Guide to Data Privacy (Record no. 185016)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 04019nam a22006135i 4500 |
001 - CONTROL NUMBER | |
control field | 978-3-031-12837-0 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | DE-He213 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240423130109.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr nn 008mamaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 221104s2022 sz | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9783031128370 |
-- | 978-3-031-12837-0 |
024 7# - OTHER STANDARD IDENTIFIER | |
Standard number or code | 10.1007/978-3-031-12837-0 |
Source of number or code | doi |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | QA76.9.A25 |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | JC596-596.2 |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | URD |
Source | bicssc |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | COM060040 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | URD |
Source | thema |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 |
Edition number | 23 |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 323.448 |
Edition number | 23 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Torra, Vicenç. |
Relator term | author. |
Relator code | aut |
-- | http://id.loc.gov/vocabulary/relators/aut |
245 10 - TITLE STATEMENT | |
Title | Guide to Data Privacy |
Medium | [electronic resource] : |
Remainder of title | Models, Technologies, Solutions / |
Statement of responsibility, etc | by Vicenç Torra. |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. 2022. |
264 #1 - | |
-- | Cham : |
-- | Springer International Publishing : |
-- | Imprint: Springer, |
-- | 2022. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | XVI, 313 p. 33 illus., 6 illus. in color. |
Other physical details | online resource. |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | c |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | cr |
-- | rdacarrier |
347 ## - | |
-- | text file |
-- | |
-- | rda |
490 1# - SERIES STATEMENT | |
Series statement | Undergraduate Topics in Computer Science, |
International Standard Serial Number | 2197-1781 |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | 1. Introduction -- 2. Basics of Cryptography and Machine Learning -- 3. Privacy Models and Privacy Mechanisms -- 4. User's Privacy -- 5. Avoiding Disclosure from Computations -- 6. Avoiding Disclosure from Data Masking Methods -- 7. Other -- 8. Conclusions. |
520 ## - SUMMARY, ETC. | |
Summary, etc | Data privacy technologies are essential for implementing information systems with privacy by design. Privacy technologies clearly are needed for ensuring that data does not lead to disclosure, but also that statistics or even data-driven machine learning models do not lead to disclosure. For example, can a deep-learning model be attacked to discover that sensitive data has been used for its training? This accessible textbook presents privacy models, computational definitions of privacy, and methods to implement them. Additionally, the book explains and gives plentiful examples of how to implement—among other models—differential privacy, k-anonymity, and secure multiparty computation. Topics and features: Provides integrated presentation of data privacy (including tools from statistical disclosure control, privacy-preserving data mining, and privacy for communications) Discusses privacy requirements and tools for different types of scenarios, including privacy for data, for computations, and for users Offers characterization of privacy models, comparing their differences, advantages, and disadvantages Describes some of the most relevant algorithms to implement privacy models Includes examples of data protection mechanisms This unique textbook/guide contains numerous examples and succinctly and comprehensively gathers the relevant information. As such, it will be eminently suitable for undergraduate and graduate students interested in data privacy, as well as professionals wanting a concise overview. Vicenç Torra is Professor with the Department of Computing Science at Umeå University, Umeå, Sweden. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Data protection |
General subdivision | Law and legislation. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Data protection. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Cryptography. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Data encryption (Computer science). |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Information technology |
General subdivision | Moral and ethical aspects. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computers and civilization. |
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Privacy. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Data and Information Security. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Cryptology. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Information Ethics. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computers and Society. |
710 2# - ADDED ENTRY--CORPORATE NAME | |
Corporate name or jurisdiction name as entry element | SpringerLink (Online service) |
773 0# - HOST ITEM ENTRY | |
Title | Springer Nature eBook |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Display text | Printed edition: |
International Standard Book Number | 9783031128363 |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Display text | Printed edition: |
International Standard Book Number | 9783031128387 |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE | |
Uniform title | Undergraduate Topics in Computer Science, |
-- | 2197-1781 |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="https://doi.org/10.1007/978-3-031-12837-0">https://doi.org/10.1007/978-3-031-12837-0</a> |
912 ## - | |
-- | ZDB-2-SCS |
912 ## - | |
-- | ZDB-2-SXCS |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks-CSE-Springer |
No items available.