Privacy and data protection Books

Sidebar Sidebar Sidebar
  • Ransomware Analysis Ransomware Analysis
    Add to Cart The item has been added

    Ransomware Analysis

    This book presents the development of a classification scheme to organize and represent ransomware threat knowledge through the implementation of an innovative methodology centred around the semantic annotation of domain-specific source documentation.
    $282.00

    Add to Cart The item has been added
  • Industrial Internet of Things Security
    Add to Cart The item has been added

    Industrial Internet of Things Security

    The industrial landscape and global society are changing rapidly, driven by the growing adoption of the Industrial Internet of Things (IIoT) and Artificial Intelligence (AI) technologies. As IIoT and AI become more pervasive, they also offer new security...
    $257.00

    Add to Cart The item has been added
  • Privacy-Preserving in Mobile Crowdsensing Privacy-Preserving in Mobile Crowdsensing
    Add to Cart The item has been added

    Privacy-Preserving in Mobile Crowdsensing

    Mobile crowdsensing is a new sensing paradigm that utilizes the intelligence of a crowd of individuals to collect data for mobile purposes by using their portable devices, such as smartphones and wearable devices. Commonly, individuals are incentivized...
    $270.00

    Add to Cart The item has been added
  • Federated Learning Federated Learning
    Add to Cart The item has been added

    Federated Learning

    This book introduces readers to the fundamentals of and recent advances in federated learning, focusing on reducing communication costs, improving computational efficiency, and enhancing the security level. Federated learning is a distributed machine...
    $335.00

    Add to Cart The item has been added
  • Privacy-Preserving in Edge Computing Privacy-Preserving in Edge Computing
    Add to Cart The item has been added

    Privacy-Preserving in Edge Computing

    With the rapid development of big data, it is necessary to transfer the massive data generated by end devices to the cloud under the traditional cloud computing model. However, the delays caused by massive data transmission no longer meet the...
    $249.00

    Add to Cart The item has been added
  • Compressed Sensing for Privacy-Preserving Data Processing Compressed Sensing for Privacy-Preserving Data Processing
    Add to Cart The item has been added

    Compressed Sensing for Privacy-Preserving Data Processing

    The objective of this book is to provide the reader with a comprehensive survey of the topic compressed sensing in information retrieval and signal detection with privacy preserving functionality without compromising the performance of the embedding in...
    $92.00

    Add to Cart The item has been added
  • Location Privacy in Mobile Applications Location Privacy in Mobile Applications
    Add to Cart The item has been added

    Location Privacy in Mobile Applications

    This book provides a comprehensive study of the state of the art in location privacy for mobile applications. It presents an integrated five-part framework for location privacy research, which includes the analysis of location privacy definitions,...
    $92.00

    Add to Cart The item has been added
  • The State of the Internet The State of the Internet
    Add to Cart The item has been added

    The State of the Internet

    The Internet has become one of the most peculiar realms that humanity has ever created. Come along as Ryan Richardson Barrett explains the elaborate networks that the Internet is comprised of in their current state and how they came to be. Outlined...
    $31.00

    Add to Cart The item has been added
  • 搭建自己的 IPsec VPN, OpenVPN 和 WireGuard 伺服器 搭建自己的 IPsec VPN, OpenVPN 和 WireGuard 伺服器
    Add to Cart The item has been added

    搭建自己的 IPsec VPN, OpenVPN 和 WireGuard 伺服器

    了解如何在雲端或 Raspberry Pi 上搭建自己的 VPN 伺服器本書是搭建你自己的 IPsec VPN、OpenVPN 和 WireGuard 伺服器的綜合指南(繁體版)。基於 10 年和擁有數百萬用戶的開源工作,本書涵蓋了搭建你自己的 VPN 所需了解的所有內容。通過閱讀本書,你將了解如何:✔ 創建雲端伺服器並使用 SSH 連接✔ 安裝帶 IKEv2 的 IPsec VPN、OpenVPN 和 WireGuard✔ 自定義 VPN 選項、高級用法和故障排除✔ 在 Docker 上運行帶...
    $36.00

    Add to Cart The item has been added
  • 搭建自己的 IPsec VPN, OpenVPN 和 WireGuard 服务器 搭建自己的 IPsec VPN, OpenVPN 和 WireGuard 服务器
    Add to Cart The item has been added

    搭建自己的 IPsec VPN, OpenVPN 和 WireGuard 服务器

    了解如何在云端或 Raspberry Pi 上搭建自己的 VPN 服务器本书是搭建你自己的 IPsec VPN、OpenVPN 和 WireGuard 服务器的综合指南(简体版)。基于 10 年和拥有数百万用户的开源工作,本书涵盖了搭建你自己的 VPN 所需了解的所有内容。通过阅读本书,你将了解如何:✔ 创建云服务器并使用 SSH 连接✔ 安装带 IKEv2 的 IPsec VPN、OpenVPN 和 WireGuard✔ 自定义 VPN 选项、高级用法和故障排除✔ 在 Docker 上运行带...
    $36.00

