Digital data collection and surveillance gets more pervasive and invasive by the day; but the best ways to protect yourself and your data are all steps you can take yourself. Understanding new technologies and surveillance measures, the benefits they provide, and the data security we give up in order to enjoy them helps us understand our best protection measures. Individual behaviors as well as legislative advances can soften the trade-off of security, and convenience, over privacy. This book analyzes why privacy is important to all of us, and describes the technologies that put your data most at risk, starting with modern computing and the Internet.…mehr
Digital data collection and surveillance gets more pervasive and invasive by the day; but the best ways to protect yourself and your data are all steps you can take yourself. Understanding new technologies and surveillance measures, the benefits they provide, and the data security we give up in order to enjoy them helps us understand our best protection measures. Individual behaviors as well as legislative advances can soften the trade-off of security, and convenience, over privacy. This book analyzes why privacy is important to all of us, and describes the technologies that put your data most at risk, starting with modern computing and the Internet.Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Theresa Payton is one of America's most respected authorities on Internet security, net crime, fraud mitigation, and technology implementation. As White House Chief Information Officer from 2006 to 2008 -- the first woman ever to hold that position -- she administered the information technology enterprise for the President and 3,000 staff members. Prior to working in federal government, Payton held executive roles in banking technology at Bank of America and Wells Fargo. Payton is the founder of Fortalice, LLC, a security, risk, and fraud consulting company. In 2010, she was named by Security Magazine as one of the top 25 "Most Influential People in Security." She, also, serves as a cyber-expert for the syndicated program America Now and is co-author of Protecting Your Internet Identity: Are You Naked Online? (Rowman & Littlefield, 2012). Theodore Claypoole is a technology attorney and is currently cochair of the Cyberspace Mobile Commerce Subcommittee for the American Bar Association's Business Law Section. Ted is the author of chapters in published books on biometrics and data security, as well as several articles on Internet security and Internet law. He is currently leader of the Privacy and Data Management team at the law firm Womble Carlyle. He leads data breach incident response teams in the financial, information processing, retail, and software industries. Ted consults on information security, privacy, consumer data treatment, and contingency planning matters, and advises clients on strategic technology and marketing alliances. Ted was previously the in-house technology and Internet counsel for CompuServe and Bank of America.
Inhaltsangabe
Introduction Chapter 1. The Intersection of Privacy, Law, and Technology Tech Section I. Ground Zero: Your Computer and the Internet Chapter 2. Your Computer is Watching You Chapter 3. How Government Follows Your Electronic Tracks Chapter 4. Chased Online by Criminals and Snoops Chapter 5. Just Hanging Our Online . . . Chapter 6. The Spy in Your Pocket Tech Section II. Risks in the Streets Chapter 7. Cameras Everywhere Chapter 8. When Your Car is Just Another Computer Chapter 9. When Your Own Body Gives You Away Chapter 10. DNA and Your Health Records Tech Section III. Home is Where the Heart (of Surveillance) Is Chapter 11. Home Sweet Home: Spies in Your Living Room Chapter 12. Risks of Computer and Phone Networks Tech Section IV. Where Do We Go From Here? Chapter 13. The Future of Technology and Privacy Chapter 14. Laws and Regulations That Could Help Preserve Privacy
Introduction Chapter 1. The Intersection of Privacy, Law, and Technology Tech Section I. Ground Zero: Your Computer and the Internet Chapter 2. Your Computer is Watching You Chapter 3. How Government Follows Your Electronic Tracks Chapter 4. Chased Online by Criminals and Snoops Chapter 5. Just Hanging Our Online . . . Chapter 6. The Spy in Your Pocket Tech Section II. Risks in the Streets Chapter 7. Cameras Everywhere Chapter 8. When Your Car is Just Another Computer Chapter 9. When Your Own Body Gives You Away Chapter 10. DNA and Your Health Records Tech Section III. Home is Where the Heart (of Surveillance) Is Chapter 11. Home Sweet Home: Spies in Your Living Room Chapter 12. Risks of Computer and Phone Networks Tech Section IV. Where Do We Go From Here? Chapter 13. The Future of Technology and Privacy Chapter 14. Laws and Regulations That Could Help Preserve Privacy
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826