Lessons from the Identity Trail

Large book cover: Lessons from the Identity Trail

Lessons from the Identity Trail

Publisher: Oxford University Press
ISBN/ASIN: 0195372476
ISBN-13: 9780195372472
Number of pages: 592

This volume promises to make important contributions to policy and scholarly thinking about developments in information technologies and changes in social, cultural and personal practices and values. Ian Kerr and his talented colleagues explore the intricacies of privacy, identity and anonymity applying fresh analytical approaches, revealing the limitations of several traditional concepts, and identifying new insights on these critically important issues.

Home page url

Download or read it online for free here:
Download link
(multiple PDF files)

Similar books

Book cover: Approaching ZeroApproaching Zero
by - ManyBooks
This study offers a somewhat European angle on the 'technological counterculture'. The authors draw on technical literature to examine the techniques of American and British phreakers, and describe the biggest international gathering of hackers.
Book cover: Security and Privacy: Global Standards for Ethical Identity ManagementSecurity and Privacy: Global Standards for Ethical Identity Management
by - ANU E Press
This study is principally concerned with the ethical dimensions of identity management technology -- electronic surveillance, the mining of personal data, and profiling -- in the context of transnational crime and global terrorism.
Book cover: Hacker, Hoaxer, Whistleblower, Spy: The many faces of AnonymousHacker, Hoaxer, Whistleblower, Spy: The many faces of Anonymous
by - Verso
Here is the ultimate book on the worldwide movement of hackers, pranksters, and activists that operates under the non-name Anonymous, by the writer the Huffington Post says ''knows all of Anonymous' deepest, darkest secrets.''
Book cover: Forensic DiscoveryForensic Discovery
by - Addison-Wesley Professional
Forensic information can be found everywhere you look. The authors develop tools to collect information from obvious and not so obvious sources, walk through analyses of real intrusions in detail, and discuss the limitations of their approach.