Products
Products
    • Total RON Comandă
      x
      Your cart is empty.
      Comandă
      Privacy Is Hard and Seven Other Myths

      Privacy Is Hard and Seven Other Myths

      Achieving Privacy through Careful Design
      Categories:
      Language:
      Engleza
      Publishing Date:
      2021
      Publisher:
      Cover Type:
      Hardcover
      Page Count:
      256
      ISBN:
      9780262045827
      Dimensions: l: 15.2cm | H: 22.9cm | 3.2cm | 499g
      Add to cart
      14900
      Supplier stock
      Delivery in 2 to 3 weeks!

      Price applicable only to online purchases!
      Free Gift Wrapping!
      Free shipping over 150 RON
      You can return it in 14 days
      You got questions? Contact Us!
      Publisher's Synopsis

      An expert on computer privacy and security shows how we can build privacy into the design of systems from the start.

      We are tethered to our devices all day, every day, leaving data trails of our searches, posts, clicks, and communications. Meanwhile, governments and businesses collect our data and use it to monitor us without our knowledge. So we have resigned ourselves to the belief that privacy is hard--choosing to believe that websites do not share our information, for example, and declaring that we have nothing to hide anyway. In this informative and illuminating book, a computer privacy and security expert argues that privacy is not that hard if we build it into the design of systems from the start.

      Along the way, Jaap-Henk Hoepman debunks eight persistent myths surrounding computer privacy. The website that claims it doesn't collect personal data, for example; Hoepman explains that most data is personal, capturing location, preferences, and other information. You don't have anything to hide? There's nothing wrong with wanting to keep personal information--even if it's not incriminating or embarrassing--private. Hoepman shows that just as technology can be used to invade our privacy, it can be used to protect it, when we apply privacy by design. Hoepman suggests technical fixes, discussing pseudonyms, leaky design, encryption, metadata, and the benefits of keeping your data local (on your own device only), and outlines privacy design strategies that system designers can apply now.