Listing 1 - 10 of 18 | << page >> |
Sort by
|
Choose an application
"Exploitation des données privées, surveillance généralisée, addiction au smartphone, disparition de pans entiers de l'économie… Les critiques du monde numérique ne cessent de s'amplifier ; difficile d'ignorer les conséquences de l'utilisation d'Amazon, Facebook, Google, Instagram ou Netflix. Et s'il existait un autre Internet, respectueux de nos libertés ? L'ancien start-uper Maxime Guedj et la journaliste Anne-Sophie Jacques proposent de s'engager sur une nouvelle voie. Ils expliquent de l'intérieur comment l'utopie des débuts a engendré des entreprises tentaculaires. Ils sont allés à la rencontre de celles et ceux qui (re)font d'Internet un bien commun, un outil d'émancipation et de liberté : logiciels libres, design éthique, protection de la vie privée, information décentralisée…Véritable manuel d'autodéfense du citoyen connecté, Déclic contient des fiches pratiques proposant des solutions pour ralentir, pour échanger, s'informer et agir autrement. Un autre Internet existe déjà : libre à nous de le découvrir."
gegevensbescherming --- Data protection. --- Internet - Social aspects. --- Protection des données.
Choose an application
Le 17 mars 2018, le monde entier se réveille en découvrant les noms de Cambridge Analytica et de Christopher Wylie. "The Guardian" et "The New York Times" révèlent une opération sans précédent d'utilisation de données à grande échelle pour influencer des élections. Convoqué devant le Congrès américain, l'ex-directeur de recherche de Cambridge Analytica dévoile tout: les financements, les liens avec les équipes de campagne de Trump, celles en faveur du Brexit, les techniques utilisées pour exploiter les failles de sécurité de Facebook, les tests effectués dans plusieurs pays africains, le recours aux hackers et les opérations des services russes. Christopher Wylie raconte avec précision et talent l'histoire d'une arme de manipulation massive. En s'attaquant à nos données, nos cerveaux et nos bulletins de vote, la société Cambridge Analytica a déclaré une guerre silencieuse à la démocratie. [Quatrième de couverture]
Presidents --- Internet in political campaigns --- Political campaigns --- Disinformation --- Fake news --- Social media --- Data protection --- Whistle blowers --- Wylie, Christopher
Choose an application
Data protection --- Information networks --- Information superhighway --- Internet --- Law and legislation --- Law and legislation --- Law and legislation --- Law and legislation
Choose an application
Les technologies de l'information et de la communication ont permis de réduire considérablement les coûts de collecte et de traitement des données personnelles. Certains estiment qu'Internet, la biométrie, la géolocalisation ou encore les puces RFID menacent nos vies privées à un niveau jamais atteint jusqu'à présent: surveillance, usurpation d'identité, invasion du marketing en ligne, etc. D'autres soulignent les bienfaits de l'exploitation des données personnelles ouvrant des perspectives nouvelles (personnalisation des services, marketing mieux ciblé, services de mobilité...) et contribuant à la croissance économique. Cet ouvrage a pour ambition d'éclairer ce débat actuel, obscurci par des enjeux industriels et partisans. En s'appuyant sur de nombreux exemples, il dresse un état des lieux de la réflexion économique sur les conséquences de l'exploitation des données personnelles sur la vie privée et le bien-être des individus. Il propose une évaluation des solutions institutionnelles visant à réguler ces évolutions, de l'autorégulation à l'octroi de droits de propriété aux individus sur leurs données personnelles.
Choose an application
This book critically investigates the role of data subject rights in countering information and power asymmetries online. It aims at dissecting 'data subject empowerment' in the information society through the lens of the right to erasure ('right to be forgotten') in Article 17 of the General Data Protection Regulation (GDPR). In doing so, it provides an extensive analysis of the interaction between the GDPR and the fundamental right to data protection in Article 8 of the Charter of Fundamental Rights of the EU (Charter), how data subject rights affect fair balancing of fundamental rights, and what the practical challenges are to effective data subject rights.
Right to be forgotten --- Privacy, Right of --- Data protection --- Law and legislation --- European Parliament. --- European law --- Human rights --- Industrial and intellectual property --- Information systems --- European Union --- Privacy, Right of - European Union countries --- Data protection - Law and legislation - European Union countries --- Right to erasure --- Right to oblivion --- Disclosure of information --- Council of the European Union. --- Online reputation management
Choose an application
Computer networks are the spinal cord of our civilisation; because of the huge stakes involved, universities and certain companies must now teach the basics of computer system security. The purpose of this book is to help people learn about the fundamentals of this field through the study of solved exercices. The primary goal is not to create experts in this domain, but rather to teach the concepts required to understand the risks and consequences of computer system misuse. This book thus handles the basic aspects of computer security, including e-mail; viruses and antivirus programs; program and network vulnerabilities; fire walls, address translation and filtering; cryptography; secure communications; secure applications; and security management.This work is a novel addition to the literature in that it gives, for each subject, a short summary of the main principles followed by a series of exercises (with solutions), resulting in a self-contained book that provides a solid foundation in computer security to students. Chapters in this book have been conceived to be as independent as possible. All of them, nevertheless, require a background in computer science and a familiarity with the most common network protocols. [Publisher]
Computer security. --- Sécurité informatique --- Computer security --- Computer systems --- Data protection --- Systèmes informatiques --- Protection de l'information (informatique) --- Safety measures --- Mesures de sécurité --- Sécurité informatique --- Safety measures. --- Mesures de sécurité. --- Systèmes informatiques --- Mesures de sécurité.
