Browse Results

Showing 52,976 through 53,000 of 72,428 results

Printreading For Welders

by Thomas E. Proctor Jonathan F. Gosse

Printreading for Welders is an established text/workbook that presents an introduction to printreading fundamentals, American Welding Society (AWS) welding symbols, and related printreading applications found in the welding and fabrication industry. This edition includes the latest AWS standards and welding symbol specifications with color-enhanced illustrations, detailed prints, and descriptive photos. This industry-leading text/workbook has an open, contemporary design with helpful factoids incorporated throughout. Interactive printreading tests, Quick Quizzes®, and flash cards on the CD-ROM offer challenging activities for testing print interpretation skills and knowledge. The Printreading for Welders text/workbook and CD-ROM package is the industry leader in providing numerous industry prints and skill-building activities. An essential companion text/workbook to Welding Skills, Printreading for Welders includes all the printreading and related math content necessary to implement an AWS SENSE-based curriculum.

Prions and Mad Cow Disease

by Brian K. Nunnally Ira S. Krull

The alarm sounded by Canada's confirmed case of bovine spongiform encephalopathy (BSE) has reaffirmed the exigency of establishing improved safeguards and more aggressive surveillance protocols in North America and around the world. Research converging on the probable causative agent--prion proteins--calls for intensive assessment of the headway gained in tracing prions, testing for transmissible neurodegenerative diseases, and developing methods for cornering the epidemic. With an illustrious panel of 36 international contributors, this timely book marshals techniques for prion protein assay and diagnosis of transmissible spongiform encephalopathies (TSEs).

Priority-Zone Mapping for Reforestation: Case Study in the Montane Dry Forests of Bolivia (SpringerBriefs in Geography)

by Larissa Böhrkircher Michael Leuchner Fabio Bayro Kaiser Christa Reicher

Andean dry forest ecosystems are threatened by deforestation and unsustainable land use methods. The negative effects for the livelihood of the local population, biodiversity, and the regional climate could be countered by reforestation measures; however, dry land forests have not attracted the same level of interest and investment like other ecosystems. This book describes the development of a priority-zone map for reforestation measures, showing where reforestation might have the greatest social and ecological benefits. To achieve this, a problem analysis of a case study region is conducted and thematic reforestation benefits are determined. Using remote sensing and GIS, the areas where benefits can be obtained are mapped in individual layers and compiled into a summarizing priority-zone map. It is thus possible to identify areas where reforestation would achieve multiple benefits. The concept of priority maps could be used to facilitate reforestation strategies by local communities and municipal governments and could thus contribute to initiate an integrated forest and landscape restoration of the Bolivian montane dry forests.

Prism and Lens Making: A Textbook for Optical Glassworkers

by Twyman F

Prism and Lens Making: A Textbook for Optical Glassworkers, Second Edition is a unique compendium of the art and science of the optical working of glass for the production of mirrors, lenses, and prisms. Incorporating minor corrections and a foreword by Professor Walter Welford FRS, this reissue of the 1957 edition provides a wealth of technical information and hands-on guidance gained from a lifetime of experience. Although some of the techniques have been replaced by more modern methods, this classic book is still a valuable source of practical assistance as well as being a pleasure to read.

Prison Food: Identity, Meaning, Practices, and Symbolism in European Prisons (Palgrave Studies in Prisons and Penology)

by An-Sofie Vanhouche

Based on the lived experiences of incarcerated persons and staff, this book explores the symbolic significance of prison foodways to normalization, autonomy, identity construction, power, group formation and security. The book also traces the rationalization(s) that policy makers attach to prison food, from the water and bread diet of the 18th century, the contested abolition of alcohol consumption, to the current fear surrounding the spread of COVID-19 through food distribution in prisons. The argument is developed that prison food policies have always reflected how Belgian governments have treated imprisoned persons. The emphasis on Belgian prisons and the discussions on prison foodways situated on a micro and macro level add a unique flavour to prison food scholarship by providing a deeper understanding of a penal culture outside the dominant tradition of Anglo-Saxon and Nordic studies. Consequently, the book provides a nuanced conception of prison foodways for penologists, sociologists, those with interests in wider prison policy, and those working on the socio-cultural role of food in closed environments.

