|
|
737件中 1件 - 30件
1 2 3 4 5 6
| 商品 | 説明 | 価格 |

Your Face Belongs to Us: A Tale of Ai, a Secretive Startup, and the End of Privacy YOUR FACE BELONGS TO US [ Kashmir Hill ]
楽天ブックス
|
YOUR FACE BELONGS TO US Kashmir Hill RANDOM HOUSE2024 Paperback English ISBN:9780593448571 洋書 Computers & Science(コンピューター&科学) Technology
|
3,960円
|

Beyond the Algorithm AI, Security, Privacy, and Ethics【電子書籍】[ Omar Santos ]
楽天Kobo電子書籍ストア
|
<p>As artificial intelligence (AI) becomes more and more woven into our everyday livesーand underpins so much of the infrastructure we rely onーthe ethical, security, and privacy implications require a critical approach that draws not simply on the programming and algorithmic foundations of the technology.</p> <p>Bringing together legal studies, philosophy, cybersecurity, and academic literature, <strong>Beyond the Algorithm</strong> examines these complex issues with a comprehensive, easy-to-understand analysis and overview. The book explores the ethical challenges that professionalsーand, increasingly, usersーare encountering as AI becomes not just a promise of the future, but a powerful tool of the present.</p> <ul> <li>An overview of the history and development of AI, from the earliest pioneers in machine learning to current applications and how it might shape the future</li> <li>Introduction to AI models and implementations, as well as examples of emerging AI trends</li> <li>Examination of vulnerabilities, including insight into potential real-world threats, and best practices for ensuring a safe AI deployment</li> <li>Discussion of how to balance accountability, privacy, and ethics with regulatory and legislative concerns with advancing AI technology</li> <li>A critical perspective on regulatory obligations, and repercussions, of AI with copyright protection, patent rights, and other intellectual property dilemmas</li> <li>An academic resource and guide for the evolving technical and intellectual challenges of AI</li> <li>Leading figures in the field bring to life the ethical issues associated with AI through in-depth analysis and case studies in this comprehensive examination.</li> </ul>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
6,765円
|

IAPP CIPM Certified Information Privacy Manager Study Guide【電子書籍】[ Mike Chapple ]
楽天Kobo電子書籍ストア
|
<p><strong>An essential resource for anyone preparing for the CIPM certification exam and a career in information privacy</strong></p> <p>As cybersecurity and privacy become ever more important to the long-term viability and sustainability of enterprises in all sectors, employers and professionals are increasingly turning to IAPP’s trusted and recognized Certified Information Privacy Manager qualification as a tried-and-tested indicator of information privacy management expertise.</p> <p>In <em>IAPP CIPM Certified Information Privacy Manager Study Guide</em>, a team of dedicated IT and privacy management professionals delivers an intuitive roadmap to preparing for the CIPM certification exam and for a new career in the field of information privacy. Make use of pre-assessments, the Exam Essentials feature, and chapter review questions with detailed explanations to gauge your progress and determine where you’re proficient and where you need more practice.</p> <p>In the book, you’ll find coverage of every domain tested on the CIPM exam and those required to succeed in your firstーor your nextーrole in a privacy-related position. You’ll learn to develop a privacy program and framework, as well as manage the full privacy program operational lifecycle, from assessing your organization’s needs to responding to threats and queries.</p> <p>The book also includes:</p> <ul> <li>A head-start to obtaining an in-demand certification used across the information privacy industry</li> <li>Access to essential information required to qualify for exciting new career opportunities for those with a CIPM credential</li> <li>Access to the online Sybex learning environment, complete with two additional practice tests, chapter review questions, an online glossary, and hundreds of electronic flashcards for efficient studying</li> </ul> <p>An essential blueprint for success on the CIPM certification exam, <em>IAPP CIPM Certified Information Privacy Manager Study Guide</em> will also ensure you hit the ground running on your first day at a new information privacy-related job.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
5,295円
|

Security and Privacy in Communication Networks 15th EAI International Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019, Proceedings, Part I【電子書籍】
楽天Kobo電子書籍ストア
|
<p>This two-volume set LNICST 304-305 constitutes the post-conference proceedings of the 15thInternational Conference on Security and Privacy in Communication Networks, SecureComm 2019, held in Orlando, FL, USA, in October 2019.<br /> The 38 full and 18 short papers were carefully reviewed and selected from 149 submissions. The papers are organized in topical sections on blockchains, internet of things, machine learning, everything traffic security communicating covertly, let’s talk privacy, deep analysis, systematic theory, bulletproof defenses, blockchains and IoT, security and analytics, machine learning, private, better clouds, ATCS workshop.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
6,076円
|

