Catalog Search Results
Author
Language
English
Formats
Description
The ongoing revolution in electronic information technology raises critical questions about our right to privacy. As more personal information is gathered and stored at breathtaking speed, corporate America is confronted with the ethical and practical issues of how to handle the information in its databases: how should it be safeguarded and who should have access to it? In Managing Privacy, Jeff Smith examines the policies of corporations such as...
Author
Pub. Date
2016.
Language
English
Description
Endless terror. Refugee waves. An unfixable global economy. Surprising election results. New billion-dollar fortunes. Miracle medical advances. What if they were all connected? What if you could understand why? The Seventh Sense examines the historic force now shaking our world -- and explains how our leaders, our businesses, and each of us can master it. All around us now we are surrounded by events that are difficult to understand. But every day,...
Author
Language
English
Description
In this incredible collection of actual government documents, Ventura, the ultimate nonpartisan truth-seeker, proves beyond any doubt that the official spin of numerous government programs is bull. He and Russell walk readers through 63 of the most incriminating programs to reveal what really happens behind the closed doors.
Author
Language
English
Formats
Description
This volume examines the evolving role of the Internet in activism, dissent, and authoritarian regimes. The author investigates the impact of a range of media on social revolution and activism from television in East Germany to Twitter during Iran's Green Revolution, intertwining that analysis with discussion of the ways governments are able to use the Internet for surveillance of political activity, propaganda dissemination, and censorship. He analyzes...
Author
Series
Language
English
Formats
Description
An insight into the biometric industry and the steps for successful deployment
Biometrics technologies verify identity through characteristics such as fingerprints, voices, and faces. By providing increased security and convenience, biometrics have begun to see widespread deployment in network, e-commerce, and retail applications. This book provides in-depth analysis of biometrics as a solution for authenticating employees and customers.
...Author
Language
English
Formats
Description
"With rapidly changing architecture and API-driven automation, cloud platforms come with unique security challenges and opportunities. In this updated second edition, you'll examine security best practices for multivendor cloud environments, whether your company plans to move legacy on-premises projects to the cloud or build a new infrastructure from the ground up. Developers, IT architects, and security professionals will learn cloud-specific techniques...
Author
Series
Language
English
Formats
Description
Governments and institutions hold secrets you are entitled by law to know. But how do you exercise your right? In this definitive guide, you will learn how to gain access to information and how to pry loose records governments and institutions would prefer not to release. This book walks you through the maze and over the obstacles that stand in the way of your right to know. In the process you will learn more about how your tax dollars are spent and...
Author
Language
English
Formats
Description
"Nuclear weapons, since their conception, have been the subject of secrecy. In the months after the dropping of the atomic bombs on Hiroshima and Nagasaki, the American scientific establishment, the American government, and the American public all wrestled with what was called the "problem of secrecy," wondering not only whether secrecy was appropriate and effective as a means of controlling this new technology but also whether it was compatible with...
Author
Language
English
Formats
Description
"A new and dangerous computer bug is sweeping the internet. But this bug is different. Smart, quick, sophisticated, and developed by elite hackers working for a cybercrime syndicate, it can break through an unknown flaw in the world's most secure computer chips and cripple any system within seconds - the ultimate cyber weapon. Reluctant American cyber sleuth Chuck Drayton unwittingly finds himself caught in the deadly crossfire of an unfolding cyber...
Author
Publisher
University of California Press
Language
English
Formats
Description
"Information is power, and the time is now for digital liberation. Access Rules mounts a strong and hopeful argument for how informational tools at present in the hands of a few could instead become empowering machines for everyone. By forcing data-hoarding companies to open access to their data, we can reinvigorate both our economy and our society. Authors Viktor Mayer-Schönberger and Thomas Ramge contend that if we disrupt monopoly power and create...
Author
Language
English
Formats
Description
"Fox is a mindnet hacker, and works for the mysterious man known only as King. He spends his time uncovering dangerous secrets and releasing them to the public. But those who cause trouble are bound to attract it, and despite their precautions King is taken prisoner by an unknown government. And if Fox is going to save him, he's going to need help--help that comes from the very last place he expected to find it."--
Publisher
Kanopy Streaming
Pub. Date
2014.
Language
English
Description
Be prepared: Value of HIPAA risk assessment. A comprehensive security risk assessment is an important and necessary strategy for health care organizations to identify gaps in their privacy and security environments. While risk assessments alone do not directly mitigate data breaches, risk exposure decreases significantly when an organization knows exactly where protected health information (PHI) resides and how it is handled. We will cover reasons...
Author
Language
English
Formats
Description
"The Freedom of Information Law allows any person to request and obtain, without explanation or justification, existing, identifiable, and unpublished governmental records, including documents, data, and video. Signed into law in New York in 1974, FOIL remains a powerful public panacea in unlocking information and maintaining vital transparency in our state government. Databases detailing public employee compensation, online viewing of highway department...
Author
Language
English
Formats
Description
"Provides a blueprint for more effective government and greater citizen participation. "Transparency" has become the new mantra of politicians and pundits alike. But what does it mean in practice? In this informative, clearly written book community activist Donald Gordon defines the essential features of a transparent government and makes a convincing case that it is critical for a healthy and maturing democracy and the basic liberties we all take...
Author
Language
English
Formats
Description
"Before World War II, transparent government was a proud tradition in the United States. In all but the most serious of circumstances, classification, covert operations, and spying were considered deeply un-American. But after the war, the power to decide what could be kept secret proved too tempting to give up. Since then, we have radically departed from that open tradition, allowing intelligence agencies, black sites, and classified laboratories...