Privacy and data protection Books

151 products


  • Cyber Attack Survival Manual: From Identity Theft

    Weldon Owen Cyber Attack Survival Manual: From Identity Theft

    10 in stock

    Book SynopsisAs we live more of our lives online and entrust personal information to the cloud, we need to be much more aware and proactive about protecting ourselves.  Are you safe from hackers? Not without taking precautions. Your identity can be stolen, your company's intellectual property can be copied and sold, and even hacks that just a few years ago sounded like science fiction will soon be possible: vehicle systems can already be hacked, and our power grid can be manipulated or sabotaged by terrorists.  But knowledge is power. In this easy-to-read, fascinating and fully illustrated book, you learn how hackers make money, and what they target - along with concrete, hands-on hints for fighting back, whether you’re a concerned parent or a top executive.  Packaged in a durable, wipe-clean flexicover with metallic corner-guards, this practical manual withstands heavy-duty use indoors and out.With all the surrounding threats, what better person to prepare the public, than a team of internationally known cybersecurity experts? Nick Selby is a police detective specializing in sharing intelligence and busting cybercriminals. He knows how these crimes happen, who does them, and how to make your life safer. In The Cyber Attack Survival Manual he and a veritable brain trust of experts from the world of intelligence, digital currency, vehicle-hacking, and sophisticated crimeware, share the best techniques for everyone. This indispensable, step-by-step guide to cyber defense includes: Everyday security: How to keep your identity from being stolen, protect your kids, protect your cards and much more. Big Stories: Silk Road, Ashley Madison, FBI vs. Apple, WikiLeaks, BitCoins, and what they mean to individuals and society at large. Global issues: the NSA, how hackers can crash your car, and is China really planning to crash Google? Crucial to surviving the worst the Internet can throw at you, The Cyber Attack Survival Manual is the must-have book of the 21st century. Think you don’t need this book because, “I have nothing to hide”? Selby and Vescent, along with Eric Olson, Moeed Siddiui, and John Bear, show you why you’re wrong (everyone now has something to hide) - and how lack of security can endanger your finances, your safety, and your reputation.

    10 in stock

    £21.38

  • IDIC Designs, LLC Small Business Cybersecurity Planning: An Owner's

    1 in stock

    Book Synopsis

    1 in stock

    £6.61

  • The Online World, What You Think You Know and

    Silversmith Press The Online World, What You Think You Know and

    1 in stock

    Book Synopsis

    1 in stock

    £23.70

  • Data Protection Officer

    BCS Learning & Development Limited Data Protection Officer

    1 in stock

    Book SynopsisSince the role of Data Protection Officer (DPO) was designated under EU GDPR in 2018, the understanding of what the DPO role entails and how DPOs solve problems day-to-day continues to grow. This book provides a practical guide to the DPO role, encompassing the key activities you’ll need to manage to succeed in the role. Coverage includes data protection fundamentals and processes, understanding risk and relevant standards, frameworks and tools, with DPO tips also embedded throughout the book and case studies included to support practice-based learning.Trade ReviewStrikes a good balance between the regulation and the day to day role of the DPO – gives good practical guidance and references, and I think would make an ideal guide for those new into the DPO world. For those already undertaking the role, it helps to refocus, and provides some valuable information on key processes and procedures. -- Andy Searle * Group Data Protection Officer, Howden Group *We are only just entering the age of data. Its power to transform humanity through new sophistication of data processing is unprecedented and unlimited. But with that power comes responsibility, and the role of the data protection officer has become key to risk management, business improvement and indeed, the protection of the values of a democratic society. This practical guide, the first of its kind, offers fresh insight into how a DPO can marshal and hone their skills in the battle for compliance, ethics and business value, in any organisation. -- Jos Creese FBCS FSIM * CEO and Founder Creese Consulting Limited, past president, BCS *This book is the perfect manual for new DPOs to get started in the field, and for more seasoned privacy professionals as a reference guide. This book not only contains the essentials of data protection law, but also guides the reader through the daily activities of a DPO. The authors have done a great job in making a complex issue accessible. -- Paul Breitbarth * Director, EU Policy & Strategy - TrustArc Inc. & Senior Visiting Fellow - European Center on Privacy and Cybersecurity, Maastricht University *Both authors bring a wealth of experience to this ‘manual’ for Data Protection Officers. Written in a clear and helpful style, it’s jam-packed with tips and resources. I particularly liked the softer tips needed for a DPO to succeed, and the two DPO case studies at the end are very useful. It’s refreshing to read a data protection book that is *not* written in legalese. -- Tim Clements FBCS CITP FIP CIPP/E CIPM CIPT CDPSE CRISC CGEIT * Business Owner and Privacy Professional, Purpose and Means, Denmark *Johnssén’s and Edvardsen’s DPO handbook offers a concise mix of privacy law and data protection best practice aimed at the inhouse legal counsels and compliance professionals alike. The authors successfully balance informational writing and quality insights from their experiences as professionals in privacy leadership roles across European established companies and startups. What speaks to me is the many practical tips drawn from a corporate setting of what works and what does not and how successful organizations implement data protection compliance. -- Mathias Strand * Assistant General Counsel, Microsoft Western Europe *Table of Contents Data Protection Fundamentals The Data Protection Officer The Data Protection Processes Understanding Risk Review Your Organisation's Data Protection Practices Standards, Frameworks and Tools DPO Case Studies

    1 in stock

    £18.99

  • Data Protection and Compliance: Second edition

    BCS Learning & Development Limited Data Protection and Compliance: Second edition

    1 in stock

    Book SynopsisLarge-scale data loss and data privacy compliance breaches continue to make headline news, highlighting the need for stringent data protection policies, especially when personal or commercially sensitive information is at stake. While regulations and legislation exist to address these issues, how organisations can best tailor their compliance approaches to their own operational circumstances has remained an open question. The focus of this book is on operationalising a truly risk-based approach to data protection and compliance, beyond just emphasis on regulatory frameworks and legalistic compliance.Trade ReviewThe past few years has seen transformative changes in privacy, particularly in the UK, where GDPR and Brexit have created a host of new and potentially divergent data protection laws. In this book, Stewart and his team distill several decades of accumulated privacy, data protection and information governance experience and know-how into a guide that’s essential reading for data protection newcomers and experienced practitioners alike. -- Toby Hayes FBCS CITP FIP CIPP/E CIPMAn ideal resource and must read for new and seasoned privacy practitioners, Data Protection and Compliance provides a comprehensive overview of UK privacy requirements together with a practical focus on hot topics and emerging issues to watch out for. Uniquely, the book helps the reader understand how the breadth of the legal, policy and practical requirements all fit together with a contextual summary and tables, untangling the deluge of privacy data. -- Vivienne Artz OBE, NED, GLEIF, former CPO LSEG/Refinitiv/Thomson ReutersStewart Room and his team apply their extensive knowledge of data protection law and practice to provide an invaluable resource on data protection that rightly goes beyond interpreting and understanding the law, and unpacks what this means on the ground for compliance leaders and their advisors. Full of practical insights on governance, risk and compliance in the data protection domain, every DPO should have this on their desk! -- Stephen Deadman, VP, DPO, MetaIn a rapidly expanding digitised global economy, this book is a must-read and a go-to resource for legal and privacy professionals and all others interested in this field. Seeing data processing as a power for good, it contains a wealth of legal knowledge and practical insights into the key issues within the world of data protection. Highly recommended. -- Olivia Shirville CIPP/E CIPM, Lead Privacy Counsel (EMEA), AonOne of the biggest challenges to data protection law is how to effectively operationalise compliance and manage risk effectively within an evolving business structure. This book shows appreciation for this challenge and provides clear methods and concepts to address it. Operational landscape of data protection is summed up concisely and the concept of ‘Technology Reference Architecture’ linked to Privacy by Design, is incredibly insightful and relevant for businesses. I recommend this book for all data privacy practitioners, including in-house lawyers. -- Nargis Hassani, SolicitorData Protection and Compliance tackles a rapidly evolving and complex regulatory landscape, in an easy to understand and practical manner. With data driving the digital evolution for most organisations, the ability to comprehend and apply an appropriate compliance framework, with respect to people, processes and systems, is increasingly challenging. For those organisations putting data at the heart of their business strategy, this is a comprehensive resource, which pulls together a wealth of subject matter expertise, tried and tested practical compliance approaches and useful insights into the rationale behind the legislation. Highly recommended. -- Janine McKelvey, BT General Counsel - Digital & Innovation, BT Group Data Protection and Ethics OfficerThere are many misconceptions about what is and isn’t Data Protection, alongside the misinformation and scaremongering that arose in the early days of the GDPR. This book distils the considerable knowledge of its author and fellow contributors to deliver the key facts with clarity, supported with reference to landmark cases and regulatory texts. The chapter on Operational Data Protection is a timely reminder that Data Protection is people, paper (processes) and technology, and that all three are required to be effective. -- David Francis CIPP/E CIPT CIPM, Group Data Protection Officer, CanopiusStewart Room and his co-authors have certainly discovered the special sauce when seeking to create a book that will appeal to so many. Data Protection and Compliance, 2nd edition, is truly inimitable amongst a minefield of technical, legal, and business publications on data protection and privacy. Taking the reader on a journey through history to providing practical operational advice is not only educationally important but also invaluable to practitioners across the multidisciplinary spectrum, regardless of their sector or experience. -- Jane Wainwright, Director, Office of the Data Protection Officer, MetaThe 4th industrial revolution is upon us. Data Protection and Compliance provides a timely and thorough orientation of the regulatory landscape but then importantly turns to the pragmatic steps that must be taken to operationalise data protection. While the explanations of the laws are comprehensive, the book embraces the notion of data protection as a foundation for accelerating innovation – seminal reading for all data practitioners. -- Jason du Preez, CEO, PrivitarData Protection and Compliance provides a clear and practical guide to the operationalisation of the GDPR. It outlines a structured and measured approach that doesn’t focus on compliance for compliance sake, but encourages doing the right thing for the benefit of both the processing organisation and the data subject. It will serve as a useful reference manual on the bookshelf of any data protection professional. -- Lisa Townsend CIPP/E CIPP/US CIPM, DPO, Wella CompanyAn invaluable source of astute guidance and pragmatic advice from one of the leading practitioners in this area as he leads you through the world of data protection and compliance in a way that demystifies the complexities of the subject matter. This book justifies a spot on the bookshelves of anyone practicing the law of data protection or just seeking to understand this area and how it impacts your day-to-day life. -- John Skelton, General Counsel (Shared Specialist Services) & Group DPO, Centrica plcData Protection and Compliance is the book you need to bridge the gap between current legal developments and the practical steps companies can take to implement a successful data protection programme. The book offers something for everyone, whether you’re starting out in data protection or an experienced practitioner looking to fine tune your data protection compliance programme. -- Andrea Chard LLM LLB BA, Group Data Protection Officer, easyJetThis is your ‘one-stop shop’ resource for data protection guidance! This book effortlessly and coherently brings together the legislative and relevant case law on data protection into a well structured and easy to follow book. This is a must have for any data protection professional looking to operationalise and embed data protection compliance within an organisation through a risk-based approach. -- Harrison Barrett CIPM CIPP/E, Deputy Data Protection Officer, CanopiusCuts nicely through the “noise” of data protection regulation and developments, making this a uniquely comprehensive guide for any practitioner wanting to understand data protection practices better. The book provides detail where it needs to, and is succinct on more straightforward topics. The handy “tables” are a useful ready-reckoner that moves the fingertips to the nub of the topic in an instant, a winner for the busy privacy team! -- Sonal Khimji FIP CIPM CIPP/E, Director and Founder, Omnigov LimitedThis revised edition of a venerable classic is a welcome addition to the reference library of data protection professionals navigating the landscape of data protection in the UK, post-Brexit. -- Daragh O Brien FICS IAPP FIP, Managing Director, CastlebridgeData Protection and Compliance is an excellent resource for anyone working in a data protection role. It’s a rare text that balances theory, practical application and the social and political context in which the legal and regulatory framework is developing; key to designing and implementing an effective, risk-based approach to operationalising data protection. I’d highly recommend Data Protection and Compliance as a solid addition to anyone’s data protection bookshelf. -- Naureen Hussain, Director of Data Estate, Virgin Media O2An indispensable book for data protection practitioners. The text includes exceptional detail, historical context, and relatable, pragmatic insights for this vast and complicated field. The style is approachable and delivers accessible, common-sense tables and summaries that will be the go-to resource for those advising businesses. A particularly useful reference for in-house privacy professionals as we face the ‘regulatory bear market’ and the need to push privacy into the very fabric of our electronically mediated lives. Well done, Stewart and team! You have re-forged a much-needed tool for our increasingly complex world with this edition. -- Eric Heath, Chief Privacy Officer and Deputy General Counsel, AncestryAn excellent guide to data protection and compliance. Takes the reader through an easy to follow journey to achieve and maintain regulatory compliance. Naturally focuses on GDPR but keeps relevant to other international laws. Illustrates impact of Brexit, highlights issues of data sovereignty and discusses challenges with global data processing in an increasingly digital world. A great reference for ins and outs of data protection law and regulatory compliance, as well as for dealing with consequences of non-compliance and data breaches. -- Ashish Bhatt, Information and Data Management Officer, Queen’s University Kingston, ON Canada'Data Protection and Compliance: Second edition' is a must have companion for anyone involved in the data protection or compliance space. It begins with a useful introduction to data protection itself, the link into the General Data Protection Regulations (GDPR) and the Data Protection Act 2018 (DPA), providing an easy-to-read breakdown of the many complexities and challenges that organisations face when collecting, processing, and managing personal data. The book is full of useful guidance, advice, and good practice that all organisations should follow and is thoroughly recommended. -- Jim Fox CISM MBCS, Cyber & Information Security Risk Management ExecutiveA fascinating read, highly thought provoking and one that will be returned to as a phenomenal reference book. -- Angela McLoughlin MBCS, Business Analyst, Director Angel Analysis Ltd.Table of ContentsPart I - The Big Picture 1. Introduction to data protection 2. Introduction to the GDPR 3. Introduction to ePrivacy 4. Introduction to operational data protection Part II - Core Law 5. The principles of data protection 6. The rights of data subjects Part III - Operating Internationally 7. National supervision within an international framework 8. Transferring data between the GDPR landmass and third countries 9. Data protection beyond the GDPR landmass Part IV - Delivery 10. Mechanisms to support operational compliance 11. Programmatic approaches for delivering data protection by design and default 12. Being accountable for records of processing, legitimate interests and risk management 13. 'The journey to code' Part V - Adverse Scrutiny 14. How to prepare for the risks of challenge and 'adverse scrutiny' 15. Complaints, rights requests, regulatory investigations and litigation 16. Regulatory action 17. Handling personal data breaches