Security, Privacy and Trust in Cloud Systems【電子書籍】
楽天Kobo電子書籍ストア
|
<p>The book compiles technologies for enhancing and provisioning security, privacy and trust in cloud systems based on Quality of Service requirements. It is a timely contribution to a field that is gaining considerable research interest, momentum, and provides a comprehensive coverage of technologies related to cloud security, privacy and trust. In particular, the book includes<br /> - Cloud security fundamentals and related technologies to-date, with a comprehensive<br /> coverage of evolution, current landscape, and future roadmap.<br /> - A smooth organization with introductory, advanced and specialist content, i.e. from basics<br /> of security, privacy and trust in cloud systems, to advanced cartographic techniques,<br /> case studies covering both social and technological aspects, and advanced platforms.<br /> - Case studies written by professionals and/or industrial researchers.<br /> - Inclusion of a section on Cloud security and eGovernance tutorial that can be used<br /> for knowledge transfer and teaching purpose.<br /> - Identification of open research issues to help practitioners and researchers.</p> <p>The book is a timely topic for readers, including practicing engineers and<br /> academics, in the domains related to the engineering, science, and art of building networks and<br /> networked applications. Specifically, upon reading this book, audiences will perceive the following<br /> benefits:</p> <ol> <li>Learn the state-of-the-art in research and development on cloud security, privacy and<br /> trust.</li> <li>Obtain a future roadmap by learning open research issues.</li> <li>Gather the background knowledge to tackle key problems, whose solutions will enhance the evolution of next-generation secure cloud systems.</li> </ol>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
12,154円
|

Data for the People How to Make Our Post-Privacy Economy Work for You【電子書籍】[ Andreas Weigend ]
楽天Kobo電子書籍ストア
|
<p><strong>A long-time chief data scientist at Amazon shows how open data can make everyone, not just corporations, richer</strong></p> <p>Every time we Google something, Facebook someone, Uber somewhere, or even just turn on a light, we create data that businesses collect and use to make decisions about us. In many ways this has improved our lives, yet, we as individuals do not benefit from this wealth of data as much as we could. Moreover, whether it is a bank evaluating our credit worthiness, an insurance company determining our risk level, or a potential employer deciding whether we get a job, it is likely that this data will be used against us rather than for us.</p> <p>In <em>Data for the People</em>, Andreas Weigend draws on his years as a consultant for commerce, education, healthcare, travel and finance companies to outline how Big Data can work better for all of us. As of today, how much we benefit from Big Data depends on how closely the interests of big companies align with our own. Too often, outdated standards of control and privacy force us into unfair contracts with data companies, but it doesn't have to be this way. Weigend makes a powerful argument that we need to take control of how our data is used to actually make it work for us. Only then can we the people get back more from Big Data than we give it.</p> <p>Big Data is here to stay. Now is the time to find out how we can be empowered by it.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
2,520円
|

CIPM Certified Information Privacy Manager All-in-One Exam Guide【電子書籍】[ Peter H. Gregory ]
楽天Kobo電子書籍ストア
|
<p><strong>This self-study guide covers every topic on the Certified Information Privacy Manager exam</strong></p> <p>This resource offers complete, up-to-date coverage of all the material included in the current release of the Certified Information Privacy Manager exam. Written by an IT security and privacy expert, <em>CIPM Certified Information Privacy Manager All-in-One Exam Guide</em> covers the exam domains and associated job practices developed by IAPP?. You’ll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the CIPM exam, this comprehensive guide also serves as an essential on-the-job reference for new and established privacy and security professionals.</p> <p>COVERS ALL EXAM TOPICS, INCLUDING:</p> <ul> <li>Developing a Privacy Program</li> <li>Privacy Program Framework</li> <li>Privacy Operational Lifecycle: Assess</li> <li>Privacy Operational Lifecycle: Protect</li> <li>Privacy Operational Lifecycle: Sustain</li> <li>Privacy Operational Lifecycle: Respond</li> </ul> <p>Online content includes:</p> <ul> <li>300 practice exam questions</li> <li>Test engine that provides full-length practice exams and customizable quizzes by exam topic</li> </ul>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
7,164円
|

Network Security Hacks Tips & Tools for Protecting Your Privacy【電子書籍】[ Andrew Lockhart ]
楽天Kobo電子書籍ストア
|
<p>In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, network security techniques and tools have evolved rapidly to meet new and more sophisticated threats that pop up with alarming regularity. The second edition offers both new and thoroughly updated hacks for Linux, Windows, OpenBSD, and Mac OS X servers that not only enable readers to secure TCP/IP-based services, but helps them implement a good deal of clever host-based security techniques as well.</p> <p>This second edition of <em>Network Security Hacks</em> offers 125 concise and practical hacks, including more information for Windows administrators, hacks for wireless networking (such as setting up a captive portal and securing against rogue hotspots), and techniques to ensure privacy and anonymity, including ways to evade network traffic analysis, encrypt email and files, and protect against phishing attacks. System administrators looking for reliable answers will also find concise examples of applied encryption, intrusion detection, logging, trending and incident response.</p> <p>In fact, this "roll up your sleeves and get busy" security book features updated tips, tricks & techniques across the board to ensure that it provides the most current information for all of the major server software packages. These hacks are quick, clever, and devilishly effective.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
2,895円
|

