The rapid proliferation of smart devices has transformed our lives and industries, but it has also created a complex and evolving cyber threat landscape.
The chapters in this book explore the main domains that represent considerable risks for the respect of privacy, such as education, health, finance or social media.
El objetivo de este documento es examinar el marco legal y jurisprudencial colombiano sobre vigilancia de comunicaciones, a la luz de las capacidades tecnológicas de hoy.
The chapters in this book explore the main domains that represent considerable risks for the respect of privacy, such as education, health, finance or social media.
En este documento exploramos cuál ha sido la respuesta de la ley y la jurisprudencia colombianas frente a las tensiones entre la intimidad y la publicidad de los datos.
Critical infrastructure sectors are those whose assets, systems, and networks, whether physical or virtual, are deemed so important to nations that their incapacitation or destruction would have a crippling effect on national security, national economic security, national public health or safety, or any combination of these.
An accessible introduction to the technical and social construct of digital identity, this book helps students understand how the data they generate through online activities and apps is used and the implications it can have.
Passage of the European Data Protection Directive and other national laws have increased the need for companies and other entities to improve their data protection and privacy controls.
This book offers insights on efficient utilization of homomorphic encryption (HE) for financial cryptography in confidentiality, phishing, anonymity, object and user identity protection.
This book offers insights on efficient utilization of homomorphic encryption (HE) for financial cryptography in confidentiality, phishing, anonymity, object and user identity protection.
This book interrogates the legality of corporate surveillance, offering a corrective approach to protecting privacy through litigation-not through legislation.
A quick, easy-to-read synthesis of theory, guidelines, and evidence-based research, this book offers timely, practical guidance for library and information professionals who must navigate ethical crises in information privacy and stay on top of emerging privacy trends.
This handbook explores smart cities of the future, provides an understanding of their development and management systems, and discusses the technology challenges.
Achieve the gold standard in penetration testing with Kali using this masterpiece, now in its fourth editionKey FeaturesRely on the most updated version of Kali to formulate your pentesting strategiesTest your corporate network against threatsExplore new cutting-edge wireless penetration tools and featuresBook DescriptionKali Linux is a comprehensive penetration testing platform with advanced tools to identify, detect, and exploit the vulnerabilities uncovered in the target network environment.
Do no harm is Alex Schmidt's mantra throughout Deliberate Interventiona book that delves into how policy and design can work together to prevent harms in technology.
Das Standard-Datenschutzmodell (SDM) gilt spätestens seit 2020 deutschlandweit als etabliert, um normative Anforderungen der DSGVO in funktionale Anforderungen an die Praxis der Datenverarbeitungen zu transformieren.
Identifying and stopping the dissemination of fabricated news, hate speech, or deceptive information camouflaged as legitimate news poses a significant technological hurdle.
Recommended textbook for the Open University's postgraduate information security course and the recommended text for all IBITGQ ISO 27001 coursesIn this updated edition, renowned ISO 27001/27002 experts Alan Calder and Steve Watkins:Discuss the ISO 27001/27002:2022 updates;Provide guidance on how to establish a strong IT governance system and an ISMS (information security management system) that complies with ISO 27001 and ISO 27002;Highlight why data protection and information security are vital in our ever-changing online and physical environments;Reflect on changes to international legislation, e.