Listing 1 - 10 of 35 | << page >> |
Sort by
|
Choose an application
The physical security of IT, network, and telecommunications assets is equally as important as cyber security. We justifiably fear the hacker, the virus writer and the cyber terrorist. But the disgruntled employee, the thief, the vandal, the corporate foe, and yes, the terrorist can easily cripple an organization by doing physical damage to IT assets. In many cases such damage can be far more difficult to recover from than a hack attack or malicious code incident. It does little good to have great computer security if wiring closets are easily accessible or individuals can readily walk into an
Choose an application
Choose an application
Drawing upon the expertise of world-renowned researchers and experts, The Cloud Security Ecosystem comprehensively discusses a range of cloud security topics from multi-disciplinary and international perspectives, aligning technical security implementations with the most recent developments in business, legal, and international environments. The book holistically discusses key research and policy advances in cloud security – putting technical and management issues together with an in-depth treaties on a multi-disciplinary and international subject. The book features contributions from key thought leaders and top researchers in the technical, legal, and business and management aspects of cloud security. The authors present the leading edge of cloud security research, covering the relationships between differing disciplines and discussing implementation and legal challenges in planning, executing, and using cloud security. Presents the most current and leading-edge research on cloud security from a multi-disciplinary standpoint, featuring a panel of top experts in the field Focuses on the technical, legal, and business management issues involved in implementing effective cloud security, including case examples Covers key technical topics, including cloud trust protocols, cryptographic deployment and key management, mobile devices and BYOD security management, auditability and accountability, emergency and incident response, as well as cloud forensics Includes coverage of management and legal issues such as cloud data governance, mitigation and liability of international cloud deployment, legal boundaries, risk management, cloud information security management plans, economics of cloud security, and standardization efforts
Electronic data processing departments --- Electronic data processing --- Internet --- Networking --- Security measures. --- Distributed processing. --- Distributed computer systems in electronic data processing --- Distributed computing --- Distributed processing in electronic data processing --- Computer networks --- Computer department security measures --- Data protection
Choose an application
Managing data continues to grow as a necessity for modern organizations. There are seemingly infinite opportunities for organic growth, reduction of costs, and creation of new products and services. It has become apparent that none of these opportunities can happen smoothly without data governance. The cost of exponential data growth and privacy / security concerns are becoming burdensome. Organizations will encounter unexpected consequences in new sources of risk. The solution to these challenges is also data governance; ensuring balance between risk and opportunity. Data Governance, Second Edition, is for any executive, manager or data professional who needs to understand or implement a data governance program. It is required to ensure consistent, accurate and reliable data across their organization. This book offers an overview of why data governance is needed, how to design, initiate, and execute a program and how to keep the program sustainable. This valuable resource provides comprehensive guidance to beginning professionals, managers or analysts looking to improve their processes, and advanced students in Data Management and related courses. With the provided framework and case studies all professionals in the data governance field will gain key insights into launching successful and money-saving data governance program. Incorporates industry changes, lessons learned and new approaches Explores various ways in which data analysts and managers can ensure consistent, accurate and reliable data across their organizations Includes new case studies which detail real-world situations Explores all of the capabilities an organization must adopt to become data driven Provides guidance on various approaches to data governance, to determine whether an organization should be low profile, central controlled, agile, or traditional Provides guidance on using technology and separating vendor hype from sincere delivery of necessary capabilities Offers readers insights into how their organizations can improve the value of their data, through data quality, data strategy and data literacy Provides up to 75% brand-new content compared to the first edition.
Data protection --- Management. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Electronic data processing departments --- Security measures. --- Computer department security measures --- E-books --- Gouvernance des données
Choose an application
Computer architecture. Operating systems --- Electronic data processing departments --- Security measures --- 681.3*K6M --- -Computer centers --- Management of computing and information systems: economics --- -Management of computing and information systems: economics --- 681.3*K6M Management of computing and information systems: economics --- -681.3*K6M Management of computing and information systems: economics --- Computer centers --- Computer department security measures --- Data protection --- Electronic data processing departments - Security measures
Choose an application
Computer security --- Electronic data processing departments --- Système informatique. --- Mesures de sécurité --- Service informatique. --- Security measures --- Computer security. --- Security measures. --- Computer department security measures --- Data protection --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Electronic digital computers --- Security of computer systems --- Security systems --- Hacking --- Cyber security --- Cybersecurity --- Computer & Data Security. --- Management Information Systems. --- Protection of computer systems --- Protection
Choose an application
Online data processing --- Electronic data processing departments --- Security measures --- -Online data processing --- 681.3.02 --- In-line data processing --- On-line data processing --- Electronic data processing --- Teleprocessing monitors (Computer programs) --- Time-sharing computer systems --- Computer centers --- Computerwetenschap--?.02 --- Online data processing. --- Security measures. --- Computer department security measures --- Data protection --- Electronic data processing departments - Security measures
Choose an application
Computer crimes --- Electronic data processing departments --- Security measures --- -Electronic data processing departments --- -681.3*K42 --- Computer centers --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Crime --- Privacy, Right of --- Computerwetenschap--?*K42 --- 681.3*K42 --- Computer department security measures --- Data protection --- Computer crimes - United States --- Electronic data processing departments - Security measures
Choose an application
Computers --- Electronic data processing departments --- Electronic data processing --- Access control --- Security measures --- Auditing --- ADP (Data processing) --- Automatic data processing --- Data processing --- EDP (Data processing) --- IDP (Data processing) --- Integrated data processing --- Office practice --- Automation --- Access control. --- Auditing. --- Security measures. --- Computer department security measures --- Data protection --- Auditing of computer systems --- Computer audits --- EDP auditing --- Computer security
Choose an application
Computer security --- Electronic data processing departments --- Security measures --- Computer security. --- Security measures. --- Computer department security measures --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Electronic digital computers --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Cyber security --- Cybersecurity --- Protection of computer systems --- Protection --- Mathematical Sciences --- Applied Mathematics --- Computer Science
Listing 1 - 10 of 35 | << page >> |
Sort by
|