Understanding the Digital World What You Need to Know about Computers, the Internet, Privacy, and Security, Second Edition【電子書籍】[ Brian W. Kernighan ]
楽天Kobo電子書籍ストア
|
<p><strong>A brand-new edition of the popular introductory textbook that explores how computer hardware, software, and networks work</strong></p> <p>Computers are everywhere. Some are highly visible, in laptops, tablets, cell phones, and smart watches. But most are invisible, like those in appliances, cars, medical equipment, transportation systems, power grids, and weapons. We never see the myriad computers that quietly collect, share, and sometimes leak personal data about us. Governments and companies increasingly use computers to monitor what we do. Social networks and advertisers know more about us than we should be comfortable with. Criminals have all-too-easy access to our data. Do we truly understand the power of computers in our world?</p> <p>In this updated edition of <em>Understanding the Digital World</em>, Brian Kernighan explains how computer hardware, software, and networks work. Topics include how computers are built and how they compute; what programming is; how the Internet and web operate; and how all of these affect security, privacy, property, and other important social, political, and economic issues. Kernighan touches on fundamental ideas from computer science and some of the inherent limitations of computers, and new sections in the book explore Python programming, big data, machine learning, and much more. Numerous color illustrations, notes on sources for further exploration, and a glossary explaining technical terms and buzzwords are included.</p> <p><em>Understanding the Digital World</em> is a must-read for readers of all backgrounds who want to know more about computers and communications.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
4,908円
|

Cyber Security and Privacy Trust in the Digital World and Cyber Security and Privacy EU Forum 2013, Brussels, Belgium, April 2013, Revised Selected Papers【電子書籍】
楽天Kobo電子書籍ストア
|
<p>This book constitutes the thoroughly refereed, selected papers on Cyber Security and Privacy EU Forum 2013, held in Belgium, in April 2013. The 14 revised full papers presented were carefully reviewed and selected from various submissions. The papers are organized in topical sections on cloud computing, security and privacy management, security and privacy technology, security and privacy policy.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
6,076円
|

Blockchain Cybersecurity, Trust and Privacy【電子書籍】
楽天Kobo電子書籍ストア
|
<p>This book provides the reader with the most up-to-date knowledge of blockchain in mainstream areas of security, trust, and privacy in the decentralized domain, which is timely and essential (this is due to the fact that the distributed and P2P applications is increasing day-by-day, and the attackers adopt new mechanisms to threaten the security and privacy of the users in those environments). This book also provides the technical information regarding blockchain-oriented software, applications, and tools required for the researcher and developer experts in both computing and software engineering to provide solutions and automated systems against current security, trust and privacy issues in the cyberspace.</p> <p>Cybersecurity, trust and privacy (CTP) are pressing needs for governments, businesses, and individuals, receiving the utmost priority for enforcement and improvement in almost any societies around the globe. Rapid advances, on the other hand, are being made in emerging blockchain technology with broadly diverse applications that promise to better meet business and individual needs. Blockchain as a promising infrastructural technology seems to have the potential to be leveraged in different aspects of cybersecurity promoting decentralized cyberinfrastructure. Blockchain characteristics such as decentralization, verifiability and immutability may revolve current cybersecurity mechanisms for ensuring the authenticity, reliability, and integrity of data.</p> <p>Almost any article on the blockchain points out that the cybersecurity (and its derivatives) could be revitalized if it is supported by blockchain technology. Yet, little is known about factors related to decisions to adopt this technology, and how it can systemically be put into use to remedy current CTP’s issues in the digital world. Topics of interest for this book include but not limited to:</p> <ul> <li>Blockchain-based authentication, authorization and accounting mechanisms</li> <li>Applications of blockchain technologies in digital forensic and threat hunting</li> <li>Blockchain-based threat intelligence and threat analytics techniques</li> <li>Formal specification of smart contracts</li> <li>Automated tools for outsmarting smart contracts</li> <li>Security and privacy aspects of blockchain technologies</li> <li>Vulnerabilities of smart contracts</li> <li>Blockchain for securing cyber infrastructure and internet of things networks</li> <li>Blockchain-based cybersecurity education systems</li> </ul> <p>This book provides information for security and privacy experts in all the areas of blockchain, cryptocurrency, cybersecurity, forensics, smart contracts, computer systems, computer networks, software engineering, applied artificial intelligence for computer security experts, big data analysts, and decentralized systems. Researchers, scientists and advanced level students working in computer systems, computer networks, artificial intelligence, big data willfind this book useful as well.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
20,662円
|

