Produse
Produse
    • Total RON Comandă
      x
      Coșul tău este gol.
      Comandă
      Privacy Is Hard and Seven Other Myths

      Privacy Is Hard and Seven Other Myths

      Achieving Privacy through Careful Design
      0.0 / 10 ( 0 voturi)
      Limba:
      Engleza
      Data publicarii:
      2023
      Editura:
      Tip coperta:
      Paperback
      Nr. pagini:
      280
      ISBN:
      9780262547208
      Dimensiuni: l: 15.2cm | H: 23cm | 3cm | 340g
      Adaugă în coș
      14300
      Livrare în 24h! (a doua zi) Stoc limitat

      Preț valabil exclusiv online!
      Împachetare cadou gratuită!
      Transport gratuit peste 150 de lei.
      Retur gratuit în 14 zile.
      Ai întrebări? Contactează-ne!
      Descriere

      An expert on computer privacy and security shows how we can build privacy into the design of systems from the start.

      We are tethered to our devices all day, every day, leaving data trails of our searches, posts, clicks, and communications. Meanwhile, governments and businesses collect our data and use it to monitor us without our knowledge. So we have resigned ourselves to the belief that privacy is hard--choosing to believe that websites do not share our information, for example, and declaring that we have nothing to hide anyway. In this informative and illuminating book, a computer privacy and security expert argues that privacy is not that hard if we build it into the design of systems from the start.

      Along the way, Jaap-Henk Hoepman debunks eight persistent myths surrounding computer privacy. The website that claims it doesn't collect personal data, for example; Hoepman explains that most data is personal, capturing location, preferences, and other information. You don't have anything to hide? There's nothing wrong with wanting to keep personal information--even if it's not incriminating or embarrassing--private. Hoepman shows that just as technology can be used to invade our privacy, it can be used to protect it, when we apply privacy by design. Hoepman suggests technical fixes, discussing pseudonyms, leaky design, encryption, metadata, and the benefits of keeping your data local (on your own device only), and outlines privacy design strategies that system designers can apply now.

      Recenzii și comentarii

      Nota

      de |

      Nu există recenzii pentru acest produs.
      Adaugă o recenzie
      Trebuie să te autentifici pentru a adăuga comentarii/recenzii.