Privacy Risk Analysis

Privacy Risk Analysis

Privacy Risk Analysis

Daniel Le Métayer / Sourya Joyee De

67,66 €
IVA incluido
Consulta disponibilidad
Editorial:
Morgan and Claypool Publishers
Año de edición:
2016
ISBN:
9781627054256
67,66 €
IVA incluido
Consulta disponibilidad

Selecciona una librería:

  • Librería 7artes
  • Donde los libros
  • Librería Elías (Asturias)
  • Librería Kolima (Madrid)
  • Librería Proteo (Málaga)

Privacy Risk Analysis fills a gap in the existing literature by providing an introduction to the basic notions, requirements, and main steps of conducting a privacy risk analysis.The deployment of new information technologies can lead to significant privacy risks and a privacy impact assessment should be conducted before designing a product or system that processes personal data. However, if existing privacy impact assessment frameworks and guidelines provide a good deal of details on organizational aspects (including budget allocation, resource allocation, stakeholder consultation, etc.), they are much vaguer on the technical part, in particular on the actual risk assessment task. For privacy impact assessments to keep up their promises and really play a decisive role in enhancing privacy protection, they should be more precise with regard to these technical aspects.This book is an excellent resource for anyone developing and/or currently running a risk analysis as it defines the notions of personal data, stakeholders, risk sources, feared events, and privacy harms all while showing how these notions are used in the risk analysis process. It includes a running smart grids example to illustrate all the notions discussed in the book. 3

Artículos relacionados

  • Privacy, Intrusion Detection and Response
    Peyman Kabiri
    Though network security has almost always been about encryption and decryption, the field of network security is moving towards securing the network environment rather than just stored or transferred data. Privacy, Intrusion Detection and Response: Technologies for Protecting Networks explores the latest practices and research works in the area of privacy, intrusion detection, ...
    Disponible

    255,72 €

  • Foundations of Cryptography
    Goldreich Oded / Oded Goldreich
    ...
    Disponible

    87,03 €

  • Quantum Information Theory
    Mark M. Wilde / Mark MWilde
    ...
    Disponible

    105,66 €

  • Automated Software Diversity
    Lucas Davi / Per Larsen / Stefan Brunthaler
    Whereas user-facing applications are often written in modern languages, the firmware, operating system, support libraries, and virtual machines that underpin just about any modern computer system are still written in low-level languages that value flexibility and performance over convenience and safety. Programming errors in low-level code are often exploitable and can, in the ...
    Consulta disponibilidad

    47,21 €

  • CEH Certified Ethical Hacker Certification The Ultimate Study Guide to Practice Questions and Master the Exam
    Jake T Mills
    Are you preparing to become a Certified Ethical Hacker (CEH)? This comprehensive guide is designed to assist you in mastering the concepts, techniques, and skills necessary to ace the CEH certification exam. Inside this book, you’ll find a wealth of practice test questions meticulously crafted to simulate the CEH exam environment. These questions cover every crucial topic, ensu...
    Disponible

    35,69 €

  • Mobile Platform Security
    Alexandra Dmitrienko / Lucas Davi / N. Asokan
    Recently, mobile security has garnered considerable interest in both the research community and industry due to the popularity of smartphones. The current smartphone platforms are open systems that allow application development, also for malicious parties. To protect the mobile device, its user, and other mobile ecosystem stakeholders such as network operators, application exec...
    Consulta disponibilidad

    50,46 €