Listing 1 - 10 of 10
Sort by

Book
The security consultant's handbook
Author:
ISBN: 184928749X 9781849287494 9781849287500 1849287503 9781849287517 1849287511 9781849287487 1849287481 Year: 2015 Publisher: Ely, Cambridgeshire, United Kingdom

Loading...
Export citation

Choose an application

Bookmark

Abstract

A compendium of essential information for the modern security entrepreneur and practitioner The modern security practitioner has shifted from a predominantly protective site and assets manager to a leading contributor to overall organizational resilience. Accordingly, The Security Consultant's Handbook sets out a holistic overview of the essential core knowledge, emerging opportunities, and approaches to corporate thinking that are increasingly demanded by employers and buyers in the security market. This book provides essential direction for those who want to succeed in security, either individually or as part of a team. It also aims to stimulate some fresh ideas and provide new market routes for security professionals who may feel that they are underappreciated and overexerted in traditional business domains. Product overview Distilling the author’s fifteen years’ experience as a security practitioner, and incorporating the results of some fifty interviews with leading security practitioners and a review of a wide range of supporting business literature, The Security Consultant’s Handbook provides a wealth of knowledge for the modern security practitioner, covering: Entrepreneurial practice (including business intelligence, intellectual property rights, emerging markets, business funding, and business networking) Management practice (including the security function’s move from basement to boardroom, fitting security into the wider context of organizational resilience, security management leadership, adding value, and professional proficiency) Legislation and regulation (including relevant UK and international laws such as the Human Rights Act 1998, the Data Protection Act 1998 and the Geneva Conventions) Private investigations (including surveillance techniques, tracing missing people, witness statements and evidence, and surveillance and the law) Information and cybersecurity (including why information needs protection, intelligence and espionage, cybersecurity threats, and mitigation approaches such as the ISO 27001 standard for information security management) Protective security (including risk assessment methods, person-focused threat assessments, protective security roles, piracy, and firearms) Safer business travel (including government assistance, safety tips, responding to crime, kidnapping, protective approaches to travel security and corporate liability) Personal and organizational resilience (including workplace initiative...


Book
Security
Author:
ISBN: 184928184X 1283006383 9786613006387 1849280649 9781849280648 1849280630 9781849280631 Year: 2010 Publisher: Ely IT Governance Pub.

Loading...
Export citation

Choose an application

Bookmark

Abstract

This pocket guide is based on the approach used by BT to protect its own data security - one that draws on the capabilities of both people and technology. The guide will prove invaluable for IT managers, information security officers and business executives.


Book
PCI DSS Version 4. 0 : A Guide to the Payment Card Industry Data Security Standard.
Author:
ISBN: 1787785092 1787785084 Year: 2024 Publisher: Ely : IT Governance Ltd,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This guide explains the fundamental concepts of the PCI DSS (v4.0) and is a perfect quick reference guide.


Book
A guide to effective internal management system audits
Author:
ISBN: 1849285608 9781849285605 9781849285599 1849285594 Year: 2014 Publisher: Ely, Cambridgeshire, UK IT Governance Pub.

Loading...
Export citation

Choose an application

Bookmark

Abstract

Discover how internal audits can help you to improve business practice in your organisation.


Book
Nine Steps to Success : An ISO 27001:2022 Implementation Overview.
Author:
ISBN: 9781787785434 1787785432 1787785424 Year: 2024 Publisher: Ely : IT Governance Ltd,


Book
IT-Sicherheitsmanagement : Das umfassende Praxis-Handbuch für IT- Security und technischen Datenschutz nach ISO 27001.
Author:
ISBN: 3747501478 Year: 2021 Publisher: Frechen : mitp,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Long description: Biographical note: Thomas W. Harich arbeitet als Leiter der Information Security in einem großen deutschen Industriekonzern. Nebenberuflich ist er als Dozent und IT-Berater tätig. Seine Schwerpunkte liegen in der Erstellung von IT-Sicherheitskonzepten und deren praktischer Umsetzung in einem international geprägten IT-Umfeld.


