Produse
Produse
    • Total RON Comandă
      x
      Coșul tău este gol.
      Comandă
      Privacy Is Hard and Seven Other Myths

      Privacy Is Hard and Seven Other Myths

      Achieving Privacy through Careful Design
      Categorii:
      Limba:
      Engleza
      Data publicarii:
      2021
      Editura:
      Tip coperta:
      Hardcover
      Nr. pagini:
      256
      ISBN:
      9780262045827
      Dimensiuni: l: 15.2cm | H: 22.9cm | 3.2cm | 499g
      Adaugă în coș
      14900
      Stoc furnizor
      Livrare în 2-3 săptămâni!

      Preț valabil exclusiv online!
      Împachetare cadou gratuită!
      Transport gratuit peste 150 de lei.
      Retur gratuit în 14 zile.
      Ai întrebări? Contactează-ne!
      Descriere

      An expert on computer privacy and security shows how we can build privacy into the design of systems from the start.

      We are tethered to our devices all day, every day, leaving data trails of our searches, posts, clicks, and communications. Meanwhile, governments and businesses collect our data and use it to monitor us without our knowledge. So we have resigned ourselves to the belief that privacy is hard--choosing to believe that websites do not share our information, for example, and declaring that we have nothing to hide anyway. In this informative and illuminating book, a computer privacy and security expert argues that privacy is not that hard if we build it into the design of systems from the start.

      Along the way, Jaap-Henk Hoepman debunks eight persistent myths surrounding computer privacy. The website that claims it doesn't collect personal data, for example; Hoepman explains that most data is personal, capturing location, preferences, and other information. You don't have anything to hide? There's nothing wrong with wanting to keep personal information--even if it's not incriminating or embarrassing--private. Hoepman shows that just as technology can be used to invade our privacy, it can be used to protect it, when we apply privacy by design. Hoepman suggests technical fixes, discussing pseudonyms, leaky design, encryption, metadata, and the benefits of keeping your data local (on your own device only), and outlines privacy design strategies that system designers can apply now.