    Add to Cart The item has been added
  • Set Up Your Own IPsec VPN, OpenVPN and WireGuard Server Set Up Your Own IPsec VPN, OpenVPN and WireGuard Server
    Add to Cart The item has been added

    Set Up Your Own IPsec VPN, OpenVPN and WireGuard Server

    Learn how to build your own VPN server in the cloud or on a Raspberry PiThis book is a comprehensive guide to building your own IPsec VPN, OpenVPN and WireGuard server. Based on 10 years of open source work with millions of users, this book covers...
    $43.00

    Add to Cart The item has been added
  • Futuro Descentralizado Futuro Descentralizado
    Add to Cart The item has been added

    Futuro Descentralizado

    ¿Qué se entiende por blockchain y bitcoin? ¿Cuáles son las trampas y la potencialidad de la Inteligencia Artificial? ¿Cómo interactúan ambas? ¿En qué medida son capaces de cambiar nuestra vida? Estas y otras preguntas se formula Claudio Fiorillo en un...
    $30.00

    Add to Cart The item has been added
  • Secure Internet Programming Secure Internet Programming
    Add to Cart The item has been added

    Secure Internet Programming

    Large-scale open distributed systems provide an infrastructure for assembling global applications on the basis of software and hardware components originating from multiple sources. Open systems rely on publicly available...
    $92.00

    Add to Cart The item has been added
  • Designing for Privacy and its Legal Framework Designing for Privacy and its Legal Framework
    Add to Cart The item has been added

    Designing for Privacy and its Legal Framework

    This book discusses the implementation of privacy by design in Europe, a principle that has been codified within the European Data Protection Regulation (GDPR). While privacy by design inspires hope for future privacy-sensitive designs, it also...
    $270.00

    Add to Cart The item has been added
  • Differential Privacy and Applications Differential Privacy and Applications
    Add to Cart The item has been added

    Differential Privacy and Applications

    This book focuses on differential privacy and its application with an emphasis on technical and application aspects. This book also presents the most recent research on differential privacy with a theory perspective. It provides an approachable strategy...
    $335.00

    Add to Cart The item has been added
  • Data Protection in a Post-Pandemic Society Data Protection in a Post-Pandemic Society
    Add to Cart The item has been added

    Data Protection in a Post-Pandemic Society

    This book offers the latest research results and predictions in data protection with a special focus on post-pandemic society. This book also includes various case studies and applications on data protection. It includes the Internet of Things (IoT),...
    $348.00

    Add to Cart The item has been added
  • Image coming soon
    Add to Cart The item has been added

    Autonomous Intelligent Cyber Defense Agent (AICA)

    This book offers a structured overview and a comprehensive guide to the emerging field of Autonomous Intelligent Cyber Defense Agents (AICA). The book discusses the current technical issues in autonomous cyber defense and offers information on practical...
    $270.00

    Add to Cart The item has been added
  • Image coming soon
    Add to Cart The item has been added

    Security and Risk Analysis for Intelligent Edge Computing

    This book offers the latest research results in security and privacy for Intelligent Edge Computing Systems. It presents state-of-the art content and provides an in-depth overview of the basic background in this related field. Practical areas in both...
    $337.00

    Add to Cart The item has been added
  • Image coming soon
    Add to Cart The item has been added

    Blockchain for Cybersecurity in Cyber-Physical Systems

    This book offers the latest research results on blockchain technology and its application for cybersecurity in cyber-physical systems (CPS). It presents crucial issues in this field and provides a sample of recent advances and insights into the research...
    $335.00

    Add to Cart The item has been added
  • Linking Sensitive Data Linking Sensitive Data
    Add to Cart The item has been added

    Linking Sensitive Data

    This book provides modern technical answers to the legal requirements of pseudonymisation as recommended by privacy legislation. It covers topics such as modern regulatory frameworks for sharing and linking sensitive information, concepts and algorithms...
    $270.00

    Add to Cart The item has been added
  • Algorithms for Data and Computation Privacy Algorithms for Data and Computation Privacy
    Add to Cart The item has been added

    Algorithms for Data and Computation Privacy

    This book introduces the state-of-the-art algorithms for data and computation privacy. It mainly focuses on searchable symmetric encryption algorithms and privacy preserving multi-party computation algorithms. This book also introduces algorithms for...
    $238.00

    Add to Cart The item has been added
  • Cybersecurity and Secure Information Systems Cybersecurity and Secure Information Systems
    Add to Cart The item has been added