Book
La protection des données pour les institutions publiques : analyse pratique et retours d'expériences
Authors: ---
Year: 2020 Publisher: Limal : Anthemis,


Book
Reinventing Data Protection?
Authors: --- --- --- --- --- et al.
ISBN: 1282236954 9786612236952 1402094981 1402094973 9048181429 9781402094972 9781402094989 Year: 2009 Publisher: Dordrecht Springer Netherlands

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book is about data protection, privacy and liberty and the way these fundamental values of our societies are protected and enforced, particularly in their interaction with the ever developing capacities and possibilities of information and communication technologies. The authors are all closely involved in data protection and privacy. They represent the stakeholders in the debate: practitioners, civil liberties advocates, civil servants, data protection commissioners and academics. Their contributions evaluate current European data protection law against the background of the introduction of increasingly powerful, miniaturized, ubiquitous and autonomic forms of computing. The book assesses data protection and privacy law by analyzing the actual problems (trans-border data flows, proportionality of the processing, and sensitive data) and identifying lacunae and bottlenecks, while at the same time looking at prospects for the future (web 2.0., RFID, profiling) and suggesting paths for a rethinking and reinvention of the fundamental principles and concepts. From this perspective the recent constitutional acknowledgment of data protection as a fundamental right has a transformative power and should create the opportunity for a dynamic, participative, inductive and democratic process of ‘networked’ re-invention of data protection. The present book aims to make a contribution by seizing on this opportunity.

Keywords

Data protection --- Law and legislation --- Interpretation and construction. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- 342.0858094 --- #SBIB:309H1015 --- #SBIB:327.7H231 --- Uk3 --- Protection de l'information (informatique) --- Banques de données (informatique) --- Confidentialité (informatique) --- Données (informatique) --- Données à caractère personnel (informatique) --- Données personnelles (informatique) --- Fichiers (informatique) --- Identité numérique --- Protection (informatique) --- Protection des données (informatique) --- Protection des fichiers (informatique) --- Protection des informations nominatives (informatique) --- Protection des renseignements personnels (informatique) --- Droits de la personnalité et Internet --- Droit à la vie privée --- Profilage --- Protection de l'information --- Services statistiques --- Traces numériques --- Chiffrement (informatique) --- Informatique --- Microordinateurs --- Norme ISO 27001 --- Norme ISO 27002 --- Norme ISO 27005 --- Ordinateurs --- Droit d'usage --- Systèmes informatiques --- Technologie de l'information --- Media: politieke, juridische, ethische, ideologische aspecten (incl. privacy) --- Europese Unie: sociaal-economisch beleid, landbouw-, milieu-, cultuur- en communicatiebeleid --- Protection --- droit --- informatique) -- Droit --- Droit --- Procédures de secours --- Accès -- Contrôle --- Mesures de sûreté --- Political science. --- Public International Law . --- Political Science. --- Administration --- Civil government --- Commonwealth, The --- Government --- Political theory --- Political thought --- Politics --- Science, Political --- Social sciences --- State, The --- Public international law. --- Law of nations --- Nations, Law of --- Public international law --- Law --- Data protection - Law and legislation - European Union countries - Congresses --- Protection de l'information (Informatique) --- Privacy, Right of


