You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
"Digital forensics is the science of collecting the evidence that can be used in a court of law to prosecute the individuals who engage in electronic crime"--Provided by publisher.
This book celebrates the 40th anniversary of the creation of the CRID and the 10th anniversary of its successor, the CRIDS. It gathers twenty-one very high quality contributions on extremely interesting and topical aspects of data protection. The authors come from Europe as well as from the United States of America and Canada. Their contributions have been grouped as follows: 1° ICT Governance; 2° Commodification & Competition; 3° Secret surveillance; 4° Whistleblowing; 5° Social Medias, Web Archiving & Journalism; 6° Automated individual decision-making; 7° Data Security; 8° Privacy by design; 9° Health, AI, Scientific Research & Post-Mortem Privacy. This book is intended for all academics, researchers, students and practitioners who have an interest in privacy and data protection.
"This book's goal is to define electronic SPAM and place its legal implications into context for the readers"--Provided by publisher.
This book presents the most interesting talks given at ISSE/SECURE 2007 - the forum for the interdisciplinary discussion of how to adequately secure electronic business processes. The topics include: Identity Management, Information Security Management - PKI-Solutions, Economics of IT-Security - Smart Tokens, eID Cards, Infrastructure Solutions - Critical Information Infrastructure Protection, Data Protection, Legal Aspects. Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE/SECURE 2007.
This book presents the most interesting talks given at ISSE 2006 - the forum for the interdisciplinary discussion of how to adequately secure electronic business processes. The topics include: Smart Token and e-ID-Card Developments and their Application - Secure Computing and how it will change the way we trust computers - Risk Management and how to quantify security threats - Awareness raising, Data Protection and how we secure corporate information. Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2006.
Annotation Researchers, business people and policy makers have recognized the importance of addressing technological, economic and social impacts in conjunction. For example, the rise and fall of the dot-com hype depended on the strength of the business model, on the technological capabilities avalable to firms and on the readiness of the society and economy, at large, to sustain a new breed of business activity. Social and Economic Transformation in the Digital Era addresses this challenge by assembling the latest thinking of leading researchers and policy makers in key subject areas of the information society and presents innovative business models, case studies, normative theories and social explanations.
The Information Security Solutions Europe Conference (ISSE) was started in 1999 by EEMA and TeleTrusT with the support of the European Commission and the German Federal Minis try of Technology and Economics. Today the annual conference is a fixed event in every IT security professional's calendar. The aim of ISSE is to support the development of a Euro pean information security culture and especially a cross-border framework for trustworthy IT applications for citizens, industry and administration. Therefore, it is important to take into consideration both international developments and European regulations and to allow for the interdisciplinary character of the information security field. I...
"This compilation serves as the ultimate source on all theories and models associated with information privacy and safeguard practices to help anchor and guide the development of technologies, standards, and best practices to meet these challenges."--Provided by publisher.