Listing 1 - 10 of 51 | << page >> |
Sort by
|
Choose an application
Data protection --- Law and legislation. --- Standards. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Habeas data --- Privacy, Right of
Choose an application
This book discusses the phenomena associated with the exponential digitization of medical data and how it has led to a transformation of the practice of medicine, also providing the tools necessary for ethical reflection on the development, implementation, and use of healthy mega data.
Medicine --- Data protection. --- Data processing. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Health Workforce --- Medical informatics. --- Medical informatics --- Big data --- Medical ethics. --- Moral and ethical aspects.
Choose an application
PCI DSS has recently updated its standard to 3.1. While the changes are fairly minor in nature, there are massive implications to companies relying on SSL as a scope reducing tool inside their enterprise. This update book goes through the specific changes to PCI DSS 3.1, and includes new case studies that discuss the specific implications for making the change to 3.1. This concise supplement also includes a detailed explanation of each changed requirement and how it will impact your environment. PCI Compliance, 3.1 Addendum serves as an update to Syngress’ comprehensive reference volume PCI Compliance, Fourth Edition . Includes all system updates to the new version of PCI DSS 3.1 Details and describes each update and enhancement Includes case studies that illustrate when and where these changes will effect and improve your enterprise
Credit cards --- Data protection. --- Security measures. --- Security measures --- Standards. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Cards, Charge --- Cards, Credit --- Charge cards --- Consumer credit --- Point-of-sale systems industry --- Charge accounts
Choose an application
Long description: Die Entwicklungen von Cloud-Computing, eHealth und mHealth-Anwendungen sind rasant und die Begehrlichkeit von persönlichen Daten wächst. Datenschutz im Gesundheitswesen ist mehr denn je eine zentrale Herausforderung, denn die Nutzung und Verarbeitung von Daten werden immer intransparenter. Unternehmen und Einrichtungen des Gesundheitswesens sind gefordert, aber die Anforderungen und Maßnahmen des Datenschutzes können nicht 1:1 aus den Datenschutzvorgaben anderer Branchen übernommen werden. Die Spezifika der Branche Gesundheitswesen sind ebenso zu berücksichtigen wie die rechtlichen Rahmenbedingungen. Das Praxisbuch „Datenschutz im Gesundheitswesen“ gibt einen umfassenden Überblick und erleichtert den Einstieg in die verschiedenen Themenfelder des Datenschutzes. Was sind die Herausforderungen und worin bestehen die Rahmenbedingungen? Welche Strategien, Konzepte und Instrumente sind in der Praxis erfolgreich? Das Autorenteam aus Praktikern und ausgewiesenen Experten unterstützt den Leser konkret in seinem Berufsalltag und vermittelt das Praxiswissen zu allen Datenschutzaspekten. Biographical note: mit Beiträgen von: J. Domnik, H. Haaz, S. Hacks, M. Henke, T. Jäschke, M. Koch, O. Methner, F.-M. Przytulla, J. Reiter, N. Richard, B. Sandrock, B. Schütze, B. Stöferle, C. Thieme, O. Ullrich, A. Vogel
Medical records --- Data protection --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Clinical records --- Health records --- Hospital medical records --- Patient care records --- Communication in medicine --- Hospital records --- Law and legislation --- Access control
Choose an application
Penetration testing is the act of attempting to break into systems, networks, and software in order to determine where the bad guys might get in. By reading this book, you'll gain the foundations of a simple methodology used to perform penetration testing on systems and networks for which you are responsible. Penetration Testing Basics explains: How to identify security vulnerabilities How to use some of the top security tools in order to identify holes How to read reports from testing tools Common vulnerability types and attacks Common Web-based attacks and exposures as well as recommendations for closing those holes.
Computer science. --- Computer programming. --- Software engineering. --- Programming languages (Electronic computers). --- Computer Science. --- Programming Techniques. --- Software Engineering. --- Programming Languages, Compilers, Interpreters. --- Penetration testing (Computer security) --- Ethical hacking (Computer security) --- Computer security --- Data protection. --- Security. --- Computer software engineering --- Engineering --- Informatics --- Science --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Computers --- Electronic computer programming --- Electronic digital computers --- Programming (Electronic computers) --- Coding theory --- Programming
Choose an application
Everything we do online, and increasingly in the real world, is tracked, logged, analyzed, and often packaged and sold on to the highest bidder. Every time you visit a website, use a credit card, drive on the freeway, or go past a CCTV camera, you are logged and tracked. Every day billions of people choose to share their details on social media, which are then sold to advertisers. The Edward Snowden revelations that governments - including those of the US and UK - have been snooping on their citizens, have rocked the world. But nobody seems to realize that this has already been happening fo
Data protection. --- Computer security. --- Computer networks --- Security measures. --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Protection --- Security measures
Choose an application
Aligned with the latest iteration of the Standard - ISO 27001:2013 - this new edition of the original no-nonsense guide to successful ISO 27001 certification is ideal for anyone tackling ISO 27001 for the first time, and covers each element of the ISO 27001 project in simple, non-technical language.
Data protection. --- Computer security. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Protection --- Security measures --- Computer security --- Management --- Standards --- E-books
Choose an application
One of the most important forming factors of the distribution of public powers in the Czech Republic is its totalitarian history. There is a strong sense of distrust towards official institutions in the general public. It is probably due to this fact, that the procedures and powers of public bodies and agencies are set very rigidly. The principle of legality is set in Art. 2 para. 3 of the Czech Constitution (Act No. 1/1993 Sb. Constitution of the Czech Republic), which states that “State authority is to serve all citizens and may be asserted only in cases, within the bounds, and in the manner provided forby law” and in Art. 2 para. 2 of the Charter of Fundamental Rights and Freedoms (the Resolution of the Presidium of the Czech National Council of 16 December 1992 on the declaration of the Charter of Fundamental Rights and Freedoms as a part of the constitutional order of the Czech Republic No. 2/1993 Sb.), which states that “State authority may be asserted only in cases and within the bounds provided for by law and only in the manner prescribed by law”. Since all the public authorities authorized to intercept telecommunication fall within the scope of these articles, they are permitted to act only within the framework of what is expressly allowed for them by law.
Data protection --- Computer networks --- Access control --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Distributed processing
Choose an application
ISO 9001 Standard. --- Computer security --- Data protection --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- International Organization for Standardization 9001 Standard --- ISO Standard 9001 --- ISO 9000 Series Standards --- Quality assurance --- Standards. --- ISO 9001 Standard --- Standards --- E-books
Choose an application
law --- information sharing --- data regulation --- freedom of expression --- information technology --- Disclosure of information --- Freedom of information --- Data protection --- Law and legislation --- Great Britain --- Disclosure laws --- Information, Disclosure of --- Truthfulness and falsehood --- Habeas data --- Privacy, Right of --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Information, Freedom of --- Liberty of information --- Right to know --- Civil rights --- Freedom of speech --- Intellectual freedom --- Telecommunication --- Anglia --- Angliyah --- Briṭanyah --- England and Wales --- Förenade kungariket --- Grã-Bretanha --- Grande-Bretagne --- Grossbritannien --- Igirisu --- Iso-Britannia --- Marea Britanie --- Nagy-Britannia --- Prydain Fawr --- Royaume-Uni --- Saharātchaʻānāčhak --- Storbritannien --- United Kingdom --- United Kingdom of Great Britain and Ireland --- United Kingdom of Great Britain and Northern Ireland --- Velikobritanii͡ --- Wielka Brytania --- Yhdistynyt kuningaskunta --- Northern Ireland --- Scotland --- Wales
Listing 1 - 10 of 51 | << page >> |
Sort by
|