All $50+ Orders Get Free Delivery
IT Security and Privacy: Design and Use of Privacy-Enhancing Security Mechanisms - Lecture Notes in Computer Science Vol.1958 | Cybersecurity Textbook for Professionals & Students | Perfect for Research, Academic Studies, and IT Security Training
IT Security and Privacy: Design and Use of Privacy-Enhancing Security Mechanisms - Lecture Notes in Computer Science Vol.1958 | Cybersecurity Textbook for Professionals & Students | Perfect for Research, Academic Studies, and IT Security Training

IT Security and Privacy: Design and Use of Privacy-Enhancing Security Mechanisms - Lecture Notes in Computer Science Vol.1958 | Cybersecurity Textbook for Professionals & Students | Perfect for Research, Academic Studies, and IT Security Training

$30.24 $54.99 -45% OFF

Free shipping on all orders over $50

7-15 days international

16 people viewing this product right now!

30-day free returns

Secure checkout

68655346

Guranteed safe checkout
amex
paypal
discover
mastercard
visa
apple pay

Description

Invasion of privacy and misuse of personal data are among the most obvious negative effects of today's information and communication technologies. Besides technical issues from a variety of fields, privacy legislation, depending on national activities and often lacking behind technical progress, plays an important role in designing, implementing, and using privacy-enhancing systems.Taking into account technical aspects from IT security, this book presents in detail a formal task-based privacy model which can be used to technically enforce legal privacy requirements. Furthermore, the author specifies how the privacy model policy has been implemented together with other security policies in accordance with the Generalized Framework for Access Control (GFAC).This book will appeal equally to R&D professionals and practitioners active in IT security and privacy, advanced students, and IT managers.

We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Allow cookies", you consent to our use of cookies. More Information see our Privacy Policy.
Top