Privacy and Data Protection Challenges in the Distributed Era (Learning and Analytics in Intelligent Systems #26)

by Eugenia Politou Efthimios Alepis Maria Virvou Constantinos Patsakis

This book examines the conflicts arising from the implementation of privacy principles enshrined in the GDPR, and most particularly of the ``Right to be Forgotten'', on a wide range of contemporary organizational processes, business practices, and emerging computing platforms and decentralized technologies. Among others, we study two ground-breaking innovations of our distributed era: the ubiquitous mobile computing and the decentralized p2p networks such as the blockchain and the IPFS, and we explore their risks to privacy in relation to the principles stipulated by the GDPR. In that context, we identify major inconsistencies between these state-of-the-art technologies with the GDPR and we propose efficient solutions to mitigate their conflicts while safeguarding the privacy and data protection rights. Last but not least, we analyse the security and privacy challenges arising from the COVID-19 pandemic during which digital technologies are extensively utilized to surveil people’s lives.

Privacy and Data Protection in Software Services (Services and Business Process Reengineering)

by Roberto Senigaglia Claudia Irti Alessandro Bernes

The aim of the book is to create a bridge between two ‘lands’ that are usually kept separate: technical tools and legal rules should be bound together for moulding a special ‘toolbox’ to solve present and future issues. The volume is intended to contribute to this ‘toolbox’ in the area of software services, while addressing how to make legal studies work closely with engineers’ and computer scientists’ fields of expertise, who are increasingly involved in tangled choices on daily programming and software development. In this respect, law has not lost its importance and its own categories in the digital world, but as well as any social science needs to experience a new realistic approach amid technological development and individuals’ fundamental rights and freedoms.

Privacy and Data Protection Seals (Information Technology and Law Series #28)

by Rowena Rodrigues Vagelis Papakonstantinou

The book presents timely and needed contributions on privacy and data protection seals as seen from general, legal, policy, economic, technological, and societal perspectives. It covers data protection certification in the EU (i.e., the possibilities, actors and building blocks); the Schleswig-Holstein Data Protection Seal; the French Privacy Seal Scheme; privacy seals in the USA, Europe, Japan, Canada, India and Australia; controversies, challenges and lessons for privacy seals; the potential for privacy seals in emerging technologies; and an economic analysis. This book is particularly relevant in the EU context, given the General Data Protection Regulation (GDPR) impetus to data protection certification mechanisms and the dedication of specific provisions to certification. Its coverage of practices in jurisdictions outside the EU also makes it relevant globally. This book will appeal to European legislators and policy-makers, privacy and data protection practitioners, certification bodies, international organisations, and academics.Rowena Rodrigues is a Senior Research Analyst with Trilateral Research Ltd. in London and Vagelis Papakonstantinou is a Senior Researcher at the Vrije Universiteit Brussel in Brussels.

Privacy and Healthcare Data: 'Choice of Control' to 'Choice' and 'Control'

by Christina Munns Subhajit Basu

In order for the information society to realise its full potential, personal data has to be disclosed, used and often shared. This book explores the disclosure and sharing of data within the area of healthcare. Including an overview of how health information is currently managed, the authors argue that with changes in modern society, the idea of personal relationships with a local GP who solely holds and controls your health records is becoming rapidly outdated. The authors aim to encourage and empower patients to make informed choices about sharing their health data. They do this by developing a three-stage theoretical model for change to the roles of the NHS and the individual. The study generates debate to stimulate and inspire new models and policy, and to provoke new visions for the sharing of healthcare data. Such discussion is framed through an exploration of the changing concept of 'privacy' and 'patient control' in healthcare information management. The volume draws on best practices from Europe and the USA and combines these to form a suggested vision for the UK as an early adopter of change. The volume will be essential reading for academics in the field of privacy and data protection, as well as healthcare and informatics professionals across different jurisdictions.