Big Data, Political Campaigning and the Law Democracy and Privacy in the Age of Micro-Targeting【電子書籍】
楽天Kobo電子書籍ストア
|
<p>In this multidisciplinary book, experts from around the globe examine how data-driven political campaigning works, what challenges it poses for personal privacy and democracy, and how emerging practices should be regulated.</p> <p>The rise of big data analytics in the political process has triggered official investigations in many countries around the world, and become the subject of broad and intense debate. Political parties increasingly rely on data analytics to profile the electorate and to target specific voter groups with individualised messages based on their demographic attributes. Political micro-targeting has become a major factor in modern campaigning, because of its potential to influence opinions, to mobilise supporters and to get out votes. The book explores the legal, philosophical and political dimensions of big data analytics in the electoral process. It demonstrates that the unregulated use of big personal data for political purposes not only infringes voters’ privacy rights, but also has the potential to jeopardise the future of the democratic process, and proposes reforms to address the key regulatory and ethical questions arising from the mining, use and storage of massive amounts of voter data.</p> <p>Providing an interdisciplinary assessment of the use and regulation of big data in the political process, this book will appeal to scholars from law, political science, political philosophy and media studies, policy makers and anyone who cares about democracy in the age of data-driven political campaigning.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
9,948円
|

e-Health Security Management Communications Security, Data Processing Security and Patient Privacy【電子書籍】[ Omessaad Hamdi ]
楽天Kobo電子書籍ストア
|
<p>Digital evolution, whether through Internet advances or the development of connected objects, has triggered a veritable societal revolution. Thanks to technological advances, e-health services enable healthcare professionals to monitor patients in real time. However, new challenges have also arisen in the field of e-health, concerning the security of medical data, as well as the protection of patient privacy.</p> <p>After presenting e-health architectures and explaining the proliferation of cyber attacks, <em>e-Health Security Management</em> focuses on proposing solutions designed to meet these security imperatives and respect patient privacy, such as the use of blockchain, "biometrics", new encryption methods or artificial intelligence. Implementing these solutions is crucial to guarantee the acceptance and effectiveness of e-health services.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
20,593円
|

洋書 Paperback, Compressed Sensing for Privacy-Preserving Data Processing (SpringerBriefs in Electrical and Computer Engineering)
Glomarket
|
*** We ship internationally, so do not use a package forwarding service. We cannot ship to a package forwarding company address because of the Japanese customs regulation. If it is shipped and customs office does not let the package go, we do not make a refund. 【注意事項】 *** 特に注意してください。 *** ・個人ではない法人・団体名義での購入はできません。この場合税関で滅却されてもお客様負担になりますので御了承願います。 ・お名前にカタカナが入っている場合法人である可能性が高いため当店システムから自動保留します。カタカナで記載が必要な場合はカタカナ変わりローマ字で記載してください。 ・お名前またはご住所が法人・団体名義(XX株式会社等)、商店名などを含めている場合、または電話番号が個人のものではない場合、税関から法人名義でみなされますのでご注意ください。 ・転送サービス会社への発送もできません。この場合税関で滅却されてもお客様負担になりますので御了承願います。 *** ・注文後品切れや価格変動でキャンセルされる場合がございますので予めご了承願います。 ・当店でご購入された商品は、原則として、「個人輸入」としての取り扱いになり、すべてニュージャージからお客様のもとへ直送されます。 ・ご注文後、30営業日以内(通常2~3週間)に配送手続きをいたします。配送作業完了後、2週間程度でのお届けとなります。 ・まれに商品入荷状況や国際情勢、運送、通関事情により、お届けが2ヶ月までかかる場合がありますのでお急ぎの場合は注文をお控えください。 ・個人輸入される商品は、すべてご注文者自身の「個人使用・個人消費」が前提となりますので、ご注文された商品を第三者へ譲渡・転売することは法律で禁止されております。 ・関税・消費税が課税される場合があります。詳細はこちらをご確認下さい。PC販売説明文
|
15,578円
|

Information Systems Security and Privacy 6th International Conference, ICISSP 2020, Valletta, Malta, February 25?27, 2020, Revised Selected Papers【電子書籍】
楽天Kobo電子書籍ストア
|
<p>This book constitutes the revised selected papers of the 6th International Conference on Information Systems Security and Privacy, ICISSP 2020, held in Valletta, Malta, in February 2020.</p> <p>The 11 full papers presented were carefully reviewed and selected from a total of 125 submissions. The papers presented in this volume address various topical research, including new approaches for attack modelling andprevention, incident management and response, and user authentication andaccess control, as well as business and human-oriented aspects such as data pro-tection and privacy, and security awareness.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
9,116円
|

