Listing 1 - 10 of 38 | << page >> |
Sort by
|
Choose an application
Cloud Storage Security: A Practical Guide introduces and discusses the risks associated with cloud-based data storage from a security and privacy perspective. Gain an in-depth understanding of the risks and benefits of cloud storage illustrated using a Use-Case methodology. The authors also provide a checklist that enables the user, as well as the enterprise practitioner to evaluate what security and privacy issues need to be considered when using the cloud to store personal and sensitive information.Describes the history and the evolving nature of cloud storage and securityExplores the threat
Cloud computing -- Security measures. --- Computer security. --- Data protection. --- Computer Science --- Engineering & Applied Sciences --- Cloud computing --- Security measures. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Web services --- Distributed processing
Choose an application
Identity theft and other confidential information theft have now topped the charts as the leading cybercrime. In particular, credit card data is preferred by cybercriminals. Is your payment processing secure and compliant? The new Fourth Edition of PCI Compliance has been revised to follow the new PCI DSS standard version 3.0, which is the official version beginning in January 2014. Also new to the Fourth Edition: additional case studies and clear guidelines and instructions for maintaining PCI compliance globally, including coverage of technologies such as NFC, P2PE, CNP/Mobile, and EMV. Thi
Data protection --- Computer networks --- Standards. --- Security measures. --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing
Choose an application
Law --- General and Others --- Data protection --- Habeas data --- Privacy, Right of --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Law and legislation --- Law and legislation. --- Europe --- EU countries --- Euroland --- European Union countries.
Choose an application
Application of Big Data for National Security provides users with state-of-the-art concepts, methods, and technologies for Big Data analytics in the fight against terrorism and crime, including a wide range of case studies and application scenarios. This book combines expertise from an international team of experts in law enforcement, national security, and law, as well as computer sciences, criminology, linguistics, and psychology, creating a unique cross-disciplinary collection of knowledge and insights into this increasingly global issue.
Regional documentation --- United States --- National security --- Big data. --- Data protection. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Data sets, Large --- Large data sets --- Data sets --- Homeland defense --- Homeland security
Choose an application
Privacy, Right of --- Data protection --- Social aspects --- Invasion of privacy --- Right of privacy --- Law and legislation --- privacy --- security --- anonymity --- surveillance --- computer --- network --- Civil rights --- Libel and slander --- Personality (Law) --- Press law --- Computer crimes --- Confidential communications --- Right to be forgotten --- Secrecy --- Privacy, Right of. --- Data protection. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing
Choose an application
This volume in the Advances in Management Information Systems series covers the managerial landscape of information security.
Computer security. --- Data protection. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures
Choose an application
More than 85% of businesses now take advantage of Cloud computing, but Cloud computing does not sit easily with the DPA. Data Protection and the Cloud addresses that issue, providing an expert introduction to the legal and practical data protection risks involved in using Cloud services. Data Protection and the Cloud highlights the risks an organisation's use of the Cloud might generate, and offers the kind of remedial measures that might be taken to mitigate those risks.
Cloud computing. --- Education, Higher -- Effect of technological innovations on -- United States. --- Web services. --- Data protection --- Computer security --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Security systems --- Hacking --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Protection --- Security measures --- E-books
Choose an application
Nearly two decades after the EU first enacted data protection rules, key questions about the nature and scope of this EU policy, and the harms it seeks to prevent, remain unanswered. The inclusion of a Right to Data Protection in the EU Charter has increased the salience of these questions, which must be addressed in order to ensure the legitimacy, effectiveness and development of this Charter right and the EU data protection regime more generally.The Foundations of EU Data Protection Law is a timely and important work which sheds new light on this neglected area of law, challenging the widespread assumption that data protection is merely a subset of the right to privacy. By positioning EU data protection law within a comprehensive conceptual framework, it argues that data protection has evolved from a regulatory instrument into a fundamental right in the EU legal order and that this right grants individuals more control over more forms of data than the right to privacy. It suggests that this dimension of the right to data protection should be explicitly recognized, while identifying the practical and conceptual limits of individual control over personal data.At a time when EU data protection law is sitting firmly in the international spotlight, this book offers academics, policy-makers, and practitioners a coherent vision for the future of this key policy and fundamental right in the EU legal order, and how best to realize it.
Data protection --- Law and legislation --- European Union countries. --- Law and legislation. --- Europe --- Human rights --- Information systems --- European Union --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Law and legislation&delete& --- European Union countries --- Protection de l'information (informatique) --- Droit à la vie privée --- Droit --- Pays de l'Union européenne --- Union européenne. --- Data protection - Law and legislation - European Union countries --- Droit à la vie privée --- Union européenne. --- Pays de l'Union européenne
Choose an application
Erstmalig thematisiert das Buch das in China weit verbreitete Phänomen Ren-rou-sou-suo (Menschenfleischsuche) auch in Deutschland. Als Hexenjagd im Internet ist dieses weltweite Phänomen auch in Deutschland in den nächsten Jahren zu erwarten. Aufgrund potenzieller Persönlichkeitsrechtsverletzungen und Datenschutzprobleme ist es hoch regulierungsbedürftig. Der Autor analysiert die Hintergründe der Suche in beiden Ländern unter technischen, kulturellen, sozialen, politischen und psychologischen Aspekten. Er untersucht und beantwortet rechtsvergleichend und detailliert alle diesbezüglichen Rechtsfragen einschließlich Providerhaftung, Anonymität und Pseudonymität, Auskunftsanspruch auf Anmeldedaten von Nutzern, Notice and take down sowie Störerhaftung.
Cyberstalking --- Data protection --- Privacy, Right of. --- Cyber stalking --- Internet stalking --- Online stalking --- Computer crimes --- Stalking --- Invasion of privacy --- Privacy, Right of --- Right of privacy --- Civil rights --- Libel and slander --- Personality (Law) --- Press law --- Confidential communications --- Right to be forgotten --- Secrecy --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Law and legislation --- Law --- Data Theft --- Jurisdiction --- Germany --- China --- comparative law --- data protection
Choose an application
"A Business Continuity Management System (BCMS) is a management framework that creates controls to address risks and measure an organization's ability to manage disruptions. The International Standard, ISO 22301, helps protect against the threats, including natural disaster, IT failure, staff illness, terrorist threat or a disruption in the supply chain. It provides a framework for assessing critical suppliers and their associated risks, assessing current business practices and planning contingency measures, so when disruptions happen, businesses are prepared and able to respond effectively.Business Continuity Management System offers a complete guide to implementing a fit-for-purpose resilience capability in any organization. Structured in line with ISO22301 and with a focus on performance improvement throughout, chapters cover developing, establishing and operating a BCMS initiative. Built upon the principles of the International Standard and current best practice, with a practical focus on theories and models, this book offers an objective, thorough solution for the practitioner. "--
Crisis management --- Emergency management --- Data protection --- Computer networks --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Consequence management (Emergency management) --- Disaster planning --- Disaster preparedness --- Disaster prevention --- Disaster relief --- Disasters --- Emergencies --- Emergency planning --- Emergency preparedness --- Management --- Public safety --- First responders --- Crises --- Management of crises --- Problem solving --- Conflict management --- Planning --- Security measures --- Preparedness --- Prevention --- E-books --- Crisis management. --- Data protection. --- Planning. --- Security measures. --- Emergency management.
Listing 1 - 10 of 38 | << page >> |
Sort by
|