e-books in Computers & Internet: Privacy category
How to Become Anonymous, Secure and Free Onlineby Amy Awol - Smashwords , 2018
This book describes how internet users can become anonymous, secure and free. It gives many free resources and methods for users who want to go anonymous and protect their personal data from being accessed or hacked from outside sources.
(4786 views)
Protecting Children Online?: Cyberbullying Policies of Social Media Companiesby Tijana Milosevic - The MIT Press , 2018
This book investigates regulatory and social pressures that social media companies face in the aftermath of high profile cyberbullying incidents. The author's research evaluates the policies companies develop to protect themselves and users.
(5190 views)
Privacy on the Line: The Politics of Wiretapping and Encryptionby Whitfield Diffie, Susan Landau - The MIT Press , 2007
An insightful study of privacy and security in telecommunications for a post-9/11, post-Patriot Act world. Authors strip away the hype surrounding the policy debate over privacy to examine the national security, commercial and civil liberties issues.
(5153 views)
Global Survey on Internet Privacy and Freedom of Expressionby Toby Mendel et al. - UNESCO , 2012
This book identifies the relationship between freedom of expression and Internet privacy, assessing where they support each other in different circumstances. The book maps out the issues in the current regulatory landscape of Internet privacy ...
(8076 views)
Security and Privacy: Global Standards for Ethical Identity Managementby John Kleinig, et al. - ANU E Press , 2011
This study is principally concerned with the ethical dimensions of identity management technology -- electronic surveillance, the mining of personal data, and profiling -- in the context of transnational crime and global terrorism.
(8884 views)
Controlling Knowledge: Freedom of Information and Privacy Protection in a Networked Worldby Lorna Stefanick - AU Press , 2011
Who controls our access to information, and who decides what others have a right to know about us? Lorna Stefanick offers a user-friendly overview of the regulatory regime that currently governs freedom of information and the protection of privacy.
(10538 views)
Approaching Zeroby Paul Mungo, Bryan Glough - ManyBooks , 1993
This study offers a somewhat European angle on the 'technological counterculture'. The authors draw on technical literature to examine the techniques of American and British phreakers, and describe the biggest international gathering of hackers.
(9554 views)
What If Crime Were Impossible?by N. Richard Wagner - Univ. of Texas San Antonio , 2002
Indeed, what if crime were impossible? This book explores technological possibilities for society, including controversial techniques like computer surveillance and tracking, and sophisticated identification of individuals.
(11030 views)
The Transnational Dimension of Cyber Crime and Terrorismby Abraham D. Sofaer, Seymour E. Goodman - Hoover Institution Press , 2001
The worldwide information infrastructure is today increasingly under attack by cyber criminals and terrorists. These attacks threaten the substantial and ever-growing reliance of commerce, governments, and the public upon the new technology.
(14035 views)
Lessons from the Identity Trailby I. Kerr, C. Lucock, V. Steeves - Oxford University Press , 2009
The authors explore the intricacies of privacy, identity and anonymity applying fresh analytical approaches, revealing the limitations of several traditional concepts, and identifying new insights on these critically important issues.
(14639 views)
Underground: Tales of hacking, madness, and obsessionby Suelette Dreyfus - Mandarin , 1997
The author uncovered one of this country's best kept secrets and in doing so has created a highly intense and enjoyable read. The book is an overview of some computer intrusion incidents and describes the persons behind them.
(15528 views)
The Future of Reputation: Gossip, Rumor, and Privacy on the Internetby Daniel J. Solove - Yale University Press , 2007
A fascinating account of how the Internet is transforming gossip and our ability to protect our own reputations. The author shows that the unconstrained flow of information on the Internet may impede opportunities for self-development and freedom.
(18363 views)
Open Source Security Tools: Practical Guide to Security Applicationsby Tony Howlett - Prentice Hall PTR , 2004
A practical introduction to open source security tools for IT managers. It reviewes the assortment of free and low-cost solutions for all areas of information security. For each security topic, the best open source tool is analysed.
(18603 views)
Forensic Discoveryby Dan Farmer, Wietse Venema - Addison-Wesley Professional , 2005
Forensic information can be found everywhere you look. The authors develop tools to collect information from obvious and not so obvious sources, walk through analyses of real intrusions in detail, and discuss the limitations of their approach.
(20471 views)