Catalog Search Results
Author
Pub. Date
2015.
Language
English
Description
"Getting someone to tell the truth is an essential skill that very few people possess. In the boardroom, classroom, or our own homes, every day we interact with others and try to get the truth from them. People are often untruthful out of fear of negative consequences associated with divulging information. But if a person is made to forget the long-term outcomes, he or she can be influenced to disclose sensitive information that's being withheld....
Author
Publisher
The MIT Press
Pub. Date
[2021]
Language
English
Description
An expert on computer privacy and security shows how we can build privacy into the design of systems from the start. We are tethered to our devices all day, every day, leaving data trails of our searches, posts, clicks, and communications. Meanwhile, governments and businesses collect our data and use it to monitor us without our knowledge. So we have resigned ourselves to the belief that privacy is hard--choosing to believe that websites do not...
Author
Language
English
Formats
Description
We live in an interconnected world, where security problems like terrorism are spilling across borders, and globalized data networks and e-commerce platforms are reshaping the world economy. This means that states' jurisdictions and rule systems clash. How have they negotiated their differences over freedom and security? Of Privacy and Power investigates how the European Union and United States, the two major regulatory systems in world politics,...
Author
Language
English
Formats
Description
"In The CEO's Digital Survival Guide: A Practical Handbook to Navigating the Future, Nathan Whittacre gives access to the fundamentals of basic operations, features, and the limitations of different computer networks available today. Nathan has years of experience creating systems and processes to help CEOs run their businesses. He gives an easy-to-follow overview of what every CEO needs to know in order to be able to systematically understand, analyze...
Author
Pub. Date
2016.
Language
English
Formats
Description
Reveals the history of espionage and its use of and dependency on technology, beginning with the Second World War and continuing through the Cold War and into the present Internet age where hackers and surveillance are commonplace.
The intertwining forces of computers and espionage are reshaping the entire world: what was once the preserve of a few intelligence agencies now affects us all. BBC security correspondent Gordon Corera's narrative takes...
Author
Language
English
Formats
Description
Technological advances have benefited our world in immeasurable ways, but there is an ominous flip side. Criminals are often the earliest, and most innovative, adopters of technology, and modern times have led to modern crimes. Today's criminals are stealing identities, draining online bank accounts, and erasing computer servers. It's disturbingly easy to activate baby monitors to spy on families, to hack pacemakers to deliver a lethal jolt of electricity,...
Author
Language
English
Formats
Description
"The moment you check your phone in the morning you are giving away data. Before you've even switched off your alarm, a whole host of organizations have been alerted to when you woke up, where you slept, and with whom. As you check the weather, scroll through your 'suggested friends' on Facebook, you continually compromise your privacy. Without your permission, or even your awareness, tech companies are harvesting your information, your location,...
Author
Language
English
Formats
Description
Flaherty examines the passage, revision, and implementation of privacy and data protection laws at the national and state levels in Sweden, Canada, France, Germany, and the United States. He offers a comparative and critical analysis of the challenges data protectors face int their attempt to preserve individual rights.
Author
Language
English
Description
"Never before has there been such a stark dichotomy in marketing: customers demand the type of deep personalization from brands that technology companies like Netflix and Amazon deliver, but they are increasingly leery of offering the type of personal data required to make it happen. Over the years companies have built byzantine "stacks" of various marketing and advertising technology to try and deliver the fabled "right person, right message, right...
Author
Language
English
Formats
Description
"This book looks at the way information and data is collected and used by individuals, governments, companies, and organizations. Arguments for both increased security and increased privacy are offered, encouraging readers to think critically about the issues. Topics relevant to children are included, such as being tracked at school, cyberbullying, and online safety."--
Author
Series
Language
English
Formats
Description
"Essential information on how to protect data in virtual environments! Virtualization is changing the data center architecture and as a result, data protection is is quickly evolving as well. This unique book, written by an industry expert with over eighteen years of data storage/backup experience, shows you how to approach, protect, and manage data in a virtualized environment. You'll get up to speed on data protection problems, explore the data...
Author
Publisher
Wiley
Language
English
Formats
Description
"Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World (9781119643371) was previously published as Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World (9781793464187). While this version features a new cover design and introduction, the remaining content is the same as the prior release and should not be considered a new or updated product. Looking for real-world advice from leading cybersecurity experts?...
Author
Language
English
Description
Filled with spies, hackers, arms dealers, and a few unsung heroes, written like a thriller and a reference, This Is How They Tell Me the World Ends is an astonishing feat of journalism. Based on years of reporting and hundreds of interviews, The New York Times reporter Nicole Perlroth lifts the curtain on a market in shadow, revealing the urgent threat faced by us all if we cannot bring the global cyber arms race to heel.
Zero day: a software bug...
Author
Language
English
Formats
Description
"Datafication threatens human rights, including privacy and the right to self-determination. This book argues not that we should own but that we are our data; and it proposes an expansion of international human rights to recognize and protect our data selves along with our physical ones"--
Author
Language
English
Formats
Description
"This book offers any senior level executive an understanding of the core fundamentals of Cyber Risk, which is critical for any business to remain sustainable and viable in the information age era of disruptive cyber-attacks. For any executive to understand that Cyber Risk is like any other business risk, it needs to be explained in focused non-technical terms. The book provides core foundational precepts of cyber risk that will enable executive leadership...
Author
Series
Language
English
Formats
Description
Businesses are frequently under attack by rivals and antagonists, and their reputations can be ruined by false websites, hacking and rumor-mongering online. Debbie Elicksen, an experienced author on digital issues, guides businesses with a step-by-step plan to protect your brand, restore your image, and deal with the predators attempting to undermine your business [She] provides practical advicxe that will minimize the damage and maximize the response...
Author
Language
English
Formats
Description
"April Falcon Doss, a cybersecurity and privacy expert with experience working for the NSA and the US government, explores the most common types of data being collected about individuals today and delve into how it is being used-sometimes against us-by the private sector, the government, and even our employers and schools"--
Author
Language
English
Formats
Description
"Identity theft. Email hacks. Infrastructure attacks. Credit card fraud. Even murder for hire. All of these crimes can be committed with just a few clicks of a mouse. Cyber criminals can attack at any time, targeting you through a laptop, a smartphone, a television -- even your doorbell or thermostat. The good news? You don't have to be a victim. In this comprehensive, practical, and fact-filled book, global security expert Nick Selby and futurist...