    1 in stock

    £44.99

  • Data Strategy: From definition to execution

    BCS Learning & Development Limited Data Strategy: From definition to execution

    1 in stock

    Book SynopsisData can be a cost for some organizations, but for those who succeed, it is a way to drive profitability, customer loyalty, and outperform others in their field. A well thought out, fit-for-purpose data strategy is vital for every modern data-driven organisation – public or private sector. This book is your essential guide to planning, developing and implementing a data strategy, presenting a framework which takes you from strategy definition to successful strategy delivery and execution with support and engagement from stakeholders. It covers vital topics such as data-driven business transformation, change enablers, benefits realisation and measurement. Written by an experienced practitioner with over 30 years in the field, this book guides the reader through the complexity of working across an organisation to achieve a successful outcome. Whether you’re just starting to consider a data strategy or are looking to improve your existing approach, this book is a valuable resource for any modern data-driven organization. Offers a structured guide for those embarking on a data strategy from definition to a successful implementation. Incorporates insights from a model that has been developed through a highly successful workshop delivered to many practitioners across the globe. Provides case studies, example scenarios and reader questions throughout the book are designed to stimulate real-world thinking and help you put the framework into practice in the context of your own organisation. Trade ReviewThis is the most comprehensive, practical and useful guide to data strategy that I have come across. I have developed a few data strategies and would have found it easier and produced a better strategy if I had read Ian Wallis' book first. This is a book that is informed by deep, real-world experience of data strategy and the many change challenges involved. It has all the frameworks, tools and thinking you could need, laid out in a clear and readable way. For anyone involved in data or digital strategies it is a must read. -- Tony Gosling, Chief Digital Officer, RSBG UK GroupWhether you are new to the area or just an old dog learning new tricks, this book offers vast experience, anecdotes and learnings from the front line for you to apply in the modern era of data. There is just so much to learn and revisit, e.g. on defensive vs offensive, dynamic data strategy, secret to success in R.A.V.E. – but most of all it’s a journey not a destination. -- Graeme McDermott, Chief Data Officer, Tempcover'Data Strategy: From definition to execution' is an excellent resource for newbies to data strategy and more seasoned professionals alike. It provides a well-organised, clear approach to developing a data strategy through its complete life cycle, alongside the potential pitfalls of getting a strategy from paper into reality. The author’s style is engaging and well thought out, clearly coming from a place of significant experience – if you’re writing a data strategy (or if you’re planning to) I heartily recommend this book, you’re bound to learn something useful! -- Jon Alvis, Data Governance SME, Member of BSI AMT/004 Group (for ISO 8000)This really is everything you need to know about writing and delivering a data strategy! I found it filled with great analogies and stories from across the public and private sector. With the ten top things to remember at the end of every chapter, it really helped to summarise the key points. I particularly liked that it covered all the salient points of a data strategy, from control to exploitation, from strategy development to implementation and everything in between. A must read for those embarking on their data strategy journey! -- Lisa Allen, Vice Chair, DAMA UKEssential reading for anyone starting out on implementing, or reviewing a current data strategy. This book provides insights the author has gained from many years implementing data strategies across many enterprises. Providing a through exposition on the do’s and don'ts, highlighting the importance of having a measurable implementation plan, and that the strategy needs to be linked to enterprise business goals.. This is a valuable guide and a perfect antidote for those who operate in organisations where ignorance masquerades as knowledge! -- Godfrey Morgan, Head of Strategy & Governance, People Analytics & Insight, CPO, HMRCIan Wallis has produced an excellent guide to crafting and executing a data strategy. It is eminently readable, always relatable but crucially entirely practical in its approach to enabling Data Strategists - whether that is your job title or not - to plan, produce and implement meaningful data strategies in any organisation. Ian guides the reader through the steps needed to get senior level buy in, tell the story of the strategy, ground the plan in reality and be positioned to secure backing and resource for the successful creation of a fully formed strategy. All with a view to see your business extract value from one of its greatest assets – data. The author's practical approach to implementation, his real life experiences, but only occasional references to what might be seen as technical speak, brings this thinking to life making this a very digestible guide. The thoughtful ‘top ten takeaways’ provide very handy references points and reminders at the end of each chapter, and his work is both an excellent standalone learning piece as well as a ‘return to’ check in guide. It’s a great read and he knows his stuff. -- Colin Grieves, Managing Director, UK&I at Experian, Marketing ServicesTo be a leader in a sector and across multiple markets it is essential to have a functional data strategy. However, the line between success and failure in defining and implementing such strategy is becoming increasingly blurred due to the complexity of the topic. Data Strategy is your guide to avoid the noise and to focus on the areas that really can make a difference to setting up an operational and effective data strategy. -- Dr Marzia Bolpagni, Head of BIM International, Associate Director, MaceWhether new to developing a data strategy or looking to enhance an existing one this book is an essential read. It offers unique insight to the author’s extensive experience combined with relevant reference material to help direct personal research. I found the takeaway points at the end of each chapter particularly useful. It is helping to define an approach and make the challenge of updating the data strategy achievable. -- Karen Alford FCCA, FCRM Manager, Digital Asset Data and Information, Environment AgencyThis guide on how to plan, craft and execute a data strategy is outstanding in its level of detail and completeness. The author weaves his extensive and varied experience as a data practitioner into the fabric of theory to create a wonderful, practical, 'how to' guide. He takes you through the early planning stages, points out the pitfalls to avoid, shares some highly useful tips (e.g. CLEAR) and shows you how to navigate the rocky waters to implementation and the measurement of value of your data strategy. Whether you are creating a data strategy for the first time or looking to be even better next time, this is a must read! -- Glenn Waine, VP / Head of Data Science and Analytics, Gale PartnersI read this book cover-to-cover in one day. Why? It's the first to fully weave the fundamentals of strategy and cultural change into the 'technical' aspects of creating and executing on a well thought out data strategy. A must-read for all who desire tangible, long-term results from the use of data in decision-making throughout an enterprise. Masterfully written, Ian! -- Lori L. Silverman, CEO/Founder & Shift Strategist, Partners for Progress; co-author, 'Business Storytelling for Dummies'Table of Contents Introduction: Why is a Strategy Relevant Today? Positioning the Data Strategy Setting the Scope of the Data Strategy Composing the Data Strategy Creating a Route Map Content, Structure and Alignment Communications, Culture and Change Readiness Executing the Strategy: Part 1, The Plan Executing the Strategy: Part 2, Delivery Flexibility in Execution Assessing Value in Data Strategy Implementation Data Strategy: Completing the Journey from Definition to Execution

    1 in stock

    £28.49

  • Information Risk Management: A practitioner's

    BCS Learning & Development Limited Information Risk Management: A practitioner's

    1 in stock

    Book SynopsisInformation risk management (IRM) is about identifying, assessing, prioritising and treating risks to keep information secure and available. This accessible book is a practical guide to understanding the principles of IRM and developing a strategic approach to an IRM programme. It is the only textbook for the BCS Practitioner Certificate in Information Risk Management and this new edition reflects recent changes to the syllabus and to the wider discipline.Trade ReviewInformation risk management is an integral part of every business and the author presents its lifecycle in an easy-to-follow and well-organised format with real-life examples, tools and templates. I highly recommend the book also as a valuable reference for legislation, standards, methodologies and frameworks for risk professionals to follow. -- Sema Yuce CISM CRISC CISA, Director at Truth ISC Technology and Security Consultancy Ltd.This book is essential reading for any risk management practitioner. The author’s many years of practical experience in the subject shine through, it is clearly written and easy to follow. The book sets out the best approach when identifying and evaluating risk and the factors to consider when treating it in a pragmatic way. The examples give context and aid understanding and the appendices are comprehensive and a go-to source of useful information on risk. Highly recommended, this will be on my bookshelf. -- David Alexander, Information Security Group, Royal Holloway, University of LondonThis book should be mandatory reading within any business to understand the scale and scope of the landscape within which their information security and assurance professionals need to operate. -- Andrea Simmons PhD FBCS CITP CISM CISSP MA CIPP/E CIPMTable of Contents1. The need for information risk management 2. Review of information security fundamentals 3. The information risk management programme 4. Risk identification 5. Threat and vulnerability assessment 6. Risk analysis and risk evaluation 7. Risk treatment 8. Risk reporting and presentation 9. Communication, consultation, monitoring and review 10. The NCSC Certified Certification scheme 11. HMG Security-related documents 12. Appendix A – Taxonomies and descriptions 13. Appendix B – Typical threats and hazards 14. Appendix C – Typical vulnerabilities 15. Appendix D – Information Risk Controls 16. Appendix E – Methodologies, guidelines and tools 17. Appendix F - Templates 18. Appendix G – HMG cyber security guidelines 19. References and further reading

    1 in stock

    £42.74

  • The Snowden Files: The Inside Story of the

    Guardian Faber Publishing The Snowden Files: The Inside Story of the

    1 in stock

    Book SynopsisIt began with an unsigned email: "I am a senior member of the intelligence community". What followed was the most spectacular intelligence breach ever, brought about by one extraordinary man, Edward Snowden. The consequences have shaken the leaders of nations worldwide, from Obama to Cameron, to the presidents of Brazil, France, and Indonesia, and the chancellor of Germany. Edward Snowden, a young computer genius working for America's National Security Agency, blew the whistle on the way this frighteningly powerful organisation uses new technology to spy on the entire planet. The spies call it "mastering the internet". Others call it the death of individual privacy. This is the inside story of Snowden's deeds and the journalists who faced down pressure from the US and UK governments to break a remarkable scoop. Snowden's story reads like a globe-trotting thriller, from the day he left his glamorous girlfriend in Hawaii, carrying a hard drive full of secrets, to the weeks of secret-spilling in Hong Kong and his battle for asylum. Now stuck in Moscow, a uniquely hunted man, he faces US espionage charges and an uncertain future in exile. What drove Snowden to sacrifice himself? Award-winning Guardian journalist Luke Harding asks the question which should trouble every citizen of the internet age. Luke Harding's other books include Wikileaks: Inside Julian Assange's War on Secrecy and Mafia State: How One Reporter Became an Enemy of the Brutal New Russia.

    1 in stock

    £11.69

  • The Fight for Privacy: Protecting Dignity,

    Vintage Publishing The Fight for Privacy: Protecting Dignity,

    1 in stock

    Book Synopsis'Devastating and urgent, this book could not be more timely' Caroline Criado Perez, award-winning and bestselling author of Invisible WomenDanielle Citron takes the conversation about technology and privacy out of the boardrooms and op-eds to reach readers where we are - in our bathrooms and bedrooms; with our families and our lovers; in all the parts of our lives we assume are untouchable - and shows us that privacy, as we think we know it, is largely already gone.The boundary that once protected our intimate lives from outside interests is an artefact of the twentieth century. In the twenty-first, we have embraced a vast array of technology that enables constant access and surveillance of the most private aspects of our lives. From non-consensual pornography, to online extortion, to the sale of our data for profit, we are vulnerable to abuse -- and our laws have failed miserably to keep up.With vivid examples drawn from interviews with victims, activists and lawmakers from around the world, The Fight for Privacy reveals the threat we face and argues urgently and forcefully for a reassessment of privacy as a human right. As a legal scholar and expert, Danielle Citron is the perfect person to show us the way to a happier, better protected future.Trade ReviewIt's so refreshing to read an argument for privacy that centres women - Citron presents a crucial analysis that has been sorely missing from this important debate until now. Devastating and urgent, this book could not be more timely -- Caroline Criado Perez, author of Invisible WomenThe Fight for Privacy is nothing less than the battle to keep our intimate, private selves free from exploitation. A vitally important book -- Cordelia Fine, author of A Mind Of Its OwnDanielle Keats Citron has given us a crucial book for understanding the crisis of privacy invasion, and the unrelenting damage that comes from intimate, nonconsensual surveillance. This book should be required reading for every policy maker, parent, or person who wants to reimagine privacy protections. If you care about anyone, anywhere, you should read this book -- Safiya Noble, author of Algorithms of OppressionProfessor Citron - the brilliant, ground-breaking law professor and civil rights advocate - continues her important and impactful work in helping governments, society, and the titans of the technology sector to understand that our collective failure to protect our intimate privacy amounts to a massive failing to protect our basic civil rights. Through heart-breaking accounts form victims, a careful and detailed exposition of how a range of technologies are being weaponized against us, and a detailed review of the ethical and legal landscape governing these issues, The Fight for Privacy is a must read by anyone who cares about civil rights -- Hany Farid, UC BerkeleyThis is a terrific, though terrifying, exposé about how often our intimate activities and intimate information about us end up on social media. Professor Danielle Citron makes a compelling case for a 'right to intimate privacy' under the law. This beautifully written book deserves a wide audience and hopefully will inspire needed meaningful change in the law * Erwin Chemerinsky, Dean and Jesse H. Choper Distinguished Professor of Law, University of California, Berkeley School of Law *When your wristwatch monitors your location and your health status and your window-shopping and purchases generate information sold and combined with other information about you, the accumulation of 'little assents' produce constant surveillance, risks of manipulation, and the elimination of privacy. Danielle Citron's expert and engaging treatment of 'technology-enabled privacy violations' shows why victims, digital platforms, and legislators alike turn to her for advice and for fights to reclaim privacy morally, legally, and practically -- Martha Minow, former Dean, Harvard Law SchoolPrivacy is politics, and if we want it back we must fight for it. In this open-hearted and down-to-earth book Danielle Citron offers reasons for optimism among the ruins of our once cherished privacy. She details the devastating effects of the loss of 'intimate privacy' and argues that new rights and laws for the digital age are both long overdue and within our grasp. Lawmakers and citizens alike, this book is for you -- Shoshana Zuboff, author of The Age of Surveillance Capitalism, Professor Emeritus, Harvard Business SchoolDanielle Citron's book makes privacy undeniably and uncomfortably personal, shining a light on the ways technology is used to pry open the most intimate corners of our lives. Hers is a powerful and urgent manifesto for the protection of "intimate privacy" in the United States and beyond -- Susie Alegre, author of Freedom to Think, international human rights lawyerThe Fight for Privacy is a tour de force. Arguing convincingly that our intimate privacy is a moral necessity being eroded in frightening and accelerating ways, Citron offers trenchant clarity and lucid hope for achieving justice in our digital future. A must read -- Kate Manne, author of Entitled: How Male Privilege Hurts Women

    1 in stock

    £17.09

  • Data Protection: for voluntary organisations

    Directory of Social Change Data Protection: for voluntary organisations

    15 in stock

    Book SynopsisVital to the effective functioning of voluntary organisations is the trust of people - the beneficiaries, clients, regulators, donors, volunteers and paid staff. Open, fair and well-managed data protection practice is not just desirable in helping to achieve that trust, but essential. Get it wrong and there is reputational damage and costs attached. Data Protection for voluntary organisations will enable you to set a shining example of best practice and also comply with UK data legislation and the General Data Protection Regulation (GDPR) in force since 2018. This book will help you: * Understand the key principles and elements of data protection * Recognise your main responsibilities as a data controller * Distinguish when you can and can't retain data * Appreciate what the rights of the data subject are Who is this book for? A must-read for anyone in the UK voluntary sector who wants to get beyond tick-box data management. Invaluable to data managers or those who handle personal information such as IT, personnel, marketing and fundraising departments. For professional advisers, and academics it will also offers a valuable summary drawing out key data protection points by examining and interpreting the primary legislation.Trade Review'I have worked with Paul for many years now and I have always appreciated his ability to share his enthusiasm for this complex subject and how it applies to our sector. Written in a very understandable and user-friendly way, this book is truly accessible.' Jeni Woods, Quality Manager, Grace Eyre Foundation --------------------------------‘A detailed and methodical approach to data protection. This comprehensive guide is an accessible source of information filled with valid and relevant examples. I found it a particularly great help in getting to grips with specific areas, such as consent and contracts.’ Kirsty Cunningham, Head of Fundraising, St Martin-in-the-Fields Charity‘------------------There are not many people within the charity sector who are specialists in data protection. Paul uses simple, straightforward language to cover all key aspects of this complex but vitally important subject. Brilliantly practical!’ Peter Dean, Director of Finance, Riding for the Disabled Association

    15 in stock

    £27.00

  • Surveillance Valley: The Secret Military History

    Icon Books Surveillance Valley: The Secret Military History

    10 in stock

    Book Synopsis** Featured as a Guardian Long Read **'[A] fast-paced, myth busting exposé' Max Blumenthal, author of The Management of Savagery'Contentious... forceful... salutary' The New YorkerEVERYTHING WE HAVE BEEN TOLD ABOUT THE DEMOCRATIC NATURE OF THE INTERNET IS A MARKETING PLOY.As the Cambridge Analytica scandal has shown, private corporations consider it their right to use our data (and by extension, us) which ever way they see fit. Tempted by their appealing organisational and diagnostic tools, we have allowed private internet corporations access to the most intimate corners of our lives.But the internet was developed, from the outset, as a weapon.Looking at the hidden origins of many internet corporations and platforms, Levine shows that this is a function, not a bug of the online experience. Conceived as a surveillance tool by ARPA to control insurgents in the Vietnam War, the internet is now essential to our lives. This book investigates the troubling and unavoidable truth of its history and the unfathomable power of the corporations who now more or less own it.Without this book, your picture of contemporary society will be missing an essential piece of the puzzle.'A masterful job of research and reporting about the military origins of the 'world wide web' and how its essential nature has not changed in the years since its creation during the Cold War.' - Tim Shorrock, author of Spies For HireTrade ReviewContentious... forceful... salutary * The New Yorker *'Surveillance Valley is perhaps one of the most deeply disturbing books of the year. It leaves no illusions intact ...' -- Scroll.inGripping and hugely readable, Surveillance Valley is an essential book which painstakingly pieces together the complex origins, and current role, of a technology that has become so ingrained in our lives -- All About History

    10 in stock

    £9.99

  • Research Handbook on the Law of Virtual and

    Edward Elgar Publishing Ltd Research Handbook on the Law of Virtual and

    15 in stock

    Book SynopsisThe proliferation of virtual and augmented reality technologies into society raise significant questions for judges, legal institutions, and policy makers. For example, when should activities that occur in virtual worlds, or virtual images that are projected into real space (that is, augmented reality), count as protected First Amendment 'speech'? When should they instead count as a nuisance or trespass? Under what circumstances would the copying of virtual images infringe intellectual property laws, or the output of intelligent virtual avatars be patentable inventions or works of authorship eligible for copyright? And when should a person (or computer) face legal consequences for allegedly harmful virtual acts?The Research Handbook on the Law of Virtual and Augmented Reality addresses these questions and others, drawing upon free speech doctrine, criminal law, the law of data protection and privacy, and of jurisdiction, as well as upon potential legal rights for increasingly intelligent virtual avatars in VR worlds. The Handbook offers a comprehensive look at challenges to various legal doctrines raised by the emergence - and increasing use of - virtual and augmented reality worlds, and at how existing law in the USA, Europe, and other jurisdictions might apply to these emerging technologies, or evolve to address them. It also considers what legal questions about virtual and augmented reality are likely to be important, not just for judges and legal scholars, but also for the established businesses and start-ups that wish to make use of, and help shape, these important new technologies.This comprehensive Research Handbook will be an invaluable reference to those looking to keep pace with the dynamic field of virtual and augmented reality, including students and researchers studying intellectual property law as well as legal practitioners, computer scientists, engineers, game designers, and business owners.Contributors include: W. Barfield, P.S. Berman, M.J. Blitz, S.J. Blodgett-Ford, J. Danaher, W. Erlank, J.A.T. Fairfield, J. Garon, G. Hallevy, B. Lewis, H.Y.F. Lim, C. Nwaneri, S.R. Peppet, M. Risch, A.L. Rossow, J. Russo, M. Supponen, A.M. Underhill, B.D. Wassom, A. Williams, G. YadinTrade Review'The Research Handbook on the Law or Virtual and Augmented Reality is an extraordinary contribution to the scholarship in this rapidly developing area. The work boasts an impressive list of contributors, and the depth and breadth of topics is quite striking. One might think that such a work would be of interest primarily to lawyers involved in the computer game industry, or in law and technology. But this area of law now reaches into daily life, and both practicing attorneys and scholars in the areas of tort law (defamation, privacy law, right of publicity), constitutional law, intellectual property, criminal law, and business law will also find much to interest them, and a great deal of insight to assist them in analyzing the very real questions that this area of law now presents us. Recommended.' --Christine Corcos, Louisiana State University and A&M, USThe Research Handbook on the Law of Virtual and Augmented Reality offers an all-encompassing view on this field of legal research, containing 20 chapters from scholars in US, Asia, and the European Union, that explore how these jurisdictions might apply to VA/R-technologies and apps. Woodrow Barfield and Marc Blitz have edited an outstanding volume that should be read by all, including students and policy makers.' --Ugo Pagallo, Università degli Studi di Torino, ItalyTable of ContentsContents: Section I. Introduction to the Law of Virtual and Augmented Reality 1. The Law of Virtual Reality and Increasingly Smart Virtual Avatars Woodrow Barfield and Alexander Williams 2. Starting Up in Virtual Reality: Examining Virtual Reality as a Space for Innovation Crystal Nwaneri 3. Virtual Rule of Law Michael Risch 4. Mixed Reality: How the Laws of Virtual Worlds Govern Everyday Life Josh A.T. Fairfield Part II Intellectual Property Law 5. Virtual Copyright Michael Risch and Jack Russo 6. Trademark and the Right of Publicity in Augmented Reality Brian D. Wassom, Amber M. Underhill and Andrew L. Rossow 7. Virtual Trade Dress Jack Russo Part III Issues of Constitutional and Criminal Law 8. First Amendment, Video Games and Virtual Marc Jonathan Blitz 9. Virtual Reality, Haptics, and First Amendment Protection for Sexual Sensation Brooke Lewis 10. Augmented and Virtual Reality, Freedom of Expression, and the Personalization of Public Space Marc Jonathan Blitz 11. Beyond Unauthorized Access: Laws of Virtual Reality Hacking Gilad Yadin 12. The Law and Ethics of Virtual Sexual Assault John Danaher 13. Criminal Liability for Intellectual Property Offenses of Artificially Intelligent Entities in Virtual and Augmented Reality Environments Gabriel Hallevy Part IV Applying the Law to Different Applications of Virtual and Augmented Reality 14. Advertising Legal Issues in Virtual and Augmented Reality S. J. Blodgett- Ford, Woodrow Barfield and Alexander Williams 15. Data Privacy Legal Issues in Virtual and Augmented Reality Advertising S. J. Blodgett- Ford and Mirjam Supponen 16. Reordering the Chaos of the Virtual Arena: Harmonizing Law and Framing Collective Bargaining for Avatar Actors and Digital Athletes Jon Garon Part V Contract, Property Law, and Jurisdiction 17. Property Rights in Virtual and Augmented Reality: Second Life Versus Pokémon Go Hannah YeeFen LIM 18. Freedom of Contract in Augmented Reality Scott R. Peppet 19. Law and Property in Virtual Worlds Wian Erlank 20. Legal Jurisdiction and the Deterritorialization of Social Life Paul Schiff Berman Index

    15 in stock

    £255.00

  • Identified, Tracked, and Profiled: The Politics

    Edward Elgar Publishing Ltd Identified, Tracked, and Profiled: The Politics

    15 in stock

    Book SynopsisRevealing the politics underlying the rapid globalization of facial recognition technology (FRT), this topical book provides a cutting-edge, critical analysis of the expanding global market for FRT, and the rise of the transnational social movement that opposes it.With the use of FRT for policing, surveillance, and business steadily increasing, this book provides a timely examination of both the benefits of FRT, and the threats it poses to privacy rights, human rights, and civil liberties. Interviews with analysts and activists with expertise in FRT find that the anti-FRT movement is highly uneven, with disproportionate influence in Western democracies and relatively little influence in authoritarian states and low-income countries in the developing world. Through a global analysis of the uptake and regulation of FRT, chapters create a holistic understanding of the politics behind this technology. Concluding with a look towards the future prospects of FRT in the face of the growing size, reach, and power of its opposition, the book reflects more broadly on the power of transnational social movements and civil society activism to prevent the globalization and normalization of new technologies.A visionary exploration of FRT, this book will be invaluable to students and scholars of politics and policy, alongside activists, stakeholders, and policy makers interested in the growing power of social movements to resist new technology.Trade Review‘Facial recognition technologies (FRT) are spreading rapidly worldwide, and have become embedded in numerous everyday government and corporate practices. This widespread adoption has prompted extensive criticism, particularly from civil society groups concerned about human rights abuses and discriminatory impacts for marginalized and vulnerable communities. In Identified, Tracked, and Profiled, Peter Dauvergne provides a much-needed and thoroughly comprehensive overview of the regulatory issues and policy disputes around FRT. This book is essential reading for those interested in political contests over our changing digital landscape.’ -- Ron Deibert, University of Toronto, CanadaTable of ContentsContents: PART I INTRODUCTION 1. Introducing facial recognition technology 2. Resisting the normalization of facial recognition PART II REINING IN FACIAL RECOGNITION TECHNOLOGY 3. The movement to oppose facial recognition 4. The politics of facial recognition bans in the United States 5. Regulating facial recognition in the United States 6. Rising global opposition to face surveillance PART III THE GLOBAL POLITICAL ECONOMY OF FACIAL RECOGNITION 7. The corporate politics of facial recognition 8. The everyday politics of facial recognition in China 9. The globalization of facial recognition technology PART IV CONCLUSIONS 10. The future of facial recognition technology Appendix: interviews Index

    15 in stock

    £69.35

  • The Politics of Personal Information:

    Berghahn Books The Politics of Personal Information:

    1 in stock

    Book Synopsis In the 1970s and 1980s West Germany was a pioneer in both the use of the new information technologies for population surveillance and the adoption of privacy protection legislation. During this era of cultural change and political polarization, the expansion, bureaucratization, and computerization of population surveillance disrupted the norms that had governed the exchange and use of personal information in earlier decades and gave rise to a set of distinctly postindustrial social conflicts centered on the use of personal information as a means of social governance in the welfare state. Combining vast archival research with a groundbreaking theoretical analysis, this book gives a definitive account of the politics of personal information in West Germany at the dawn of the information society.Trade Review “This is an important book crafted by a master of intellectual history. It will be widely consumed and discussed among German historians and a wide range of intellectuals interested in the origins of the modern surveillance state. Essential.” • Choice “This book unites disparate episodes in West German history into a careful and illuminating exploration of Germans’ attitudes toward the privacy of their own personal data, the changing implications for those attitudes as technological capacity expands, and the very conception of governmentality as the state inescapably can see more and more into the intimate lives of its citizens.” • Kenneth Ledford, Case Western Reserve University “Frohman has done a truly masterful job of capturing the debates around privacy and surveillance, demonstrating with the help of the West German case how these concepts have evolved alongside information technologies. For those looking for a path forward, a way out of the panopticon or Big Brother’s grasp, the book’s most vital contribution is its use of privacy not only to theorize the information state but to actively contest the new forms of power that state pursues.” • Karrin Hanshew, Michigan State UniversityTable of Contents List of Illustrations List of Abbreviations Acknowledgements Introduction: Surveillance, Privacy, and Power in the Information Society Part I: Population Registration, Power, and Privacy Chapter 1. The Federal Population Registration, Administrative Power, and the Politicization of Privacy Part II: Negotiating Communicative Norms in the Computer Age: The Information Question and the Federal Privacy Protection Law, 1970–1990 Chapter 2. Rethinking Privacy in the Age of the Mainframe: From the Private Sphere to Informational Self-Determination Chapter 3. The Legislative Path to the Federal Privacy Protection Law, 1970-77 Chapter 4. “Only Sheep Let Themselves Be Counted”: The 1983/87 Census Boycotts, the Census Decision, and the Question of Statistical Governance Chapter 5. Out of the Frying Pan and into the Fire: The Census Decision, Party Politics, and the Revision of the Federal Privacy Protection Law Part III: The Precautionary Turn: Security, Surveillance, and the Changing Nature of the State Chapter 6. Paper, Power, and Policing: The Federal Criminal Police on the Cusp of the Computer Age Chapter 7. The Quest for Security and the Meaning of Privacy: Computers, Networks, and the Securitization of Space, Place, Movement, and Identity Chapter 8. Mapping the Radical Milieu: Terrorism, Counterterrorism, and the New Police Surveillance Chapter 9. The Reform of Police Law: Datenschutz, the Defense of Law, and the Debate over Precautionary Surveillance Conclusion Selected Bibliography

    1 in stock

    £32.40

  • The Little Black Book of Data and Democracy: From

    15 in stock

    £9.49

  • The Little Black Book of Social Media

    Byline Books The Little Black Book of Social Media

    15 in stock

    Book Synopsis

    15 in stock

    £9.49

  • CISA – Certified Information Systems Auditor

    Packt Publishing Limited CISA – Certified Information Systems Auditor

    2 in stock

    Book SynopsisThis CISA study guide is for those interested in achieving CISA certification and provides complete coverage of ISACA’s latest CISA Review Manual (2019) with practical examples and over 850 exam-oriented practice questionsKey Features Gain tactical skills in auditing, control, and security to pass the CISA examination Get up to speed with auditing business IT systems Increase your value to organizations and be at the forefront of an evolving business landscape by achieving CISA certification Book DescriptionAre you looking to prepare for the CISA exam and understand the roles and responsibilities of an information systems (IS) auditor? The CISA - Certified Information Systems Auditor Study Guide is here to help you get started with CISA exam prep. This book covers all the five CISA domains in detail to help you pass the exam. You’ll start by getting up and running with the practical aspects of an information systems audit. The book then shows you how to govern and manage IT, before getting you up to speed with acquiring information systems. As you progress, you’ll gain knowledge of information systems operations and understand how to maintain business resilience, which will help you tackle various real-world business problems. Finally, you’ll be able to assist your organization in effectively protecting and controlling information systems with IT audit standards. By the end of this CISA book, you'll not only have covered the essential concepts and techniques you need to know to pass the CISA certification exam but also have the ability to apply them in the real world.What you will learn Understand the information systems auditing process Get to grips with IT governance and management Gain knowledge of information systems acquisition Assist your organization in protecting and controlling information systems with IT audit standards Understand information systems operations and how to ensure business resilience Evaluate your organization’s security policies, standards, and procedures to meet its objectives Who this book is forThis CISA exam study guide is designed for those with a non-technical background who are interested in achieving CISA certification and are currently employed or looking to gain employment in IT audit and security management positions.Table of ContentsTable of Contents Audit Planning Audit Execution IT Governance IT Management Information Systems Acquisition and Development Information Systems Implementation Information System Operations Business Resilience Information Asset Security and Control Network Security and Control Public Key Cryptography and Other Emerging Technologies Security Event Management

    2 in stock

    £31.49

  • The Data Governance Imperative: A Business Strategy for Corporate Data

    IT Governance Publishing The Data Governance Imperative: A Business Strategy for Corporate Data

    15 in stock

    Book SynopsisAttention to corporate information has never been more important than now. The ability to generate accurate business intelligence, accurate financial reports and to understand your business relies on better processes and personal commitment to clean data. Every byte of data that resides inside your company, and some that resides outside its walls, has the potential to make you stronger by giving you the agility, speed and intelligence that none of your competitors yet have. Data governance is the term given to changing the hearts and minds of your company to see the value of such information quality. The Data Governance Imperative is a business person's view of data governance. This practical book covers both strategies and tactics around managing a data governance initiative. The author, Steve Sarsfield, works for a major enterprise software company and is a leading expert in data quality and data governance, focusing on the business perspectives that are important to data champions, front-office employees, and executives. Steve runs an award-winning and world-recognized blog called the Data Governance and Data Quality Insider, offering practical wisdom.Table of ContentsChapter 1: The need for Data Governance 20 Sins of the Past 21 Where Are The Metrics? 24 Unnecessary Complexity 26 ETL and Data Warehouse 27 Building More Efficiency 29 Reducing Risk and Improving Compliance 36 The Value of an Acquisition 30 Decisions Based on Gut 33 Data Governance and Being Green 33 Why Data Governance? 36 Who Needs Data Governance? 38 Chapter 2: What is data governance? 40 How do different groups see data governance? 40 Defining Data Governance by its Benefits 45 Chapter 3: Defining Data Governance Success 50 Generic Data Governance Success Factors 50 Specific Data Governance Success 55 Chapter 4: Getting Funded for IQ projects 57 The Data Champion 57 Return on Investment 61 Picking the Right Projects 62 Building Credibility 64 Leveraging a Crisis 64 Conversation Starters 65 The 'Do Nothing' Option 70 Overcoming Objections to Data Governance 71 Chapter 5: People - What does a data governance team look like? 77 Data Governance Roles and Responsibilities 77 Data Governance Council 80 Team Performance Goals 82 Methodologies 83 Chapter 6: Painting the Picture 86 Mission Statement 86 Communication Strategies 87 Having Productive Meetings 88 Getting the Data 93 Data Governance Workshops 94 Building a Useful Data Quality Scorecard 95 Views of Data Quality Scorecard 96 Which Key Metrics Do I Track? 97 chapter 7 - Fixing your data 114 Causes and Actions 114 Information Quality and Data Intensive Projects 121 The Six Phases of a Data Intensive Project 121 Phase One: Project Preparation 122 Phase Two: Making the Blueprint 126 Phase Three: Implement 131 Phase Four: Rollout Preparation 133 Phase Five: Go Live 136 Phase Six: Maintain 139 Chapter 8: technologies that support data governance 141 Types of Data Governance Technologies 142 PREVENTATIVE 142 Diagnostic and Health 145 Infrastructure 149 Enrichment 154 Chapter 9: WHAT'S NEXT 155 ITG Resources 157

    15 in stock

    £35.29

  • Basic Politics of Movement Security: A Talk of Security with J. Sakai & G20 Repression & Infiltration in Toronto: An Interview with Mandy Hiscocks

    15 in stock

    £6.62

  • A Simpler Guide to Online Security for Everyone:

    1 in stock

    £9.05

  • We See It All: liberty and justice in the age of

    Scribe Publications We See It All: liberty and justice in the age of

    5 in stock

    Book SynopsisWhat are citizens of a free country willing to tolerate in the name of public safety? Jon Fasman journeys from the US to London — one of the most heavily surveilled cities on earth — to China and beyond, to expose the legal, political, and moral issues surrounding how the state uses surveillance technology. Automatic licence-plate readers allow police to amass a granular record of where people go, when, and for how long. Drones give the state eyes — and possibly weapons — in the skies. Algorithms purport to predict where and when crime will occur, and how big a risk a suspect has of reoffending. Specially designed tools can crack a device’s encryption keys, rending all privacy protections useless. And facial recognition technology poses perhaps a more dire and lasting threat than any other form of surveillance. Jon Fasman examines how these technologies help police do their jobs, and what their use means for our privacy rights and civil liberties, exploring vital questions, such as: Should we expect to be tracked and filmed whenever we leave our homes? Should the state have access to all of the data we generate? Should private companies? What might happen if all of these technologies are combined and put in the hands of a government with scant regard for its citizens’ civil liberties? Through on-the-ground reporting and vivid storytelling, Fasman explores one of the most urgent issues of our time.Trade Review‘[A] deeply reported and sometimes chilling look at mass surveillance technologies in the American justice system … Fasman avoids alarmism while making a strong case for greater public awareness and tighter regulations around these technologies. This illuminating account issues an essential warning about a rising threat to America’s civil liberties.’ * Publishers Weekly *‘A cogent critique of the age of ubiquitous surveillance … An urgent examination of police-state intrusions on the privacy of lawful and law-abiding citizens.’ * Kirkus Reviews *‘If you want to understand the stakes and the landscape of surveillance in your life — yes, yours right now — We See It All is an outstanding place to start. Fasman walks his readers through a meticulously balanced review of how police, corporations, local businesses, governments, and ordinary people conspire to exchange real privacy for the feeling of safety. An evocative storyteller, Fasman lays out his case that, because government regulation lags impossibly behind technological advances, the only salve for our predicament is collective awareness. And collective action. The writing is sober and sobering. And, though the recent fires of Minneapolis, Atlanta, Portland, and the nation have not centred squarely on surveillance, Fasman argues convincingly that the next ones very well might.’ -- Phillip Atiba Goff, co-founder and CEO of the Centre for Policing Equity, and professor of African American studies and psychology at Yale University‘This powerful, engrossing book will challenge your assumptions about persistent surveillance. Jon Fasman makes a clear case for civil liberties and explains how our laws and public safety infrastructure must keep pace with the advancement of technology. It's a must-read for anyone interested in the future and the unintended consequences of artificial intelligence, data, encryption and recognition technology.’ -- Amy Webb, founder of The Future Today Institute, author of The Big Nine and The Signals are Talking‘Jon Fasman has given us a stellar account of the use of surveillance technologies by the police. It's comprehensive, even-handed, informative, and fun to read.’ -- Barry Friedman, Jacob D. Fuchsberg professor at New York University School of Law‘This lively book is a call to action.’ -- David Anderson * Literary Review *‘Attempts to shake us out of our complacency … We See It All is a brutal reminder of the ‘perpetual’ surveillance powers of the police and government.’ -- Bernard E. Harcourt * TLS *Praise for The Unpossessed City: ‘Bestseller Fasman … takes a compassionate look at the hard truths of modern-day Russia in his absorbing second novel … The bio-thriller aspect of the plot provides a loose frame for Fasman's real concerns … and, more importantly, the trials and tribulations of the new Russia itself.’ * Publishers Weekly *Praise for The Geographer's Library: ‘A brainy noir … [A] winningly cryptic tale … [A] cabinet of wonders written by a novelist whose surname and sensibility fit comfortably on the shelf between Umberto Eco and John Fowles.’ * Los Angeles Times *Praise for The Geographer's Library: ‘One of the year's most literate and absorbing entertainments.’ -- Kirkus Reviews

    5 in stock

    £15.29

  • Scam Proof Your Life in the End Times: Justice & Restoration for Christians

    15 in stock

    £11.21

  • Audacity to Spy: How Government, Business &

    Technics Publications LLC Audacity to Spy: How Government, Business &

    15 in stock

    Book SynopsisEver get the feeling you are being watched? The thieves that steal identities are using cutting-edge, high-tech tools that can take one fact from a social media site, another from an online travel survey, a third from a purchase made via the internet and even access highly confidential medical records. Little by little they piece together your buying habits, your religious and school affiliations, the names of your family and pets, your political views, your driving habits, the places you have vacationed, and much, much more. This is not science fiction and this is not the future, this is what is happening to each and every one of us now - today. And although the vast majority of adults say they are concerned about providing personal information online, nearly 1/3 say they have never used a privacy setting on their computer, never inquired about the charities to whom they donate their money, never worried about someone accessing their medical information and never thought twice about giving a financial institution their social security number over the internet. The Audacity to Spy, written by an attorney with an interest in privacy laws and legislation and her grandmother who is an experienced Information Analyst, reveals the ways in which your identity and personal data have been stolen by various sources. Yes, you should be concerned about the NSA and other government agencies having your phone logs and emails; but you should worry more about the insidious data brokers that are collecting information about you every time you log on to your laptop, use your cell phone, access an app, or use your GPS. Companies are collecting a variety of data about you, combining it with location information, and using it to both personalise their own services and to sell to other advertisers for behavioural marketing. Law enforcement agencies are tracking your car and insurance companies are installing devices to monitor your driving. Clerks are making copies of your credit cards. And if that wasn''t enough, the FBI has reported that hackers have been discovered embedding malicious software in two million computers, opening a virtual door for criminals to rifle through users'' valuable personal and financial information. More than warning you about the ways your data can be stolen, at the end of each chapter are suggestions for limiting the amount of personal data that is available to be seized and divulged. Can you completely cut off the flow of information about yourself? The answer is no, not completely - there is already too much data out there and increasingly sophisticated ways to obtain bits and pieces. But knowing how it is collected, and by whom, gives you the power to control sensitive information and determine how much of your life you wish to expose to those more than willing to exploit it.

    15 in stock

    £17.84

  • The Secret to Cybersecurity: A Simple Plan to

    Forefront Books The Secret to Cybersecurity: A Simple Plan to

    10 in stock

    Book Synopsis

    10 in stock

    £18.89

  • Privacy and Identity Management. Fairness,

    Springer Nature Switzerland AG Privacy and Identity Management. Fairness,

    1 in stock

    Book SynopsisThis book contains selected papers presented at the 13th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held in Vienna, Austria, in August 2018. The 10 full papers included in this volume were carefully reviewed and selected from 27 submissions. Also included are reviewed papers summarizing the results of workshops and tutorials that were held at the Summer School as well as papers contributed by several of the invited speakers. The papers combine interdisciplinary approaches to bring together a host of perspectives: technical, legal, regulatory, socio-economic, social, societal, political, ethical, anthropological, philosophical, historical, and psychological. Table of ContentsA Causal Bayesian Networks Viewpoint on Fairness.- Sharing is caring, a boundary object approach to mapping and discussing personal data processing.- Who You Gonna Call When There's Something Wrong in Your Processing? Risk Assessment and Data Breach Notications in Practice.- Design and Security Assessment of Usable Multi-Factor Authentication and Single Sign-On Solutions for Mobile Applications: A Workshop Experience Report.- Towards Empowering the Human for Privacy Online.- Trust and Distrust: On Sense and Nonsense in Big Data.- GDPR transparency requirements and data privacy vocabularies.- Glycos: the basis for a peer-to-peer, private online social network.- GDPR and the Concept of Risk: The Role of risk, the Scope of risk and the technology involved.- Privacy Patterns for Pseudonymity.- Implementing GDPR in the Charity Sector: A Case Study.- Me and My Robot! Sharing Information with a New Friend.- chownIoT: Enhancing IoT Privacy by Automated Handling of Ownership Change.- Is Privacy Controllable?.- Assessing Theories for Research on Personal Data Transparency.- Data Protection by Design for cross-border electronic identication: does the eIDAS Interoperability Framework need to be modernised?.- Risk proling by law enforcement agencies in the Big Data era: Is there a need for transparency?

    1 in stock

    £62.99

  • Face Recognition Technology: Compulsory

    Springer Nature Switzerland AG Face Recognition Technology: Compulsory

    15 in stock

    Book SynopsisThis book examines how face recognition technology is affecting privacy and confidentiality in an era of enhanced surveillance. Further, it offers a new approach to the complex issues of privacy and confidentiality, by drawing on Joseph K in Kafka’s disturbing novel The Trial, and on Isaiah Berlin’s notion of liberty and freedom. Taking into consideration rights and wrongs, protection from harm associated with compulsory visibility, and the need for effective data protection law, the author promotes ethical practices by reinterpreting privacy as a property right. To protect this right, the author advocates the licensing of personal identifiable images where appropriate.The book reviews American, UK and European case law concerning privacy and confidentiality, the effect each case has had on the developing jurisprudence, and the ethical issues involved. As such, it offers a valuable resource for students of ethico-legal fields, professionals specialising in image rights law, policy-makers, and liberty advocates and activists.Table of Contents

    15 in stock

    £82.49

  • The CISO’s Transformation: Security Leadership in a High Threat Landscape

    Springer Nature Switzerland AG The CISO’s Transformation: Security Leadership in a High Threat Landscape

    1 in stock

    Book SynopsisThe first section of this book addresses the evolution of CISO (chief information security officer) leadership, with the most mature CISOs combining strong business and technical leadership skills. CISOs can now add significant value when they possess an advanced understanding of cutting-edge security technologies to address the risks from the nearly universal operational dependence of enterprises on the cloud, the Internet, hybrid networks, and third-party technologies demonstrated in this book. In our new cyber threat-saturated world, CISOs have begun to show their market value. Wall Street is more likely to reward companies with good cybersecurity track records with higher stock valuations. To ensure that security is always a foremost concern in business decisions, CISOs should have a seat on corporate boards, and CISOs should be involved from beginning to end in the process of adopting enterprise technologies.The second and third sections of this book focus on building strong security teams, and exercising prudence in cybersecurity. CISOs can foster cultures of respect through careful consideration of the biases inherent in the socio-linguistic frameworks shaping our workplace language and through the cultivation of cyber exceptionalism. CISOs should leave no stone unturned in seeking out people with unique abilities, skills, and experience, and encourage career planning and development, in order to build and retain a strong talent pool. The lessons of the breach of physical security at the US Capitol, the hack back trend, and CISO legal liability stemming from network and data breaches all reveal the importance of good judgment and the necessity of taking proactive stances on preventative measures. This book will target security and IT engineers, administrators and developers, CIOs, CTOs, CISOs, and CFOs. Risk personnel, CROs, IT, security auditors and security researchers will also find this book useful.Table of ContentsCISOs – Leading from the front!.- More CISOs on Corporate Boards.- Cyber program turnaround by a new CISO.- CISOs - the next step!.- CISO Maturity Model.- CISO guidance on some Emerging and Disruptive Technologies.- See Something, Do Something.- My journey as a writer.- Defensive measures in the wake of the SolarWinds fallout.- Cyber Exceptionalism.- Special Needs, Disability, and Cybersecurity: often, a great fit.- Bias-free lexicon.- The grass is not always greener on the other side.- Let not any outage go to waste.- If you can’t hire them, then develop them.- Should you accept Counteroffers?.- Importance of 1:1 Conversations.- The Cyber Hygiene Mantra.- Cybersecurity lessons from the breach of physical security at US Capitol building.- Protect society, the commonwealth, and the infrastructure - post COVID-19.- Self-Service Recovery Options for Bricked Windows Devices.- Certification and Accreditation.- Hack back or not.- CISOs need Liability Protection.- Enable Secure work-from-home.

    1 in stock

    £49.49

  • Modern Socio-Technical Perspectives on Privacy

    Springer Nature Switzerland AG Modern Socio-Technical Perspectives on Privacy

    5 in stock

    Book SynopsisThis open access book provides researchers and professionals with a foundational understanding of online privacy as well as insight into the socio-technical privacy issues that are most pertinent to modern information systems, covering several modern topics (e.g., privacy in social media, IoT) and underexplored areas (e.g., privacy accessibility, privacy for vulnerable populations, cross-cultural privacy). The book is structured in four parts, which follow after an introduction to privacy on both a technical and social level: Privacy Theory and Methods covers a range of theoretical lenses through which one can view the concept of privacy. The chapters in this part relate to modern privacy phenomena, thus emphasizing its relevance to our digital, networked lives. Next, Domains covers a number of areas in which privacy concerns and implications are particularly salient, including among others social media, healthcare, smart cities, wearable IT, and trackers. The Audiences section then highlights audiences that have traditionally been ignored when creating privacy-preserving experiences: people from other (non-Western) cultures, people with accessibility needs, adolescents, and people who are underrepresented in terms of their race, class, gender or sexual identity, religion or some combination. Finally, the chapters in Moving Forward outline approaches to privacy that move beyond one-size-fits-all solutions, explore ethical considerations, and describe the regulatory landscape that governs privacy through laws and policies. Perhaps even more so than the other chapters in this book, these chapters are forward-looking by using current personalized, ethical and legal approaches as a starting point for re-conceptualizations of privacy to serve the modern technological landscape. The book’s primary goal is to inform IT students, researchers, and professionals about both the fundamentals of online privacy and the issues that are most pertinent to modern information systems. Lecturers or teachers can assign (parts of) the book for a “professional issues” course. IT professionals may select chapters covering domains and audiences relevant to their field of work, as well as the Moving Forward chapters that cover ethical and legal aspects. Academics who are interested in studying privacy or privacy-related topics will find a broad introduction in both technical and social aspects.Table of Contents1. Introduction and Overview.- Part I: Privacy Theory and Methods.- 2. Privacy Theories and Frameworks.- 3. Revisiting APCO.- 4. Privacy and Behavioral Economics.- 5. The Development of Privacy Norms.- 6. Privacy Beyond the Individual Level.- Part II: Domains.- 7. Social Media and Privacy.- 8. Privacy-Enhancing Technologies.- 9. Tracking and Personalization.- 10. Healthcare Privacy.- 11. Privacy and the Internet of Things.- Part III: Audiences.- 12. Cross-Cultural Privacy Differences.- 13. Accessible Privacy.- 14. Privacy in Adolescence.- 15. Privacy and Vulnerable Populations.- Part IV: Moving Forward.- 16. User-Tailored Privacy.- 17. The Ethics of Privacy in Research and Design: Principles, Practices, and Potential.- 18. EU GDPR: Toward a Regulatory Initiative for Deploying a Private Digital Era.- 19. Reflections: Bringing Privacy to Practice.

    5 in stock

    £40.49

  • Modern Socio-Technical Perspectives on Privacy

    Springer Nature Switzerland AG Modern Socio-Technical Perspectives on Privacy

    1 in stock

    Book SynopsisThis open access book provides researchers and professionals with a foundational understanding of online privacy as well as insight into the socio-technical privacy issues that are most pertinent to modern information systems, covering several modern topics (e.g., privacy in social media, IoT) and underexplored areas (e.g., privacy accessibility, privacy for vulnerable populations, cross-cultural privacy). The book is structured in four parts, which follow after an introduction to privacy on both a technical and social level: Privacy Theory and Methods covers a range of theoretical lenses through which one can view the concept of privacy. The chapters in this part relate to modern privacy phenomena, thus emphasizing its relevance to our digital, networked lives. Next, Domains covers a number of areas in which privacy concerns and implications are particularly salient, including among others social media, healthcare, smart cities, wearable IT, and trackers. The Audiences section then highlights audiences that have traditionally been ignored when creating privacy-preserving experiences: people from other (non-Western) cultures, people with accessibility needs, adolescents, and people who are underrepresented in terms of their race, class, gender or sexual identity, religion or some combination. Finally, the chapters in Moving Forward outline approaches to privacy that move beyond one-size-fits-all solutions, explore ethical considerations, and describe the regulatory landscape that governs privacy through laws and policies. Perhaps even more so than the other chapters in this book, these chapters are forward-looking by using current personalized, ethical and legal approaches as a starting point for re-conceptualizations of privacy to serve the modern technological landscape. The book’s primary goal is to inform IT students, researchers, and professionals about both the fundamentals of online privacy and the issues that are most pertinent to modern information systems. Lecturers or teachers can assign (parts of) the book for a “professional issues” course. IT professionals may select chapters covering domains and audiences relevant to their field of work, as well as the Moving Forward chapters that cover ethical and legal aspects. Academics who are interested in studying privacy or privacy-related topics will find a broad introduction in both technical and social aspects.Table of Contents1. Introduction and Overview.- Part I: Privacy Theory and Methods.- 2. Privacy Theories and Frameworks.- 3. Revisiting APCO.- 4. Privacy and Behavioral Economics.- 5. The Development of Privacy Norms.- 6. Privacy Beyond the Individual Level.- Part II: Domains.- 7. Social Media and Privacy.- 8. Privacy-Enhancing Technologies.- 9. Tracking and Personalization.- 10. Healthcare Privacy.- 11. Privacy and the Internet of Things.- Part III: Audiences.- 12. Cross-Cultural Privacy Differences.- 13. Accessible Privacy.- 14. Privacy in Adolescence.- 15. Privacy and Vulnerable Populations.- Part IV: Moving Forward.- 16. User-Tailored Privacy.- 17. The Ethics of Privacy in Research and Design: Principles, Practices, and Potential.- 18. EU GDPR: Toward a Regulatory Initiative for Deploying a Private Digital Era.- 19. Reflections: Bringing Privacy to Practice.

    1 in stock

    £31.49

  • Big Data Privacy and Security in Smart Cities

    Springer International Publishing AG Big Data Privacy and Security in Smart Cities

    5 in stock

    Book SynopsisThis book highlights recent advances in smart cities technologies, with a focus on new technologies such as biometrics, blockchains, data encryption, data mining, machine learning, deep learning, cloud security, and mobile security. During the past five years, digital cities have been emerging as a technology reality that will come to dominate the usual life of people, in either developed or developing countries. Particularly, with big data issues from smart cities, privacy and security have been a widely concerned matter due to its relevance and sensitivity extensively present in cybersecurity, healthcare, medical service, e-commercial, e-governance, mobile banking, e-finance, digital twins, and so on. These new topics rises up with the era of smart cities and mostly associate with public sectors, which are vital to the modern life of people. This volume summarizes the recent advances in addressing the challenges on big data privacy and security in smart cities and points out the future research direction around this new challenging topic.Table of Contents1. Introduction.- 2. Deep Digital Identity for Big Data Privacy and Security.- 3. Behavioral Biometrics for Security in Smart Cities.- 4. Identity Spoofing and Cyber Attacks.- 5. Intrusion Detection via Deep Learning.- 6. Biometric Blockchain in e-Governance.- 7. e-Voting and Transparent Democracy.- 8. Secured e-Trading with Blockchain.- 9. Healthcare Biometric Blockchain.- 10. Medical Data and Security.- 11. Digital Passport.- 12. Social Smart Cities.- 13. Forensics and Legislation.- 14. Soft Border Control with Digital IDs.

    5 in stock

    £80.99

  • Artificial Intelligence and Cybersecurity: Theory and Applications

    Springer International Publishing AG Artificial Intelligence and Cybersecurity: Theory and Applications

    1 in stock

    Book SynopsisThis book discusses artificial intelligence (AI) and cybersecurity from multiple points of view. The diverse chapters reveal modern trends and challenges related to the use of artificial intelligence when considering privacy, cyber-attacks and defense as well as applications from malware detection to radio signal intelligence.The chapters are contributed by an international team of renown researchers and professionals in the field of AI and cybersecurity.During the last few decades the rise of modern AI solutions that surpass humans in specific tasks has occurred. Moreover, these new technologies provide new methods of automating cybersecurity tasks. In addition to the privacy, ethics and cybersecurity concerns, the readers learn several new cutting edge applications of AI technologies.Researchers working in AI and cybersecurity as well as advanced level students studying computer science and electrical engineering with a focus on AI and Cybersecurity will find this book useful as a reference. Professionals working within these related fields will also want to purchase this book as a reference. Table of ContentsPart I Cybersecurity ConcernsUse of Artificial Intelligence in a Cybersecurity EnvironmentPetri Vähäkainu and Martti LehtoA Review of Cyber Threat (Artificial) Intelligence in SecurityManagementMartin Lundgren and Ali PadyabModel Based Resilience Engineering for Design and Assessment ofMission Critical Systems Containing AI ComponentsAutomation of CybersecurityWorkArtificial Intelligence for Cybersecurity Education and TrainingOffensive Machine Learning Methods and the Cyber Kill ChainDefensive Machine Learning Methods and the Cyber Defence Chain . Part II Privacy and EthicsDifferential Privacy: An Umbrella ReviewAI in Cyber Operations: Ethical and Legal Considerations for End-UsersPart III ApplicationsAndroid Malware Detection Using Deep LearningArtificial Intelligence Enabled Radio Signal IntelligenceDeep Learning Quantile Regression for Robustness, Confidence andPlanningModel Fooling Threats Against Medical Imaging

    1 in stock

    £125.99

  • Autonomous Intelligent Cyber Defense Agent

    Springer International Publishing AG Autonomous Intelligent Cyber Defense Agent

    1 in stock

    Book SynopsisThis book offers a structured overview and a comprehensive guide to the emerging field of Autonomous Intelligent Cyber Defense Agents (AICA). The book discusses the current technical issues in autonomous cyber defense and offers information on practical design approaches. The material is presented in a way that is accessible to non-specialists, with tutorial information provided in the initial chapters and as needed throughout the book. The reader is provided with clear and comprehensive background and reference material for each aspect of AICA.Today’s cyber defense tools are mostly watchers. They are not active doers. They do little to plan and execute responses to attacks, and they don’t plan and execute recovery activities. Response and recovery – core elements of cyber resilience – are left to human cyber analysts, incident responders and system administrators. This is about to change. The authors advocate this vision, provide detailed guide to how such a vision can be realized in practice, and its current state of the art.This book also covers key topics relevant to the field, including functional requirements and alternative architectures of AICA, how it perceives and understands threats and the overall situation, how it plans and executes response and recovery, how it survives threats, and how human operators deploy and control AICA. Additionally, this book covers issues of testing, risk, and policy pertinent to AICA, and provides a roadmap towards future R&D in this field.This book targets researchers and advanced students in the field of cyber defense and resilience. Professionals working in this field as well as developers of practical products for cyber autonomy will also want to purchase this book.Table of ContentsChapter. 1. Autonomous Intelligent Cyber-defense Agent: Introduction and OverviewChapter. 2. Alternative Architectural ApproachesChapter. 3. Perception of EnvironmentChapter. 4. Perception of Cyber ThreatsChapter. 5. Situational Understanding and DiagnosticsChapter. 6. Learning about the AdversaryChapter. 7. Response PlanningChapter. 8. Recovery PlanningChapter. 9. Strategic Cyber CamouflageChapter. 10. Adaptivity & AntifragilityChapter. 11. Negotiation and CollaborationChapter. 12. Human InteractionsChapter. 13. Testing and MeasurementsChapter. 14. Deployment and OperationChapter. 15. Command in AICA-intensive OperationsChapter. 16. Risk ManagementChapter. 17. Policy IssuesChapter. 18. Development ChallengesChapter. 19. Case Study A: A Prototype Autonomous Intelligent Cyber-defense AgentChapter. 20. Case Study B: AI Agents for Tactical EdgeChapter. 21. Case Study C: the Sentinel Agents

    1 in stock

    £123.49

  • Continuous Biometric Authentication Systems: An

    Springer International Publishing AG Continuous Biometric Authentication Systems: An

    1 in stock

    Book SynopsisThis book offers an overview of the field of continuous biometric authentication systems, which capture and continuously authenticate biometrics from user devices. This book first covers the traditional methods of user authentication and discusses how such techniques have become cumbersome in the world of mobile devices and short usage sessions. The concept of continuous biometric authentication systems is introduced and their construction is discussed. The different biometrics that these systems may utilise (e.g.: touchscreen-gesture interactions) are described and relevant studies surveyed. It also surveys important considerations and challenges.This book brings together a wide variety of key motivations, components and advantages of continuous biometric authentication systems. The overview is kept high level, so as not to limit the scope to any single device, biometric trait, use-case, or scenario. Therefore, the contents of this book are applicable to devices ranging from smartphones to desktop computers, utilising biometrics ranging from face recognition to keystroke dynamics. It also provides metrics from a variety of existing systems such that users can identify the advantages and disadvantages of different approaches.This book targets researchers and lecturers working in authentication, as well as advanced-level students in computer science interested in this field. The book will also be of interest to technical professionals working in cyber security.Table of ContentsIntroduction.- Traditional Authentication.- Continuous Authentication.- Biometrics for Continuous Authentication.- Considerations and Challenges.- Conclusion.

    1 in stock

    £37.99

  • Cognitive Computing – ICCC 2023: 7th

    Springer International Publishing AG Cognitive Computing – ICCC 2023: 7th

    1 in stock

    Book SynopsisThis book constitutes the refereed proceedings of the 7th International Conference on Cognitive Computing, ICCC 2023, held in Shenzhen, China, during December 17–18, 2023.The 9 full papers in this book were carefully reviewed and selected from 14 submissions. They are organized in topical sections as follows: Cognitive Computing Technologies and Infrastructure, Cognitive Computing Applications, Sensing Intelligence, Cognitive Analysis, Mobile Services, Cognitive Computing on Smart Home, and Cognitive Computing on Smart City.Table of Contents​Research Track.- High-Precision Detection of Suicidal Ideation on Social Media Using Bi-LSTM and BERT Models.- P-Reader: A Clue-inspired Model for Machine Reading Comprehension.- An Unsupervised Method for Sarcasm Detection with Prompts.- ENER: Named Entity Recognition Model for Ethnic Ancient Books Based on Entity Boundary Detection.- An Enhanced Opposition-Based Golden-Sine Whale Optimization Algorithm.- T4S: Two-stage Screenplay Synopsis Summary Generation with Turning Points.- Application Track.- Multi-factor Water Level Prediction Based on InnRNN-Attention.- Ethereum Public Opinion Analysis Based on Attention Mechanism.- Prompt Tuning Models on Sentiment-Aware for Explainable Recommendation.

    1 in stock

    £42.74

  • Malware

    Springer Malware

    1 in stock

    Book SynopsisPart I Theoretical foundation and modeling.- Chapter 1 Classifying Malware using Tensor Decomposition.- Chapter 2 Radial Spike and Slab Bayesian Neural Networks for Sparse Data in Ransomware Attacks.- Chapter 3 Mathematical models for malware propagation: state of art and perspectives.- Chapter 4 Botnet Defense System: A System to Fight Botnets with Botnets.- Part II Machine learning for malware classification.- Chapter 5 Machine Learning-Based Malware Detection in a Production Setting.- Chapter 6 Machine Learning for Windows Malware Detection and Classification: Methods, Challenges and Ongoing Research.- Chapter 7 Conventional Machine Learning-based Android Malware Detectors.- Chapter 8 Conventional Machine Learning-based Android Malware Detectors.- Chapter 9 Method to automate the classification of PE32 malware using Word2vec and LSTM.- Part III Social and legal.- Chapter 10 The South African and Senegalese legislative response to malware facilitated cybercrime.- Chapter 11Malware as a Geopolitical Tool.-Part IV Malware analysis in practice and evasions.- Chapter 12 Advancements in Malware Evasion: Analysis Detection and the Future Role of AI.-Chapter 13 Unpacking malware in the real world: a step by step guide.- Chapter 14 Forensic Analysis of CapraRAT Android Malware.- Chapter 15 Hidden Realms: Exploring Steganography Methods in Games for Covert Malware Delivery.- Part V Malware ecosystem.- Chapter 16  The Malware as a Service ecosystem.- Chapter 17Preventing and detecting malware in smart environments. The smart home case.

    1 in stock

    £179.99

  • Springer Privacy Enhancing Techniques

    15 in stock

    Book Synopsis

    15 in stock

    £39.99

  • Cinderella's Stick: A Fairy Tale for Digital

    Springer International Publishing AG Cinderella's Stick: A Fairy Tale for Digital

    1 in stock

    Book SynopsisThis book explains the main problems related to digital preservation using examples based on a modern version of the well-known Cinderella fairy tale. Digital preservation is the endeavor to protect digital material against loss, corruption, hardware/software technology changes, and changes in the knowledge of the community.Τhe structure of the book is modular, with each chapter consisting of two parts: the episode and the technical background. The episodes narrate the story in chronological order, exactly as in a fairy tale. In addition to the story itself, each episode is related to one or more digital preservation problems, which are discussed in the technical background section of the chapter. To reveal a more general and abstract formulation of these problems, the notion of pattern is used. Each pattern has a name, a summary of the problem, a narrative describing an attempt to solve the problem, an explanation of what could have been done to avoid or alleviate this problem, some lessons learned, and lastly, links to related patterns discussed in other chapters.The book is intended for anyone wanting to understand the problems related to digital preservation, even if they lack the technical background. It explains the technical details at an introductory level, provides references to the main approaches (or solutions) currently available for tackling related problems, and is rounded out by questions and exercises appropriate for computer engineers and scientists. In addition, the book's website, maintained by the authors, presents the contents of Cinderella's “real USB stick,” and includes links to various tools and updates.Trade Review“‘Cinderella’s Stick’ is an excellent book for all readers in research libraries. It provides the right concepts in a very smart and innovative way, and it underlines that the amount of digital information that we alone produce is immense and the challenges of fragility are here to stay.” (Giannis Tsakonas, Liber Quarterly, Vol. 29(1), 2019)Table of Contents1 A Few Words About Digital Preservation And Book Overview.- 2 The Fairy Tale Of Cinderella.- 3 Daphne (A Modern Cinderella).- 4 Reading the Contents of the USB Stick.- 5 First Contact with the Contents of the USB Stick.- 6 The File Poem.html: On Reading Characters.- 7 The File MyPlace.png: On Getting the Provenance of a Digital Object.- 8 The File todo.csv – On Understanding Data Values.- 9 The File destroyAll.exe: On Executing Proprietary Software.- 10 The File Mymusic.class: On Decompiling Software.- 11 The File yyy.java: On Compiling And Running Software.- 12 The File myFriendsBook.war: On Running Web Applications.- 13 The File roulette.BAS: On Running Obsolete Software.- 14 The Folder myExperiment: On Verifying and Reproducing Data.- 15 The File MyContacts.con: On Reading Unknown Digital Resources.- 16 The File SecretMeeting.Txt: On Authenticity Checking.- 17 The Personal Archive Of Robert: On Preservation Planning.- 18 The Meta-Pattern: Toward a Common Umbrella.- 19 How Robert Eventually Found Daphne.- 20 Daphne’s Dream.- 21 Epilogue.

    1 in stock

    £41.24

  • Privatheit und selbstbestimmtes Leben in der

    Springer Fachmedien Wiesbaden Privatheit und selbstbestimmtes Leben in der

    1 in stock

    Book SynopsisPrivatheit ist eine wichtige Grundlage für ein selbstbestimmtes Leben. In einer immer stärker vernetzten digitalen Welt ist sie von vielen Seiten bedroht. Die Beiträge des Buches untersuchen aktuelle Herausforderungen für Privatheit und Datenschutz aus multidisziplinärer Perspektive. Thematisiert wird dabei u.a., welche Rolle Privatheit in der Gesellschaft einnimmt, wie Bürger diese heute verstehen und wie sie mit den zunehmenden Angriffen darauf umgehen. Darüber hinaus befassen sich die Beiträge mit der europäischen Datenschutzpolitik und neuen Regelungsformen für einen wirksameren Datenschutz.Table of ContentsPrivatheit, Öffentlichkeit und digitales Leben.- Wandel rechtlicher Normen in der digitalen Welt.- Privatheit in Kommunikation und Wirtschaft.- Technische Ansätze zum Schutz von Privatheit.

    1 in stock

    £49.49

  • Grundrechtsschutz im Smart Car: Kommunikation,

    Springer Fachmedien Wiesbaden Grundrechtsschutz im Smart Car: Kommunikation,

    1 in stock

    Book SynopsisDie Integration von Fahrzeugtechnik, Informationstechnik und Kommunikation verändert den Charakter des Automobils und des Autofahrens von Grund auf. Vom Sinnbild für Eigentum und Bewegungsfreiheit, Individualität und Privatheit wird es durch die Vernetzung zum Bestandteil eines komplexen Mobilitätssystems und potenziell zum Objekt ständiger Überwachung. Die Beiträge analysieren Herausforderungen, erörtern Lösungen und entwerfen Gestaltungsvorschläge für Technik, Recht und Organisation vernetzten Fahrens.Table of ContentsGrundrechtskonflikte im vernetzten Fahrzeug.- Vertragsgestaltungen und Verantwortungserfüllung.- Verfügungs- und Nutzungsbefugnisse.- Das Auto im Internet und das Internet im Auto.- Sicherheitsgewährleistung und Datenschutz.- Ausländische Erfahrungen und Konzepte.

    1 in stock

    £62.99

  • Die Zukunft der Datenökonomie: Zwischen

    Springer Fachmedien Wiesbaden Die Zukunft der Datenökonomie: Zwischen

    1 in stock

    Book SynopsisDigitale Daten gelten sowohl als Quelle für Wirtschaftswachstum, Innovation und Arbeitsplätze wie auch als Treiber der datenbasierten Reorganisation praktisch aller gesellschaftlichen Bereiche („Datafizierung“). Die datenökonomisch befeuerten Transformationsprozesse des Sozialen werfen dementsprechend vielfältige Fragen auf: Welche Daten sollen von wem wie verwertbar sein? Wie lässt sich legitime Verfügungsmacht gestalten? Usw. Der Band behandelt diese Fragen aus interdisziplinärer Perspektive.Trade Review“... Das Werk enthält vielmehr scharfe Analysen und innovative Gedanken renommierter Forscher unterschiedlichster Fachrichtungen. Damit lädt es nicht nur, wie es der Titel vermuten lässt, zu einem Blick in die Zukunft unserer „datengetriebenen“ Zeit, sondern vor allem auch zu einem Blick über den Tellerrand ein.” (Dr. Alexander Golland, in: DATENSCHUTZ - BERATER, Jg. 43, Heft 12, 2019)Table of ContentsDatenökonomische Geschäftsmodelle.- Kollektivgut & Gemeinwohl in der Datenökonomie.- Handlungsspielräume in der Datenökonomie.- Verfügungsmacht in der Datenökonomie.- Gestaltung der Datenökonomie.

    1 in stock

    £49.49

  • Die Zukunft von Privatheit und Selbstbestimmung:

    Springer Fachmedien Wiesbaden Die Zukunft von Privatheit und Selbstbestimmung:

    15 in stock

    Book SynopsisDie in diesem Open-Access-Buch zusammengeführten interdisziplinären Untersuchungen des „Forums Privatheit“ gehen der Frage nach, wie sich die Verwirklichungsbedingungen von Privatheit und Selbstbestimmung durch die Digitalisierung aller Lebensbereiche radikal ändern. Nahezu jede Lebensregung hinterlässt Datenspuren, ermöglicht vielfältige und intensive Datensammlungen über Menschen, unterstützt Verhaltensbeeinflussungen und verstärkt Ungleichgewichte in der Informationsmacht. Es analysiert die Auswirkungen der Digitalisierung auf den rechtlichen und politischen Schutz der Grundrechte, die ökonomischen Beziehungen, die gesellschaftliche Integration und die individuelle Entfaltung. Das Buch zeigt aber auch auf, wie Digitalisierung und ihre gesellschaftlichen Rahmenbedingungen technisch, sozial, ökonomisch und rechtlich gestaltet werden können, um Privatheit und Selbstbestimmung zu schützen.Table of ContentsEinleitung.- Neue Konzepte für den Grundrechtsschutz in der digitalen Welt.- Governance der EU-Datenschutzpolitik: Harmonisierung und Technikneutralität in und Innovationswirkung der DSGVO.- Zum Zusammenspiel zwischen Unternehmen und Verbrauchern in der Datenökonomie: Herausforderungen und neue Gestaltungsansätze.- Privatheit und Digitalität: Zur soziotechnischen Transformation des selbstbestimmten Lebens.- Privatheit, Ethik und demokratische Selbstregulierung in einer digitalen Gesellschaft.- Von Schutzbedürfnissen und Schutzverhalten: Einemedienpsychologische Analyse des individuellen Privatheitsschutzes.- Digitaler Fußabdruck.- Datenschutz und Privatheitsschutz durch Gestaltung der Systeme.

    15 in stock

    £31.49

  • Datenschutz: Einführung in technischen

    Springer Fachmedien Wiesbaden Datenschutz: Einführung in technischen

    1 in stock

    Book SynopsisDieses Lehrbuch behandelt im ersten Teil schwerpunktmäßig technische Maßnahmen, die den Schutz personenbezogener Daten sicherstellen. Dazu werden grundlegende Verfahren der Anonymisierung und der Gewährleistung von Anonymität im Internet (z. B. Tor) vorgestellt. Das Buch gibt einen Überblick über gängige Verfahren des Identitätsmanagements (z. B. OpenID Connect) und die in elektronischen Ausweisdokumenten (z. B. im Personalausweis) verwendeten Sicherheitsmaßnahmen. Die Datenschutz-Garantien der vermittelten Ansätze werden im Detail behandelt. Im Bereich des World Wide Web erfährt der Leser, wo die Probleme aus Sicht des Datenschutzes liegen und wie diese Lücken geschlossen werden können. Anonyme Bezahlverfahren und eine Untersuchung von Bitcoin runden den technischen Teil des Buches ab. Der Leser lernt Ansätze aus der Praxis kennen, um so je nach Anforderungen in der Systementwicklung das passende Verfahren auswählen zu können.Im zweiten Teil werden die Grundlagen des Datenschutzrechts behandelt. Denn technische Maßnahmen sollen unerlaubte Datenverarbeitung verhindern; das Recht bestimmt, welche Datenverarbeitungen erlaubt sind. Ohne Kenntnisse im Datenschutzrecht können technische Maßnahmen nicht richtig implementiert werden. Zum besseren Verständnis erfolgt ein Überblick über die Rechtsordnung insgesamt, in die das Datenschutzrecht eingeordnet wird. Betrachtet werden die europäische und die verfassungsrechtliche Dimension des Datenschutzes. Der Schwerpunkt liegt auf den Regelungen der Datenschutz-Grundverordnung. Dabei werden auch besonders häufig vorkommende und Fragen aufwerfende Verarbeitungssituationen wie das Webtracking erörtert. Beispielhaft werden datenschutzrechtliche Fälle bearbeitet.Trade Review“... Im rechtlichen Teil ist hervorzuheben, dass ... Grundlagen des Rechtsverständnisses zielgruppenbezogen für Informatikerinnen und Informatiker dargestellt werden. ... Es bildet die technischen Themen umfassend ab und bietet für das rechtliche Verständnis aktueller Fragestellungen eine solide Grundlage.” (Rudi Kramer, in: AWV-Informationen, 14. Februar 2023) Table of ContentsEinführung in den Technischen Datenschutz - Anonymitätsmaße - Anonymität im Internet - Identitätsmanagement - Anonymes Bezahlen und Bitcoin - Datenschutz im World Wide Web - Instant Messaging - Elektronische Ausweisdokumente - Weitere Privacy-Enhancing Technologies - Datenschutzrecht - Einführung in die Rechtsordnung - Wichtige Gesetze, wichtige Grundbegriffe - Erlaubte und unerlaubte Datenverarbeitungen, Rechtsgrundlagen - Rechenschaftspflicht - technische und organisatorische Maßnahmen (toM) - Betroffenenrechte (Auskunft, Kopie, Berichtigung, Löschung usw.) - Wichtige Verarbeitungssituationen (Videoüberwachung, Fotoaufnahmen, Tracking, Cloud Computing usw.) - Zertifizierung, Akkreditierung - Betriebliche Datenschutzbeauftragte - Datenschutz-Aufsichtsbehörde

    1 in stock

    £26.59

  • Behind the Cloud: A Theory of the Private Without

    Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Behind the Cloud: A Theory of the Private Without

    1 in stock

    Book SynopsisThoughts are free - but they are no longer secret. Today, our data is automatically stored and analyzed by algorithms ”behind the cloud” - where we no longer have control over our data. Our most private and secret information is entrusted to the internet and permanently collected, stacked and linked to our digital twins. With and without our consent. "Privacy is dead", as Mark Zuckerberg put it. The question is: How did we get there? And, if the actors behind the cloud know everything: what is still private today, and are there any personal secrets at all when the "gods" behind the cloud possibly know us better than our friends and family?The book uses a wealth of case studies (e.g. cryptocurrencies, journalism, digital traces of sexual preferences) to develop a typology of privacy in the history of ideas. Furthermore, it shows the areas of life in which big data and artificial intelligence have already made inroads. This book is a translation of the original German 2nd edition Die Rückseite der Cloud by Peter Seele and Lucas Zapf, published by Springer-Verlag GmbH Germany, part of Springer Nature in 2020. The translation was done with the help of artificial intelligence (machine translation by the service DeepL.com). A subsequent human revision was done primarily in terms of content, so that the book will read stylistically differently from a conventional translation.Table of ContentsIntroduction: The reverse side of the cloud.- Part 1: The secret private - introduction and derivation.- "Privacy is dead": How could it come to this?- Part 2: Symptoms of the structural change of the private.- Symptoms of an immanent digital omniscience.- Part 3: Theory of the structural change of the private.- Functional systematics of the structural change of the private.- Summary of the theory or: Thoughts are free - but no longer secret.- Conclusions.- Outlook: Digital authenticity - an immersive consumer experience.

    1 in stock

    £24.74

  • Nothing to hide?: Warum wir alle etwas zu

    Books on Demand Nothing to hide?: Warum wir alle etwas zu

    15 in stock

    Book Synopsis

    15 in stock

    £9.52

  • Cyber Diplomacy

    Pentagon Press LLP Cyber Diplomacy

    3 in stock

    Book Synopsis

    3 in stock

    £37.99

  • Tor Anonymity Network 101: En introduktion til

    Books on Demand Tor Anonymity Network 101: En introduktion til

    1 in stock

    Book Synopsis

    1 in stock

    £21.38

  • Bernan Distribution Data Stewardship and the Role of National

    1 in stock

    Book Synopsis

    1 in stock

    £25.46

  • Private and Controversial: When Privacy and

    HarperCollins India Private and Controversial: When Privacy and

    15 in stock

    Book SynopsisSet against the background of the COVID pandemic, creation of the National Digital Health Mission, and the ongoing debate on data protection, the collection of essays in Private and Controversial will explore the intersection between privacy and public health.

    15 in stock

    £18.27

© 2025 Book Curl

    • American Express
    • Apple Pay
    • Diners Club
    • Discover
    • Google Pay
    • Maestro
    • Mastercard
    • PayPal
    • Shop Pay
    • Union Pay
    • Visa

    Login

    Forgot your password?

    Don't have an account yet?
    Create account