Privacy and Security Challenges in Cloud Computing: A Holistic Approach (Cognitive Approaches in Cloud and Edge Computing.)

by T. Ananth Kumar

This reference text discusses various security techniques and challenges for cloud data protection from both software and hardware aspects. The text provides readers with an overview of cloud computing, beginning with historical perspectives on mainframe computers and early networking protocols, moving to current issues such as security of hardware and networks, performance, evolving IoT areas, edge computing, etc. It also deals with threat detection and incident response in cloud security. It covers important topics including operational security agitations in cloud computing, cyber artificial intelligence (AI) platform for cloud security, and security concerns of virtualization in cloud computing. The book will serve as a useful resource for graduate students and professionals in the fields of electrical engineering, electronics engineering, computer science, and information technology.

Privacy and Security for Mobile Crowdsourcing (River Publishers Series in Digital Security and Forensics)

by Shabnam Sodagari

This concise guide to mobile crowdsourcing and crowdsensing vulnerabilities and countermeasures walks readers through a series of examples, discussions, tables, initiative figures, and diagrams to present to them security and privacy foundations and applications. Discussed approaches help build intuition to apply these concepts to a broad range of system security domains toward dimensioning of next generations of mobiles crowdsensing applications. This book offers vigorous techniques as well as new insights for both beginners and seasoned professionals. It reflects on recent advances and research achievements. Technical topics discussed in the book include but are not limited to: Risks affecting crowdsensing platforms Spatio-temporal privacy of crowdsourced applications Differential privacy for data mining crowdsourcing Blockchain-based crowdsourcing Secure wireless mobile crowdsensing. This book is accessible to readers in mobile computer/communication industries as well as academic staff and students in computer science, electrical engineering, telecommunication systems, business information systems, and crowdsourced mobile app developers.

Privacy as Trust: Information Privacy for an Information Age

by Ari Ezra Waldman

It seems like there is no such thing as privacy anymore. But the truth is that privacy is in danger only because we think about it in narrow, limited, and outdated ways. In this transformative work, Ari Ezra Waldman, leveraging the notion that we share information with others in contexts of trust, offers a roadmap for data privacy that will better protect our information in a digitized world. With case studies involving websites, online harassment, intellectual property, and social robots, Waldman shows how 'privacy as trust' can be applied in the most challenging real-world contexts to make privacy work for all of us. This book should be read by anyone concerned with reshaping the theory and practice of privacy in the modern world.

Privacy Computing: Theory and Technology

by Fenghua Li Hui Li Ben Niu

The continuous evolution and widespread application of communication technology, network technology and computing technology have promoted the intelligent interconnection of all things and ubiquitous sharing of information. The cross-border, cross-system, and cross-ecosystem exchange of user data has become commonplace. At the same time, difficulties in the prevention of private information abuse and lack of protection methods have become global problems. As such, there is an urgent need to intensify basic theoretical research in this field to support the protection of personal information in a ubiquitously interconnected environment. The authors of this book proposed the concept, definition and research scope of privacy computing for the first time in 2015. This book represents their original and innovative scientific research achievement dedicated to privacy computing research, and systematically explains the basic theory and technology involved. It introduces readers to the connection between personal information and privacy protection, defines privacy protection and privacy desensitization, clarifies and summarizes the limitations of existing privacy-preserving technologies in practical information system applications, analyzes the necessity of conducting privacy computing research, and proposes the concept, definition and research scope of privacy computing. It comprehensively expounds the theoretical system of privacy computing and some privacy-preserving algorithms based on the idea of privacy computing. In closing, it outlines future research directions.

Privacy-Enhancing Aggregation Techniques for Smart Grid Communications

by Rongxing Lu

This book provides an overview of security and privacy issues in smart grid communications, as well as the challenges in addressing these issues. It also introduces several privacy enhancing aggregation techniques including multidimensional data aggregation, subset data aggregation, multifunctional data aggregation, data aggregation with fault tolerance, data aggregation with differential privacy, and data aggregation with integrity protection. Offering a comprehensive exploration of various privacy preserving data aggregation techniques, this book is an exceptional resource for the academics, researchers, and graduate students seeking to exploit secure data aggregation techniques in smart grid communications and Internet of Things (IoT) scenarios.