Choose an application
Research Methods for Cyber Security teaches scientific methods for generating impactful knowledge, validating theories, and adding critical rigor to the cyber security field. This book shows how to develop a research plan, beginning by starting research with a question, then offers an introduction to the broad range of useful research methods for cyber security research: observational, mathematical, experimental, and applied. Each research method chapter concludes with recommended outlines and suggested templates for submission to peer reviewed venues. This book concludes with information on cross-cutting issues within cyber security research. Cyber security research contends with numerous unique issues, such as an extremely fast environment evolution, adversarial behavior, and the merging of natural and social science phenomena. Research Methods for Cyber Security addresses these concerns and much more by teaching readers not only the process of science in the context of cyber security research, but providing assistance in execution of research as well. Presents research methods from a cyber security science perspective Catalyzes the rigorous research necessary to propel the cyber security field forward Provides a guided method selection for the type of research being conducted, presented in the context of real-world usage
Computer security --- Study and teaching. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Computer security. --- Cyberspace --- Security measures.
Choose an application
Computer security --- Computer viruses --- Computerbeveiliging --- Computergegevens--Bescherming --- Computers--Beveiliging --- Computervirussen --- Data protection --- Données [Protection des ] --- Gegevens--Bescherming --- Gegevensbescherming --- Informatique--Sécurité --- Protection des données --- Sécurité informatique --- Virus d'ordinateur --- ABB9606-IVB --- 681.3 --- 12.03 --- Computerwetenschap --- Preventie ; Diefstal ; Fraude --- Databases --- Security measures --- Virus informatiques --- Systèmes informatiques --- ORDINATEURS --- SECURITE
Choose an application
Keep black-hat hackers at bay with the tips and techniques in this entertaining, eye-opening book! Developers will learn how to padlock their applications throughout the entire development process—from designing secure applications to writing robust code that can withstand repeated attacks to testing applications for security flaws. Easily digested chapters reveal proven principles, strategies, and coding techniques. The authors—two battle-scarred veterans who have solved some of the industry’s toughest security problems—provide sample code in several languages. This edition includes updated information about threat modeling, designing a security process, international issues, file-system issues, adding privacy to applications, and performing security code reviews. It also includes enhanced coverage of buffer overruns, Microsoft® .NET security, and Microsoft ActiveX® development, plus practical checklists for developers, testers, and program managers.
Computer security --- Data encryption (Computer science) --- Sécurité informatique --- Chiffrement (Informatique) --- Computerbeveiliging --- Data encryptie --- Computernetwerken --- Netwerkbeveiliging --- Programmeren --- codes --- veiligheid --- software --- Computernetwerken. --- Netwerkbeveiliging. --- Programmeren. --- Computer security. --- Sécurité informatique --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures
Choose an application
Handbook of System Safety and Security: Cyber Risk and Risk Management, Cyber Security, Adversary Modeling, Threat Analysis, Business of Safety, Functional Safety, Software Systems, and Cyber Physical Systems presents an update on the world's increasing adoption of computer-enabled products and the essential services they provide to our daily lives. The tailoring of these products and services to our personal preferences is expected and made possible by intelligence that is enabled by communication between them. Ensuring that the systems of these connected products operate safely, without creating hazards to us and those around us, is the focus of this book, which presents the central topics of current research and practice in systems safety and security as it relates to applications within transportation, energy, and the medical sciences. Each chapter is authored by one of the leading contributors to the current research and development on the topic. The perspective of this book is unique, as it takes the two topics, systems safety and systems security, as inextricably intertwined. Each is driven by concern about the hazards associated with a system’s performance. Presents the most current and leading edge research on system safety and security, featuring a panel of top experts in the field Includes several research advancements published for the first time, including the use of ‘goal structured notation’ together with a ‘judgment calculus’ and their automation as a ‘rule set’ to facilitate systems safety and systems security process execution in compliance with existing standards Presents for the first time the latest research in the field with the unique perspective that systems safety and systems security are inextricably intertwined Includes coverage of systems architecture, cyber physical systems, tradeoffs between safety, security, and performance, as well as the current methodologies and technologies and implantation practices for system safety and security
Computer security --- Computer networks --- Security measures --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Distributed processing --- Protection
Listing 1 - 10 of 18 | << page >> |
Sort by
|