Narrow your search
Listing 1 - 10 of 38 << page
of 4
>>
Sort by

Book
Cloud storage security : a practical guide
Authors: ---
ISBN: 0128029315 0128029307 9780128029312 9780128029305 9780128029305 Year: 2015 Publisher: Amsterdam, Netherlands ; Oxford, England ; Waltham, Massachusetts : Elsevier,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Cloud Storage Security: A Practical Guide introduces and discusses the risks associated with cloud-based data storage from a security and privacy perspective. Gain an in-depth understanding of the risks and benefits of cloud storage illustrated using a Use-Case methodology. The authors also provide a checklist that enables the user, as well as the enterprise practitioner to evaluate what security and privacy issues need to be considered when using the cloud to store personal and sensitive information.Describes the history and the evolving nature of cloud storage and securityExplores the threat


Book
PCI compliance : understand and implement effective PCI data security standard compliance
Authors: --- ---
ISBN: 0128016515 0128015799 1322286876 9780128016510 9780128015797 Year: 2015 Publisher: Waltham, Massachusetts : Syngress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Identity theft and other confidential information theft have now topped the charts as the leading cybercrime. In particular, credit card data is preferred by cybercriminals. Is your payment processing secure and compliant? The new Fourth Edition of PCI Compliance has been revised to follow the new PCI DSS standard version 3.0, which is the official version beginning in January 2014. Also new to the Fourth Edition: additional case studies and clear guidelines and instructions for maintaining PCI compliance globally, including coverage of technologies such as NFC, P2PE, CNP/Mobile, and EMV. Thi


Periodical
European data protection law review
Author:
ISSN: 23642831 2364284X Year: 2015 Publisher: Berlin, Germany Lexxion


Book
Application of big data for national security : a practitioner's guide to emerging technologies
Authors: ---
ISBN: 9780128019733 0128019735 0128019670 9780128019672 1322985855 Year: 2015 Publisher: Oxford, UK : Butterworth-Heinemann,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Application of Big Data for National Security provides users with state-of-the-art concepts, methods, and technologies for Big Data analytics in the fight against terrorism and crime, including a wide range of case studies and application scenarios. This book combines expertise from an international team of experts in law enforcement, national security, and law, as well as computer sciences, criminology, linguistics, and psychology, creating a unique cross-disciplinary collection of knowledge and insights into this increasingly global issue.


Periodical
Proceedings on Privacy Enhancing Technologies.
Author:
ISSN: 22990984 22990984 Year: 2015 Publisher: Warsaw, Poland : Rochester, NY : De Gruyter Open Privacy Enhancing Technologies Board


Book
Information security : policy, processes, and practices
Authors: --- ---
ISBN: 1315288680 1315288699 1282119451 9786612119453 0765623730 9780765623737 9781282119451 9780765617187 0765617188 9781315288697 9781315288666 9781315288673 9781138679450 Year: 2015 Publisher: London ; New York : Routledge,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This volume in the Advances in Management Information Systems series covers the managerial landscape of information security.


Book
Data Protection and the Cloud : Are the risks too great?
Author:
ISBN: 1849287139 9781849287135 1849287120 9781849287128 Year: 2015 Publisher: Ely : IT Governance Ltd,

Loading...
Export citation

Choose an application

Bookmark

Abstract

More than 85% of businesses now take advantage of Cloud computing, but Cloud computing does not sit easily with the DPA. Data Protection and the Cloud addresses that issue, providing an expert introduction to the legal and practical data protection risks involved in using Cloud services. Data Protection and the Cloud highlights the risks an organisation's use of the Cloud might generate, and offers the kind of remedial measures that might be taken to mitigate those risks.


Book
The foundations of EU data protection law
Author:
ISBN: 9780198718239 0198718233 Year: 2015 Publisher: Oxford, United Kingdom : Oxford University Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Nearly two decades after the EU first enacted data protection rules, key questions about the nature and scope of this EU policy, and the harms it seeks to prevent, remain unanswered. The inclusion of a Right to Data Protection in the EU Charter has increased the salience of these questions, which must be addressed in order to ensure the legitimacy, effectiveness and development of this Charter right and the EU data protection regime more generally.The Foundations of EU Data Protection Law is a timely and important work which sheds new light on this neglected area of law, challenging the widespread assumption that data protection is merely a subset of the right to privacy. By positioning EU data protection law within a comprehensive conceptual framework, it argues that data protection has evolved from a regulatory instrument into a fundamental right in the EU legal order and that this right grants individuals more control over more forms of data than the right to privacy. It suggests that this dimension of the right to data protection should be explicitly recognized, while identifying the practical and conceptual limits of individual control over personal data.At a time when EU data protection law is sitting firmly in the international spotlight, this book offers academics, policy-makers, and practitioners a coherent vision for the future of this key policy and fundamental right in the EU legal order, and how best to realize it.


Book
Die rechtliche Regulierung der Menschenfleischsuche im Internet : Eine rechtsvergleichende Untersuchung zwischen Deutschland und China
Author:
ISBN: 3653058112 363166365X 3653962129 Year: 2015 Publisher: Peter Lang International Academic Publishing Group

Loading...
Export citation

Choose an application

Bookmark

Abstract

Erstmalig thematisiert das Buch das in China weit verbreitete Phänomen Ren-rou-sou-suo (Menschenfleischsuche) auch in Deutschland. Als Hexenjagd im Internet ist dieses weltweite Phänomen auch in Deutschland in den nächsten Jahren zu erwarten. Aufgrund potenzieller Persönlichkeitsrechtsverletzungen und Datenschutzprobleme ist es hoch regulierungsbedürftig. Der Autor analysiert die Hintergründe der Suche in beiden Ländern unter technischen, kulturellen, sozialen, politischen und psychologischen Aspekten. Er untersucht und beantwortet rechtsvergleichend und detailliert alle diesbezüglichen Rechtsfragen einschließlich Providerhaftung, Anonymität und Pseudonymität, Auskunftsanspruch auf Anmeldedaten von Nutzern, Notice and take down sowie Störerhaftung.


Book
Business continuity management system : a complete framework for implementing ISO 22301
Authors: ---
ISBN: 9780749469122 0749469129 9780749469115 0749469110 Year: 2015 Publisher: London ; Philadelphia : Kogan Page,

Loading...
Export citation

Choose an application

Bookmark

Abstract

"A Business Continuity Management System (BCMS) is a management framework that creates controls to address risks and measure an organization's ability to manage disruptions. The International Standard, ISO 22301, helps protect against the threats, including natural disaster, IT failure, staff illness, terrorist threat or a disruption in the supply chain. It provides a framework for assessing critical suppliers and their associated risks, assessing current business practices and planning contingency measures, so when disruptions happen, businesses are prepared and able to respond effectively.Business Continuity Management System offers a complete guide to implementing a fit-for-purpose resilience capability in any organization. Structured in line with ISO22301 and with a focus on performance improvement throughout, chapters cover developing, establishing and operating a BCMS initiative. Built upon the principles of the International Standard and current best practice, with a practical focus on theories and models, this book offers an objective, thorough solution for the practitioner. "--

Listing 1 - 10 of 38 << page
of 4
>>
Sort by