Skip to content
X page opens in new windowLinkedin page opens in new window
Follow us on Bluesky 🦋
Cart0

View CartCheckout

  • No products in the cart.

Subtotal: $0.00

View CartCheckout

My Account
Login
Search:
Privacy + Security Academy
A Community Where Experts Share Advanced Knowledge
Privacy + Security Academy
  • Spring Academy
    Privacy+Security Forum
    • Plan
      • Conference
      • Schedule 2026
      • Speakers 2026
      • Call for Speakers
    • Explore
      • Participating Organizations
      • Previous Events
      • FAQ + CLE
    • Participate
      • Sponsor + Exhibit
      • Register
      • Contact
  • Fall Academy
    Privacy+Security Forum
    • Plan
      • Conference
      • Schedule 2026
        • Schedule 2025 (past event)
      • Speakers 2026
        • Speakers 2025 (past event)
      • Call for Speakers
    • Explore
      • Participating Organizations
      • Previous Events
      • Hotels + Venue
      • FAQ + CLE
    • Participate
      • Sponsor + Exhibit
      • Register
      • Contact

  • Online Courses
    • Online Courses
    • Shop Online Courses
    • FAQs

  • Privacy Law Salon
    • Miami Roundtable 2027
      • Agenda
      • Keynote Speakers
      • Reference Materials + CLE
      • Venue + Hotel
    • Washington Roundtable 2026
      • Agenda
      • Keynote Speakers + Policymakers
      • Reference Materials + CLE
      • Venue
    • Privacy Law Salon
      • Sponsorship
      • FAQs
      • Testimonials
      • Contact

  • Resources
    • Library
      • Information Privacy Law
      • Publications
      • Non-Fiction Privacy+Security Books

  • Newsletter

    • Newsletter Sign-Up
    • Update Your Information

  • Contact
  • Spring Academy
    Privacy+Security Forum
    • Plan
      • Conference
      • Schedule 2026
      • Speakers 2026
      • Call for Speakers
    • Explore
      • Participating Organizations
      • Previous Events
      • FAQ + CLE
    • Participate
      • Sponsor + Exhibit
      • Register
      • Contact
  • Fall Academy
    Privacy+Security Forum
    • Plan
      • Conference
      • Schedule 2026
        • Schedule 2025 (past event)
      • Speakers 2026
        • Speakers 2025 (past event)
      • Call for Speakers
    • Explore
      • Participating Organizations
      • Previous Events
      • Hotels + Venue
      • FAQ + CLE
    • Participate
      • Sponsor + Exhibit
      • Register
      • Contact

  • Online Courses
    • Online Courses
    • Shop Online Courses
    • FAQs

  • Privacy Law Salon
    • Miami Roundtable 2027
      • Agenda
      • Keynote Speakers
      • Reference Materials + CLE
      • Venue + Hotel
    • Washington Roundtable 2026
      • Agenda
      • Keynote Speakers + Policymakers
      • Reference Materials + CLE
      • Venue
    • Privacy Law Salon
      • Sponsorship
      • FAQs
      • Testimonials
      • Contact

  • Resources
    • Library
      • Information Privacy Law
      • Publications
      • Non-Fiction Privacy+Security Books

  • Newsletter

    • Newsletter Sign-Up
    • Update Your Information

  • Contact

Tag Archives: Books 2013

There will be cyberwar

Richard Stiennon, There Will be Cyberwar (2015)

Books (PSA)By Privacy + Security Academy (S)July 3, 2015

From Stiennon’s synopsis of his book: “There Will Be Cyberwar traces the origins of network-centric warfighting from the Taiwan Straits Crisis of 1995-96 to the creation of US Cyber Command. It raises the specter of future wars–not too distant–where adversaries take advantage of vulnerabilities in sensors, weapons, and command and control, to dominate the battle…

The Watchman in Pieces

David Rosen and Aaron Santesso, The Watchman in Pieces: Surveillance, Literature, and Liberal Personhood (2013)

Books (PSA)By Privacy + Security Academy (S)July 3, 2015

Everyday Surveillance

William G. Staples, Everyday Surveillance: Vigilance and Visibility in Postmodern Life (2013)

Books (PSA)By Privacy + Security Academy (S)May 21, 2015

Surveillance or Security

Susan Landau, Surveillance or Security?: The Risks Posed by New Wiretapping (2013)

Books (PSA)By Privacy + Security Academy (S)May 21, 2015

A compelling argument for how designing technologies around surveillance capabilities will undermine rather than promote security.

New Directions in Surveillance and Privacy

Benjamin J. Goold and Daniel Neyland, New Directions in Surveillance and Privacy (2013)

Books (PSA)By Privacy + Security Academy (S)May 21, 2015

Risky Business

Khaled El Emam, editor, Risky Business: Sharing Health Data While Protecting Privacy (2013)

Books (PSA)By Privacy + Security Academy (S)May 21, 2015

The Frontier of Social Evolution

Timothy M Jurgensen, Privacy: The Frontier of Social Evolution (2013)

Books (PSA)By Privacy + Security Academy (S)May 21, 2015

Privacy Due Process and the Computational Turn

Mireille Hildebrandt and Katja de Vries, editors, Privacy, Due Process and the Computational Turn (2013)

Books (PSA)By Privacy + Security Academy (S)May 21, 2015

Transborder Data Flow Regulation and Data Privacy Law

Christopher Kuner, Transborder Data Flow Regulation and Data Privacy Law (2013)

Books (PSA)By Privacy + Security Academy (S)May 21, 2015

A democratic conception of privacy

Annabelle Lever, A Democratic Conception of Privacy (2013)

Books (PSA)By Privacy + Security Academy (S)May 21, 2015
→12→
  • Privacy Policy
  • Terms + Conditions
Footer Menu

Website by BerrySeed

Go to Top