Listing 1 - 3 of 3 |
Sort by
|
Choose an application
While technological threats to personal privacy have proliferated rapidly, legislation designed to protect privacy has been slow and incremental. In this study of legislative attempts to reconcile privacy and technology, Priscilla Regan examines congressional policy making in three key areas: computerized databases, wiretapping, and polygraph testing. In each case, she argues, legislation has represented an unbalanced compromise benefiting those with a vested interest in new technology over those advocating privacy protection. Legislating Privacy explores the dynamics of congressio
Choose an application
Computer security --- Lie detectors and detection --- Privacy, Right of --- Wiretapping --- Government policy --- Privacy [Right of ] --- United States --- Computer security - Government policy - United States. --- Wiretapping - Government policy - United States. --- Lie detectors and detection - Government policy - United States.
Choose an application
US national security compromised by WikiLeaks. Towns held hostage by ransomware. Corporate websites hacked. Cyber espionage and cybercrimes are increasing in both frequency and sophistication - requiring the collection of actionable intelligence in order to combat them. The author provides here a comprehensive overview of cyber intelligence, explaining what it is, why it is needed, who is doing it, and how it is done. Notably, the book : Outlines the roles of the major US intelligence agencies involved; Assesses significant laws and policies from the 1990s to the present; Compares methods and best practices across the public and private sectors; Looks beyond the US to explore the capabilities of actors like China, Iran, and Russia; Includes real-world examples and case studies. The result is an in-depth examination of the processes and applications of spying in cyberspace, accessible to a wide range of readers.
Computer networks --- Cyber intelligence (Computer security) --- National security --- Intelligence service --- Internet in espionage --- Security measures --- Government policy --- CYBER INTELLIGENCE (COMPUTER SECURITY)--GOVERNMENT POLICY--USA --- INTELLIGENCE SERVICE--USA --- USA--NATIONAL SECURITY --- COMPUTER NETWORKS--SECURITY MEASURES--GOVERNMENT POLICY--USA --- Computer networks - Security measures - Government policy - United States --- Cyber intelligence (Computer security) - Government policy - United States --- National security - United States --- Intelligence service - United States
Listing 1 - 3 of 3 |
Sort by
|