Listing 1 - 10 of 154 | << page >> |
Sort by
|
Choose an application
Computer security --- Data protection. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Management.
Choose an application
Using the factor analysis of information risk (FAIR) methodology developed over ten years and adopted by corporations worldwide, Measuring and Managing Information Risk provides a proven and credible framework for understanding, measuring, and analyzing information risk of any size or complexity. Intended for organizations that need to either build a risk management program from the ground up or strengthen an existing one, this book provides a unique and fresh perspective on how to do a basic quantitative risk analysis. Covering such key areas as risk theory, risk calculation, scenario mode
Risk management. --- Information technology --- Data protection. --- Management. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Insurance --- Management
Choose an application
Data protection --- Law and legislation. --- Standards. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Habeas data --- Privacy, Right of
Choose an application
Written by industry experts with more than 30 years combined experience, this handbook covers all the major aspects of Governance, Risk, and Compliance management in your organization with this book and ebook.
Data protection. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Oracle (Computer file) --- Oracle7.3 --- Oracle 7.3 --- Personal Oracle7 --- Personal Oracle 7
Choose an application
Mandy Webster's book provides a practical and comprehensive guide to the complex issue of data protection within human resources, looking at the implications throughout the employment lifecycle. It effectively brings together the strict legal requiremen
Data protection --- Personnel management --- Personnel records --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Access control --- Law and legislation
Choose an application
Data protection. --- Economics. --- Economic theory --- Political economy --- Social sciences --- Economic man --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing
Choose an application
Data protection. --- Business information services. --- Business --- Business enterprises --- Information services --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing
Choose an application
This book constitutes the refereed proceedings of the 15th International Symposium on Foundations and Practice of Security, FPS 2022, held in Ottawa, ON, Canada, during December 12–14, 2022. The 26 regular and 3 short papers presented in this book were carefully reviewed and selected from 83 submissions. The papers have been organized in the following topical sections: Cryptography; Machine Learning; Cybercrime and Privacy; Physical-layer Security; Blockchain; IoT and Security Protocols; and Short Papers.
Data protection. --- Data and Information Security. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Computer security --- Data encryption (Computer science)
Choose an application
This book constitutes the proceedings of the 17th International Conference on Risks and Security of Internet and Systems, CRiSIS 2022, which took place in Sousse, Tunesia, during December 7-9, 2022. The 14full papers and 4 short papers included in this volume were carefully reviewed and selected from 39 submissions. The papers detail security issues in internet-related applications, networks and systems.
Data protection. --- Data and Information Security. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Computer Security --- Computers
Choose an application
This book constitutes the refereed proceedings of the 4th International Conference on Codes, Cryptology and Information Security, C2SI 2023, held in Rabat, Morocco, during May 29–31, 2023. The 21 full papers included in this book were carefully reviewed and selected from 62 submissions. They were organized in topical sections as follows: Invited Papers, Cryptography, Information Security, Discrete Mathematics, Coding Theory.
Data protection. --- Data and Information Security. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Engineering --- Technology & Engineering
Listing 1 - 10 of 154 | << page >> |
Sort by
|