Listing 1 - 10 of 24 | << page >> |
Sort by
|
Choose an application
Data protection --- -Data protection --- -342.08580941 --- Ug2.3 --- Qb8gbr --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Law and legislation --- -Law and legislation --- -Privacy, Right of --- Droit à la vie privée --- Protection de l'information (Informatique) --- Droit --- Great Britain. --- -Law and legislation -
Choose an application
Computer security --- Data protection --- Computer security. --- Data protection. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Electronic digital computers --- Security of computer systems --- Security measures --- Electronic data processing --- Security systems --- Hacking --- Cyber security --- Cybersecurity --- Protection of computer systems --- Protection --- Computer Science
Choose an application
The battle to protect intellectual property and commercial rights in the digital world remains fierce, with content owners under constant threat from file-sharing networks and illegal download sites. Jude Umeh calls on content creators, law makers and businesses to work more closely with end-users to harness the opportunities in the digital age.
Copyright and electronic data processing. --- Intellectual property. --- Copyright --- Data protection. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Electronic information resources --- Intellectual property --- IP (Intellectual property) --- Proprietary rights --- Rights, Proprietary --- Intangible property --- Electronic data processing and copyright --- Copyright infringement --- Fair use (Copyright) --- Electronic information resources. --- Law and legislation
Choose an application
International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing. For more information about the 300 other books in the IFIP series, please visit www.springer.com. For more information about IFIP, please visit www.ifip.org.
Computer security --- Data protection --- Study and teaching --- Congresses --- Computer security -- Study and teaching. --- Engineering & Applied Sciences --- Computer Science --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Security measures --- Protection of computer systems --- Protection --- Computer science. --- Computer security. --- Computer Science. --- Systems and Data Security. --- Electronic data processing --- Security systems --- Hacking
Choose an application
"In a nutshell, this book is about code and data and what happens when the two become confused. You'll work with the basic building blocks of security bugs--assembler, source code, the stack, the heap, and so on. You'll experiment, explore, and understand the systems you're running--and how to better protect them." --Back cover
Computer security --- Data protection --- Risk assessment --- Sécurité informatique --- Protection de l'information (Informatique) --- Evaluation du risque --- 005.8 --- Analysis, Risk --- Assessment, Risk --- Risk analysis --- Risk evaluation --- Evaluation --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Electronic digital computers --- Security of computer systems --- Security systems --- Hacking --- Security measures --- Computer security. --- Sécurité informatique --- Cyber security --- Cybersecurity --- Protection of computer systems --- Protection
Choose an application
Identity theft has been steadily rising in recent years, and credit card data is one of the number one targets for identity theft. With a few pieces of key information. Organized crime has made malware development and computer networking attacks more professional and better defenses are necessary to protect against attack. The credit card industry established the PCI Data Security standards to provide a baseline expectancy for how vendors, or any entity that handles credit card transactions or data, should protect data to ensure it is not stolen or compromised. This book will provide the infor
Data protection --- Computer networks --- Credit cards. --- Liability for credit information. --- Standards. --- Security measures. --- Credit information, Liability for --- Cards, Charge --- Cards, Credit --- Charge cards --- Computer network security --- Network security, Computer --- Security of computer networks --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Credit bureaus --- Consumer credit --- Point-of-sale systems industry --- Charge accounts --- Computer security --- Electronic data processing --- Law and legislation --- Information Technology --- General and Others
Choose an application
The only book that instructs IT Managers to adhere to federally mandated certification and accreditation requirements.This book will explain what is meant by Certification and Accreditation and why the process is mandated by federal law. The different Certification and Accreditation laws will be cited and discussed including the three leading types of C&A: NIST, NIAP, and DITSCAP. Next, the book explains how to prepare for, perform, and document a C&A project. The next section to the book illustrates addressing security awareness, end-user rules of behavior, and incident response requi
Computer security. --- Computer security --- Computer networks --- Data protection. --- Standards. --- Security measures. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Computer network security --- Network security, Computer --- Security of computer networks --- Security measures --- Protection of computer systems --- Protection --- Data protection --- Security systems --- Hacking --- Electronic data processing --- Information Technology --- General and Others
Choose an application
Foundations of Security: What Every Programmer Needs to Know teaches new and current software professionals state-of-the-art software security design principles, methodology, and concrete programming techniques they need to build secure software systems. Once you're enabled with the techniques covered in this book, you can start to alleviate some of the inherent vulnerabilities that make today's software so susceptible to attack. The book uses web servers and web applications as running examples throughout the book. For the past few years, the Internet has had a "wild, wild west" flavor to it. Credit card numbers are stolen in massive numbers. Commercial web sites have been shut down by Internet worms. Poor privacy practices come to light and cause great embarrassment to the corporations behind them. All these security-related issues contribute at least to a lack of trust and loss of goodwill. Often there is a monetary cost as well, as companies scramble to clean up the mess when they get spotlighted by poor security practices. It takes time to build trust with users, and trust is hard to win back. Security vulnerabilities get in the way of that trust. Foundations of Security: What Every Programmer Needs To Know helps you manage risk due to insecure code and build trust with users by showing how to write code to prevent, detect, and contain attacks. The lead author co-founded the Stanford Center for Professional Development Computer Security Certification. This book teaches you how to be more vigilant and develop a sixth sense for identifying and eliminating potential security vulnerabilities. You'll receive hands-on code examples for a deep and practical understanding of security. You'll learn enough about security to get the job done.
