Privacy-Enhancing Technologies
No se pudo agregar al carrito
Solo puedes tener X títulos en el carrito para realizar el pago.
Add to Cart failed.
Por favor prueba de nuevo más tarde
Error al Agregar a Lista de Deseos.
Por favor prueba de nuevo más tarde
Error al eliminar de la lista de deseos.
Por favor prueba de nuevo más tarde
Error al añadir a tu biblioteca
Por favor intenta de nuevo
Error al seguir el podcast
Intenta nuevamente
Error al dejar de seguir el podcast
Intenta nuevamente
Prueba gratis de 30 días de Audible Standard
Selecciona 1 audiolibro al mes de nuestra colección completa de más de 1 millón de títulos.
Es tuyo mientras seas miembro.
Obtén acceso ilimitado a los podcasts con mayor demanda.
Plan Standard se renueva automáticamente por $8.99 al mes después de 30 días. Cancela en cualquier momento.
Compra ahora por $8.90
-
Narrado por:
-
Virtual Voice
-
De:
-
Ajit Singh
Este título utiliza narración de voz virtual
Voz Virtual es una narración generada por computadora para audiolibros..
Philosophy
The core philosophy of this book is "Privacy by Design, Learned by Doing." We operate on the principle that true understanding of Privacy-Enhancing Technologies (PETs) comes not from memorizing definitions but from building functional systems. Traditional textbooks often focus heavily on the mathematical and theoretical underpinnings, which can be intimidating and disconnected from practical application. This book flips that model. While it provides the necessary theoretical foundations, its primary goal is to empower readers to write code, develop applications, and solve real-world privacy challenges. I believe privacy should be a default, proactive feature of system architecture, not a reactive measure added to address a breach or comply with a regulation.
Key Features
1. Implementation-Oriented: More than 60% of the book is dedicated to code, tutorials, and step-by-step guides for building privacy-preserving applications.
2. Technology Stack: Utilizes popular, accessible programming languages (like Python) and libraries, ensuring readers can get started without a steep learning curve.
3. Global Curriculum Compatibility: The content is carefully mapped to the AICTE (India) syllabus for emerging technology courses and aligns with typical "Data Privacy and Security" courses in US and other international universities.
4. Beginner to Advanced: While the explanations start from first principles, the book progresses to cover advanced topics, making it suitable for both introductory and advanced learners.
5. Visual and Explanatory: Includes architectures, frameworks, and component diagrams to visually explain how different technologies work and integrate.
6. End-to-End Coverage: Each PET is discussed from its core design and model to its implementation, deployment, and future scope.
Key Takeaways
1. Upon completing this book, readers will be able to:
2. Understand Core Privacy Principles: Grasp the fundamentals of privacy, data protection, and the need for PETs in the modern digital ecosystem.
3. Implement Anonymization Techniques: Apply techniques like k-anonymity and l-diversity to anonymize datasets effectively.
4. Build with Differential Privacy: Implement differentially private mechanisms to collect and analyze aggregate data with formal privacy guarantees.
5. Use Homomorphic Encryption: Write programs that can perform computations on encrypted data, enabling secure cloud processing.
6. Develop Secure Multi-Party Computation: Build simple protocols where multiple parties can compute a joint function without revealing their private inputs.
7. Leverage Zero-Knowledge Proofs: Understand and implement basic ZKPs for identity verification and other applications where information must be proven without being revealed.
Disclaimer: Earnest request from the Author.
Kindly go through the table of contents and refer kindle edition for a glance on the related contents.
Thank you for your kind consideration!
Todavía no hay opiniones