Bibliografia

Principal

  • Andress, J. (2014). The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice. Syngress. Kim, D., Solomon, M. (2016). Fundamentals of Information Systems Security. Jones & Bartlett Learning. Cannon, J.C. Privacy in Technology: Standards and Practices for Engineers and Security and IT Professionals. Portsmouth: AN IAPP Publication, 2014. Breaux, Travis. Introduction to IT Privacy: A Handbook for Technologists. Portsmouth: An IAPP Publication, 2014. Whitman, M., & Mattord, H. (2013). Management of information security. Nelson Education. Katz, J., & Lindell, Y. (2014). Introduction to modern cryptography. CRC press. Ethics, Technology, and Engineering: An Introduction (2011). Ibo van de Poel, Lamber Royakkers, Wiley-Blackwell. European Union Agency for Fundamental Rights, The Handbook on European data protection law, 2018:, 2019, http://fra.europa.eu/sites/default/files/fra_uploads/fra-coe-edps-2018-handbook-data-protection_en.pdf, http://fra.europa.eu/sites/default/files/fra_uploads/fra-coe-edps-2018-handbook-data-protection_en.pdf:

Secundária

  • A. Barreto Menezes Cordeiro, Direito da Proteção de Dados à luz do RGPD e da Lei n.º 58/2019, Edições Almedina., 2020, Cordeiro (2020) Sara Baase, A gift of fire : social, legal, and ethical issues for computing technology, 2013, - Whitman, M., Mattord, H. (2017). Principles of Information Security. Course Technology. Bowman, Courtney. The Architecture of Privacy: On Engineering Technologies that Can Deliver Trustworthy Safeguards. O?Reilly Media, 2015. Anderson, R. J. (2010). Security engineering: a guide to building dependable distributed systems. John Wiley & Sons. Zúquete, A. (2018). Segurança em redes informáticas. FCA-Editora de Informática. Regulamentos e orientações da Comissão Europeia relativos à Proteção de Dados, https://ec.europa.eu/info/law/law-topic/data-protection_en Bynum, Terrell Ward, and Simon Rogerson, (2004), Computer Ethics and Professional Responsibility: Introductory Text and Readings. Oxford: Blackwell, 2004. Grupo do Artigo 29, Parecer 05/2014 sobre técnicas de anonimização do grupo de trabalho de proteção de dados do artigo 29.º, de 10 de Abril de 2014, 2014, -, https://ec.europa.eu/justice/article-29/documentation/opinion-recommendation/files/2014/wp216_pt.pdf Enisa, Orientações da Enisa sobre técnicas de pseudonimização e boas práticas, 2019, -, https://www.enisa.europa.eu/publications/pseudonymisation-techniques-and-best-practices UE, Proposta do regulamento do parlamento europeu e do conselho que estabelece regras harmonizadas em matéria de inteligência artificial (regulamento inteligência artificial) e altera determinados atos legislativos da União, 2023, -, https://eur-lex.europa.eu/legal-content/PT/TXT/?uri=CELEX%3A52021PC0206 Outros textos a indicar e distribuídos pelo docente ao longo do semestre.: