Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7(495) 980-12-10
  пн-пт: 10-18 сб,вс: 11-18
  shop@logobook.ru
   
    Поиск книг                    Поиск по списку ISBN Расширенный поиск    
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Хиты | |
 

Controlling Privacy and the Use of Data Assets - Volume 2, Mattsson, Ulf


Варианты приобретения
Цена: 6430.00р.
Кол-во:
Наличие: Поставка под заказ.  Есть в наличии на складе поставщика.
Склад Америка: Есть  
При оформлении заказа до: 2025-08-18
Ориентировочная дата поставки: конец Сентября - начало Октября
При условии наличия книги у поставщика.

Добавить в корзину
в Мои желания

Автор: Mattsson, Ulf
Название:  Controlling Privacy and the Use of Data Assets - Volume 2
ISBN: 9781032185187
Издательство: Taylor&Francis
Классификация:


ISBN-10: 103218518X
Обложка/Формат: Paperback
Страницы: 264
Вес: 0.62 кг.
Дата издания: 23.08.2023
Серия: Internal audit and it audit
Иллюстрации: 1 tables, black and white; 261 line drawings, black and white; 261 illustrations, black and white
Размер: 178 x 254 x 21
Читательская аудитория: Professional & vocational
Подзаголовок: What is the new world currency - data or trust?
Рейтинг:
Поставляется из: Европейский союз


The Art of Deception: Controlling the Human Element of Security

Автор: Kevin D. Mitnick
Название: The Art of Deception: Controlling the Human Element of Security
ISBN: 076454280X ISBN-13(EAN): 9780764542800
Издательство: Wiley
Рейтинг:
Цена: 1584.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Focusing on the human factors involved with information security, this book explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system.

Net zeros and ones - how data erasure promotes  sustainability, privacy, and security

Автор: Stiennon, Richard Ernst, Russ Forslund, Fredrik
Название: Net zeros and ones - how data erasure promotes sustainability, privacy, and security
ISBN: 1119866162 ISBN-13(EAN): 9781119866169
Издательство: Wiley
Рейтинг:
Цена: 3008.00 р.
Наличие на складе: Поставка под заказ.

Описание: Nigel Sylvester: GO is the first self-titled book by professional BMX athlete, entrepreneur, YouTube sensation and culture icon - Nigel Sylvester. His GO brand embraces the relentless, unapologetic and graceful pursuit of accomplishing a dream. His globally acclaimed digital film series, GO, captures his style and thrilling adventures in cities around the globe from his POV.

African Data Privacy Laws

Автор: Alex B. Makulilo
Название: African Data Privacy Laws
ISBN: 3319473158 ISBN-13(EAN): 9783319473154
Издательство: Springer
Рейтинг:
Цена: 19564.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This volume presents analyses of data protection systems and of 26 jurisdictions with data protection legislation in Africa, as well as additional selected countries without comprehensive data protection laws.

Data and Applications Security and Privacy XXX

Автор: Ranise
Название: Data and Applications Security and Privacy XXX
ISBN: 3319414828 ISBN-13(EAN): 9783319414829
Издательство: Springer
Рейтинг:
Цена: 10482.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This book constitutes the refereed proceedings of the 30th Annual IFIP WG 11.3 International Working Conference on Data and Applications Security and Privacy, DBSec 2016, held in trento, Itlay, in July 2016.

The European Union as Guardian of Internet Privacy

Автор: Hijmans
Название: The European Union as Guardian of Internet Privacy
ISBN: 3319340891 ISBN-13(EAN): 9783319340890
Издательство: Springer
Рейтинг:
Цена: 27950.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This book examines the role of the EU in ensuring privacy and data protection on the internet. It describes and demonstrates the importance of privacy and data protection for our democracies and how the enjoyment of these rights is challenged by, particularly, big data and mass surveillance. The book takes the perspective of the EU mandate under Article 16 TFEU. It analyses the contributions of the specific actors and roles within the EU framework: the judiciary, the EU legislator, the independent supervisory authorities, the cooperation mechanisms of these authorities, as well as the EU as actor in the external domain. Article 16 TFEU enables the Court of the Justice of the EU to play its role as constitutional court and to set high standards for fundamental rights protection. It obliges the European Parliament and the Council to lay down legislation that encompasses all processing of personal data. It confirms control by independent supervisory authorities as an essential element of data protection and it gives the EU a strong mandate to act in the global arena. The analysis shows that EU powers can be successfully used in a legitimate and effective manner and that this subject could be a success story for the EU, in times of widespread euroskepsis. It demonstrates that the Member States remain important players in ensuring privacy and data protection. In order to be a success story, the key stakeholders should be prepared to go the extra mile, so it is argued in the book. The book is based on academic research for which the author received a double doctorate at the University of Amsterdam and the Vrije Universiteit Brussels. It builds on a long inside experience within the European institutions, as well as within the community of data protection and data protection authorities.It is a must read in a time where the setting of EU privacy and data protection is changing dramatically, not only as a result of the rapidly evolving information society, but also because of important legal developments such as the entry into force of the General Data Protection Regulation. This book will appeal to all those who are in some way involved in making this regulation work. It will also appeal to people interested in the institutional framework of the European Union and in the role of the Union of promoting fundamental rights, also in the wider world.

Medical data privacy handbook

Название: Medical data privacy handbook
ISBN: 3319236326 ISBN-13(EAN): 9783319236322
Издательство: Springer
Рейтинг:
Цена: 32142.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Medical Data Privacy Handbook

Emergence of personal data protection as a fundamental right of the eu

Автор: Gonzalez Fuster, Gloria
Название: Emergence of personal data protection as a fundamental right of the eu
ISBN: 3319050222 ISBN-13(EAN): 9783319050225
Издательство: Springer
Рейтинг:
Цена: 18167.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: The Emergence of Personal Data Protection as a Fundamental Right of the EU

Trusted Computing: Principles and Applications

Автор: Dengguo Feng
Название: Trusted Computing: Principles and Applications
ISBN: 3110476045 ISBN-13(EAN): 9783110476040
Издательство: Walter de Gruyter
Рейтинг:
Цена: 18586.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science researchers to industrial engineers.

Controlling privacy and the use of data assets - volume 1

Автор: Mattsson, Ulf
Название: Controlling privacy and the use of data assets - volume 1
ISBN: 1032039124 ISBN-13(EAN): 9781032039121
Издательство: Taylor&Francis
Рейтинг:
Цена: 8726.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This book uses practical lessons learned in applying real-life concepts and tools to help security leaders and their teams craft and implement strategies. These projects deal with a variety of use cases and data types.

Social Tagging for Linking Data Across Environments

Автор: Pennington Diane
Название: Social Tagging for Linking Data Across Environments
ISBN: 1783303387 ISBN-13(EAN): 9781783303380
Издательство: Facet
Рейтинг:
Цена: 16368.00 р.
Наличие на складе: Нет в наличии.

Описание: This book, representing researchers and practitioners across different information professions, will explore how social tags can link content across a variety of environments.

Preserving Privacy Against Side-Channel Leaks

Автор: Liu
Название: Preserving Privacy Against Side-Channel Leaks
ISBN: 3319426427 ISBN-13(EAN): 9783319426426
Издательство: Springer
Рейтинг:
Цена: 10760.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

This book offers a novel approach to data privacy by unifying side-channel attacks within a general conceptual framework. This book then applies the framework in three concrete domains.
First, the book examines privacy-preserving data publishing with publicly-known algorithms, studying a generic strategy independent of data utility measures and syntactic privacy properties before discussing an extended approach to improve the efficiency. Next, the book explores privacy-preserving traffic padding in Web applications, first via a model to quantify privacy and cost and then by introducing randomness to provide background knowledge-resistant privacy guarantee. Finally, the book considers privacy-preserving smart metering by proposing a light-weight approach to simultaneously preserving users' privacy and ensuring billing accuracy.
Designed for researchers and professionals, this book is also suitable for advanced-level students interested in privacy, algorithms, or web applications.
Audacity to spy

Автор: Nolan, Catherine Wilson, Ashley M.
Название: Audacity to spy
ISBN: 1935504797 ISBN-13(EAN): 9781935504795
Издательство: Gazelle Book Services
Рейтинг:
Цена: 4502.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Ever get the feeling you are being watched? The thieves that steal identities are using cutting-edge, high-tech tools that can take one fact from a social media site, another from an online travel survey, a third from a purchase made via the internet and even access highly confidential medical records. Little by little they piece together your buying habits, your religious and school affiliations, the names of your family and pets, your political views, your driving habits, the places you have vacationed, and much, much more. This is not science fiction and this is not the future, this is what is happening to each and every one of us now - today. And although the vast majority of adults say they are concerned about providing personal information online, nearly 1/3 say they have never used a privacy setting on their computer, never inquired about the charities to whom they donate their money, never worried about someone accessing their medical information and never thought twice about giving a financial institution their social security number over the internet. The Audacity to Spy, written by an attorney with an interest in privacy laws and legislation and her grandmother who is an experienced Information Analyst, reveals the ways in which your identity and personal data have been stolen by various sources. Yes, you should be concerned about the NSA and other government agencies having your phone logs and emails; but you should worry more about the insidious data brokers that are collecting information about you every time you log on to your laptop, use your cell phone, access an app, or use your GPS. Companies are collecting a variety of data about you, combining it with location information, and using it to both personalise their own services and to sell to other advertisers for behavioural marketing. Law enforcement agencies are tracking your car and insurance companies are installing devices to monitor your driving. Clerks are making copies of your credit cards. And if that wasnt enough, the FBI has reported that hackers have been discovered embedding malicious software in two million computers, opening a virtual door for criminals to rifle through users valuable personal and financial information. More than warning you about the ways your data can be stolen, at the end of each chapter are suggestions for limiting the amount of personal data that is available to be seized and divulged. Can you completely cut off the flow of information about yourself? The answer is no, not completely - there is already too much data out there and increasingly sophisticated ways to obtain bits and pieces. But knowing how it is collected, and by whom, gives you the power to control sensitive information and determine how much of your life you wish to expose to those more than willing to exploit it.


ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru
   В Контакте     В Контакте Мед  Мобильная версия