Skip to Main Content
It looks like you're using Internet Explorer 11 or older. This website works best with modern browsers such as the latest versions of Chrome, Firefox, Safari, and Edge. If you continue with this browser, you may see unexpected results.
Browse Computer Science books in the library:
QA76 - Electronic computers. Computer science. General works.
QA76.15 - Dictionaries and encyclopedias
QA76.167 - Philosophy
QA76.17 - History. Biography
QA76.215 - Directories
QA76.25 - Computer science as a profession
QA76.5 - Digital computers
QA76.525 - Microcomputer workstations
QA76.527 - Network computers
QA76.53 - Time-sharing data processing. Real-time data processing
QA76.55 - Online data processing
QA76.575 - Multimedia systems
QA76.58 - Parallel processing. Parallel computers
QA76.59 - Mobile computing
QA76.6 - Programming
QA76.9.A25 - Computer Security
TK6721-9000 - Electronics
TK7885-7895 - Computer engineering
Cyber Defense (FSEM)
Publication Date: 2011-11-16
Bio-Privacy: Privacy Regulations and the Challenge of Biometrics provides an in-depth consideration of the legal issues posed by the use of biometric technology. Focusing particularly on the relationship between the use of this technology and the protection of privacy, this book draws on material across a range of jurisdictions in order to explore several key questions. What are the privacy issues in the biometric context? How are these issues currently dealt with under the law? What principles are applied? Is the current regulation satisfactory? Is it applied consistently? And, more generally, what is the most appropriate way to deal with the legal implications of biometrics? Offering an analysis, and recommendations, with a view to securing adequate human rights and personal data protection, Bio-Privacy: Privacy Regulations and the Challenge of Biometrics will be an important reference point for those with interests in the tension between freedom and security.
Habeas Data by
Call Number: KF1262 .F37 2018
Publication Date: 2018-05-08
Show me the data! Until the 21st century, just about all of our activities were private by default, public through effort; today anything that touches digital space has the potential (and likelihood) to remain somewhere online forever. That means all of the technologies that have made our lives easier, faster, better, more efficient have also simultaneously made it easier to keep an eye on our activities. In 10 crucial legal cases, Habeas Data explores the tools of surveillance that exist today, how they work, and what the implications are for the future of privacy.
Digital Transformation in a Post-Covid World by
Publication Date: 2021-10-03
This book explores the innovations, disruptions and changes that are required to adapt in a fast-evolving landscape due to the extraordinary circumstances triggered by the COVID-19 pandemic. Recognized experts from around the world share their research and professional experience on how the working environment, as well as the world around them, have changed due to the pandemic. Chapters consider how different fields across technology and business have been affected by this new, dramatic scenario and the drastic consequences that the pandemic had on them. With diverse contributions stemming from public health, technology strategies, urban planning and sociology to sustainable management, this volume is articulated into four distinct but complementary sections of People, Process, Planet, and Prosperity influencing the post-COVID world. This book will be of great interest to those in the fields of computer science and information technology, as well as those studying the impact and effects that COVID-19 is having on society.
Cybersecurity in the COVID-19 Pandemic by
Publication Date: 2021-03-16
As the 2020 global lockdown became a universal strategy to control the COVID-19 pandemic, social distancing triggered a massive reliance on online and cyberspace alternatives and switched the world to the digital economy. Despite their effectiveness for remote work and online interactions, cyberspace alternatives ignited several Cybersecurity challenges. Malicious hackers capitalized on global anxiety and launched cyberattacks against unsuspecting victims. Internet fraudsters exploited human and system vulnerabilities and impacted data integrity, privacy, and digital behaviour. Cybersecurity in the COVID-19 Pandemic demystifies Cybersecurity concepts using real-world cybercrime incidents from the pandemic to illustrate how threat actors perpetrated computer fraud against valuable information assets particularly healthcare, financial, commercial, travel, academic, and social networking data. The book simplifies the socio-technical aspects of Cybersecurity and draws valuable lessons from the impacts COVID-19 cyberattacks exerted on computer networks, online portals, and databases. The book also predicts the fusion of Cybersecurity into Artificial Intelligence and Big Data Analytics, the two emerging domains that will potentially dominate and redefine post-pandemic Cybersecurity research and innovations between 2021 and 2025. The book's primary audience is individual and corporate cyberspace consumers across all professions intending to update their Cybersecurity knowledge for detecting, preventing, responding to, and recovering from computer crimes. Cybersecurity in the COVID-19 Pandemic is ideal for information officers, data managers, business and risk administrators, technology scholars, Cybersecurity experts and researchers, and information technology practitioners. Readers will draw lessons for protecting their digital assets from email phishing fraud, social engineering scams, malware campaigns, and website hijacks.
Data Protection and Consumer Privacy by
Publication Date: 2004-01-01
Today we are living in a data age. Millions of pieces of information are generated and used by organizations every day - and developments in technology have helped to make the storage and manipulation of this information much easier. But while marketers have been rubbing their hands together at the comparative ease at which they are now able to gather, analyze and interpret masses of customer data, serious underlying issues of privacy and data protection are threatening to not only damage business relationships, but also ask searching questions as to the conduct of corporations in today's information society.
Privacy Is Power by
Call Number: JC596 .V45 2021
Publication Date: 2021-04-06
An Economist Book of the Year Every minute of every day, our data is harvested and exploited... It is time to pull the plug on the surveillance economy. Governments and hundreds of corporations are spying on you, and everyone you know. They're not just selling your data. They're selling the power to influence you and decide for you. Even when you've explicitly asked them not to. Reclaiming privacy is the only way we can regain control of our lives and our societies. These governments and corporations have too much power, and their power stems from us--from our data. Privacy is as collective as it is personal, and it's time to take back control. Privacy Is Power tells you how to do exactly that. It calls for the end of the data economy and proposes concrete measures to bring that end about, offering practical solutions, both for policymakers and ordinary citizens.
Digital Identity: An Emergent Legal Concept by
This is the first full-length study of digital identity in a transactional context, from a legal perspective. The functions and legal nature of digital identity are analysed using real examples which highlight the implications for individuals, businesses and government. The findings have the potential to fundamentally change the way digital identity is legally and commercially regarded.