Andress, J. (2014). The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice. Syngress.
Kim, D., Solomon, M. (2016). Fundamentals of Information Systems Security. Jones & Bartlett Learning.
Cannon, J.C. Privacy in Technology: Standards and Practices for Engineers and Security and IT Professionals. Portsmouth: AN IAPP Publication, 2014.
Breaux, Travis. Introduction to IT Privacy: A Handbook for Technologists. Portsmouth: An IAPP Publication, 2014.
Whitman, M., & Mattord, H. (2013). Management of information security. Nelson Education.
Katz, J., & Lindell, Y. (2014). Introduction to modern cryptography. CRC press.
Ethics, Technology, and Engineering: An Introduction (2011). Ibo van de Poel, Lamber Royakkers, Wiley-Blackwell.
European Union Agency for Fundamental Rights, The Handbook on European data protection law, 2018:, 2019, http://fra.europa.eu/sites/default/files/fra_uploads/fra-coe-edps-2018-handbook-data-protection_en.pdf, http://fra.europa.eu/sites/default/files/fra_uploads/fra-coe-edps-2018-handbook-data-protection_en.pdf:
Secundária
A. Barreto Menezes Cordeiro, Direito da Proteção de Dados à luz do RGPD e da Lei n.º 58/2019, Edições Almedina., 2020, Cordeiro (2020)
Sara Baase, A gift of fire : social, legal, and ethical issues for computing technology, 2013, -
Whitman, M., Mattord, H. (2017). Principles of Information Security. Course Technology.
Bowman, Courtney. The Architecture of Privacy: On Engineering Technologies that Can Deliver Trustworthy Safeguards. O?Reilly Media, 2015.
Anderson, R. J. (2010). Security engineering: a guide to building dependable distributed systems. John Wiley & Sons.
Zúquete, A. (2018). Segurança em redes informáticas. FCA-Editora de Informática.
Regulamentos e orientações da Comissão Europeia relativos à Proteção de Dados, https://ec.europa.eu/info/law/law-topic/data-protection_en
Bynum, Terrell Ward, and Simon Rogerson, (2004), Computer Ethics and Professional Responsibility: Introductory Text and Readings. Oxford: Blackwell, 2004.
Grupo do Artigo 29, Parecer 05/2014 sobre técnicas de anonimização do grupo de trabalho de proteção de dados do artigo 29.º, de 10 de Abril de 2014, 2014, -, https://ec.europa.eu/justice/article-29/documentation/opinion-recommendation/files/2014/wp216_pt.pdf
Enisa, Orientações da Enisa sobre técnicas de pseudonimização e boas práticas, 2019, -, https://www.enisa.europa.eu/publications/pseudonymisation-techniques-and-best-practices
UE, Proposta do regulamento do parlamento europeu e do conselho que estabelece regras harmonizadas em matéria de inteligência artificial (regulamento inteligência artificial) e altera determinados atos legislativos da União, 2023, -, https://eur-lex.europa.eu/legal-content/PT/TXT/?uri=CELEX%3A52021PC0206
Outros textos a indicar e distribuídos pelo docente ao longo do semestre.: