Nobody expects to be the victim of cybercrime or defrauded. Yet thousands become victims of cybercriminals each day. Imagine the feeling if criminals steal and leak your clients’ biggest secrets? The good news is that you can help prevent it from happening by reading this book. Alexandra, both a coach and cyberfraud expert herself, provides actionable and proven tips on how to ensure that you will not become the next victim of the criminals. Read this book - and learn from one of the best!"Mindaugas Kutkaitis, Fraud Prevention Expert, Financial Services"This book is a must-have for any coach, therapist or organizations handling sensitive data whose eyes glaze over when the word "cybersecurity" is mentioned! It’s jam packed with information and tips to ensure you’re safely and securely protecting your business and your clients’ confidentiality and information more broadly. It also helps you create a trusted and safe environment which is the foundation of a strong client relationship."Dr Suzy Green, D Psych (Clin) MAPS, The Positivity Institute - Founder & CEO "Whether we like it or not, cybersecurity should be part of our lives in this time and age in which cybercrime is proliferating. In a solution-focused approach, Alexandra Fouracres describes how to navigate this new challenge in an effective and inspiring manner. This book should be read by all practitioners."Dr Itai Ivtzan, School Director, School of Positive Transformation"A fascinating book which is an essential read for those of us who work in digital environments as coaches, mentors and consultants. Alexandra helps identify the current risks and what individuals and coaching businesses can do to protect themselves, their clients and their business from viruses, scams, data theft and other online risks."Prof Jonathan Passmore, Professor of Coaching & Behavioural Change & Director, Henley Centre for Coaching & Behavioural Change "As psychologists bound by a code of ethics, we are all aware of the need to ensure the confidentiality of our clients and data security relating to our practice. However, few of us are experts in this area. In this book, Alexandra brings together her experience as a fraud intelligence and prevention manager and a coaching psychologist to inform and support practitioners' awareness of risks, prevention and compliance strategies and the ability to detect and react to potential breaches. Having recently worked with the British Psychological Society to establish standards for Chartership in Coaching Psychology, I'm confident that this book will help those within our particular domain of practice to understand and meet standards relating to client confidentiality and compliance with data privacy legislation." Dr Marie Stopforth CPsychol. AFBPsS"We all need to realize, that the cyber security challenge will not be solved by any single actor, service provider or authority. Everybody needs to take actions and show responsibility and contribute to a joint defence against the dark. We need to consider, how it would feel if our lack of security, led to a client falling victim to a cyber crime. I have experienced, myself, how a therapist got his computer infected with malware and in the beginning unknowingly leaked customers sensitive information, and after I informed him, kept leaking data, simply caused by a lack of understanding and knowledge of how to handle the situation. Therefore, this book is like rain in a desert."Sune Gabelgård, Head of Financial Crime Prevention, MobilePay"This book gives the reader a non-nonsense, digestible way for therapists and coaches to approach IT security. It shows the reader that with sensible, attainable behaviours it is possible to minimise risks for both themselves their valued clients, as well as practical examples to learn from. It reinforces an important message, that good digital hygiene is becoming less about raw technology and more about a holistic, defensive mindset."Sean Henley, Technology Strategy & Resilience Manager, Financial Services "Cybersecurity... Oftentimes people will get intimidated by this term. That is something for the 'IT Expert' to sort out, not me. No one will actually try to attack my information or account. That is for the 'big companies'. That is a misconception this book will help clear up. It really can happen to us all. With the tools and information given to you in this book, you will realize there is in fact a lot you can do yourself. The book will also show, you do not need to be an 'IT Expert' to secure yourself and your business. Take the opportunity to read this book. It will be an eye opener."H. Erik Inberg, Senior Technical Manager, Support & Projects"This reassuring, practical and informative guide to coach and therapist cyber-security, focused on how to protect client data, is long overdue. Alexandra has a knack of presenting what could otherwise be a complicated diet of ideas in a wholly digestible format. In straightforward, encouraging language, she raises practitioner awareness of potential issues, improving competence and