From predictive policing to self-surveillance to private security, the potential uses to of big data in crime control pose serious legal and ethical challenges relating to privacy, discrimination, and the presumption of innocence.
This book introduces the prevailing domains of recommender systems and cross-device federated learning, highlighting the latest research progress and prospects regarding cross-device federated recommendation.
This book provides emergent knowledge relating to physical, cyber, and human risk mitigation in a practical and readable approach for the corporate environment.
Cyber-terrorism and corporate espionage are increasingly common and devastating threats, making trained network security professionals more important than ever.
This study guide offers 100% coverage of every objective for the Certified Data Privacy Solutions Engineer Exam This resource offers complete, up-to-date coverage of all the material included on the current release of the Certified Data Privacy Solutions Engineer exam.
This self-study guide covers every topic on the Certified Information Privacy Manager examThis resource offers complete, up-to-date coverage of all the material included in the current release of the Certified Information Privacy Manager exam.
The Internet has been transformed in the past years from a system primarily oriented on information provision into a medium for communication and community-building.
The Internet has been transformed in the past years from a system primarily oriented on information provision into a medium for communication and community-building.
The aim of this book is to demonstrate the use of business-driven risk assessments within the privacy impact assessment process to meet the requirements of privacy laws.
Ambient assisted living (AAL) utilizes information and communication technology to empower individuals to maintain an active and independent lifestyle for as long as possible.
Issues of surveillance, control and privacy in relation to the internet are coming to the fore as a result of state concern with security, crime and economic advantage.
Issues of surveillance, control and privacy in relation to the internet are coming to the fore as a result of state concern with security, crime and economic advantage.
A comprehensive guide that will give you hands-on experience to study and overcome financial cyber threatsKey FeaturesProtect your financial environment with cybersecurity practices and methodologiesIdentify vulnerabilities such as data manipulation and fraudulent transactionsProvide end-to-end protection within organizationsBook DescriptionOrganizations have always been a target of cybercrime.
A collection of popular essays from security guru Bruce Schneier In his latest collection of essays, security expert Bruce Schneier tackles a range of cybersecurity, privacy, and real-world security issues ripped from the headlines.
A collection of popular essays from security guru Bruce Schneier In his latest collection of essays, security expert Bruce Schneier tackles a range of cybersecurity, privacy, and real-world security issues ripped from the headlines.
The definitive guide for ensuring data privacy and GDPR compliance Privacy regulation is increasingly rigorous around the world and has become a serious concern for senior management of companies regardless of industry, size, scope, and geographic area.
The definitive guide for ensuring data privacy and GDPR compliance Privacy regulation is increasingly rigorous around the world and has become a serious concern for senior management of companies regardless of industry, size, scope, and geographic area.
An easy-to-read guide to protecting your digital life and your family online The rise of new technologies in our lives, which has taken us from powerful mobile phones to fitness trackers and smart appliances in under a decade, has also raised the need for everyone who uses these to protect themselves from cyber scams and hackers.
An easy-to-read guide to protecting your digital life and your family online The rise of new technologies in our lives, which has taken us from powerful mobile phones to fitness trackers and smart appliances in under a decade, has also raised the need for everyone who uses these to protect themselves from cyber scams and hackers.
Harden the human firewall against the most current threats Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker s repertoire why hack into something when you could just ask for access?
Harden the human firewall against the most current threats Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker s repertoire why hack into something when you could just ask for access?
Discusses the evolution of WHOIS and how policy changes will affect WHOIS place in IT today and in the futureThis book provides a comprehensive overview of WHOIS.
Discusses the evolution of WHOIS and how policy changes will affect WHOIS place in IT today and in the futureThis book provides a comprehensive overview of WHOIS.
Bestselling author Bruce Schneier offers his expert guidance on achieving security on a network Internationally recognized computer security expert Bruce Schneier offers a practical, straightforward guide to achieving security throughout computer networks.
Bestselling author Bruce Schneier offers his expert guidance on achieving security on a network Internationally recognized computer security expert Bruce Schneier offers a practical, straightforward guide to achieving security throughout computer networks.
Leading technology scholars examine how networks powered by algorithms are transforming humanity, posing deep questions about power, freedom, and fairness.
Leading technology scholars examine how networks powered by algorithms are transforming humanity, posing deep questions about power, freedom, and fairness.
This book focuses on artificial intelligence (AI) and machine learning (ML) technologies and how they are progressively being incorporated into a wide range of products, including consumer gadgets, "e;smart"e; personal assistants, cutting-edge medical diagnostic systems, and quantum computing systems.
This book provides a thorough exploration of the intersection between gender-based healthcare disparities and the transformative potential of artificial intelligence (AI) and machine learning (ML).
Integration of AI-Based Manufacturing and Industrial Engineering Systems with the Internet of Things describes how AI techniques, such as deep learning, cognitive computing, and Machine Learning, can be used to analyze massive volumes of data produced by IoT devices in manufacturing environments.