Logo

Computers & Internet: Privacy

e-books in Computers & Internet: Privacy category

Book cover: Privacy on the Line: The Politics of Wiretapping and EncryptionPrivacy on the Line: The Politics of Wiretapping and Encryption
by - The MIT Press ,
An insightful study of privacy and security in telecommunications for a post-9/11, post-Patriot Act world. Authors strip away the hype surrounding the policy debate over privacy to examine the national security, commercial and civil liberties issues.
(315 views)

Book cover: Hacker, Hoaxer, Whistleblower, Spy: The many faces of AnonymousHacker, Hoaxer, Whistleblower, Spy: The many faces of Anonymous
by - Verso ,
Here is the ultimate book on the worldwide movement of hackers, pranksters, and activists that operates under the non-name Anonymous, by the writer the Huffington Post says ''knows all of Anonymous' deepest, darkest secrets.''
(603 views)
Book cover: Global Survey on Internet Privacy and Freedom of ExpressionGlobal Survey on Internet Privacy and Freedom of Expression
by - UNESCO ,
This book identifies the relationship between freedom of expression and Internet privacy, assessing where they support each other in different circumstances. The book maps out the issues in the current regulatory landscape of Internet privacy ...
(3231 views)
Book cover: Security and Privacy: Global Standards for Ethical Identity ManagementSecurity and Privacy: Global Standards for Ethical Identity Management
by - ANU E Press ,
This study is principally concerned with the ethical dimensions of identity management technology -- electronic surveillance, the mining of personal data, and profiling -- in the context of transnational crime and global terrorism.
(4237 views)
Book cover: Approaching ZeroApproaching Zero
by - ManyBooks ,
This study offers a somewhat European angle on the 'technological counterculture'. The authors draw on technical literature to examine the techniques of American and British phreakers, and describe the biggest international gathering of hackers.
(4371 views)
Book cover: What If Crime Were Impossible?What If Crime Were Impossible?
by - Univ. of Texas San Antonio ,
Indeed, what if crime were impossible? This book explores technological possibilities for society, including controversial techniques like computer surveillance and tracking, and sophisticated identification of individuals.
(5385 views)
Book cover: The Transnational Dimension of Cyber Crime and TerrorismThe Transnational Dimension of Cyber Crime and Terrorism
by - Hoover Institution Press ,
The worldwide information infrastructure is today increasingly under attack by cyber criminals and terrorists. These attacks threaten the substantial and ever-growing reliance of commerce, governments, and the public upon the new technology.
(7538 views)
Book cover: Lessons from the Identity TrailLessons from the Identity Trail
by - Oxford University Press ,
The authors explore the intricacies of privacy, identity and anonymity applying fresh analytical approaches, revealing the limitations of several traditional concepts, and identifying new insights on these critically important issues.
(9303 views)
Book cover: Underground: Tales of hacking, madness, and obsessionUnderground: Tales of hacking, madness, and obsession
by - Mandarin ,
The author uncovered one of this country's best kept secrets and in doing so has created a highly intense and enjoyable read. The book is an overview of some computer intrusion incidents and describes the persons behind them.
(9641 views)
Book cover: The Future of Reputation: Gossip, Rumor, and Privacy on the InternetThe Future of Reputation: Gossip, Rumor, and Privacy on the Internet
by - Yale University Press ,
A fascinating account of how the Internet is transforming gossip and our ability to protect our own reputations. The author shows that the unconstrained flow of information on the Internet may impede opportunities for self-development and freedom.
(11043 views)
Book cover: Open Source Security Tools: Practical Guide to Security ApplicationsOpen Source Security Tools: Practical Guide to Security Applications
by - Prentice Hall PTR ,
A practical introduction to open source security tools for IT managers. It reviewes the assortment of free and low-cost solutions for all areas of information security. For each security topic, the best open source tool is analysed.
(11136 views)
Book cover: Forensic DiscoveryForensic Discovery
by - Addison-Wesley Professional ,
Forensic information can be found everywhere you look. The authors develop tools to collect information from obvious and not so obvious sources, walk through analyses of real intrusions in detail, and discuss the limitations of their approach.
(11263 views)