ICT Systems Security and Privacy Protection 36th IFIP TC 11 International Conference, SEC 2021, Oslo, Norway, June 22?24, 2021, Proceedings【電子書籍】
楽天Kobo電子書籍ストア
|
<p>This book constitutes the refereed proceedings of the 36th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2021, held in Oslo, Norway, in June 2021.*</p> <p>The 28 full papers presented were carefully reviewed and selected from 112 submissions. The papers present novel research on theoretical and practical aspects of security and privacy protection in ICT systems. They are organized in topical sections on digital signatures; vulnerability management; covert channels and cryptography; application and system security; privacy; network security; machine learning for security; and security management.</p> <p>*The conference was held virtually.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
17,016円
|

Privacy in Statistical Databases UNESCO Chair in Data Privacy, International Conference, PSD 2018, Valencia, Spain, September 26?28, 2018, Proceedings【電子書籍】
楽天Kobo電子書籍ストア
|
<p>This book constitutes the refereed proceedings of the International Conference on Privacy in Statistical Databases, PSD 2018, held in Valencia, Spain, in September 2018 under the sponsorship of the UNESCO Chair in Data Privacy.</p> <p>The 23 revised full papers presented were carefully reviewed and selected from 42 submissions. The papers are organized into the following topics: tabular data protection; synthetic data; microdata and big data masking; record linkage; and spatial and mobility data.</p> <p>Chapter "SwapMob: Swapping Trajectories for Mobility Anonymization" is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
7,900円
|

Data Gathering, Analysis and Protection of Privacy Through Randomized Response Techniques: Qualitative and Quantitative Human Traits【電子書籍】[ Arijit Chaudhuri ]
楽天Kobo電子書籍ストア
|
<p>Data Gathering, Analysis and Protection of Privacy through Randomized Response Techniques: Qualitative and Quantitative Human Traits tackles how to gather and analyze data relating to stigmatizing human traits. S.L. Warner invented RRT and published it in JASA, 1965. In the 50 years since, the subject has grown tremendously, with continued growth. This book comprehensively consolidates the literature to commemorate the inception of RR. - Brings together all relevant aspects of randomized response and indirect questioning - Tackles how to gather and analyze data relating to stigmatizing human traits - Gives an encyclopedic coverage of the topic - Covers recent developments and extrapolates to future trends</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
26,434円
|

Vehicle Safety Communications Protocols, Security, and Privacy【電子書籍】[ Tao Zhang ]
楽天Kobo電子書籍ストア
|
<p><strong>Provides an up-to-date, in-depth look at the current research, design, and implementation of cooperative vehicle safety communication protocols and technology</strong></p> <p>Improving traffic safety has been a top concern for transportation agencies around the world and the focus of heavy research and development efforts sponsored by both governments and private industries. Cooperative vehicle systemsーwhich use sensors and wireless technologies to reduce traffic accidentsーcan play a major role in making the world's roads safer.</p> <p><em>Vehicle Safety Communications: Protocols, Security, and Privacy</em> describes fundamental issues in cooperative vehicle safety and recent advances in technologies for enabling cooperative vehicle safety. It gives an overview of traditional vehicle safety issues, the evolution of vehicle safety technologies, and the need for cooperative systems where vehicles work together to reduce the number of crashes or mitigate damage when crashes become unavoidable.</p> <p>Authored by two top industry professionals, the book:</p> <ul> <li>Summarizes the history and current status of 5.9 GHz Dedicated Short Range Communications (DSRC) technology and standardization, discussing key issues in applying DSRC to support cooperative vehicle safety</li> <li>Features an in-depth overview of on-board equipment (OBE) and roadside equipment (RSE) by describing sample designs to illustrate the key issues and potential solutions</li> <li>Takes on security and privacy protection requirements and challenges, including how to design privacy-preserving digital certificate management systems and how to evict misbehaving vehicles</li> <li>Includes coverage of vehicle-to-infrastructure (V2I) communications like intersection collision avoidance applications and vehicle-to-vehicle (V2V) communications like extended electronic brake lights and intersection movement assist</li> </ul> <p><em>Vehicle Safety Communications</em> is ideal for anyone working in the areas ofーor studyingーcooperative vehicle safety and vehicle communications.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
16,249円
|

PRIVACY PROTECTION BASED ACCESS CONTROL SCHEME IN CLOUD-BASED SERVICES MINI PROJECT DISSERTATION【電子書籍】[ DR K VENKATA NAGANJANEYULU ]
楽天Kobo電子書籍ストア
|
<p>With the rapid development of computer technology, cloud-based services have become a hot topic. They not only provide users with convenience, but also bring many security issues, such as data sharing and privacy issue. In this paper, we present an access control system with privilege separation based on privacy protection (PS-ACS). In the PS-ACS scheme, we divide users into private domain (PRD) and public domain (PUD) logically.</p> <p>In PRD, to achieve read access permission and write access permission, we adopt the Key- Aggregate Encryption (KAE) and the Improved Attribute-based Signature (IABS) respectively. In PUD, we construct a new multi-authority ciphertest policy attribute-based encryption (CP-ABE scheme with efficient decryption to avoid the issues of single point of failure and complicated key distribution, and design an efficient attribute revocation method for it. The analysis and simulation result show that our scheme is feasible and superior to protect users' privacy in cloud-based services.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
332円
|

