Zone Labs

Spyware - Computer Security - Computer Protection - Software

Phishing - Spam - Email Virus - Antivirus






Data Protection In A Profiled World

RRP $24.95

One of the most challenging issues facing our current information society is the accelerating accumulation of data trails in transactional and communication systems, which may be used not only to profile the behaviour of individuals for commercial, marketing and law enforcement purposes, but also to locate and follow things and actions. Data mining, convergence, interoperability, ever- increasing computer capacities and the extreme miniaturisation of the hardware are all elements which contribute to a major contemporary challenge: the profiled world. This interdisciplinary volume offers twenty contributions that delve deeper into some of the complex but urgent questions that this profiled world addresses to data protection and privacy. The chapters of this volume were all presented at the second Conference on Privacy and Data Protection (CPDP2009) held in Brussels in January 2009 (www.cpdpconferences.org). The yearly CPDP conferences aim to become Europe's most important meeting where academics, practitioners, policy-makers and activists come together to exchange ideas and discuss emerging issues in information technology, privacy and data protection and law. This volume reflects the richness of the conference, containing chapters by leading lawyers, policymakers, computer, technology assessment and social scientists. The chapters cover generic themes such as the evolution of a new generation of data protection laws and the constitutionalisation of data protection and more specific issues like security breaches, unsolicited adjustments, social networks, surveillance and electronic voting. This book not only offers a very close and timely look on the state of data protection and privacy in our profiled world, but it also explores and invents ways to make sure this world remains a world we want to live in.


Data Protection In A Profiled World

RRP $407.99

One of the most challenging issues facing our current information society is the accelerating accumulation of data trails in transactional and communication systems, which may be used not only to profile the behaviour of individuals for commercial, marketing and law enforcement purposes, but also to locate and follow things and actions. Data mining, convergence, interoperability, ever increasing computer capacities and the extreme miniaturisation of the hardware are all elements which contribute to a major contemporary challenge: the profiled world. This interdisciplinary volume offers twenty contributions that delve deeper into some of the complex but urgent questions that this profiled world addresses to data protection and privacy.

The chapters of this volume were all presented at the second Conference on Privacy and Data Protection (CPDP2009) held in Brussels in January 2009 (www.cpdpconferences.org). The yearly CPDP conferences aim to become Europe's most important meeting where academics, practitioners, policy-makers and activists come together to exchange ideas and discuss emerging issues in information technology, privacy and data protection and law. This volume reflects the richness of the conference, containing chapters by leading lawyers, policymakers, computer expets, technology assessment practitioners and social scientists. The chapters cover generic themes such as the evolution of a new generation of data protection laws and the constitutionalisation of data protection and more specific issues like security breaches, unsolicited adjustments, social networks, surveillance and electronic voting.

This book not only offers a very close and timely look on the state of data protection and privacy in our profiled world, but it also explores and invents ways to make sure this world remains a world we want to live in.


Diary Of An 80s Computer Geek

RRP $13.99

From bright colours and big hair to synthesized songs and day glow wardrobes. The 1980s were certainly loud, often garish and utterly fabulous - no matter how embarrassing the outfits were. There are so many elements, which made the 80s a truly great decade, but one of the greatest contributions, if not the greatest, is the mass introduction of affordable 8-bit home micro computers. These curious machines of geekdom changed the way we regarded computers and technology. No longer were they the sole perverse of tweed jacket clad scientists sporting unruly beards, micro computers were now forming a staple inventory in millions of homes. Much of the technology that we enjoy today, such as desktop computers, notebooks, tablets, gaming consoles and smart phones, all of which are often taken for granted, can be traced back to this innovative decade. If you were a child of the 80s and remember the joy of receiving your very first home computer or maybe a young adult who fondly remembers the excitement, then you will appreciate this unabashed reminiscence of a simpler time whose adolescent technological was on the cusp of great advancements. This book is intended as celebration and reflection of all the computer technology that made the 80s such a wonderful, pioneering period and follows the journey of a self confessed, teenaged computer geek who experienced and enjoyed every ground breaking moment, including publishing his own software. 10 Print "The 80s are fab!" 20 Goto 10 Run Author's Comments: The current edition is dated 31st January 2016 and has been edited based on customer feedback.


Fire Protection Systems

RRP $254.99

In addition to architects, engineers, and design professionals, fire fighters also need to understand fire protection systems in order to manage the fire scene and minimize risks to life and property. Fire Protection Systems, Second Edition provides a comprehensive overview of the various types of fire protection systems, their operational abilities and characteristics, and their applications within various types of structures. The new Second Edition meets the latest course objectives from the Fire and Emergency Services Higher Education's (FESHE) Fire Protection Systems model curriculum and covers: * Water supply basics, including sources, distribution networks, piping, and hydrants. * Active fire protection systems and components, their operational characteristics, and installation, inspection, testing, and maintenance requirements. * Passive fire protection systems such as firewalls, fire separation assemblies, and fire dampers * Smoke control and management systems, gas-based suppression, access and egress control systems, and the code requirements for installation of these systems. Ensure that you are completely up-to-date on the latest fire protection systems and their operational characteristics and abilities with Fire Protection Systems, Second Edition.



Search

Zone Labs Articles

Spyware Computer Security Computer Protection Software
Phishing Spam Email Virus Antivirus
Email Protection Spam Protection Virus Protection Reduce Spam

Zone Labs Books

Spyware Computer Security Computer Protection Software
Phishing Spam Email Virus Antivirus
Email Protection Spam Protection Virus Protection Reduce Spam

Zone Labs