The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The eBook copy of this book is not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.
This book provides an overview of non-governmental threats to privacy from private businesses and corporations. The authors explore the concept of informational privacy and suggest rules to limit the distribution of public information from private businesses. They discuss how computers, database technology, and the Internet enable mass surveillance. The text includes a non-technical introduction to the types of malware that are typically used to illegally access information, along with strategies for defending against such attacks. It also presents possible market, legal, and technical solutions to these challenges.