洋書 Paperback, Location Privacy Protection in Mobile Networks (SpringerBriefs in Computer Science)
Glomarket
|
*** We ship internationally, so do not use a package forwarding service. We cannot ship to a package forwarding company address because of the Japanese customs regulation. If it is shipped and customs office does not let the package go, we do not make a refund. 【注意事項】 *** 特に注意してください。 *** ・個人ではない法人・団体名義での購入はできません。この場合税関で滅却されてもお客様負担になりますので御了承願います。 ・お名前にカタカナが入っている場合法人である可能性が高いため当店システムから自動保留します。カタカナで記載が必要な場合はカタカナ変わりローマ字で記載してください。 ・お名前またはご住所が法人・団体名義(XX株式会社等)、商店名などを含めている場合、または電話番号が個人のものではない場合、税関から法人名義でみなされますのでご注意ください。 ・転送サービス会社への発送もできません。この場合税関で滅却されてもお客様負担になりますので御了承願います。 *** ・注文後品切れや価格変動でキャンセルされる場合がございますので予めご了承願います。 ・当店でご購入された商品は、原則として、「個人輸入」としての取り扱いになり、すべてニュージャージからお客様のもとへ直送されます。 ・ご注文後、30営業日以内(通常2~3週間)に配送手続きをいたします。配送作業完了後、2週間程度でのお届けとなります。 ・まれに商品入荷状況や国際情勢、運送、通関事情により、お届けが2ヶ月までかかる場合がありますのでお急ぎの場合は注文をお控えください。 ・個人輸入される商品は、すべてご注文者自身の「個人使用・個人消費」が前提となりますので、ご注文された商品を第三者へ譲渡・転売することは法律で禁止されております。 ・関税・消費税が課税される場合があります。詳細はこちらをご確認下さい。PC販売説明文
|
15,437円
|

Women Securing the Future with TIPPSS for Connected Healthcare Trust, Identity, Privacy, Protection, Safety, Security【電子書籍】
楽天Kobo電子書籍ストア
|
<p>The second in the <em>Women Securing the Future with TIPPSS</em> series, this book provides insight and expert advice from seventeen women leaders in technology, healthcare and policy to address the challenges of Trust, Identity, Privacy, Protection, Safety and Security (TIPPSS) for connected healthcare, and the growing Internet of Medical Things (IoMT) ecosystem. The ten chapters in this book delve into trust, security and privacy risks in connected healthcare for patients, medical devices, personal and clinical data, healthcare providers and institutions, and provide practical approaches to manage and protect the data, devices, and humans. Cybersecurity, technology and legal experts discuss risks, from data and device hacks to ransomware, and propose approaches to address the challenges including new frameworks for architecting and evaluating medical device and connected hospital cybersecurity. We all need to be aware of the TIPPSS challenges in connected healthcare, and we call upon engineers, device manufacturers, system developers and healthcare providers to ensure trust and manage the risk. Featuring contributions from prominent female experts and role models in technology, cybersecurity, engineering, computer science, data science, business, healthcare, accessibility, research, law, privacy and policy, this book sets the stage to improve security and safety in our increasingly connected world.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
7,900円
|

Security and Privacy for Next-Generation Wireless Networks【電子書籍】[ Sheng Zhong ]
楽天Kobo電子書籍ストア
|
<p>This timely book provides broad coverage of security and privacy issues in the macro and micro perspective. In macroperspective, the system and algorithm fundamentals of next-generation wireless networks are discussed. In micro-perspective, this book focuses on the key secure and privacy techniques in different emerging networks from the interconnection view of human and cyber-physical world. This book includes 7 chapters from prominent international researchers working in this subject area. This book serves as a useful reference for researchers, graduate students, and practitioners seeking solutions to wireless security and privacy related issues</p> <p>Recent advances in wireless communication technologies have enabled the large-scale deployment of next-generation wireless networks, and many other wireless applications are emerging. The next generation of mobile networks continues to transform the way people communicate and access information. As a matter of fact, next-generation emerging networks are exploiting their numerous applications in both military and civil fields. For most applications, it is important to guarantee high security of the deployed network in order to defend against attacks from adversaries, as well as the privacy intrusion.</p> <p>The key target in the development of next-generation wireless networks is to promote the integration of the human, cyber, and physical worlds. Previous work in Cyber Physical Systems (CPS) considered the connection between the cyber world and the physical world. In the recent studies, human involvement brings new channels and initiatives in this interconnection. In this integration process, security and privacy are critical issues to many wireless network applications, and it is a paramount concern for the growth of next-generation wireless networks. This is due to the open nature of wireless communication and the involvement of humans. New opportunities for tackling these security and privacy issues in next-generation wireless networks will be achieved by leveraging the properties of interaction among human, computers and things.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
12,154円
|

