Zone Labs

Spyware - Computer Security - Computer Protection - Software

Phishing - Spam - Email Virus - Antivirus






Data Protection In A Profiled World

RRP $24.95

One of the most challenging issues facing our current information society is the accelerating accumulation of data trails in transactional and communication systems, which may be used not only to profile the behaviour of individuals for commercial, marketing and law enforcement purposes, but also to locate and follow things and actions. Data mining, convergence, interoperability, ever- increasing computer capacities and the extreme miniaturisation of the hardware are all elements which contribute to a major contemporary challenge: the profiled world. This interdisciplinary volume offers twenty contributions that delve deeper into some of the complex but urgent questions that this profiled world addresses to data protection and privacy. The chapters of this volume were all presented at the second Conference on Privacy and Data Protection (CPDP2009) held in Brussels in January 2009 (www.cpdpconferences.org). The yearly CPDP conferences aim to become Europe's most important meeting where academics, practitioners, policy-makers and activists come together to exchange ideas and discuss emerging issues in information technology, privacy and data protection and law. This volume reflects the richness of the conference, containing chapters by leading lawyers, policymakers, computer, technology assessment and social scientists. The chapters cover generic themes such as the evolution of a new generation of data protection laws and the constitutionalisation of data protection and more specific issues like security breaches, unsolicited adjustments, social networks, surveillance and electronic voting. This book not only offers a very close and timely look on the state of data protection and privacy in our profiled world, but it also explores and invents ways to make sure this world remains a world we want to live in.


Data Protection In A Profiled World

RRP $407.99

One of the most challenging issues facing our current information society is the accelerating accumulation of data trails in transactional and communication systems, which may be used not only to profile the behaviour of individuals for commercial, marketing and law enforcement purposes, but also to locate and follow things and actions. Data mining, convergence, interoperability, ever increasing computer capacities and the extreme miniaturisation of the hardware are all elements which contribute to a major contemporary challenge: the profiled world. This interdisciplinary volume offers twenty contributions that delve deeper into some of the complex but urgent questions that this profiled world addresses to data protection and privacy.

The chapters of this volume were all presented at the second Conference on Privacy and Data Protection (CPDP2009) held in Brussels in January 2009 (www.cpdpconferences.org). The yearly CPDP conferences aim to become Europe's most important meeting where academics, practitioners, policy-makers and activists come together to exchange ideas and discuss emerging issues in information technology, privacy and data protection and law. This volume reflects the richness of the conference, containing chapters by leading lawyers, policymakers, computer expets, technology assessment practitioners and social scientists. The chapters cover generic themes such as the evolution of a new generation of data protection laws and the constitutionalisation of data protection and more specific issues like security breaches, unsolicited adjustments, social networks, surveillance and electronic voting.

This book not only offers a very close and timely look on the state of data protection and privacy in our profiled world, but it also explores and invents ways to make sure this world remains a world we want to live in.


Three-dimensional Computer Vision

RRP $456.99

This monograph by one of the world's leading vision researchers provides a thorough, mathematically rigorous exposition of a broad and vital area in computer vision: the problems and techniques related to three-dimensional (stereo) vision and motion. The emphasis is on using geometry to solve problems in stereo and motion, with examples from navigation and object recognition. Faugeras takes up such important problems in computer vision as projective geometry, camera calibration, edge detection, stereo vision (with many examples on real images), different kinds of representations and transformations (especially 3-D rotations), uncertainty and methods of addressing it, and object representation and recognition. His theoretical account is illustrated with the results of actual working programs. "Three-Dimensional Computer Vision "proposes solutions to problems arising from a specific robotics scenario in which a system must perceive and act. Moving about an unknown environment, the system has to avoid static and mobile obstacles, build models of objects and places in order to be able to recognize and locate them, and characterize its own motion and that of moving objects, by providing descriptions of the corresponding three-dimensional motions. The ideas generated, however, can be used indifferent settings, resulting in a general book on computer vision that reveals the fascinating relationship of three-dimensional geometry and the imaging process. Olivier Faugeras is Research Director of the Computer Vision and Robotics Laboratory at INRIA Sophia-Antipolis and a Professor of Applied Mathematics at the Ecole Polytechnique in Paris.


Critical Infrastructure Protection In Homeland Security

RRP $81.99

"...excellent for use as a text in information assurance or cyber-security courses...I strongly advocate that professors...examine this book with the intention of using it in their programs." (Computing Reviews.com, March 22, 2007)

"The book is written as a student textbook, but it should be equally valuable for current practitioners...this book is a very worthwhile investment." (Homeland Security Watch, August 17, 2006)

While the emphasis is on the development of policies that lead to successful prevention of terrorist attacks on the nation’s infrastructure, this book is the first scientific study of critical infrastructures and their protection. The book models the nation’s most valuable physical assets and infrastructure sectors as networks of nodes and links. It then analyzes the network to identify vulnerabilities and risks in the sector combining network science, complexity theory, modeling and simulation, and risk analysis.

The most critical components become the focus of deeper analysis and protection. This approach reduces the complex problem of protecting water supplies, energy pipelines, telecommunication stations, Internet and Web networks, and power grids to a much simpler problem of protecting a few critical nodes. The new edition incorporates a broader selection of ideas and sectors and moves the mathematical topics into several appendices.



Search

Zone Labs Articles

Spyware Computer Security Computer Protection Software
Phishing Spam Email Virus Antivirus
Email Protection Spam Protection Virus Protection Reduce Spam

Zone Labs Books

Spyware Computer Security Computer Protection Software
Phishing Spam Email Virus Antivirus
Email Protection Spam Protection Virus Protection Reduce Spam

Zone Labs