null
Loading... Please wait...
FREE SHIPPING on All Unbranded Items LEARN MORE
Print This Page

Controlling Privacy and the Use of Data Assets - Volume 2 (What is the New World Currency - Data or Trust?)

List Price: $59.99
SKU:
9781032185187
Quantity:
Minimum Purchase
25 unit(s)
  • Availability: Confirm prior to ordering
  • Branding: minimum 50 pieces (add’l costs below)
  • Check Freight Rates (branded products only)

Branding Options (v), Availability & Lead Times

  • 1-Color Imprint: $2.00 ea.
  • Promo-Page Insert: $2.50 ea. (full-color printed, single-sided page)
  • Belly-Band Wrap: $2.50 ea. (full-color printed)
  • Set-Up Charge: $45 per decoration
FULL DETAILS
  • Availability: Product availability changes daily, so please confirm your quantity is available prior to placing an order.
  • Branded Products: allow 10 business days from proof approval for production. Branding options may be limited or unavailable based on product design or cover artwork.
  • Unbranded Products: allow 3-5 business days for shipping. All Unbranded items receive FREE ground shipping in the US. Inquire for international shipping.
  • RETURNS/CANCELLATIONS: All orders, branded or unbranded, are NON-CANCELLABLE and NON-RETURNABLE once a purchase order has been received.
  • Product Details

    Author:
    Ulf Mattsson
    Format:
    Paperback
    Pages:
    318
    Publisher:
    CRC Press (August 24, 2023)
    Language:
    English
    Audience:
    Professional and scholarly
    ISBN-13:
    9781032185187
    Weight:
    21.875oz
    Dimensions:
    7" x 10"
    File:
    TAYLORFRANCIS-TayFran_260113055421006-20260113.xml
    Folder:
    TAYLORFRANCIS
    List Price:
    $59.99
    Country of Origin:
    United States
    Series:
    Security, Audit and Leadership Series
    Case Pack:
    30
    As low as:
    $56.99
    Publisher Identifier:
    P-CRC
    Discount Code:
    H
    Pub Discount:
    30
    Imprint:
    CRC Press
  • Overview

    The book will review how new and old privacy-preserving techniques can provide practical protection for data in transit, use, and rest. We will position techniques like Data Integrity, and Ledger. This book will use practical lessons in Data Integrity, and Trust, and data's business utility.