Information Systems Security and Privacy 4th International Conference, ICISSP 2018, Funchal - Madeira, Portugal, January 22-24, 2018, Revised Selected Papers【電子書籍】
楽天Kobo電子書籍ストア
|
<p>This book constitutes the revised selected papers of the 4th International Conference on Information Systems Security and Privacy, ICISSP 2018, held in Funchal - Madeira, Portugal, in January 2018.<br /> The 15 full papers presented were carefully reviewed and selected from a total of 71 submissions. They are dealing with topics such as data and software security; privacy and confidentiality; mobile systems security; biometric authentication; information systems security and privacy; authentication, privacy and security models; data mining and knowledge discovery; phishing; security architecture and design analysis; security testing; vulnerability analysis and countermeasures; web applications and services.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
6,076円
|

Safety for Stalking Victims How to Save Your Privacy, Your Sanity, and Your Life【電子書籍】[ Lyn Bates ]
楽天Kobo電子書籍ストア
|
<p>Stalking is a serious crime that disproportionately affects and endangers women. The National Institute of Justice says one in every 12 women and one in every 20 men will be stalked in their lifetimes.</p> <p>Some stalkers make phone calls, send messages, or deliver "gifts." Some follow their victims home, vandalize property, make threats, or kill pets. Some stalkers even attempt rape, kidnapping, or murder. And some succeed. Being the target of an obsessed person is a frightening experience. But it isn't necessary to live in fear. Learning how to live safely is the key.</p> <p>Topics include:<br /> Who stalks, who is stalked, and why<br /> Evaluating the seriousness of the situation<br /> Replacing terror with sensible precautions Restraining ordersgood or bad?<br /> Disappearingwhy, when and how<br /> Protecting your children<br /> Self-defensewhat works, what doesnt Safety on a budget<br /> Maintaining your privacy<br /> Strategies that don't work<br /> Helpful web sites and organizations</p> <p>Using scenarios based on real stalking cases, this book overflows with detailed, practical strategies to put you in control of your situation, and let you break the cycle of terror.</p> <p>Mistakes by the legal system, employers, or even family members can make the situation worse. If you work with stalking victims, or are concerned about one, you need this information, too.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
468円
|

Privacy Online: The Practical Privacy Guide For Anyone【電子書籍】[ Roger Fassinou ]
楽天Kobo電子書籍ストア
|
<p>Nowadays, everyone takes security as a serious matter: individuals, companies, institutions, organizations, and government. Everyone cares about privacy; well, I hope you too. At some point, people usually do not want information to be released for various reasons; for instance, what will happen if a na?ve government employee queries a government database and messes up sending user Social Security Number to someone? Or maybe what if an attacker listens to communications between two hosts (assuming 2 diplomatic agencies)? Let's even assume at home: you have some children browsing the web, using computers or tablets for games, streaming songs or downloading videos, all kinds of stuffs. Children like to do things online; however, they are unaware of what is out there and do not understand the risk they are taking online. So, it is your responsibility to educate and help them securing their online browsing in order to be safe. To triumph, this book comes handy to everyone who needs privacy; in other words, it makes easier for anyone to understand step by step the best practices for everyday use of Internet: beginner, medium, advanced, and addicted of Internet. Today, Internet is our home, our office, and business.<br /> The question of security of information, privacy and confidentiality seems to be more than a personal interest. It has become a big concern for parents, administrations, institutions, corporations (public or private), agencies, etc. In a multi-user environment, we use what known as encryption to secure the communication over (probably an insecure) channel. The question: is that enough? This book explains online privacy issues and provides methods and tips to be safe from online attacks and thefts. You don't need to be experts to understand and use this book.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
1,600円
|

VPN - Security, Privacy, and Internet Freedom【電子書籍】[ Mostafizur Rahman ]
楽天Kobo電子書籍ストア
|
<p>In today's digital age, privacy and freedom online are more important than ever. <strong>"VPN - Security, Privacy, and Internet Freedom"</strong> is your ultimate guide to understanding and utilizing Virtual Private Networks (VPNs) to protect your personal data, stay anonymous online, and access content without borders. This comprehensive eBook demystifies how VPNs work, explores their practical uses for individuals and businesses, and helps you choose the best VPN service for your needs. Whether you're a beginner curious about online privacy or a tech enthusiast wanting deeper insights, this guide offers clear explanations, practical tips, and future-forward perspectives to empower your online experience.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
550円
|