    Cybersecurity and Secure Information Systems

    This book provides a concise overview of the current state of the art in cybersecurity and shares novel and exciting ideas and techniques, along with specific cases demonstrating their practical application. It gathers contributions by both academic and...
    $184.00

    Add to Cart The item has been added
  • 搭建自己的 VPN 伺服器分步指南 搭建自己的 VPN 伺服器分步指南
    Add to Cart The item has been added

    搭建自己的 VPN 伺服器分步指南

    了解如何在雲端或 Raspberry Pi 上搭建自己的 VPN 伺服器本書是搭建你自己的 IPsec VPN, OpenVPN 和 WireGuard 伺服器的分步指南(繁體版)。基於 10 年和擁有數百萬用戶的開源工作,本書將幫助你在幾分鐘內搭建自己的 VPN,即使你之前沒有設置過伺服器或使用過 VPN。通過閱讀本書,你將了解如何:✔ 在 DigitalOcean, Vultr, Linode 和 OVH 上創建雲端伺服器✔ 使用 SSH 連接並安裝 WireGuard, OpenVPN 和帶...
    $22.00

    Add to Cart The item has been added
  • 搭建自己的 VPN 服务器分步指南 搭建自己的 VPN 服务器分步指南
    Add to Cart The item has been added

    搭建自己的 VPN 服务器分步指南

    了解如何在云端或 Raspberry Pi 上搭建自己的 VPN 服务器本书是搭建你自己的 IPsec VPN, OpenVPN 和 WireGuard 服务器的分步指南(简体版)。基于 10 年和拥有数百万用户的开源工作,本书将帮助你在几分钟内搭建自己的 VPN,即使你之前没有设置过服务器或使用过 VPN。通过阅读本书,你将了解如何:✔ 在 DigitalOcean, Vultr, Linode 和 OVH 上创建云服务器✔ 使用 SSH 连接并安装 WireGuard, OpenVPN 和带...
    $22.00

    Add to Cart The item has been added
  • Risk Assessment and Countermeasures for Cybersecurity Risk Assessment and Countermeasures for Cybersecurity
    Add to Cart The item has been added

    Risk Assessment and Countermeasures for Cybersecurity

    The relentless growth of cyber threats poses an escalating challenge to our global community. The current landscape of cyber threats demands a proactive approach to cybersecurity, as the consequences of lapses in digital defense reverberate across...
    $509.00

    Add to Cart The item has been added
  • Safeguarding Financial Data in the Digital Age Safeguarding Financial Data in the Digital Age
    Add to Cart The item has been added

    Safeguarding Financial Data in the Digital Age

    Despite advancements in cybersecurity measures, the financial sector continues to grapple with data breaches, fraud, and privacy concerns. Traditional security measures are often insufficient to combat sophisticated cyber threats, leading to financial...
    $565.00

    Add to Cart The item has been added
  • Social Media Security Social Media Security
    Add to Cart The item has been added

    Social Media Security

    "Social Media Security: Protecting Your Digital Life" is a comprehensive guidebook that aims to educate readers on the risks and threats associated with social media platforms. The book starts with an introduction to the Wild West of social...
    $22.00

    Add to Cart The item has been added
  • Windows 11 Datenschutzfibel Windows 11 Datenschutzfibel
    Add to Cart The item has been added

    Windows 11 Datenschutzfibel

    Datenschutz ist für immer mehr Menschen ein wichtiges Thema, gerade auch bei Windows 11. Das beliebte Betriebssystem ist durch Onlinekonten, Cloud-Diensten und Telemetrie-Funktionen eng mit den Datensammeldiensten von Microsoft verknüpft. Zwar lassen...
    $34.00

    Add to Cart The item has been added
  • Digitale Signaturen. Das Lamport-Diffie-Einmal-Signaturverfahren, RSA-Signaturverfahren, Merkle-Signaturverfahren und der Digital Signature Algorithm Digitale Signaturen. Das Lamport-Diffie-Einmal-Signaturverfahren, RSA-Signaturverfahren, Merkle-Signaturverfahren und der Digital Signature Algorithm
    Add to Cart The item has been added

    Digitale Signaturen. Das Lamport-Diffie-Einmal-Signaturverfahren, RSA-Signaturverfahren, Merkle-Signaturverfahren und der Digital Signature Algorithm

    Studienarbeit aus dem Jahr 2020 im Fachbereich Informatik - IT-Security, Note: 1,0, Friedrich-Alexander-Universität Erlangen-Nürnberg, Sprache: Deutsch, Abstract: In dieser Arbeit werden die wichtigsten digitalen Signatur-Verfahren in ihren Grundzügen...
    $66.00

    Add to Cart The item has been added
  • Cybersecurity Enforcement and Monitoring Solutions Cybersecurity Enforcement and Monitoring Solutions
    Add to Cart The item has been added

