Coverart for item
The Resource The Architecture of Privacy : On Engineering Technologies that Can Deliver Trustworthy Safeguards, Courtney Bowman, Ari Gesher, John K. Grant & Daniel Slate ; edited by Elissa Lerner

The Architecture of Privacy : On Engineering Technologies that Can Deliver Trustworthy Safeguards, Courtney Bowman, Ari Gesher, John K. Grant & Daniel Slate ; edited by Elissa Lerner

Label
The Architecture of Privacy : On Engineering Technologies that Can Deliver Trustworthy Safeguards
Title
The Architecture of Privacy
Title remainder
On Engineering Technologies that Can Deliver Trustworthy Safeguards
Statement of responsibility
Courtney Bowman, Ari Gesher, John K. Grant & Daniel Slate ; edited by Elissa Lerner
Creator
Contributor
Author
Editor
Subject
Language
eng
Summary
Annotation
Member of
Cataloging source
N$T
http://library.link/vocab/creatorName
Bowman, Courtney
Dewey number
005.1
Index
index present
LC call number
QA76.758
Literary form
non fiction
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorName
  • Gesher, Ari
  • Grant, John K.
  • Slate, Daniel
  • Lerner, Elissa
http://library.link/vocab/subjectName
  • Software engineering
  • Computer security
  • Privacy
  • COMPUTERS
  • COMPUTERS
  • Computer security
  • Privacy
  • Software Engineering
  • Computersicherheit
  • Privatsphäre
  • Datenschutz
  • Datensicherung
  • Internet
Summary expansion
Technology's influence on privacy has become a matter of everyday concern for millions of people, from software architects designing new products to political leaders and consumer groups. This book explores the issue from the perspective of technology itself: how privacy-protective features can become a core part of product functionality, rather than added on late in the development process
Label
The Architecture of Privacy : On Engineering Technologies that Can Deliver Trustworthy Safeguards, Courtney Bowman, Ari Gesher, John K. Grant & Daniel Slate ; edited by Elissa Lerner
Instantiates
Publication
Note
  • Subtitle from PDF image of cover
  • Includes index
Antecedent source
unknown
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
pt. I. Getting started -- What is privacy? -- Personal data and privacy -- Case studies in data collection -- Information security : protecting data from unauthorized access -- pt. II. Access and control : controlling authorized data access -- Security architecture -- Access controls -- Data revelation -- pt. III. Oversight : holding users and systems accountable -- Federated systems -- Audit logging -- Data retention and data purging -- pt. IV. Putting it all together -- Practical applications and use cases -- Enter the privacy engineer -- The future of privacy
Control code
919495780
Dimensions
unknown
Edition
First edition.
Extent
1 online resource
File format
unknown
Form of item
online
Isbn
9781491904015
Lccn
2016302154
Level of compression
unknown
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
http://library.link/vocab/ext/overdrive/overdriveId
673bc542-fd40-44e8-86fe-2539319fb489
Quality assurance targets
not applicable
Reformatting quality
unknown
Sound
unknown sound
Specific material designation
remote
System control number
(OCoLC)919495780
Label
The Architecture of Privacy : On Engineering Technologies that Can Deliver Trustworthy Safeguards, Courtney Bowman, Ari Gesher, John K. Grant & Daniel Slate ; edited by Elissa Lerner
Publication
Note
  • Subtitle from PDF image of cover
  • Includes index
Antecedent source
unknown
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
pt. I. Getting started -- What is privacy? -- Personal data and privacy -- Case studies in data collection -- Information security : protecting data from unauthorized access -- pt. II. Access and control : controlling authorized data access -- Security architecture -- Access controls -- Data revelation -- pt. III. Oversight : holding users and systems accountable -- Federated systems -- Audit logging -- Data retention and data purging -- pt. IV. Putting it all together -- Practical applications and use cases -- Enter the privacy engineer -- The future of privacy
Control code
919495780
Dimensions
unknown
Edition
First edition.
Extent
1 online resource
File format
unknown
Form of item
online
Isbn
9781491904015
Lccn
2016302154
Level of compression
unknown
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
http://library.link/vocab/ext/overdrive/overdriveId
673bc542-fd40-44e8-86fe-2539319fb489
Quality assurance targets
not applicable
Reformatting quality
unknown
Sound
unknown sound
Specific material designation
remote
System control number
(OCoLC)919495780

Library Locations

    • Ellis LibraryBorrow it
      1020 Lowry Street, Columbia, MO, 65201, US
      38.944491 -92.326012
    • Engineering Library & Technology CommonsBorrow it
      W2001 Lafferre Hall, Columbia, MO, 65211, US
      38.946102 -92.330125
Processing Feedback ...