Kementerian Pendidikan Dasar dan Menengah

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
    To
  • Availability
  • Attachment
  • Collection Type
  • General Material Designation
    See More
  • Location
  • Language
Found 14 from your keywords: subject="Data protection"
1 2 Next Last Page
cover
Governing privacy in knowledge commons
Sanfilippo, Madelyn R.,Frischmann, Brett M.,Strandburg, Katherine Jo,

Privacy, in contrast with secrecy, is a relational concept, achieved when personal information is shared appropriately between actors. Viewed in this way, privacy is necessarily contextual and complex because norms about appropriate flows and use of personal information are socially negotiated and often contested. (Nissenbaum, 2009) Privacy is thus a problem of collective action. Moreover, pers…

Edition
-
ISBN/ISSN
9781108749978
Collation
xi, 289 pages; illustration
Series Title
Cambridge studies on governing knowledge commons
Call Number
342.08 SAN g
Availability0
Items not available
MARC DownloadCite
cover
A practical guide to tpm 2.0 : using the trusted platform module in the new a…
Arthur WillChallener DavidGoldman Kenneth

A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. Simply put, this book is designed to empower and excite the programming community to go out and do cool things with the TPM. The approach is to ramp t…

Edition
-
ISBN/ISSN
9781430265849
Collation
XXVII, 392 p
Series Title
-
Call Number
005.82 ART a
Availability0
Items not available
MARC DownloadCite
cover
Handbook of digital face manipulation and detection : from DeepFakes to morph…
Rathgeb ChristianTolosana RubenRodriguez Ruben VeraBusch Christoph

This open access book provides the first comprehensive collection of studies dealing with the hot topic of digital face manipulation such as DeepFakes, Face Morphing, or Reenactment. It combines the research fields of biometrics and media forensics including contributions from academia and industry. Appealing to a broad readership, introductory chapters provide a comprehensive overview of the t…

Edition
-
ISBN/ISSN
9783030876647
Collation
IX, 487 p
Series Title
-
Call Number
621.367 HAN c
Availability0
Items not available
MARC DownloadCite
cover
Consumer data protection in Brazil, China and Germany
Metz, RainerBinding, JörgHaifeng, PanHuber, Florian

The rapid development of new information and communication technologies has changed people’s everyday life and consumption patterns significantly. The worldwide spread of those technologies provides many innovations for consumers, but it can also bear risks, such as the indiscriminate collection, storage and cross-border flow of personal data, illegal spying on Internet activities, disseminat…

Edition
-
ISBN/ISSN
9783863952365
Collation
222 p. ; 24 cm
Series Title
-
Call Number
343.071 CON c
Availability0
Items not available
MARC DownloadCite
cover
Rational cybersecurity for business : the security leaders' guide to business…
Blum, Dan

Use the guidance in this comprehensive field guide to gain the support of your top executives for aligning a rational cybersecurity plan with your business. You will learn how to improve working relationships with stakeholders in complex digital businesses, IT, and development environments. You will know how to prioritize your security program, and motivate and retain your team. Misalignment…

Edition
-
ISBN/ISSN
9781484259528
Collation
xxvi, 333p. : ill.
Series Title
-
Call Number
005.8 BLU r
Availability0
Items not available
MARC DownloadCite
cover
Bulk collection: systematic government access to private-sector data
Cate, Fred HDempsey, James X

In June 2013, Edward Snowden revealed a secret US government program that collected records on every phone call made in the country. Further disclosures followed, detailing mass surveillance by the UK as well. Journalists and policymakers soon began discussing large-scale programs in other countries. Over two years before the Snowden leaks began, Cate and Dempsey had started researching systema…

Edition
-
ISBN/ISSN
9780190685515
Collation
xxxiv, 471 p.: ill
Series Title
-
Call Number
342.0858 BUL b
Availability0
Items not available
MARC DownloadCite
cover
Data privacy and trust in cloud computing : building trust in the cloud throu…
Lynn, TheoMooney, John G.van der Werff, LisaFox, Grace

This open access book brings together perspectives from multiple disciplines including psychology, law, IS, and computer science on data privacy and trust in the cloud. Cloud technology has fueled rapid, dramatic technological change, enabling a level of connectivity that has never been seen before in human history. However, this brave new world comes with problems. Several high-profile cases o…

Edition
-
ISBN/ISSN
9783030546601
Collation
xxi, 149p. : ill.
Series Title
-
Call Number
005.8 DAT d
Availability0
Items not available
MARC DownloadCite
cover
Security infrastructure technology for integrated utilization of big data : a…
Miyaji, AtsukoMimoto, Tomoaki

This open access book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical institutions, and user institutions in a circle of trust. It begins by discussing the most relevant technical issues involved in creating safe and privacy-preserving big data distribution platforms, and especially focuses on cryptographic primitives and pri…

Edition
-
ISBN/ISSN
9789811536540
Collation
ix, 166p. : ill.
Series Title
-
Call Number
005.8 SEC s
Availability0
Items not available
MARC DownloadCite
cover
Intel trusted execution technology for server platforms : a guide to more sec…
Futral, WilliamGreene, James

Intel® Trusted Execution Technology (Intel TXT) is a new security technology that started appearing on Intel server platforms in 2010. This book explains Intel Trusted Execution Technology for Servers, its purpose, application, advantages, and limitations. This book guides the server administrator / datacenter manager in enabling the technology as well as establishing a launch control policy t…

Edition
-
ISBN/ISSN
9781430261490
Collation
xvii, 156p. : ill.
Series Title
-
Call Number
005.8 FUT i
Availability0
Items not available
MARC DownloadCite
cover
The privacy engineer's manifesto : getting from policy to code to QA to value
Dennedy, MichelleFox, JonathanFinneran, Tom

"It's our thesis that privacy will be an integral part of the next wave in the technology revolution and that innovators who are emphasizing privacy as an integral part of the product life cycle are on the right track." --The authors of The Privacy Engineer's Manifesto The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value is the first book of its kind, offering industr…

Edition
-
ISBN/ISSN
9781430263562
Collation
xxxvi, 400p. : ill.
Series Title
-
Call Number
005.8 DEN p
Availability0
Items not available
MARC DownloadCite
1 2 Next Last Page
Kementerian Pendidikan Dasar dan Menengah
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Pengelolaan Perpustakaan Kemendikbud dilaksanakan sesuai dengan Standar Nasional Perpustakaan (SNP) Khusus, dimana pada tahun 2017 Perpustakaan Kemendikbud telah mendapatkan Akreditasi A oleh Perpustakaan Nasional RI. Perpustakaan Kemendikbud dikelola secara profesional dengan memanfaatkan teknologi informasi dan komunikasi dalam menunjang pelayanan kepada pemustaka.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search