join us on facebook killer on the wall eleanor oliphant granchester twitter
Search our site
Blue Light Yokohama by Nicolas Obregon Read the opening extract of the brand new Nicolas Obregon book before its publication on 18/09/2017

Privacy & data protection books

See below for a selection of the latest books from Privacy & data protection category. Presented with a red border are the Privacy & data protection books that have been lovingly read and reviewed by the experts at Lovereading.

With expert reading recommendations made by people with a passion for books and some unique features Lovereading will help you find great Privacy & data protection books and those from many more genres to read that will keep you inspired and entertained. And it's all free!


Recently Published

A Holistic Approach to Measuring the Security of SCADA Systems by Carlos Queiroz A Holistic Approach to Measuring the Security of SCADA Systems

Describes how Supervisory Control and Data Acquisitions (SCADA) systems work and defines a new paradigm that assesses security and provides solutions through predictive modelling. This book evaluates the rapid development in hacking Supervisory Control and Data Acquisitions (SCADA) systems.
Format: Hardback - Released: 18/09/2017

Computer and Network Security Essentials by Eman El-Sheikh Computer and Network Security Essentials

This book introduces readers to the tools needed to protect IT resources and communicate with security specialists when there is a security problem. The book covers a wide range of security topics including Cryptographic Technologies, Network Security, Security Management, Information...
Format: Hardback - Released: 17/07/2017

Advanced Persistent Training  Take Your Security Awareness Program to the Next Level by Jordan Schroeder Advanced Persistent Training Take Your Security Awareness Program to the Next Level

Gain greater compliance with corporate training by addressing the heart of the very awareness vs. compliance problem: people are human. People have incredible strengths and incredible weaknesses, and as a Information Security professional, you need to recognize and devise training...
Format: Paperback - Released: 14/06/2017

Smart Cards, Tokens, Security and Applications by Dr. Keith (University of London) Mayes Smart Cards, Tokens, Security and Applications

This new edition adds content on RFIDs, embedded security, attacks and countermeasures, security evaluation, javacards, banking or payment cards, identity cards and passports, mobile systems security, and security management.
Format: Hardback - Released: 27/05/2017

Cyberspace Risks and Benefits for Society, Security and Development by J. Martin Ramirez Cyberspace Risks and Benefits for Society, Security and Development

This book covers many aspects of cyberspace, emphasizing not only its possible `negative' challenge as a threat to security, but also its positive influence as an efficient tool for defense as well as a welcome new factor for economic and...
Format: Hardback - Released: 22/05/2017

Cyber Security. Simply. Make it Happen Leveraging Digitization Through it Security by Ferri Abolhassan Cyber Security. Simply. Make it Happen Leveraging Digitization Through it Security

This book provides a practical and strategic perspective on IT and cyber security for corporations and other businesses. Leading experts from industry, politics and research discuss the status quo and future prospects of corporate cyber security. They answer questions such...
Format: Hardback - Released: 18/05/2017

Research Methods for Cyber Security by Thomas W. (Senior Cyber Security Scientist, Pacific Northwest National Laboratory) Edgar, David O. (Senior Cyber Security Manz Research Methods for Cyber Security
, ,
Research Methods for Cyber Security teaches scientific methods for generating impactful knowledge, validating theories, and adding critical rigor to the cyber security field. This book shows how to develop a research plan, beginning by starting research with a question, then...
Format: Paperback - Released: 21/04/2017

Advanced Computing and Systems for Security by Rituparna Chaki Advanced Computing and Systems for Security

This book presents extended versions of papers originally presented and discussed at the 3rd International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2016) held from August 12 to 14, 2016 in Kolkata, India. The symposium was jointly organized...
Format: Paperback - Released: 17/03/2017

Coming Soon

Cyber Survival Manual From Identity Theft to the Digital Apocalypse and Everything in Between by Nick Selby, Heather Vescent Cyber Survival Manual From Identity Theft to the Digital Apocalypse and Everything in Between
,

Format: Paperback - Released: 10/10/2017

Privacy Principles and Data Protection Practices A Professional's Guide to EU GDPR by Karen Lawrence OEqvist, Filip Johnssen Privacy Principles and Data Protection Practices A Professional's Guide to EU GDPR
,
The EU General Data Protection Regulation (GDPR) is coming into force in 2018 and it will have an impact on all organisations that process the personally identifiable information of EU residents. This essential guide to EU GDPR compliance provides the...
Format: Paperback - Released: 18/10/2017

Other books in this genre

Advanced Computing and Systems for Security by Rituparna Chaki Advanced Computing and Systems for Security

This book presents extended versions of papers originally presented and discussed at the 3rd International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2016) held from August 12 to 14, 2016 in Kolkata, India. The symposium was jointly organized...
Format: Paperback - Released: 17/03/2017

Secure and Privacy-Preserving Data Communication in Internet of Things by Liehuang Zhu Secure and Privacy-Preserving Data Communication in Internet of Things

This book mainly concentrates on protecting data security and privacy when participants communicate with each other in the Internet of Things (IoT). Technically, this book categorizes and introduces a collection of secure and privacy-preserving data communication schemes/protocols in three traditional...
Format: Paperback - Released: 01/03/2017

Privacy and Security Policies in Big Data by Sharvari Tamane Privacy and Security Policies in Big Data

This book covers the fundamental concepts of big data management and analytics along with recent research development in big data. It also includes various real time/offline applications and case studies in the field of engineering, computer science, information security, cloud...
Format: Hardback - Released: 24/02/2017

Data Recovery Ensuring Data Availability by Preston de Guise Data Recovery Ensuring Data Availability

This is the fundamental truth about data protection: backup is dead. Or rather, backup and recovery, as a standalone topic, no longer has relevance in IT. As a standalone topic, it's been killed off by seemingly exponential growth in storage...
Format: Paperback - Released: 22/02/2017

Data for the People How to Make Our Post-Privacy Economy Work for You by Andreas Weigend Data for the People How to Make Our Post-Privacy Economy Work for You


Format: Hardback - Released: 16/02/2017

Securing the Internet of Things by Shancang Li, Lida Xu Securing the Internet of Things
,
Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge they need to know regarding security in the Internet of Things (IoT). This booming field, moving from strictly research to the...
Format: Paperback - Released: 13/01/2017

Knowledge Discovery in Cyberspace Statistical Analysis & Predictive Modeling by Kristijan Kuk Knowledge Discovery in Cyberspace Statistical Analysis & Predictive Modeling


Format: Paperback - Released: 01/01/2017

Building a Practical Information Security Program by Jason (CISSP, ISSAP, CISM, GPEN) Andress, Mark (CISSP, CISM, CGIET, PMP) Leary Building a Practical Information Security Program
, , , , , , ,
Building a Practical Information Security Program provides users with a strategic view on how to build an information security program that aligns with business objectives. The information provided enables both executive management and IT managers not only to validate existing...
Format: Paperback - Released: 00/12/2016

Registered users have access to unique site features

Register now