Are you between 5 and 25? If so, enter the Wicked Young Writer Awards NOW - click here for details...

likeyoulove twitter
Search our site
Last Letter from Istanbul by Lucy Foley Read the opening extract of the brand new Lucy Foley book before its publication on 19/03/2018

Privacy & data protection books

See below for a selection of the latest books from Privacy & data protection category. Presented with a red border are the Privacy & data protection books that have been lovingly read and reviewed by the experts at Lovereading.

With expert reading recommendations made by people with a passion for books and some unique features Lovereading will help you find great Privacy & data protection books and those from many more genres to read that will keep you inspired and entertained. And it's all free!


Recently Published

Computer Security, Ethics and Society by George Ledin Computer Security, Ethics and Society

Computer Security, Ethics, and Society is a book designed for computer science, engineering, and information technology majors taking a course in security. With the growing importance of networks and the importance of having secure transfer of data electronically, computer security...
Format: Hardback - Released: 16/02/2018

Methods for Location Privacy A Comparative Overview by Kostantinos Chatzikokolakis, Ehab Elsalamouny, Catuscia Palamidessi Methods for Location Privacy A Comparative Overview
, ,
Examines the various privacy breaches that may arise due to the use of LBSs, and considers and compares the mechanisms and metrics that have been proposed to protect user privacy, focusing in particular on a comparison between probabilistic spatial obfuscation...
Format: Paperback - Released: 28/12/2017

Privacy Principles and Data Protection Practices A Professional's Guide to EU GDPR by Karen Lawrence OEqvist, Filip Johnssen Privacy Principles and Data Protection Practices A Professional's Guide to EU GDPR
,
The EU General Data Protection Regulation (GDPR) is coming into force in 2018 and it will have an impact on all organisations that process the personally identifiable information of EU residents. This essential guide to EU GDPR compliance provides the...
Format: Paperback - Released: 22/12/2017

Personal Analytics and Privacy. An Individual and Collective Perspective First International Workshop, PAP 2017, Held in Conjunction with ECML PKDD 2017, Skopje, Macedonia, September 18, 2017, Revised by Riccardo Guidotti Personal Analytics and Privacy. An Individual and Collective Perspective First International Workshop, PAP 2017, Held in Conjunction with ECML PKDD 2017, Skopje, Macedonia, September 18, 2017, Revised

This book constitutes the thoroughly refereed post-conference proceedings of the First International Workshop on Personal Analytics and Privacy, PAP 2017, held in Skopje, Macedonia, in September 2017.
Format: Paperback - Released: 26/11/2017

Cyber Survival Manual From Identity Theft to the Digital Apocalypse and Everything in Between by Nick Selby, Heather Vescent Cyber Survival Manual From Identity Theft to the Digital Apocalypse and Everything in Between
,

Format: Paperback - Released: 27/10/2017

CompTIA Complete Cybersecurity Study Guide 2-Book Set Exam SY0-501 and Exam CSA-001 by Emmett Dulaney, Chuck Easttom, Mike Chapple, David Seidl CompTIA Complete Cybersecurity Study Guide 2-Book Set Exam SY0-501 and Exam CSA-001
, , ,
Value-Priced Bundle of Two Bestselling Sybex Study Guides Prepare for your certification journey with this discounted Cybersecurity bundle, which includes the CompTIA Security+ Study Guide: Exam SY0-501, 7th Edition, as well as the CompTIA CySA+ Study Guide: Exam CS0-001.
Format: Paperback - Released: 16/10/2017

Privacy Technologies and Policy 5th Annual Privacy Forum, APF 2017, Vienna, Austria, June 7-8, 2017, Revised Selected Papers by Erich Schweighofer Privacy Technologies and Policy 5th Annual Privacy Forum, APF 2017, Vienna, Austria, June 7-8, 2017, Revised Selected Papers

This book constitutes the thoroughly refereed post-conference proceedings of the 5th Annual Privacy Forum, APF 2017, held in Vienna, Austria, in June 2017. Finally, the third chapter, Privacy Policies in Practice , discusses privacy by design, privacy scores, privacy data...
Format: Paperback - Released: 11/10/2017

Differential Privacy and Applications by Tianqing Zhu, Wanlei Zhou, Gang Li, Philip S. Yu Differential Privacy and Applications
, , ,
It provides an approachable strategy for researchers and engineers to implement differential privacy in real world applications.Early chapters are focused on two major directions, differentially private data publishing and differentially private data analysis.
Format: Hardback - Released: 08/09/2017

Coming Soon

Security, Privacy, and Anonymization in Social Networks: Emerging Research and Opportunities by B. K. (Vit University India) Tripathy Security, Privacy, and Anonymization in Social Networks: Emerging Research and Opportunities

Presents the most up-to-date research on edge clustering models and weighted social networks. Presenting widespread coverage across a range of applicable perspectives and topics, such as neighbourhood attacks, fast k-degree anonymization (FKDA), and vertex-clustering algorithms, this book is designed for...
Format: Hardback - Released: 28/02/2018

The Huawei and Snowden Questions Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment? by Olav Lysne The Huawei and Snowden Questions Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment?