Privacy-Enhancing Fog Computing and Its Applications (SpringerBriefs in Electrical and Computer Engineering)

by Xiaodong Lin Jianbing Ni Xuemin Sherman Shen

This SpringerBrief covers the security and privacy challenges in fog computing, and proposes a new secure and privacy-preserving mechanisms to resolve these challenges for securing fog-assisted IoT applications. Chapter 1 introduces the architecture of fog-assisted IoT applications and the security and privacy challenges in fog computing. Chapter 2 reviews several promising privacy-enhancing techniques and illustrates examples on how to leverage these techniques to enhance the privacy of users in fog computing. Specifically, the authors divide the existing privacy-enhancing techniques into three categories: identity-hidden techniques, location privacy protection and data privacy enhancing techniques. The research is of great importance since security and privacy problems faced by fog computing impede the healthy development of its enabled IoT applications. With the advanced privacy-enhancing techniques, the authors propose three secure and privacy-preserving protocols for fog computing applications, including smart parking navigation, mobile crowdsensing and smart grid. Chapter 3 introduces identity privacy leakage in smart parking navigation systems, and proposes a privacy-preserving smart parking navigation system to prevent identity privacy exposure and support efficient parking guidance retrieval through road-side units (fogs) with high retrieving probability and security guarantees. Chapter 4 presents the location privacy leakage, during task allocation in mobile crowdsensing, and propose a strong privacy-preserving task allocation scheme that enables location-based task allocation and reputation-based report selection without exposing knowledge about the location and reputation for participators in mobile crowdsensing. Chapter 5 introduces the data privacy leakage in smart grid, and proposes an efficient and privacy-preserving smart metering protocol to allow collectors (fogs) to achieve real-time measurement collection with privacy-enhanced data aggregation. Finally, conclusions and future research directions are given in Chapter 6. This brief validates the significant feature extension and efficiency improvement of IoT devices without sacrificing the security and privacy of users against dishonest fog nodes. It also provides valuable insights on the security and privacy protection for fog-enabled IoT applications. Researchers and professionals who carry out research on security and privacy in wireless communication will want to purchase this SpringerBrief. Also, advanced level students, whose main research area is mobile network security will also be interested in this SpringerBrief.

Privacy in Context

by Helen Nissenbaum

Privacy is one of the most urgent issues associated with information technology and digital media. This book claims that what people really care about when they complain and protest that privacy has been violated is not the act of sharing information itself-most people understand that this is crucial to social life -but the inappropriate, improper sharing of information. Arguing that privacy concerns should not be limited solely to concern about control over personal information, Helen Nissenbaum counters that information ought to be distributed and protected according to norms governing distinct social contexts-whether it be workplace, health care, schools, or among family and friends. She warns that basic distinctions between public and private, informing many current privacy policies, in fact obscure more than they clarify. In truth, contemporary information systems should alarm us only when they function without regard for social norms and values, and thereby weaken the fabric of social life.

Privacy in Dynamical Systems

by Farhad Farokhi

This book addresses privacy in dynamical systems, with applications to smart metering, traffic estimation, and building management. In the first part, the book explores statistical methods for privacy preservation from the areas of differential privacy and information-theoretic privacy (e.g., using privacy metrics motivated by mutual information, relative entropy, and Fisher information) with provable guarantees. In the second part, it investigates the use of homomorphic encryption for the implementation of control laws over encrypted numbers to support the development of fully secure remote estimation and control. Chiefly intended for graduate students and researchers, the book provides an essential overview of the latest developments in privacy-aware design for dynamical systems.

The Privacy Mission: Achieving Ethical Data for Our Lives Online

by Annie Machon

Future-proof yourself and your organization against known threats to privacy and online safety The subject of data ethics has never been more urgent. This is no longer an academic or niche geek issue as it has been since the inception of the internet and the world wide web. Data ethics is an issue that affects all of us now as our personal and professional lives increasingly take place online. Who controls access to the hardware, who runs the software, who can spy on us, hack us, data farm us? What are the threats that we need to mitigate against democratically, societally, and personally? How can corporations protect us and how can that help their bottom line?The Privacy Mission aims to answer these questions and summarise both the overarching concepts and principles about why data ethics is important. It offers practical solutions for companies, policy makers and individuals to push back against known threats and future proof themselves going forward.

