Listing 1 - 1 of 1 |
Sort by
|
Choose an application
Here's a unique and practical book that addresses the rapidly growing problem of information security, privacy, and secrecy threats and vulnerabilities. This authoritative resource helps professionals understand what really needs to be done to protect sensitive data and systems and how to comply with the burgeoning roster of data protection laws and regulations. The book examines the effectiveness and weaknesses of current approaches and guides you towards practical methods and doable processes that can bring about real improvement in the overall security environment. Readers gain insight into the latest security and privacy trends, learn how to determine and mitigate risks, and discover the specific dangers and responses regarding the most critical sectors of a modern economy. -- Publisher description.
Business enterprises --Computer networks --Security measures. --- Computer security. --- Data protection. --- Information technology --Security measures. --- Business enterprises --- Information technology --- Computer security --- Data protection --- Commerce --- Business & Economics --- Marketing & Sales --- Security measures --- Computer networks --- -Information technology --- -Computer security --- 658.478 --- -Security measures --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Electronic digital computers --- Security of computer systems --- Security systems --- Hacking --- IT (Information technology) --- Technology --- Telematics --- Information superhighway --- Knowledge management --- Business organizations --- Businesses --- Companies --- Enterprises --- Firms --- Organizations, Business --- Business --- Security measures. --- Cyber security --- Cybersecurity --- Protection of computer systems --- Protection
Listing 1 - 1 of 1 |
Sort by
|