Udvidet returret til d. 31. januar 2025

Persondata og datasikkerhed

Her finder du spændende bøger om Persondata og datasikkerhed. Nedenfor er et flot udvalg af over 154 bøger om emnet.
Vis mere
Filter
Filter
Sorter efterSorter Populære
  • af William Oettinger
    547,95 kr.

  • af Shimon Brathwaite
    514,95 - 842,95 kr.

  • af Yair Neuman
    660,95 kr.

    Searching for a needle in a haystack is an important task in several contexts of data analysis and decision-making. Examples include identifying the insider threat within an organization, the prediction of failure in industrial production, or pinpointing the unique signature of a solo perpetrator, such as a school shooter or a lone wolf terrorist. It is a challenge different from that of identifying a rare event (e.g., a tsunami) or detecting anomalies because the "needle" is not easily distinguished from the haystack. This challenging context is imbued with particular difficulties, from the lack of sufficient data to train a machine learning model through the identification of the relevant features and up to the painful price of false alarms, which might cause us to question the relevance of machine learning solutions even if they perform well according to common performance criteria. In this book, Prof. Neuman approaches the problem of finding the needle by specifically focusing on the human factor, from solo perpetrators to insider threats. Providing for the first time a deep, critical, multidimensional, and methodological analysis of the challenge, the book offers data scientists and decision makers a deep scientific foundational approach combined with a pragmatic practical approach that may guide them in searching for a needle in a haystack.

  • af Julius Holderer
    527,95 kr.

    This Open Access book explores the dilemma-like stalemate between security and regulatory compliance in business processes on the one hand and business continuity and governance on the other. The growing number of regulations, e.g., on information security, data protection, or privacy, implemented in increasingly digitized businesses can have an obstructive effect on the automated execution of business processes. Such security-related obstructions can particularly occur when an access control-based implementation of regulations blocks the execution of business processes. By handling obstructions, security in business processes is supposed to be improved. For this, the book presents a framework that allows the comprehensive analysis, detection, and handling of obstructions in a security-sensitive way. Thereby, methods based on common organizational security policies, process models, and logs are proposed. The Petri net-based modeling and related semantic and language-based research, aswell as the analysis of event data and machine learning methods finally lead to the development of algorithms and experiments that can detect and resolve obstructions and are reproducible with the provided software.

  • af Mohammad Monshizadeh
    187,95 kr.

  • af Andy Greenberg
    182,95 kr.

    Who Are The Cypherpunks? This is the unauthorized telling of the revolutionary cryptography story behind the motion picture The Fifth Estate in theatres this October, and We Steal Secrets: The Story of Wikileaks, a documentary out now. WikiLeaks brought to light a new form of whistleblowing, using powerful cryptographic code to hide leakers' identities while they spill the private data of government agencies and corporations. But that technology has been evolving for decades in the hands of hackers and radical activists, from the libertarian enclaves of Northern California to Berlin to the Balkans. And the secret-killing machine continues to evolve beyond WikiLeaks, as a movement of hacktivists aims to obliterate the world's institutional secrecy.Forbes journalist Andy Greenberg has traced its shadowy history from the cryptography revolution of the 1970s to Wikileaks founding hacker Julian Assange, Anonymous, and beyond.This is the story of the code and the characters—idealists, anarchists, extremists—who are transforming the next generation's notion of what activism can be.With unrivaled access to such major players as Julian Assange, Daniel Domscheit-Berg, and WikiLeaks' shadowy engineer known as the Architect, never before interviewed, Greenberg unveils the world of politically-motivated hackers—who they are and how they operate.

  • af Frank L. Lewis, Kyriakos G. Vamvoudakis, Yan Wan & mfl.
    2.422,95 kr.

  • - Building Secure Systems in Untrusted Networks
    af Evan Gilman & Doug Barth
    597,95 kr.

    The perimeter defenses guarding your network perhaps are not as secure as you think. Hosts behind the firewall have no defenses of their own, so when a host in the "e;trusted"e; zone is breached, access to your data center is not far behind. Thats an all-too-familiar scenario today. With this practical book, youll learn the principles behind zero trust architecture, along with details necessary to implement it.The Zero Trust Model treats all hosts as if theyre internet-facing, and considers the entire network to be compromised and hostile. By taking this approach, youll focus on building strong authentication, authorization, and encryption throughout, while providing compartmentalized access and better operational agility.Understand how perimeter-based defenses have evolved to become the broken model we use todayExplore two case studies of zero trust in production networks on the client side (Google) and on the server side (PagerDuty)Get example configuration for open source tools that you can use to build a zero trust networkLearn how to migrate from a perimeter-based network to a zero trust network in production

  • - Technology and the End of the Future
    af James Bridle
    117,95 - 163,95 kr.