Privacy on the Line, updated and expanded edition: The Politics of Wiretapping and Encryption

by Whitfield Diffie Susan Landau

A penetrating and insightful study of privacy and security in telecommunications for a post-9/11, post-Patriot Act world.Telecommunication has never been perfectly secure. The Cold War culture of recording devices in telephone receivers and bugged embassy offices has been succeeded by a post-9/11 world of NSA wiretaps and demands for data retention. Although the 1990s battle for individual and commercial freedom to use cryptography was won, growth in the use of cryptography has been slow. Meanwhile, regulations requiring that the computer and communication industries build spying into their systems for government convenience have increased rapidly. The application of the 1994 Communications Assistance for Law Enforcement Act has expanded beyond the intent of Congress to apply to voice over Internet Protocol (VoIP) and other modern data services; attempts are being made to require ISPs to retain their data for years in case the government wants it; and data mining techniques developed for commercial marketing applications are being applied to widespread surveillance of the population.In Privacy on the Line, Whitfield Diffie and Susan Landau strip away the hype surrounding the policy debate over privacy to examine the national security, law enforcement, commercial, and civil liberties issues. They discuss the social function of privacy, how it underlies a democratic society, and what happens when it is lost. This updated and expanded edition revises their original—and prescient—discussions of both policy and technology in light of recent controversies over NSA spying and other government threats to communications privacy.

Privacy Preservation in Distributed Systems: Algorithms and Applications (Signals and Communication Technology)

by Anqi Zhang Ping Zhao Guanglin Zhang

This book provides a discussion of privacy in the following three parts: Privacy Issues in Data Aggregation; Privacy Issues in Indoor Localization; and Privacy-Preserving Offloading in MEC. In Part 1, the book proposes LocMIA, which shifts from membership inference attacks against aggregated location data to a binary classification problem, synthesizing privacy preserving traces by enhancing the plausibility of synthetic traces with social networks. In Part 2, the book highlights Indoor Localization to propose a lightweight scheme that can protect both location privacy and data privacy of LS. In Part 3, it investigates the tradeoff between computation rate and privacy protection for task offloading a multi-user MEC system, and verifies that the proposed load balancing strategy improves the computing service capability of the MEC system. In summary, all the algorithms discussed in this book are of great significance in demonstrating the importance of privacy.

Privacy Preservation in IoT: A Comprehensive Survey and Use Cases (SpringerBriefs in Computer Science)

by Youyang Qu Longxiang Gao Shui Yu Yong Xiang

This book aims to sort out the clear logic of the development of machine learning-driven privacy preservation in IoTs, including the advantages and disadvantages, as well as the future directions in this under-explored domain. In big data era, an increasingly massive volume of data is generated and transmitted in Internet of Things (IoTs), which poses great threats to privacy protection. Motivated by this, an emerging research topic, machine learning-driven privacy preservation, is fast booming to address various and diverse demands of IoTs. However, there is no existing literature discussion on this topic in a systematically manner. The issues of existing privacy protection methods (differential privacy, clustering, anonymity, etc.) for IoTs, such as low data utility, high communication overload, and unbalanced trade-off, are identified to the necessity of machine learning-driven privacy preservation. Besides, the leading and emerging attacks pose further threats to privacy protection in this scenario. To mitigate the negative impact, machine learning-driven privacy preservation methods for IoTs are discussed in detail on both the advantages and flaws, which is followed by potentially promising research directions. Readers may trace timely contributions on machine learning-driven privacy preservation in IoTs. The advances cover different applications, such as cyber-physical systems, fog computing, and location-based services. This book will be of interest to forthcoming scientists, policymakers, researchers, and postgraduates.

Privacy-Preserving Techniques with e-Healthcare Applications (Wireless Networks)

by Dan Zhu Dengguo Feng Xuemin (Sherman) Shen

This book investigates novel accurate and efficient privacy-preserving techniques and their applications in e-Healthcare services. The authors first provide an overview and a general architecture of e-Healthcare and delve into discussions on various applications within the e-Healthcare domain. Simultaneously, they analyze the privacy challenges in e-Healthcare services. Then, in Chapter 2, the authors give a comprehensive review of privacy-preserving and machine learning techniques applied in their proposed solutions. Specifically, Chapter 3 presents an efficient and privacy-preserving similar patient query scheme over high-dimensional and non-aligned genomic data; Chapter 4 and Chapter 5 respectively propose an accurate and privacy-preserving similar image retrieval scheme and medical pre-diagnosis scheme over dimension-related medical images and single-label medical records; Chapter 6 presents an efficient and privacy-preserving multi-disease simultaneous diagnosis scheme over medical records with multiple labels. Finally, the authors conclude the monograph and discuss future research directions of privacy-preserving e-Healthcare services in Chapter 7.

