Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Help

Privacy


1. 

PGP & GPG

PGP & GPG

By: 

Publisher: No Starch Press

Publication Date: 18-APR-2006

Insert Date: 18-OCT-2013

Slots: 1.0

Table of Contents • Start Reading

PGP & GPG is an easy-to read, informal tutorial for implementing electronic privacy on the cheap using the standard tools of the email privacy field - commercial PGP and non-commercial GnuPG (GPG). The book shows how to integrate these OpenPGP implementations into the most common email clients and how to use PGP and GPG in daily email correspondence to both send and receive encrypted email....

2. 

Simple Steps to Data Encryption

Simple Steps to Data Encryption

By: Peter Loshin

Publisher: Syngress

Publication Date: 30-APR-2013

Insert Date: 17-AUG-2013

Slots: 1.0

Table of Contents • Start Reading

Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who want just enough information about encryption to use it safely and securely and appropriately--WITHOUT having to become experts in cryptography. Data encryption is a powerful tool, if used properly. Encryption turns ordinary, readable data into what...

3. 

Privacy Protection for E-Services

Privacy Protection for E-Services

By: George Yee

Publisher: IGI Global

Publication Date: 31-MAR-2006

Insert Date: 23-MAR-2013

Slots: 1.0

Table of Contents • Start Reading

There is a deep need for privacy education and technology with which to educate the e-services industry, and provide it the tools to build privacy preserving e-services. Privacy Protection for E-Services fulfills this need by reporting on the latest advances in privacy protection issues and technologies for e-services, covering important material, such as: consumer empowerment, assessing privacy risks, security technologies needed for privacy protection, systems for privacy policy enforcement, and even methods for assessing privacy technologies. Privacy Protection for E-Services is a...

4. 

Privacy Solutions and Security Frameworks in Information Protection

Privacy Solutions and Security Frameworks in Information Protection

By: Hamid Nemati

Publisher: IGI Global

Publication Date: 30-SEP-2012

Insert Date: 04-JAN-2013

Slots: 1.0

Table of Contents • Start Reading

While information technology continues to play a vital role in every aspect of our lives, there is a greater need for the security and protection of this information.  Ensuring the trustworthiness and integrity is important in order for data to be used appropriately.Privacy Solutions and Security Frameworks in Information Protection explores the areas of concern in guaranteeing the security and privacy of data and related technologies. This reference source includes a range of topics in information security and privacy provided for a diverse readership ranging from academic and...

5. 

Privacy in Social Networks

Privacy in Social Networks

By: Elena Zheleva; Evimaria Terzi; Lise Getoor

Publisher: Morgan & Claypool Publishers

Publication Date: 01-MAR-2013

Insert Date: 25-SEP-2012

Slots: 1.0

Table of Contents • Start Reading

This synthesis lecture provides a survey of work on privacy in online social networks (OSNs). This work encompasses concerns of users as well as service providers and third parties. Our goal is to approach such concerns from a computer-science perspective, and building upon existing work on privacy, security, statistical modeling and databases to provide an overview of the technical and algorithmic issues related to privacy in OSNs. We start our survey by introducing a simple OSN data model and describe common statistical-inference techniques that can be used to infer potentially sensitive...

6. 

Optimizing Information Security and Advancing Privacy Assurance

Optimizing Information Security and Advancing Privacy Assurance

By: Hamid Nemati

Publisher: IGI Global

Publication Date: 31-JAN-2012

Insert Date: 07-JAN-2012

Slots: 1.0

Table of Contents • Start Reading

Optimizing Information Security and Advancing Privacy Assurance: New Technologies reviews issues and trends in security and privacy at an individual user level, as well as within global enterprises. Enforcement of existing security technologies, factors driving their use, and goals for ensuring the continued security of information systems are discussed in this multidisciplinary collection of research, with the primary aim being the continuation and promotion of methods and theories in this far-reaching discipline....

7. 

Pervasive Information Security and Privacy Developments: Trends and Advancements

Pervasive Information Security and Privacy Developments: Trends and Advancements

By: Hamid Nemati

Publisher: IGI Global

Publication Date: 31-JUL-2010

Insert Date: 02-DEC-2011

Slots: 1.0

Table of Contents • Start Reading

Pervasive Information Security and Privacy Developments: Trends and Advancements compiles research on topics such as technical, regulatory, organizational, managerial, cultural, ethical, and human aspects of information security and privacy. This reference offers methodologies, research frameworks, theory development and validation, case studies, simulations, technological architectures, infrastructure issues in design, and implementation of secure and privacy preserving initiatives. ...

8. 

The Silicon Jungle

The Silicon Jungle

By: Shumeet Baluja

Publisher: Princeton University Press

Publication Date: 28-MAR-2011

Insert Date: 03-OCT-2011

Slots: 1.0

Table of Contents • Start Reading

What happens when a naive intern is granted unfettered access to people's most private thoughts and actions? Young Stephen Thorpe lands a coveted internship at Ubatoo, an Internet empire that provides its users with popular online services, from a search engine and shopping to e-mail and social networking. When Stephen's boss asks him to work on a project with the American Coalition for Civil Liberties, Stephen innocently obliges, believing he is mining Ubatoo's vast databases to protect the ever-growing number of people unfairly targeted in the name of national security. But nothing is...

9. 

Privacy and Big Data

Privacy and Big Data

By: ;

Publisher: O'Reilly Media, Inc.

Publication Date: 22-SEP-2011

Insert Date: 17-SEP-2011

Slots: 1.0

Table of Contents • Start Reading

There is a perfect storm brewing. While data is growing at an exponential rate, technology is pushing the transformation envelope making data aggregation and large scale analytic computation easy. What is the most valuable commodity on the market today? It’s us. We are the asset that every company, industry, non-profit, and government agency (civil, internal security, military, or intelligence) wants. In fact, the investment community is placing huge bets on “us.” Our personal digital data is now considered more valuable than diamonds, rubies, gold, or platinum....

10. 

Privacy What Developers and IT Professionals Should Know

Privacy What Developers and IT Professionals Should Know

By: 

Publisher: Addison-Wesley Professional

Publication Date: 21-SEP-2004

Insert Date: 29-JAN-2005

Slots: 1.0

Table of Contents • Start Reading

Praise for J.C. Cannon's Privacy "A wonderful exploration of the multifaceted work being done to protect the privacy of users, clients, companies, customers, and everyone in between." —Peter Wayner, author of Translucent Databases "Cannon provides an invaluable map to guide developers through the dark forest created by the collision of cutting-edge software development and personal privacy." —Eric Fredericksen, Sr. Software Engineer, PhD., Foundstone, Inc. "Cannon's book is the most comprehensive work today on privacy for managers and developers. I cannot name any technical areas...