You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.
Threat intelligence is a surprisingly complex topic that goes far beyond the obvious technical challenges of collecting, modelling and sharing technical indicators. Most books in this area focus mainly on technical measures to harden a system based on threat intel data and limit their scope to single organizations only. This book provides a unique angle on the topic of national cyber threat intelligence and security information sharing. It also provides a clear view on ongoing works in research laboratories world-wide in order to address current security concerns at national level. It allows practitioners to learn about upcoming trends, researchers to share current results, and decision makers to prepare for future developments.
This book contains a range of keynote papers and submitted papers presented at the 9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, held in Patras, Greece, in September 2014. The 9 revised full papers and 3 workshop papers included in this volume were carefully selected from a total of 29 submissions and were subject to a two-step review process. In addition, the volume contains 5 invited keynote papers. The regular papers are organized in topical sections on legal privacy aspects and technical concepts, privacy by design and privacy patterns and privacy technologies and protocols.
This book contains a range of keynote papers and submitted papers presented at the 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, held in Edinburgh, UK, in August 2015. The 14 revised full papers included in this volume were carefully selected from a total of 43 submissions and were subject to a two-step review process. In addition, the volume contains 4 invited keynote papers. The papers cover a wide range of topics: cloud computing, privacy-enhancing technologies, accountability, measuring privacy and understanding risks, the future of privacy and data protection regulation, the US privacy perspective, privacy and security, the PRISMS Decision System, engineering privacy, cryptography, surveillance, identity management, the European General Data Protection Regulation framework, communicating privacy issues to the general population, smart technologies, technology users' privacy preferences, sensitive applications, collaboration between humans and machines, and privacy and ethics.
This book constitutes the thoroughly refereed post-conference proceedings of the Third Annual Privacy Forum, APF 2015, held in Luxembourg, Luxembourg, in October 2015. The 11 revised full papers presented in this volume were carefully reviewed and selected from 24 submissions. The topics focus on privacy by design (PbD), i.e. the attempt to combine technical and organizational measures to ensure the basic rights of the individual. The papers are organized in three sessions: measuring privacy; rules and principles; legal and economic perspectives on privacy.
The digital space is a powerful enabler for more inclusive democratic discourse, participation and policy-making. At the same time, digitisation comes with new challenges. The abundance of data in the online space and powerful algorithm-based technologies pose serious risks to privacy, as well as to other interrelated human rights. The trans-border nature of the Internet itself presents significant legislative and judicial challenges for existing legal and institutional frameworks. This book follows on from the June 2019 seminar paying tribute to the outstanding contribution of Lawrence Early, Jurisconsult of the European Court of Human Rights, as he was about to retire. The seminar brought ...
Online Terrorist Propaganda, Recruitment, and Radicalization is most complete treatment of the rapidly growing phenomenon of how terrorists’ online presence is utilized for terrorism funding, communication, and recruitment purposes. The book offers an in-depth coverage of the history and development of online "footprints" to target new converts, broaden their messaging, and increase their influence. Chapters present the emergence of various groups; the advancement of terrorist groups’ online presences; their utilization of video, chat room, and social media; and the current capability for propaganda, training, and recruitment. With contributions from leading experts in the field—includ...
Cybersecurity: A Practical Engineering Approach introduces the implementation of a secure cyber architecture, beginning with the identification of security risks. It then builds solutions to mitigate risks by considering the technological justification of the solutions as well as their efficiency. The process follows an engineering process model. Each module builds on a subset of the risks, discussing the knowledge necessary to approach a solution, followed by the security control architecture design and the implementation. The modular approach allows students to focus on more manageable problems, making the learning process simpler and more attractive.
The subjects of Privacy and Data Protection are more relevant than ever, and especially since 25 May 2018, when the European General Data Protection Regulation became enforceable. This volume brings together papers that offer conceptual analyses, highlight issues, propose solutions, and discuss practices regarding privacy and data protection. It is one of the results of the eleventh annual International Conference on Computers, Privacy, and Data Protection, CPDP 2018, held in Brussels in January 2018. The book explores the following topics: biometrics and data protection in criminal justice processing, privacy, discrimination and platforms for men who have sex with men, mitigation through da...
This open access book provides researchers and professionals with a foundational understanding of online privacy as well as insight into the socio-technical privacy issues that are most pertinent to modern information systems, covering several modern topics (e.g., privacy in social media, IoT) and underexplored areas (e.g., privacy accessibility, privacy for vulnerable populations, cross-cultural privacy). The book is structured in four parts, which follow after an introduction to privacy on both a technical and social level: Privacy Theory and Methods covers a range of theoretical lenses through which one can view the concept of privacy. The chapters in this part relate to modern privacy ph...
A detailed analysis of the ethical, legal, and regulatory landscape of medical devices in the US and EU.