Audacity to Spy: How Government, Business & Hackers Rob Us of Privacy
Autor Catherine Nolan, Ashley M Wilson JDen Limba Engleză Paperback – 29 aug 2014
Preț: 107.84 lei
Nou
Puncte Express: 162
Preț estimativ în valută:
20.64€ • 21.44$ • 17.14£
20.64€ • 21.44$ • 17.14£
Carte disponibilă
Livrare economică 13-27 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781935504795
ISBN-10: 1935504797
Pagini: 250
Dimensiuni: 155 x 230 x 18 mm
Greutate: 0.34 kg
Editura: Technics Publications LLC
Colecția Technics Publications LLC (US)
ISBN-10: 1935504797
Pagini: 250
Dimensiuni: 155 x 230 x 18 mm
Greutate: 0.34 kg
Editura: Technics Publications LLC
Colecția Technics Publications LLC (US)
Recenzii
Watch the author describe this informative book in this short video. Ever get the feeling youre being watched? The thieves that steal identities are using cutting-edge, high-tech tools that can take one fact from a social media site, another from an online travel survey, a third from a purchase made via the internet and even access highly confidential medical records. Little by little they piece together your buying habits, your religious and school affiliations, the names of your family and pets, your political views, your driving habits, the places you have vacationed, and much, much more. This is not science fiction and this is not the future, this is what is happening to each and every one of us now - today. And although the vast majority of adults say they are concerned about providing personal information online, nearly 1/3 say they have never used a privacy setting on their computer, never inquired about the charities to whom they donate their money, never worried about someone accessing their medical information and never thought twice about giving a financial institution their social security number over the internet. The Audacity to Spy, written by an attorney with an interest in privacy laws and legislation and her grandmother who is an experienced Information Analyst, reveals the ways in which your identity and personal data have been stolen by various sources. More than warning you about the ways your data can be stolen, at the end of each chapter are suggestions for limiting the amount of personal data that is available to be seized and divulged.