Software protection. --- Computer security. --- Data encryption (Computer science) --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computer software protection --- Protection of software --- Protection --- Security measures --- Access control --- Information Technology --- Computer Science (Hardware & Networks) --- Data protection. --- Software engineering. --- Security. --- Software Engineering/Programming and Operating Systems. --- Computer software engineering --- Engineering --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Data and Information Security. --- Software Engineering.
Choose an application
Privacy - Privacy Internationaal - Gegevensverwerking - Wet verwerking persoonsgegevens (wet 08.12.1992) Europees en internationaal recht privacy - E.G. privacy - Richtlijn privacy - Raad van Europa privacy 1. Europese data bescherming: wetgeving en instellingen 2. Fundamentele wettelijke begrippen 3. Toepasselijke wet en toepasselijke rechtbank 4. Internationale data transferten 5. Compliance uitdagingen en strategieen
Company law. Associations --- European Union --- Data protection --- Electronic commerce --- Law and legislation --- -Electronic commerce --- -342.0858094 --- Ug2.3.i --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Commerce --- Information superhighway --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- -Law and legislation --- -Data protection --- -Company law. Associations --- 342.0858094 --- Data protection - Law and legislation - European Union countries --- Electronic commerce - Law and legislation - European Union countries --- Acqui 2006 --- Protection de l'information (Informatique) --- Commerce électronique --- Droit
Choose an application
The study of surveillance is more relevant than ever before. The fast growth of the field of surveillance studies reflects both the urgency of civil liberties and privacy questions in the war on terror era and the classical social science debates over the power of watching and classification, from Bentham to Foucault and beyond. In this overview, David Lyon, one of the pioneers of surveillance studies, fuses with aplomb classical debates and contemporary examples to provide the most accessible and up-to-date introduction to surveillance available. The book takes in surveillance studies in all its breadth, from local face-to-face oversight through technical developments in closed-circuit TV, radio frequency identification and biometrics to global trends that integrate surveillance systems internationally. Surveillance is understood in its ambiguity, from caring to controlling, and the role of visibility of the surveilled is taken as seriously as the powers of observing, classifying and judging. The book draws on international examples and on the insights of several disciplines; sociologists, political scientists and geographers will recognize key issues from their work here, but so will people from media, culture, organization, technology and policy studies. This illustrates the diverse strands of thought and critique available, while at the same time the book makes its own distinct contribution and offers tools for evaluating both surveillance trends and the theories that explain them. This book is the perfect introduction for anyone wanting to understand surveillance as a phenomenon and the tools for analysing it further, and will be essential reading for students and scholars alike.
Surveillance électronique --- Contrôle social --- Contrôle social --- Sociology of knowledge --- Human rights --- Electronic surveillance --- Social control --- Data protection --- Privacy, Right of --- Civil rights --- Social aspects --- Civil rights. --- Data protection. --- Privacy, Right of. --- Social control. --- Social aspects. --- Surveillance électronique --- Protection de l'information (Informatique) --- Aspect social --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Basic rights --- Civil liberties --- Constitutional rights --- Fundamental rights --- Rights, Civil --- Constitutional law --- Political persecution --- Invasion of privacy --- Right of privacy --- Libel and slander --- Personality (Law) --- Press law --- Computer crimes --- Confidential communications --- Right to be forgotten --- Secrecy --- Social conflict --- Sociology --- Liberty --- Pressure groups --- Law and legislation --- Electronic surveillance - Social aspects
Listing 1 - 10 of 24 | << page >> |
Sort by
|