Make us homepage
Add to Favorites
FAIL (the browser should render some flash content, not this).

Main page » Tag Privacy

Sort by: date | rating | most visited | comments | alphabetically


Computer Privacy Annoyances
5
 
 

Computer Privacy Annoyances

From the moment you're born, you enter the data stream-from birth certificates to medical records to what you bought on Amazon last week. As your dossier grows, so do the threats, from identity thieves to government snoops to companies who want to sell you something. Computer Privacy Annoyances shows you how to regain control of your life. You'll learn how to keep private information private, stop nosy bosses, get off that incredibly annoying mailing list, and more.
 
  More..
Tags: private, Annoyances, Privacy, Computer, regain
The Lighthouse by P. D. James
8
 
 

The Lighthouse by P. D. JamesThe Lighthouse by P. D. James Combe Island off the Cornish coast has a bloodstained history of piracy and cruelty but now, privately owned, it offers respite to over-stressed men and women in positions of high authority who require privacy and guaranteed security. But the peace of Combe is violated when one of the distinguished visitors is bizarrely murdered. 

 

REUPLOAD NEEDED
 
  More..
Tags: Combe, security, peace, guaranteed, privacy, Lighthouse, James
Privacy and Identity Management for Life
2
 
 

Privacy and Identity Management for LifePrivacy and Identity Management for Life

This book constitutes the thoroughly refereed post conference proceedings of the 5th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, held in Nice, France, in September 2009. The 25 revised papers were carefully selected from numerous submissions during two rounds of reviewing. They are organized in topical sections on lifelong privacy, privacy for social network sites and collaborative systems, privacy for e-government applications, privacy and identity management for e-health and ambient assisted living applications, anonymisation and privacy-enhancing technologies, identity management and multilateral security, and usability, awareness and transparency tools.
 
  More..
Tags: privacy, management, identity, applications, ambient, Privacy
Invasion of Privacy
0
 
 

Invasion of PrivacyInvasion of Privacy

Perri O'Shaughnessy - Invasion of Privacy

A second legal thriller featuring female attorney Nina Reilly, who finds herself with private and family traumas, as well as becoming involved with the defence of a person who she is almost certain committed dreadful crimes.

 
  More..
Tags: Invasion, Privacy, defence, involved, becoming, traumas
American Privacy - The 400-Year History of Our Most Contested Right
4
 
 

American Privacy - The 400-Year History of Our Most Contested RightAmerican Privacy - The 400-Year History of Our Most Contested Right

A sweeping story of the right to privacy as it sped along colonial postal routes, telegraph wires, and today’s fiber-optic cables on a collision course with presidents and programmers, librarians and letter-writers.

 
  More..
Tags: librarians, letter-writers, programmers, presidents, course, Right, American, History, Contested, Privacy