Lessons from the Identity Trail
by I. Kerr, C. Lucock, V. Steeves
Publisher: Oxford University Press 2009
Number of pages: 592
This volume promises to make important contributions to policy and scholarly thinking about developments in information technologies and changes in social, cultural and personal practices and values. Ian Kerr and his talented colleagues explore the intricacies of privacy, identity and anonymity applying fresh analytical approaches, revealing the limitations of several traditional concepts, and identifying new insights on these critically important issues.
Home page url
Download or read it online for free here:
(multiple PDF files)
by Dan Farmer, Wietse Venema - Addison-Wesley Professional
Forensic information can be found everywhere you look. The authors develop tools to collect information from obvious and not so obvious sources, walk through analyses of real intrusions in detail, and discuss the limitations of their approach.
by Suelette Dreyfus - Mandarin
The author uncovered one of this country's best kept secrets and in doing so has created a highly intense and enjoyable read. The book is an overview of some computer intrusion incidents and describes the persons behind them.
by John Kleinig, et al. - ANU E Press
This study is principally concerned with the ethical dimensions of identity management technology -- electronic surveillance, the mining of personal data, and profiling -- in the context of transnational crime and global terrorism.
by Abraham D. Sofaer, Seymour E. Goodman - Hoover Institution Press
The worldwide information infrastructure is today increasingly under attack by cyber criminals and terrorists. These attacks threaten the substantial and ever-growing reliance of commerce, governments, and the public upon the new technology.