Digital Privacy: Theory, Technologies, and Practices
Editat de Alessandro Acquisti, Stefanos Gritzalis, Costos Lambrinoudakis, Sabrina di Vimercatien Limba Engleză Hardback – 22 dec 2007
Even though the utilization of personal information can improve customer services, increase revenues, and lower business costs, it can be easily misused and lead to violations of privacy. Important legal, regulatory, and ethical issues have emerged, prompting the need for an urgent and consistent response by electronic societies. Currently there is no book available that combines such a wide range of privacy topics with such a stellar cast of contributors. Filling that void, Digital Privacy: Theory, Techniques, and Practices gives you the foundation for building effective and legal privacy protocols into your business processes.
Preț: 887.70 lei
Preț vechi: 1109.63 lei
-20% Nou
Puncte Express: 1332
Preț estimativ în valută:
169.90€ • 176.71$ • 142.38£
169.90€ • 176.71$ • 142.38£
Carte tipărită la comandă
Livrare economică 13-27 martie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781420052176
ISBN-10: 1420052179
Pagini: 492
Ilustrații: 41 b/w images, 12 tables, 9 halftones and 11 equations
Dimensiuni: 156 x 234 x 32 mm
Greutate: 0.82 kg
Ediția:1
Editura: CRC Press
Colecția Auerbach Publications
ISBN-10: 1420052179
Pagini: 492
Ilustrații: 41 b/w images, 12 tables, 9 halftones and 11 equations
Dimensiuni: 156 x 234 x 32 mm
Greutate: 0.82 kg
Ediția:1
Editura: CRC Press
Colecția Auerbach Publications
Public țintă
Academic, Professional, and Professional Practice & DevelopmentCuprins
Setting the Scene: Introductory Issues. Legal and Regulatory Issues. Technical Issues. Practical Experience and Results – Case Studies. Research Issues.
Notă biografică
Alessandro Acquisti, Stefanos Gritzalis, Costos Lambrinoudakis, Sabrina di Vimercati
Descriere
According to recent surveys, privacy and anonymity are the fundamental issues of concern for most internet users, ranked higher than ease-of-use, spam, and cost. Reflecting the growing interest in this area, this volume provides information on state-of-the-art technologies, best practices, and research results, as well as legal, regulatory, and ethical issues. Featuring contributions from experts in academia, industry, and government, it examines attacks that compromise the path of a message as it travels through the anonymous system. It also introduces a risk model IT firms can use to determine the risks they are exposed to as a result of privacy violations and/or disclosure of personal data.