Listing 1 - 10 of 128 | << page >> |
Sort by
|
Choose an application
Data protection. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing
Choose an application
Computer security --- Data protection. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Management.
Choose an application
Using the factor analysis of information risk (FAIR) methodology developed over ten years and adopted by corporations worldwide, Measuring and Managing Information Risk provides a proven and credible framework for understanding, measuring, and analyzing information risk of any size or complexity. Intended for organizations that need to either build a risk management program from the ground up or strengthen an existing one, this book provides a unique and fresh perspective on how to do a basic quantitative risk analysis. Covering such key areas as risk theory, risk calculation, scenario mode
Risk management. --- Information technology --- Data protection. --- Management. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Insurance --- Management
Choose an application
Data protection --- Law and legislation. --- Standards. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Habeas data --- Privacy, Right of
Choose an application
Written by industry experts with more than 30 years combined experience, this handbook covers all the major aspects of Governance, Risk, and Compliance management in your organization with this book and ebook.
Data protection. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Oracle (Computer file) --- Oracle7.3 --- Oracle 7.3 --- Personal Oracle7 --- Personal Oracle 7
Choose an application
Mandy Webster's book provides a practical and comprehensive guide to the complex issue of data protection within human resources, looking at the implications throughout the employment lifecycle. It effectively brings together the strict legal requiremen
Data protection --- Personnel management --- Personnel records --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Access control --- Law and legislation
Choose an application
This book discusses the phenomena associated with the exponential digitization of medical data and how it has led to a transformation of the practice of medicine, also providing the tools necessary for ethical reflection on the development, implementation, and use of healthy mega data.
Medicine --- Data protection. --- Data processing. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Health Workforce --- Medical informatics. --- Medical informatics --- Big data --- Medical ethics. --- Moral and ethical aspects.
Choose an application
Data stewards in business and IT are the backbone of a successful data governance implementation because they do the work to make a company's data trusted, dependable, and high quality. Data Stewardship explains everything you need to know to successfully implement the stewardship portion of data governance, including how to organize, train, and work with data stewards, get high-quality business definitions and other metadata, and perform the day-to-day tasks using a minimum of the steward's time and effort. David Plotkin has loaded this book with practical advice on stewardship so y
Information technology --- Data protection. --- Data warehousing. --- Security measures. --- Information Technology --- General and Others --- Information warehousing --- Warehousing, Data --- Database management --- Management information systems --- Multidimensional databases --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing
Choose an application
Cloud Storage Security: A Practical Guide introduces and discusses the risks associated with cloud-based data storage from a security and privacy perspective. Gain an in-depth understanding of the risks and benefits of cloud storage illustrated using a Use-Case methodology. The authors also provide a checklist that enables the user, as well as the enterprise practitioner to evaluate what security and privacy issues need to be considered when using the cloud to store personal and sensitive information.Describes the history and the evolving nature of cloud storage and securityExplores the threat
Cloud computing -- Security measures. --- Computer security. --- Data protection. --- Computer Science --- Engineering & Applied Sciences --- Cloud computing --- Security measures. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Web services --- Distributed processing
Choose an application
Identity theft and other confidential information theft have now topped the charts as the leading cybercrime. In particular, credit card data is preferred by cybercriminals. Is your payment processing secure and compliant? The new Fourth Edition of PCI Compliance has been revised to follow the new PCI DSS standard version 3.0, which is the official version beginning in January 2014. Also new to the Fourth Edition: additional case studies and clear guidelines and instructions for maintaining PCI compliance globally, including coverage of technologies such as NFC, P2PE, CNP/Mobile, and EMV. Thi
Data protection --- Computer networks --- Standards. --- Security measures. --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing
Listing 1 - 10 of 128 | << page >> |
Sort by
|