Information Security and Privacy 29th Australasian Conference, ACISP 2024, Sydney, NSW, Australia, July 15?17, 2024, Proceedings, Part II【電子書籍】
楽天Kobo電子書籍ストア
|
<p>This volume constitutes the refereed proceedings of the 29th Australasian Conference, ACISP 2024, held in Sydney, NSW, Australia, during July 15?17, 2024.</p> <p>The 70 full papers were carefully reviewed and selected from 232 submission. They are categorized in the following sections: Post-Quantum Cryptography, Cryptanalysis, Secure Protocols, Application Security.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
18,231円
|

Technologische Dictatuur Privacy, Toezicht en Vrijheid in het Digitale Tijdperk【電子書籍】[ ILDELI COSTA ]
楽天Kobo電子書籍ストア
|
<p>In <em><strong>"Technologische Dictatuur: Privacy, Toezicht en Vrijheid in het Digitale Tijdperk"</strong></em> betreden we een wereld waarin technologiereuzen een ongekende macht uitoefenen over ons leven. In dit boek onderzoeken we het fenomeen van de Technologische Dictatuur en de impact van technologie op sociale controle in de 21e eeuw.</p> <p>Van toenemende monitoring van onze activiteiten tot manipulatie van de informatie die we consumeren, duiken we diep in fundamentele vraagstukken over privacy, ethiek en individuele vrijheid in het digitale tijdperk. We analyseren de opkomst van Technologisch Totalitarisme, waarbij kolossale bedrijven waardevolle informatie bezitten over ons leven en beslissingen.</p> <p>Gedurende deze pagina's bespreken we de ethische en juridische uitdagingen die de Technologische Dictatuur met zich meebrengt, en de noodzaak van verantwoordelijke regelgeving die de burgers beschermt zonder innovatie in gevaar te brengen. We onderzoeken hoe algoritmische manipulatie onze perspectieven en meningen kan be?nvloeden, evenals de rol van deze technologiereuzen bij het be?nvloeden van politieke en sociale beslissingen.</p> <p>We zijn echter niet tevreden met alleen de diagnose. We verkennen ook initiatieven voor Digitaal Verzet en Activisme, die tot doel hebben bewustzijn te vergroten en individuele rechten te beschermen. Door strategie?n te presenteren om privacy en vrijheid te beschermen, geven we lezers de macht om controle te nemen over hun informatie en online interacties.</p> <p>"Technologische Dictatuur" is een oproep tot reflectie over de toekomst van de digitale samenleving en de zoektocht naar een evenwicht tussen technologische vooruitgang en bescherming van democratische waarden. Dit boek is voor degenen die beter willen begrijpen welke uitdagingen en kansen technologie met zich meebrengt, en die streven naar een toekomst waarin technologie het welzijn van de mensheid dient, terwijl onze individuele vrijheden en kernwaarden behouden blijven. Of je nu een technologie-expert, digitale activist of gewone burger bent die zich zorgen maakt over de toekomst, "Technologische Dictatuur" belooft je denken te stimuleren en je te inspireren tot actie op zoek naar een rechtvaardigere en ethischere digitale wereld.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
496円
|

洋書 Chapman and Hall/CRC Paperback, Introduction to Privacy-Preserving Data Publishing (Chapman & Hall/Crc Data Mining and Knowledge Discovery Series)
Glomarket
|
*** We ship internationally, so do not use a package forwarding service. We cannot ship to a package forwarding company address because of the Japanese customs regulation. If it is shipped and customs office does not let the package go, we do not make a refund. 【注意事項】 *** 特に注意してください。 *** ・個人ではない法人・団体名義での購入はできません。この場合税関で滅却されてもお客様負担になりますので御了承願います。 ・お名前にカタカナが入っている場合法人である可能性が高いため当店システムから自動保留します。カタカナで記載が必要な場合はカタカナ変わりローマ字で記載してください。 ・お名前またはご住所が法人・団体名義(XX株式会社等)、商店名などを含めている場合、または電話番号が個人のものではない場合、税関から法人名義でみなされますのでご注意ください。 ・転送サービス会社への発送もできません。この場合税関で滅却されてもお客様負担になりますので御了承願います。 *** ・注文後品切れや価格変動でキャンセルされる場合がございますので予めご了承願います。 ・当店でご購入された商品は、原則として、「個人輸入」としての取り扱いになり、すべてニュージャージからお客様のもとへ直送されます。 ・ご注文後、30営業日以内(通常2~3週間)に配送手続きをいたします。配送作業完了後、2週間程度でのお届けとなります。 ・まれに商品入荷状況や国際情勢、運送、通関事情により、お届けが2ヶ月までかかる場合がありますのでお急ぎの場合は注文をお控えください。 ・個人輸入される商品は、すべてご注文者自身の「個人使用・個人消費」が前提となりますので、ご注文された商品を第三者へ譲渡・転売することは法律で禁止されております。 ・関税・消費税が課税される場合があります。詳細はこちらをご確認下さい。PC販売説明文
|
23,519円
|
|