confidence in preventing fraud, promoting security online, carefully considering ethical practice and always looking for the best outcomes for both practitioner and client. Every coach and therapist needs to read this book."Ruth Hughes, Course Director, Cambridge Coaching Certificate Programme "Understanding the psychology behind cybersecurity, is to understand one of the biggest threats to the economical world as we know it today. As a cyber security professional, I have at first hand seen not only how well organised and imposing cyberattacks can be on enterprises and also how intimidating and debilitating it can be for people. One thing is the loss of money, the other and most important thing, is the impact it has on a human psyche, and how it can ruin lives, relationships and trust in the human race. Putting in place good cybersecurity is then the stepping stone for securing your practices and keeping clients safe."Kim Ottobrøker, Compliance specialist, Danish utility sector"Fraud and cybercrime are increasing problems, impacting all areas of society, and putting organizations as well as individuals at risk. Today, no one is safe, and anyone can become a target of criminals operating on a global scale. In this highly relevant book on Cybersecurity, Alexandra J.S Fouracres, shares her extensive knowledge about the subject with the reader and gives a thorough introduction to the concepts and how criminals operate. This book is highly recommended, as it provides the reader with the necessary tools and knowledge needed to avoid becoming a victim of fraud and cybercrime."Kristian E. Stephansen, Card Fraud Prevention ExpertTable of ContentsIntroduction 1. Cyber security is here to stay 2. Securing PCs and other devices 3. Networks, login credentials and embracing friction 4. Keeping communications confidential 5. Cyberattacks 6. Scams tailored to your profession 7. Payment fraud directed at your practice 8. Ethics and data 9. Case studies 10. Checklists and conclusions Afterword
£30.39
Taylor & Francis The Routledge Handbook of Privacy and Social
Book SynopsisThis volume provides the basis for contemporary privacy and social media research and informs global as well as local initiatives to address issues related to social media privacy through research, policymaking, and education.Renowned scholars in the fields of communication, psychology, philosophy, informatics, and law look back on the last decade of privacy research and project how the topic will develop in the next decade. The text begins with an overview of key scholarship in online privacy, expands to focus on influential factors shaping privacy perceptions and behaviors â such as culture, gender, and trust â and continues with specific examinations of concerns around vulnerable populations such as children and older adults. It then looks at how privacy is managed and the implications of interacting with artificial intelligence, concluding by discussing feasible solutions to some of the more pressing questions surrounding online privacy.This handbook will be a valuTable of ContentsPart 1: Perspectives on Social Media Privacy 1. Definitions of Privacy 2. Individualistic Privacy Theories 3. Privacy Theory – Social, Networked, Relational, Collective 4. Institutional Perspectives on Privacy 5. Group Privacy 6. A Situational Perspective on Privacy in Social Media 7. Privacy Calculus: Theory, Studies, and New Perspectives 8. Online Privacy Cues and Heuristics Part 2: Factors Shaping Social Media Privacy 9. Social Media Affordances and Privacy 10. Privacy and Trust 11. Challenges in Studying Social Media Privacy Literacy 12. Privacy Breaches 13. Privacy Cynicism: Resignation in the Face of Agency Constraints 14. Intercultural Privacy 15. Privacy and Gender Part 3: Populations and Their Social Media Privacy 16. The Translucent Family: Sharenting and Privacy Negotiations between Children and Parents 17. An Intimate Relation: Adolescent Development, Self-disclosure, and Privacy 18. Privacy in Later Life 19. Toward a Better Understanding of Minorities’ Privacy in Social Media 20.Inequalities and Privacy in the Context of Social Media Part 4: Algorithms and Privacy 21. Privacy in Interactions with Machines and Intelligent Systems 22. Social Credit System and Privacy 23. Microtargeting, Privacy, and the Need for Regulating Algorithms 24. Health Data and Privacy Part 5: Solutions to Preserve Social Media Privacy 25. Nudges (and Deceptive Patterns) for Privacy: Six Years Later 26. Communicating Information Security 27. From Procedural Rights to Political Economy: New Horizons for Regulating Online Privacy 28. Regulating Privacy on Online Social Networks 29. Consumer Privacy and Data Protection in the EU 30. The Role of Participants in Online Privacy Research: Ethical and Practical Considerations
£209.00
CRC Press Privacy in Practice