Privacy, Security And Forensics in The Internet of Things (IoT)

by Ian Mitchell Reza Montasari Fiona Carroll Sukhvinder Hara Rachel Bolton-King

This book provides the most recent security, privacy, technical and legal challenges in the IoT environments. This book offers a wide range of theoretical and technical solutions to address these challenges. Topics covered in this book include; IoT, privacy, ethics and security, the use of machine learning algorithms in classifying malicious websites, investigation of cases involving cryptocurrency, the challenges police and law enforcement face in policing cyberspace, the use of the IoT in modern terrorism and violent extremism, the challenges of the IoT in view of industrial control systems, and the impact of social media platforms on radicalisation to terrorism and violent extremism.This book also focuses on the ethical design of the IoT and the large volumes of data being collected and processed in an attempt to understand individuals’ perceptions of data and trust. A particular emphasis is placed on data ownership and perceived rights online. It examines cyber security challenges associated with the IoT, by making use of Industrial Control Systems, using an example with practical real-time considerations. Furthermore, this book compares and analyses different machine learning techniques, i.e., Gaussian Process Classification, Decision Tree Classification, and Support Vector Classification, based on their ability to learn and detect the attributes of malicious web applications. The data is subjected to multiple steps of pre-processing including; data formatting, missing value replacement, scaling and principal component analysis. This book has a multidisciplinary approach. Researchers working within security, privacy, technical and legal challenges in the IoT environments and advanced-level students majoring in computer science will find this book useful as a reference. Professionals working within this related field will also want to purchase this book.

Privacy Symposium 2022: Data Protection Law International Convergence and Compliance with Innovative Technologies (DPLICIT)

by Stefan Schiffner Sebastien Ziegler Adrian Quesada Rodriguez

This book presents a collection of high-quality research works and professional perspectives arising from the call for papers of the Privacy Symposium 2022; an international conference aimed towards the promotion of international dialogue, cooperation and knowledge sharing on data protection regulations, compliance and emerging technologies. Gathering legal and technology expertise, this publication provides cutting-edge perspectives on the convergence of international data protection regulations, as well as data protection compliance of emerging technologies, such as: Artificial Intelligence, e-health, blockchain, edge computing, Internet of things, V2X and Smart Grids. It includes selected papers from the Privacy Symposium conference 2022 (PSC 2022) call for papers, encompassing relevant topics, including: international law and comparative law in data protection cross-border data transfers emerging technologies and data protection compliance data protection by design technologic solutions for data protection compliance data protection good practices across industries and verticals cybersecurity and data protection assessment and certification of data protection compliance, and data subject rights implementation This publication includes papers authored by academics and professionals involved on various areas of data protection, technical, legal and compliance services.Chapter 10 is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com

Privacy Symposium 2023: Data Protection Law International Convergence and Compliance with Innovative Technologies (DPLICIT)

by Stefan Schiffner Sébastien Ziegler Meiko Jensen

This book presents the proceedings of the Privacy Symposium 2023. the book features a collection of high-quality research works and professional perspectives on personal data protection and emerging technologies. Gathering legal and technology expertise, it provides cutting-edge perspective on international data protection regulations convergence, as well as data protection compliance of emerging technologies, such as artificial intelligence, e-health, blockchain, edge computing, Internet of Things, V2X and smart grid. Papers encompass various topics, including international law and comparative law in data protection and compliance, cross-border data transfer, emerging technologies and data protection compliance, data protection by design, technology for compliance and data protection, data protection good practices across industries and verticals, cybersecurity and data protection, assessment and certification of data protection compliance, and data subject rights implementation.

Refine Search

Showing 52,976 through 53,000 of 72,428 results