PreliminaryThis book is open access under a CC BY 4.0 license.This book answers two central questions: firstly, is it at all possible to verify electronic equipment procured from untrusted vendors?
Format: Paperback - Released: 22/03/2018

Security and Privacy Management, Techniques, and Protocols by Yassine Maleh Security and Privacy Management, Techniques, and Protocols

Examines emerging protocols and methods for effective management of information security at organisations. Featuring coverage on a broad range of topics such as cryptography, secure routing protocols, and wireless security, this book is aimed at academics, engineers, IT specialists, researchers,...
Format: Hardback - Released: 30/04/2018

Ethical Data and Information Management Concepts, Tools and Methods by Katherine O'Keefe, Daragh O'Brien Ethical Data and Information Management Concepts, Tools and Methods
,
Get a practical guide for information management professionals that provides a framework for applying ethical principles and practices to information management and governance.
Format: Paperback - Released: 03/05/2018

Other books in this genre

Privacy and Security Policies in Big Data by Sharvari Tamane Privacy and Security Policies in Big Data

Presents the latest research on innovative concepts on the management of security and privacy analytics within big data. Featuring extensive coverage on relevant areas such as kinetic knowledge, cognitive analytics, and parallel computing, this publication is an ideal resource for...
Format: Hardback - Released: 30/08/2017

Computer and Network Security Essentials by Eman El-Sheikh Computer and Network Security Essentials

The book covers a wide range of security topics including Cryptographic Technologies, Network Security, Security Management, Information Assurance, Security Applications, Computer Security, Hardware Security, and Biometrics and Forensics.
Format: Hardback - Released: 17/07/2017

Advanced Persistent Training Take Your Security Awareness Program to the Next Level by Jordan Schroeder Advanced Persistent Training Take Your Security Awareness Program to the Next Level

Gain greater compliance with corporate training by addressing the heart of the very awareness vs. compliance problem: people are human. People have incredible strengths and incredible weaknesses, and as a Information Security professional, you need to recognize and devise training...
Format: Paperback - Released: 14/06/2017

Smart Cards, Tokens, Security and Applications by Dr. Keith (University of London) Mayes Smart Cards, Tokens, Security and Applications

This new edition adds content on RFIDs, embedded security, attacks and countermeasures, security evaluation, javacards, banking or payment cards, identity cards and passports, mobile systems security, and security management.
Format: Hardback - Released: 27/05/2017

Cyberspace Risks and Benefits for Society, Security and Development by J. Martin Ramirez Cyberspace Risks and Benefits for Society, Security and Development

This book covers many aspects of cyberspace, emphasizing not only its possible `negative' challenge as a threat to security, but also its positive influence as an efficient tool for defense as well as a welcome new factor for economic and...
Format: Hardback - Released: 22/05/2017

Cyber Security. Simply. Make it Happen. Leveraging Digitization Through IT Security by Ferri Abolhassan Cyber Security. Simply. Make it Happen. Leveraging Digitization Through IT Security

This book provides a practical and strategic perspective on IT and cyber security for corporations and other businesses. Consequently, cyber security is destined to become the great facilitator of digitization, providing maximum protection for data, networks, data centres and terminal...
Format: Hardback - Released: 18/05/2017

Research Methods for Cyber Security by Thomas W. (Senior Cyber Security Scientist, Pacific Northwest National Laboratory) Edgar, David O. (Senior Cyber Security Manz Research Methods for Cyber Security
, ,
Research Methods for Cyber Security teaches scientific methods for generating impactful knowledge, validating theories, and adding critical rigor to the cyber security field. This book shows how to develop a research plan, beginning by starting research with a question, then...
Format: Paperback - Released: 21/04/2017

Datenschutz Einfuhrung in Technischen Datenschutz, Datenschutzrecht Und Angewandte Kryptographie by Ronald Petrlic, Christoph Sorge Datenschutz Einfuhrung in Technischen Datenschutz, Datenschutzrecht Und Angewandte Kryptographie
,

Format: Paperback - Released: 10/04/2017

Registered users have access to unique site features

Register now