Catalog Search Results
Author
Description
"Your every step online is being tracked and stored, and your identity literally stolen. Big companies and big governments want to know and exploit what you do, and privacy is a luxury few can afford or understand ... Kevin Mitnick uses true-life stories to show exactly what is happening without your knowledge, teaching you "the art of invisibility"--Online and real-world tactics to protect you and your family, using easy step-by-step instructions....
Author
Description
The classic guide to information security-fully updated for the latest attacks and countermeasures Security in Computing, Third Edition systematically demonstrates how to control failures of confidentiality, integrity, and availability in applications, databases, operating systems, and networks alike. This sweeping revision of the field's classic guide to computer security reflects today's entirely new generation of network- and Internet-based threats...
Author
Formats
Description
Data Privacy: A runbook for engineers teaches you how to navigate the trade-off s between strict data security and real world business needs. In this practical book, you'll learn how to design and implement privacy programs that are easy to scale and automate. There's no bureaucratic process--just workable solutions and smart repurposing of existing security tools to help set and achieve your privacy goals.
Description
The Angels are working for the mysterious Charles Townsend, whose security and investigative agency has expanded internationally. With the world's smartest, bravest, and most highly trained women all over the globe, there are now teams of Angels guided by multiple Bosleys taking on the toughest jobs everywhere.
Author
Formats
Description
"The surprising story of the fitful development of the right to privacy--and its battle against the public's right to know--across American history. There is no hotter topic than the desire to constrain tech companies like Facebook from exploiting our personal data, or to keep Alexa from spying on you. Privacy has also provoked constitutional crisis (presidential tax returns) while Justice Clarence Thomas seeks to remove the protection of journalists...
Author
Series
Goon Squad volume 2
Description
"'The candy house' opens with the staggeringly brilliant Bix Bouton, 'a tech demigod on a first name basis with the world.' Bix is forty, with four kids, restless, desperate for a new idea, when he stumbles into a conversation group, mostly Columbia professors, one of whom is experimenting with 'externalizing' memory. It's 2010. Within a decade, Bix's new technology, 'Own Your Unconscious'--which allows you to access every memory you've ever had,...
Author
Formats
Description
Get to grips with cybersecurity and privacy laws to protect your company's data and comply with international privacy standards Key Features Comply with cybersecurity standards and protect your data from hackers Find the gaps in your company's security posture with gap analysis and business impact analysis Understand what you need to do with security and privacy without needing to pay consultants Book Description Cybercriminals are incessantly coming...
Author
Description
"Privacy is gravely endangered in the digital age, and we, the digital citizens, are its principal threat, willingly surrendering it to avail ourselves of new technology, and granting the government and corporations immense power over us. In this highly original work, Firmin DeBrabander begins with this premise and asks how we can ensure and protect our freedom in the absence of privacy"--
Author
Description
Data Privacy: A runbook for engineers teaches you how to navigate the trade-off s between strict data security and real world business needs. In this practical book, you'll learn how to design and implement privacy programs that are easy to scale and automate. There's no bureaucratic process-just workable solutions and smart repurposing of existing security tools to help set and achieve your privacy goals.
Author
Description
Surveillance is a divisive issue--one might say it is inherently controversial. Used by private industry, law enforcement, and for national security, it can be a potent tool for protecting resources and assets. It can also be extremely invasive, calling into question our basic rights to freedom and privacy. Introduction to Surveillance Studies explores technological trends, past- and present-day rationales for surveillance and surveillance devices,...
Author
Description
Many organizations today analyze and share large, sensitive datasets about individuals. Whether these datasets cover healthcare details, financial records, or exam scores, it's become more difficult for organizations to protect an individual's information through deidentification, anonymization, and other traditional statistical disclosure limitation techniques. This practical book explains how differential privacy (DP) can help. Authors Ethan Cowan,...
Author
Formats
Description
"Discusses how to protect personal information from online privacy violations. Covers how to set and store secure passwords, monitor online visibility, safely use social media and apps, and create online profiles. Contains emergency instructions for those who have been hacked or had their identity, phone, or laptop stolen"--
Author
Description
"The essential road map for understanding-and defending-your right to privacy in the twenty-first century. Privacy is disappearing. From our sex lives to our workout routines, the details of our lives once relegated to pen and paper have joined the slipstream of new technology. As a MacArthur fellow and distinguished professor of law at the University of Virginia, acclaimed civil rights advocate Danielle Citron has spent decades working with lawmakers...
Author
Formats
Description
"Social networking has grown into a staple of modern society, but its continued evolution is becoming increasingly detrimental to our lives. Shifts in communication and privacy are affecting us more than we realize or understand. Terms of Service crystallizes the current moment in technology and contemplates its implications: the identity-validating pleasures and perils of online visibility; our newly adopted view of daily life through the lens of...
Author
Description
"This book looks at the way information and data is collected and used by individuals, governments, companies, and organizations. Arguments for both increased security and increased privacy are offered, encouraging readers to think critically about the issues. Topics relevant to children are included, such as being tracked at school, cyberbullying, and online safety."--
Author
Description
"It's our thesis that privacy will be an integral part of the next wave in the technology revolution and that innovators who are emphasizing privacy as an integral part of the product life cycle are on the right track."--The authors of The Privacy Engineer's Manifesto The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value is the first book of its kind, offering industry-proven solutions that go beyond mere theory and adding lucid...
Author
Description
"We are Data explores what identity means in an algorithmic age: how it works, how our lives are controlled by it, and how we can resist it. Algorithms are everywhere, organizing the near limitless data that exists in our world. Derived from our every search, like, click, and purchase, algorithms determine the news we get, the ads we see, the information accessible to us and even who our friends are. These complex configurations not only form knowledge...
Author
Formats
Description
The moment you check your phone in the morning you are giving away data. Before you've even switched off your alarm, a whole host of organisations have been alerted to when you woke up, where you slept, and with whom. As you check the weather, scroll through your 'suggested friends' on Facebook, you continually compromise your privacy. Without your permission, or even your awareness, tech companies are harvesting your information, your location, your...
In Interlibrary Loan
Didn't find what you need? Items not owned by Alachua County Library District can be requested from other Interlibrary Loan libraries to be delivered to your local library for pickup.
Didn't find it?
Can't find what you are looking for? Try our Suggest Materials Service. Submit Request