Narrow your search
Listing 1 - 10 of 51 << page
of 6
>>
Sort by

Book
Mobile data loss : threats and countermeasures
Author:
ISBN: 0128029013 0128028645 9780128028643 9780128028643 Year: 2016 Publisher: Waltham, Massachusetts : Syngress,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Big data and ethics : the medical datasphere
Author:
ISBN: 0081010621 1785480251 9780081010624 9781785480256 Year: 2016 Publisher: London : ISTE Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book discusses the phenomena associated with the exponential digitization of medical data and how it has led to a transformation of the practice of medicine, also providing the tools necessary for ethical reflection on the development, implementation, and use of healthy mega data.


Book
PCI DSS 3.1
Author:
ISBN: 012804649X 0128046279 9780128046494 9780128046272 Year: 2016 Publisher: Waltham, MA

Loading...
Export citation

Choose an application

Bookmark

Abstract

PCI DSS has recently updated its standard to 3.1. While the changes are fairly minor in nature, there are massive implications to companies relying on SSL as a scope reducing tool inside their enterprise. This update book goes through the specific changes to PCI DSS 3.1, and includes new case studies that discuss the specific implications for making the change to 3.1. This concise supplement also includes a detailed explanation of each changed requirement and how it will impact your environment. PCI Compliance, 3.1 Addendum serves as an update to Syngress’ comprehensive reference volume PCI Compliance, Fourth Edition . Includes all system updates to the new version of PCI DSS 3.1 Details and describes each update and enhancement Includes case studies that illustrate when and where these changes will effect and improve your enterprise


Book
Datenschutz im Gesundheitswesen
Author:
ISBN: 3954662574 9783954662579 9783954662210 Year: 2016 Publisher: Berlin

Loading...
Export citation

Choose an application

Bookmark

Abstract

Long description: Die Entwicklungen von Cloud-Computing, eHealth und mHealth-Anwendungen sind rasant und die Begehrlichkeit von persönlichen Daten wächst. Datenschutz im Gesundheitswesen ist mehr denn je eine zentrale Herausforderung, denn die Nutzung und Verarbeitung von Daten werden immer intransparenter. Unternehmen und Einrichtungen des Gesundheitswesens sind gefordert, aber die Anforderungen und Maßnahmen des Datenschutzes können nicht 1:1 aus den Datenschutzvorgaben anderer Branchen übernommen werden. Die Spezifika der Branche Gesundheitswesen sind ebenso zu berücksichtigen wie die rechtlichen Rahmenbedingungen. Das Praxisbuch „Datenschutz im Gesundheitswesen“ gibt einen umfassenden Überblick und erleichtert den Einstieg in die verschiedenen Themenfelder des Datenschutzes. Was sind die Herausforderungen und worin bestehen die Rahmenbedingungen? Welche Strategien, Konzepte und Instrumente sind in der Praxis erfolgreich? Das Autorenteam aus Praktikern und ausgewiesenen Experten unterstützt den Leser konkret in seinem Berufsalltag und vermittelt das Praxiswissen zu allen Datenschutzaspekten. Biographical note: mit Beiträgen von: J. Domnik, H. Haaz, S. Hacks, M. Henke, T. Jäschke, M. Koch, O. Methner, F.-M. Przytulla, J. Reiter, N. Richard, B. Sandrock, B. Schütze, B. Stöferle, C. Thieme, O. Ullrich, A. Vogel


Book
Penetration Testing Basics : A Quick-Start Guide to Breaking into Systems
Author:
ISBN: 1484218566 1484218574 Year: 2016 Publisher: Berkeley, CA : Apress : Imprint: Apress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Penetration testing is the act of attempting to break into systems, networks, and software in order to determine where the bad guys might get in. By reading this book, you'll gain the foundations of a simple methodology used to perform penetration testing on systems and networks for which you are responsible. Penetration Testing Basics explains: How to identify security vulnerabilities How to use some of the top security tools in order to identify holes How to read reports from testing tools Common vulnerability types and attacks Common Web-based attacks and exposures as well as recommendations for closing those holes.


Book
You : for sale protecting your personal data and privacy online
Authors: ---
ISBN: 0128034238 012803405X 9780128034231 9780128034057 9780128034057 Year: 2016 Publisher: Waltham, Massachusetts : Syngress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Everything we do online, and increasingly in the real world, is tracked, logged, analyzed, and often packaged and sold on to the highest bidder. Every time you visit a website, use a credit card, drive on the freeway, or go past a CCTV camera, you are logged and tracked. Every day billions of people choose to share their details on social media, which are then sold to advertisers. The Edward Snowden revelations that governments - including those of the US and UK - have been snooping on their citizens, have rocked the world. But nobody seems to realize that this has already been happening fo


Book
Nine steps to succes : an ISO 27001: 2013 implementation overview
Author:
ISBN: 1849288240 9781849288248 9781849288231 1849288232 9781849288255 Year: 2016 Publisher: Cambridgeshire, England : IT Governance Publishing,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Aligned with the latest iteration of the Standard - ISO 27001:2013 - this new edition of the original no-nonsense guide to successful ISO 27001 certification is ideal for anyone tackling ISO 27001 for the first time, and covers each element of the ISO 27001 project in simple, non-technical language.


Book
Interception of electronic communications in the Czech Republic and Slovakia
Authors: ---
ISBN: 802108684X 9788021086845 9788021084230 8021084235 Year: 2016 Publisher: Brno

Loading...
Export citation

Choose an application

Bookmark

Abstract

One of the most important forming factors of the distribution of public powers in the Czech Republic is its totalitarian history. There is a strong sense of distrust towards official institutions in the general public. It is probably due to this fact, that the procedures and powers of public bodies and agencies are set very rigidly. The principle of legality is set in Art. 2 para. 3 of the Czech Constitution (Act No. 1/1993 Sb. Constitution of the Czech Republic), which states that “State authority is to serve all citizens and may be asserted only in cases, within the bounds, and in the manner provided forby law” and in Art. 2 para. 2 of the Charter of Fundamental Rights and Freedoms (the Resolution of the Presidium of the Czech National Council of 16 December 1992 on the declaration of the Charter of Fundamental Rights and Freedoms as a part of the constitutional order of the Czech Republic No. 2/1993 Sb.), which states that “State authority may be asserted only in cases and within the bounds provided for by law and only in the manner prescribed by law”. Since all the public authorities authorized to intercept telecommunication fall within the scope of these articles, they are permitted to act only within the framework of what is expressly allowed for them by law.


Book
ISO 9001 : 2015 : a pocket guide
Authors: ---
ISBN: 1849288127 9781849288125 1849288119 9781849288118 Year: 2016 Publisher: Cambridgeshire, England : IT Governance Publishing,

Listing 1 - 10 of 51 << page
of 6
>>
Sort by