Digital data collection and surveillance gets more pervasive and invasive by the day; but the best ways to protect yourself and your data are all steps you can take yourself. Understanding new technologies and surveillance measures, the benefits they provide, and the data security we give up in order to enjoy them helps us understand our best protection measures. Individual behaviors as well as legislative advances can soften the trade-off of security, and convenience, over privacy. This book analyzes why privacy is important to all of us, and describes the technologies that put your data most at risk, starting with modern computing and the Internet.…mehr
Digital data collection and surveillance gets more pervasive and invasive by the day; but the best ways to protect yourself and your data are all steps you can take yourself. Understanding new technologies and surveillance measures, the benefits they provide, and the data security we give up in order to enjoy them helps us understand our best protection measures. Individual behaviors as well as legislative advances can soften the trade-off of security, and convenience, over privacy. This book analyzes why privacy is important to all of us, and describes the technologies that put your data most at risk, starting with modern computing and the Internet.
By Theresa Payton and Ted Claypoole - Foreword by Hon. Howard A. Schmidt
Inhaltsangabe
Introduction Chapter 1. The Intersection of Privacy, Law, and Technology Tech Section I. Ground Zero: Your Computer and the Internet Chapter 2. Your Computer is Watching You Chapter 3. How Government Follows Your Electronic Tracks Chapter 4. Chased Online by Criminals and Snoops Chapter 5. Just Hanging Our Online . . . Chapter 6. The Spy in Your Pocket Tech Section II. Risks in the Streets Chapter 7. Cameras Everywhere Chapter 8. When Your Car is Just Another Computer Chapter 9. When Your Own Body Gives You Away Chapter 10. DNA and Your Health Records Tech Section III. Home is Where the Heart (of Surveillance) Is Chapter 11. Home Sweet Home: Spies in Your Living Room Chapter 12. Risks of Computer and Phone Networks Tech Section IV. Where Do We Go From Here? Chapter 13. The Future of Technology and Privacy Chapter 14. Laws and Regulations That Could Help Preserve Privacy
Introduction Chapter 1. The Intersection of Privacy, Law, and Technology Tech Section I. Ground Zero: Your Computer and the Internet Chapter 2. Your Computer is Watching You Chapter 3. How Government Follows Your Electronic Tracks Chapter 4. Chased Online by Criminals and Snoops Chapter 5. Just Hanging Our Online . . . Chapter 6. The Spy in Your Pocket Tech Section II. Risks in the Streets Chapter 7. Cameras Everywhere Chapter 8. When Your Car is Just Another Computer Chapter 9. When Your Own Body Gives You Away Chapter 10. DNA and Your Health Records Tech Section III. Home is Where the Heart (of Surveillance) Is Chapter 11. Home Sweet Home: Spies in Your Living Room Chapter 12. Risks of Computer and Phone Networks Tech Section IV. Where Do We Go From Here? Chapter 13. The Future of Technology and Privacy Chapter 14. Laws and Regulations That Could Help Preserve Privacy
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Shop der buecher.de GmbH & Co. KG Bürgermeister-Wegele-Str. 12, 86167 Augsburg Amtsgericht Augsburg HRA 13309