Book SynopsisPrivacy is not just the right to be left alone, but also the right to autonomy, control, and access to your personal data. This book aims at helping privacy leaders, professionals and organizations in establishing a unified, integrated, privacy program, both on a personal and enterprise-wide level.Table of ContentsPart 1: Privacy Basics and Landscape, 1. Privacy Concept and a Brief History, 2. Legal Systems, World Models, and Landscape, 3. GDPR, CCPA/CPRA, PIPL and PIPEDA, 4. Privacy Best Practices, Standards, and Certifications, Part 2: Business Impact and a Holistic Framework, 5. Data Protection Drivers and Challenges, 6. Unified Data Protection Framework, 7. Privacy Program Assessment and Roadmap, 8. Privacy Program Management Metrics and Tools, Part 3: Privacy Governance, 9. Data Protection Legal Mandate and Business Requirements, 10. Governance Structure and Responsibilities, 11. Privacy Policies and Procedures, 12. Privacy Awareness, Training, and Engagement, Part 4: Privacy Operations, 13. Privacy Impact Assessment (PIA), 14. Record of Processing Activities, 15. Privacy Notice, 16. Lawful Basis, 17. Data Collection, 18. Data Usage and Maintenance, 19. Personal Data Sharing, 20. Data Residency and Cross-Border Transfers, 21. Data Retention and De-Identification, 22. Security of Personal Data Processing, Part 5: High-Risk Business Scenarios, 23. PbD in Marketing Practices, 24. Workforce Data Protection, 25. Protection of Children’s Data, 26. PbD for AI Solutions, Part 6: Data Breach Handling and DPA Cooperation, 27. Data Subject Rights, Inquiries, and Complaints, 28. Data Breach Handling, 29. DPA Cooperation
£37.99
Taylor & Francis Ltd Blockchain and Artificial IntelligenceBased
Book SynopsisThe chapters in this book explore the main domains that represent considerable risks for the respect of privacy, such as education, health, finance or social media.Through its place in the massive data production industry, the Internet of Things participates in the development of artificial intelligence and is increasingly attracting the attention of web giants, governments and especially all types of hackers. Thanks to this book, private and public organizations will have at their disposal a tool that highlights, on the one hand, the major challenges raised by privacy in the context of the Internet of Things and, on the other hand, recommendations for improving good practices.Digital identity is presented as a bulwark for the protection of privacy. It opens up new avenues for improving digital trust. Concretely, there are a set of challenges that are associated with the management of digital identity, mainly in relation to the compliance and governance of personnel daTable of ContentsSection I Digital Identity Era. 1. Demystifying the Digital Identity Challenges and the Blockchain Role. 2. Blockchain for Digital Identity. Section II Privacy Dilemma. 3. Security and Corporate Violation to Privacy in the Internet Of Things Age. 4. Security, Privacy and Blockchain in Financial Technology. Section III Sensitive Data Challenges. 5. Where Does the Novel Legal Framework for AI in Canada Stand against the Emerging Trend of Online Test Proctoring? 6. - Blockchain, AI and Data Protection in Healthcare: A Comparative Analysis of Two Blockchain Data Marketplaces in Relation to Fair Data Processing and the ‘Data Double-Spending’ Problem. 7 - Cyber Influence Stakes. Postface.
£80.74
Taylor & Francis Ltd The Global Insurance Market and Change
Book SynopsisThis book focuses on the global landscape in which insurance is transacted, and where it is evolving, driven from within by transformative technologies and externally by the necessity to address risks like climate change and health crises, such as the COVID-19 pandemic.It discusses the dynamic challenges and opportunities that lie ahead for the industry in areas such as on-demand insurance, embedded insurance, parametric insurance, autonomous vehicles, the rise of fintech, the cyber risk landscape and through initiatives driven by distributed ledger technology or blockchain solutions.Moreover, it covers the major external challenges confronting the global insurance market, such as the growing insurance protection gap in relation to the affordability and insurability of natural catastrophes and climate change, and pandemics like COVID-19.This book examines innovations in insurance driven by the industry as well as externally imposed changes and dynamics impactingTable of ContentsList of Editors, List of Contributors, Chapter 1 Introduction, Chapter 2 Big Data, Artificial Intelligence and Insurance, Chapter 3 On-Demand Insurance, Chapter 4 Embedded Insurance, Chapter 5 Distributed Ledger Technology & Blockchain: Insurance, Chapter 6 Parametric Insurance, Chapter 7 Autonomous Vehicles: Liability and Insurance, Chapter 8 Autonomous Ships: Liability and Insurance, Chapter 9 Unmanned Aerial Vehicles: Liability and Insurance, Chapter 10 The Rise of Fintech: Liability and Insurance, Chapter 11 Cyber Risk and Insurance, Chapter 12 Professional Indemnity Insurance, Chapter 13 Pandemics and Insurance, Chapter 14 Climate Change and Insurance, Chapter 15 Climate Change: Liability Risk, Chapter 16 Conclusion: New and evolving challenges and opportunities
£275.50