    Cybersecurity Enforcement and Monitoring Solutions

    If you want to become a Cybersecurity Professional, this book is for you! IT Security jobs are on the rise! Small, medium or large size companies are always on the look out to get on board bright individuals to provide their services for Business as...
    $42.00

    Add to Cart The item has been added
  • Cybersecurity and Privacy Law Handbook Cybersecurity and Privacy Law Handbook
    Add to Cart The item has been added

    Cybersecurity and Privacy Law Handbook

    Get to grips with cybersecurity and privacy laws to protect your company's data and comply with international privacy standardsKey Features:Comply with cybersecurity standards and protect your data from hackersIdentify the gaps in your company's security...
    $109.00

    Add to Cart The item has been added
  • Combating Crime on the Dark Web Combating Crime on the Dark Web
    Add to Cart The item has been added

    Combating Crime on the Dark Web

    Know your enemy and counter the dark web criminality with this easy-to-follow guide, including a detailed tour of the dark web ecosystem and the tools and tactics used to mitigate cyber threatsKey Features:Get up to speed with the ins and outs of...
    $81.00

    Add to Cart The item has been added
  • Hands-On Web Penetration Testing with Metasploit Hands-On Web Penetration Testing with Metasploit
    Add to Cart The item has been added

    Hands-On Web Penetration Testing with Metasploit

    Identify, exploit, and test web application security with easeKey FeaturesGet up to speed with Metasploit and discover how to use it for pentestingUnderstand how to exploit and protect your web environment effectivelyLearn how an exploit works and what...
    $103.00

    Add to Cart The item has been added
  • Your Safety and Privacy Online Your Safety and Privacy Online
    Add to Cart The item has been added

    Your Safety and Privacy Online

    The purpose of this book is to provide an average computer user with the knowledge that will help them stay safe while online, as well as help them make privacy choices that work for them. My goal is to explain online threats in terms that don't...
    $36.00

    Add to Cart The item has been added
  • Social Media Investigation for Law Enforcement Social Media Investigation for Law Enforcement
    Add to Cart The item has been added

    Social Media Investigation for Law Enforcement

    Social media is becoming an increasingly important-and controversial-investigative source for law enforcement. Social Media Investigation for Law Enforcement provides an overview of the current state of digital forensic investigation of Facebook and...
    $473.00

    Add to Cart The item has been added
  • Testing and Securing Web Applications Testing and Securing Web Applications
    Add to Cart The item has been added

    Testing and Securing Web Applications

    Web applications occupy a large space within the IT infrastructure of a business or a corporation. They simply just don't touch a front end or a back end; today's web apps impact just about every corner of it. Today's web apps have become complex, which...
    $365.00

    Add to Cart The item has been added
  • Build Your Own VPN Server Build Your Own VPN Server
    Add to Cart The item has been added

    Build Your Own VPN Server

    Learn how to build your own VPN server in the cloud or on a Raspberry PiThis book is a step-by-step guide to building your own IPsec VPN, OpenVPN and WireGuard server. Based on 10 years of open source work with millions of users, this book will help you...
    $22.00

    Add to Cart The item has been added
  • Security Management System of Cyber Cafes Security Management System of Cyber Cafes
    Add to Cart The item has been added

    Security Management System of Cyber Cafes

    "Security Management System of Cyber Cafes" is a comprehensive and practical guide that outlines effective strategies and best practices for ensuring the security of cyber cafes. Written by industry experts and cybersecurity professionals, this book...
    $64.00

    Add to Cart The item has been added
  • Online Traffic & Advertisements Online Traffic & Advertisements
    Add to Cart The item has been added

    Online Traffic & Advertisements

    One strategy to draw some attention to the website when launching an internet business at a low startup cost is through traffic. This is essentially a mechanism that makes sure each person's site is included in the viewing arrangement by having sites...
    $22.00

    Add to Cart The item has been added
  • Implementing Palo Alto Networks Prisma® Access Implementing Palo Alto Networks Prisma® Access
    Add to Cart The item has been added

    Implementing Palo Alto Networks Prisma® Access

    Deploy Prisma Access for mobile users, remote networks, and service connections harnessing advanced featuresKey Features- Find out how to activate, deploy, and configure Prisma Access- Configure mobile user and remote network security processing nodes-...
    $115.00

    Add to Cart The item has been added
  • Image coming soon
    Add to Cart The item has been added

    Advanced Network Simulations Simplified

    Get to grips with the essential concepts and features of ns-3 using practical examples and assessmentsPurchase of the print or Kindle book includes a free PDF eBookKey Features:Explore network simulation for development, testing, and evaluation...
    $98.00

    Add to Cart The item has been added
Privacy and data protection