    ';New Dark Ageis among the most unsettling and illuminating books I've read about the Internet, which is to say that it is among the most unsettling and illuminating books I've read about contemporary life.'New YorkerAs the world around us increases in technological complexity, our understanding of it diminishes. Underlying this trend is a single idea: the belief that our existence is understandable through computation, and more data is enough to help us build a better world. In reality, we are lost in a sea of information, increasingly divided by fundamentalism, simplistic narratives, conspiracy theories, and post-factual politics. Meanwhile, those in power use our lack of understanding to further their own interests. Despite the apparent accessibility of information, we're living in a new Dark Age. From rogue financial systems to shopping algorithms, from artificial intelligence to state secrecy, we no longer understand how our world is governed or presented to us. The media is filled with unverifiable speculation, much of it generated by anonymous software, while companies dominate their employees through surveillance and the threat of automation. In his brilliant new work, leading artist and writer James Bridle surveys the history of art, technology, and information systems, and reveals the dark clouds that gather over our dreams of the digital sublime.

  • af Aljosha Judmayer
    395,95 kr.

    The new field of cryptographic currencies and consensus ledgers, commonly referred to as blockchains, is receiving increasing interest from various different communities. These communities are very diverse and amongst others include: technical enthusiasts, activist groups, researchers from various disciplines, start ups, large enterprises, public authorities, banks, financial regulators, business men, investors, and also criminals. The scientific community adapted relatively slowly to this emerging and fast-moving field of cryptographic currencies and consensus ledgers. This was one reason that, for quite a while, the only resources available have been the Bitcoin source code, blog and forum posts, mailing lists, and other online publications. Also the original Bitcoin paper which initiated the hype was published online without any prior peer review. Following the original publication spirit of the Bitcoin paper, a lot of innovation in this field has repeatedly come from the community itself in the form of online publications and online conversations instead of established peer-reviewed scientific publishing. On the one side, this spirit of fast free software development, combined with the business aspects of cryptographic currencies, as well as the interests of today's time-to-market focused industry, produced a flood of publications, whitepapers, and prototypes. On the other side, this has led to deficits in systematization and a gap between practice and the theoretical understanding of this new field. This book aims to further close this gap and presents a well-structured overview of this broad field from a technical viewpoint. The archetype for modern cryptographic currencies and consensus ledgers is Bitcoin and its underlying Nakamoto consensus. Therefore we describe the inner workings of this protocol in great detail and discuss its relations to other derived systems.

  • af Hamid Jahankhani, Shaun Lawson & Arshad Jamal
    587,95 kr.

  • af Pete Hancock
    197,95 kr.

  • af Sudeep Tanwar
    1.035,95 kr.

  • af Balázs Pejó & Damien Desfontaines
    602,95 kr.

  • af Uttam Ghosh
    682,95 kr.

    The main goal of Internet of Things (IoT) is to make secure, reliable, and fully automated smart environments. However, there are many technological challenges in deploying IoT. This includes connectivity and networking, timeliness, power and energy consumption dependability, security and privacy, compatibility and longevity, and network/protocol standards. Internet of Things and Secure Smart Environments: Successes and Pitfalls provides a comprehensive overview of recent research and open problems in the area of IoT research.Features:Presents cutting edge topics and research in IoTIncludes contributions from leading worldwide researchersFocuses on IoT architectures for smart environmentsExplores security, privacy, and trustCovers data handling and management (accumulation, abstraction, storage, processing, encryption, fast retrieval, security, and privacy) in IoT for smart environmentsThis book covers state-of-the-art problems, presents solutions, and opens research directions for researchers and scholars in both industry and academia.

  • af Tania Sourdin, Jacqueline Meredith & Bin (Louisiana State University Li
    303,95 - 705,95 kr.

  • af Heinz-Adalbert Krebs
    366,95 kr.

    ¿Die fortschreitende Digitalisierung, die immer höhere Verfügbarkeit des Internets in Echtzeit sowie die progressive Entwicklung der IT ermöglichen es Unternehmen und Organisationen, Daten in einem nie zuvor dagewesenen Umfang zu erzeugen und zu verarbeiten, wodurch sie einen enormen Stellen- und Marktwert erhalten haben. Zudem kann mithilfe der künstlichen Intelligenz (KI) das in den Daten enthaltene Wissen extrahiert werden. Oft handelt es sich dabei um gesammelte Daten von Personen, mit denen Vorhersagen über verschiedene Aspekte der Personen getroffen werden können.Das Buch befasst sich mit der Anonymisierung im Kontext der KI und Big Data. Dazu werden die wesentlichen Grundlagen dargestellt sowie pseudonymisierte und anonymisierte Daten mit Personenbezug im Rahmen der Datenschutz-Grundverordnung (DSGVO) und des Bundesdatenschutzgesetzes (BDSG) beleuchtet. Es werden Möglichkeiten zur Pseudonymisierung, zu den jeweiligen Techniken und Verfahren der Anonymisierung sowieentsprechende Risikobetrachtungen behandelt. Abschließend wird die Vorgehensweise der Anonymisierung aus rechtlicher und technischer Sicht unter Anwendung entsprechender Software behandelt.

