0

My Bag

0.00

Download App

Digital Privacy: Theory, Technologies, and Practices 14.0%OFF

Digital Privacy: Theory, Technologies, and Practices

by Alessandro Acquisti, Stefanos Gritzalis and Costos Lambrinoudakis

  • ISBN

    :  

    9781420052176

  • Publisher

    :  

    Auerbach Publications

  • Subject

    :  

    Computer Security

  • Binding

    :  

    Hardcover

  • Pages

    :  

    470

  • Year

    :  

    2007

14074.0

14.0% OFF

12103.0

Buy Now

Shipping charges are applicable for books below Rs. 101.0

View Details

(Imported Edition) Estimated Shipping Time : 25-28 Business Days

View Details

Share it on

  • Description

    During recent years, a continuously increasing amount of personal data has been made available through different websites around the world. Although the availability of personal information has created several advantages, it can be easily misused and may lead to violations of privacy. With growing interest in this area, Digital Privacy: Theory, Technologies, and Practices addresses this timely issue, providing information on state-of-the-art technologies, best practices, and research results, as well as legal, regulatory, and ethical issues. This book features contributions from experts in academia, industry, and government.

Related Items

-

of

  • OFFER

    Worm: The First Digital World War

    Mark Bowden

    Starts At

    412.0

    550.0

    25% OFF

  • OFFER

    Securing Information and Communications Systems: Principles, Technologies, and Applications (Information Security & Privacy)

    Steven Furnell

    Starts At

    8326.0

    9682.0

    14% OFF

  • OFFER

    Information Warfare: corporate attack and defence in a digital world (Computer Weekly Professional)

    Bill Hutchinson

    Starts At

    3562.0

    4687.0

    24% OFF

  • OFFER

    Malware Forensics Field Guide for Windows Systems: Digital Forensics Field Guides

    MALIN

    Starts At

    6612.0

    8700.0

    24% OFF

  • Digital Audio Watermarking Techniques and Technologies: Applications and Benchmarks

    Nedeljko Cvejic

    Starts At

    15354.0

  • OFFER

    Security Transformation: Digital Defense Strategies to Protect Your Company's Reputation and Market Share

    Stuart Campbell Mary Pat Mccarthy

    Starts At

    1830.0

    2128.0

    14% OFF

  • OFFER

    Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance (Theory in Practice)

    Tim Mather

    Starts At

    4862.0

    6398.0

    24% OFF

  • OFFER

    Real Digital Forensics: Computer Security and Incident Response

    Keith J. Jones

    Starts At

    5316.0

    6995.0

    24% OFF

  • OFFER

    Digital Signature: Network Security Practices

    Kailash N. Gupta

    Starts At

    181.0

    195.0

    7% OFF

  • OFFER

    Optical and Digital Techniques for Information Security (Advanced Sciences and Technologies for Security Applications)

    Bahram Javidi

    Starts At

    13920.0

    14500.0

    4% OFF

  • OFFER

    Privacy Enhancing Technologies: 9th International Symposium, PETS 2009, Seattle, WA, USA, August 5-7, 2009, Proceedings (Lecture Notes in Computer Science / Security and Cryptology)

    Ian Goldberg

    Starts At

    8107.0

    8445.0

    4% OFF

  • OFFER

    Digital Watermarking: 8th International Workshop, IWDW 2009, Guildford, UK, August 24-26, 2009, Proceedings (Lecture Notes in Computer Science/ Security and Cryptology)

    Anthony T. S. Ho

    Starts At

    8107.0

    8445.0

    4% OFF

  • OFFER

    Trust, Privacy and Security in Digital Business: 6th International Conference, TrustBus 2009, Linz, Austria, September 3-4, 2009, Proceedings (Lecture ... Computer Science / Security and Cryptology)

    Simone Fischer-Hýbner

    Starts At

    8107.0

    8445.0

    4% OFF

  • OFFER

    Digital Watermarking: 7th International Workshop, IWDW 2008, Busan, Korea, November 10-12, 2008, Selected Papers (Lecture Notes in Computer Science / Security and Cryptology)

    Hyoung-Joong Kim

    Starts At

    10563.0

    11004.0

    4% OFF

  • OFFER

    Digital Video and Audio Broadcasting Technology: A Practical Engineering Guide (Signals and Communication Technology)

    Walter Fischer

    Starts At

    13101.0

    13647.0

    4% OFF

  • OFFER

    Digital Watermarking: 6th International Workshop, IWDW 2007 Guangzhou, China, December 3-5, 2007, Proceedings (Lecture Notes in Computer Science / Security and Cryptology)

    Yun Q. Shi

    Starts At

    10563.0

    11004.0

    4% OFF

  • OFFER

    Information Hiding Techniques for Steganography and Digital Watermarking

    Stefan Katzenbeisser

    Starts At

    6270.0

    8831.0

    29% OFF

  • OFFER

    Handbook of Electronic Security and Digital Forensics

    Hamid Jahankhani

    Starts At

    27728.0

    32243.0

    14% OFF

  • OFFER

    Digital Forensics for Network, Internet, and Cloud Computing: A Forensic Evidence Guide for Moving Targets and Data

    Terrence V. Lillard

    Starts At

    4355.0

    5967.0

    27% OFF

  • Securing Business Information: Strategies to Protect the Enterprise and Its Network

    Chrisitan F. Byrnes

    Starts At

    1105.0

  • OFFER

    Hacking Matter: Levitating Chairs, Quantum Mirages, and the Infinite Weirdness of Programmable Atoms

    Wil Mccarthy

    Starts At

    376.0

    495.0

    24% OFF

  • OFFER

    The Code Book : The Secret History of Codes and Code-breaking

    Simon Singh

    Starts At

    379.0

    499.0

    24% OFF

  • OFFER

    Control and Security of E-Commerce

    Gordon Edward Smith

    Starts At

    9646.0

    11217.0

    14% OFF

  • Access Control, Authentication, and Public Key Infrastructure (Information Systems Security & Assurance)

    Bill Ballad

    Starts At

    5799.0

  • OFFER

    Hacker Techniques, Tools, and Incident Handling (Jones & Bartlett Learning Information Systems Security & Assurance Series)

    Sean-Philip Oriyano

    Starts At

    8880.0

    11685.0

    24% OFF

  • OFFER

    Internet Security: Hacking, Counterhacking, and Security

    Kenneth Einar Himma

    Starts At

    2625.0

    3241.0

    19% OFF

  • Security Policies and Implementation Issues (Information Systems Security & Assurance)

    Robert Johnson

    Starts At

    5799.0

  • OFFER

    Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy

    Committee on Deterring Cyberattacks: Informing Strategies and Developing Options

    Starts At

    3678.0

    5039.7

    27% OFF

© 2016, All rights are reserved.

Subscribe to Our Newsletter

 

Are you sure you want to remove the item from your Bag?

Yes

No

Added to Your Wish List

OK

Your Shopping Bag

- 2 Items

null

Item

Delivery

Unit Price

Quantity

Sub Total

Shipping Charges : 0.0 Total Savings        : Grand Total :

Order Summary