The practical digital library updated

A few years ago I moved my private library to the cloud. It uses Calibre to catalog my books, and the Open Publication Distribution System (OPDS) to provide an Internet-capable catalog. OPDS is built in to a lot of publisher-independent e-reader softwa… Continue reading The practical digital library updated

A CISO’s Guide to Principles of Data Privacy and Security

A CISO’s Guide to Principles of Data Privacy and Security by David Sheidlower, currently CISO for an international media and advertising firm, examines the key issues surrounding data privacy and security. In this Security Current ebook, David Sheidlower provides his perspective on topics, which include privacy policies, big data, consent, governance, and security. According to… Continue reading A CISO’s Guide to Principles of Data Privacy and Security

A CISO’s Guide to Phishing and Malware

A CISO’s Guide to Phishing and Malware examines real-world examples of advanced targeted attacks via email and social media to show how these evolving threats are increading an organization’s business risks. Cybercrime is very much a B2B affair with surging returns on investment. From a business perspective, there is always a number associated with a breach. For… Continue reading A CISO’s Guide to Phishing and Malware

Resource: Massive Free Microsoft eBook Giveaway At Your Fingertips

In what is quickly becoming an annual tradition, Microsoft’s Eric Ligman the companies Director of Sales Excellence, is offering access to a huge library of eBooks on all kind of subjects relating to Microsoft services and products.

read more Continue reading Resource: Massive Free Microsoft eBook Giveaway At Your Fingertips

Reading Analytics and Privacy

Interesting paper: "The rise of reading analytics and the emerging calculus of reading privacy in the digital world," by Clifford Lynch: Abstract: This paper studies emerging technologies for tracking reading behaviors ("reading analytics") and their implications for reader privacy, attempting to place them in a historical context. It discusses what data is being collected, to whom it is available, and… Continue reading Reading Analytics and Privacy