  • af Lisa Hunter
    72,95 kr.

    Can't remember your passwords? Tired of resetting your passwords? myJot is a convenient tool for jotting down important information we use on a daily basis for work, online accounts, social media, & email. myJot provides a convenient and organized way to keep usernames, passwords & account information centrally located.

  • af Ben Halpert
    317,95 kr.

  • af Parikshit N. Mahalle
    1.966,95 kr.

    This book extends the work from introduction of ubiquitous computing, to the Internet of things to security and to privacy aspects of ubiquitous computing. The uniqueness of this book is the combination of important fields like the Internet of things and ubiquitous computing. It assumes that the readers' goal is to achieve a complete understanding of IoT, smart computing, security issues, challenges and possible solutions. It is not oriented towards any specific use cases and security issues; privacy threats in ubiquitous computing problems are discussed across various domains. This book is motivating to address privacy threats in new inventions for a wide range of stakeholders like layman to educated users, villages to metros and national to global levels. This book contains numerous examples, case studies, technical descriptions, scenarios, procedures, algorithms and protocols. The main endeavour of this book is threat analysis and activity modelling of attacks in order to give an actual view of the ubiquitous computing applications. The unique approach will help readers for a better understanding.

  • af Kashmir Hill
    105,95 kr.

    A thrilling investigation into the secret world of facial recognition technology from an award-winning journalist

  • af André Schindela
    388,95 kr.

    Studienarbeit aus dem Jahr 2019 im Fachbereich Jura - Öffentliches Recht / Sonstiges, Note: 1,3, Europäische Fernhochschule Hamburg, Sprache: Deutsch, Abstract: Die Hausarbeit befasst sich mit der Rechtsstellung des betrieblichen Datenschutzbeauftragten. Begonnen wird in dieser Arbeit mit der historischen Einordnung des Datenschutzes, der Datenschutzbestimmungen und Datenschutzgrundverordnungen, ihrer rechtlichen Grundlagen und deren Anwendungsvoraussetzungen. Es wird dabei auf die Veränderung, der Stellung der öffentlichen und nichtöffentlichen Stellen, eingegangen und das Kontrollsystem nach Forderung des Gesetzgebers ausführlich dargestellt. Das Hauptaugenmerk der Hausarbeit liegt auf dem betrieblichen Datenschutzbeauftragten dessen Erforderlichkeit, die Benennung und die Anforderungen an die Person sowie die Aufgaben, Rechtsstellung und die hierarchische Stellung mit allen Rechten und Pflichten. Abgeschlossen wird die Hausarbeit mit der Beendigung des Amtes, des betrieblichen Datenschutzbeauftragten.

  • af Alexander Roßnagel
    522,95 kr.

    Die in diesem Open-Access-Buch zusammengeführten interdisziplinären Untersuchungen des ¿Forums Privatheit¿ gehen der Frage nach, wie sich die Verwirklichungsbedingungen von Privatheit und Selbstbestimmung durch die Digitalisierung aller Lebensbereiche radikal ändern. Nahezu jede Lebensregung hinterlässt Datenspuren, ermöglicht vielfältige und intensive Datensammlungen über Menschen, unterstützt Verhaltensbeeinflussungen und verstärkt Ungleichgewichte in der Informationsmacht. Es analysiert die Auswirkungen der Digitalisierung auf den rechtlichen und politischen Schutz der Grundrechte, die ökonomischen Beziehungen, die gesellschaftliche Integration und die individuelle Entfaltung. Das Buch zeigt aber auch auf, wie Digitalisierung und ihre gesellschaftlichen Rahmenbedingungen technisch, sozial, ökonomisch und rechtlich gestaltet werden können, um Privatheit und Selbstbestimmung zu schützen.

  • af Hui Li, Jianying Zhou & Xuejia Lai
    580,95 kr.

    This book constitutes the refereed proceedings of the 14th International Conference on Information Security, ISC 2011, held in Xi'an, China, in October 2011. The 25 revised full papers were carefully reviewed and selected from 95 submissions. The papers are organized in topical sections on attacks; protocols; public-key cryptosystems; network security; software security; system security; database security; privacy; digital signatures.

  • af Hsinchun Chen, Daniel Zeng, Wenji Mao, mfl.
    558,95 - 575,95 kr.

  • af Fabio Martinelli, Pierpaolo Degano & Joshua Guttman
    569,95 - 575,95 kr.

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.