Book
La protection des données pour les institutions publiques : analyse pratique et retours d'expériences
Authors: --- ---
ISBN: 9782807207219 2807207219 Year: 2020 Publisher: Limal: Anthemis,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Le R.G.P.D., bien qu’il influence l’ensemble de nos activités quotidiennes, reste pour beaucoup un texte bien mystérieux.Les institutions publiques en particulier sont confrontées à de nombreuses questions. Quand faire une analyse d’impact ? Quels sont les rôles du DPO ? Comment protéger les systèmes informatiques des institutions administratives ? Quels sont les droits des citoyens à l’égard des administrations en ce qui concerne leurs données traitées ?Les auteurs de cet ouvrage, tous spécialistes de la matière (avocats, praticiens, délégués à la protection des données), ont décortiqué, les multiples questions et zones d’ombre suscitées par le règlement.Jean-Pierre Heymans, nous livre son retour d’expérience concernant les impacts concrets du R.G.P.D. et les mesures à prendre pour se mettre en conformité avec ce dernier.Stéphanie Golinvaux et Hannah Tacheny présentent le nouveau métier de délégué à la protection des données, et étudient les modalités de sa désignation, ses responsabilités ou encore l’assurabilité des risques liés à cette fonction.Laurentia Vanelven se penche sur les obligations du responsable de traitement. Saba Parsa et Nicolas Roland examinent en détail les droits des personnes concernées.Philippe Cornette revient sur le concept de principe de sécurité des données personnelles et ses enjeux au regard de la nouvelle réglementation, pour se concentrer ensuite plus particulièrement sur les impacts du R.G.P.D. sur les technologies de l’information, tant dans leur conception que dans leur utilisation quotidienne par les administrations.Enfin, Dominique Grégoire offre un regard à la fois interne et externe sur le défi que représente la mise en conformité des administrations au Règlement, l’envisageant comme l’occasion d’un changement profond source d’améliorations.Cet ouvrage, qui bénéficie de toute la rigueur scientifique nécessaire, se présente aussi comme un guide accessible et pratique. Toutes les contributions ont fait l’objet d’un peer review par Axel Beelen, spécialiste reconnu en protection des données personnelles.

Keywords

BPB9999 --- BPB2011 --- protection des données --- zaštita podataka --- tietosuoja --- ochrana údajov --- databeskyttelse --- protecția datelor --- adatvédelem --- përpunim i të dhënave --- Datenschutz --- varstvo podatkov --- protección de datos --- cosaint sonraí --- proteção dos dados --- uppgiftsskydd --- duomenų apsauga --- andmekaitse --- ochrona danych --- datu aizsardzība --- προστασία δεδομένων --- ochrana údajů --- gegevensbescherming --- защита на информация --- protezzjoni tad-data --- заштита на податоци --- data protection --- заштита података --- protezione dei dati --- Datensicherung --- varnost podatkov --- andmeturve --- ασφάλεια των δεδομένων --- zajištění dat --- dataskydd --- ochrana dat --- databeveiliging --- segurança de dados --- slándáil sonraí --- bezpečnost dat --- безбедност на податоци --- Datensicherheit --- data security --- datu drošība --- gegevensbeveiliging --- aineistoturvallisuus --- sigurnost podataka --- protecção dos dados --- sigurtà tad-data --- сигурност података --- datos protegidos --- sicurezza dei dati --- tietoturva --- zabezpečení údajů --- сигурност на данните --- sécurité des données --- bezpečnosť osobných údajov --- заштита на лични податоци --- bezpieczeństwo danych --- beveiliging van gegevens --- adatbiztonság --- zaštita informacija --- ochrana informací --- duomenų saugumas --- zabezpečení dat --- protezione dei dati personali --- securitate a datelor --- сигурност на податоци --- andmete turvalisus --- Jurisquare --- système informatique --- sistema informático --- računalni sustav --- система за обработка на данни --- edb-system --- computer system --- kompiuterių sistema --- Datenverarbeitungssystem --- sistema informatico --- atk-järjestelmä --- sistema tal-kompjuter --- datorsistēma --- računalniški sistem --- számítógépes rendszer --- рачунарски систем --- sistem kompjuterik --- компјутерски систем --- σύστημα πληροφορικής --- system informatyczny --- sistem informatic --- systém spracovania údajov --- arvutisüsteem --- počítačový systém --- databehandlingssystem --- informatieverwerkend systeem --- sistem de procesare a datelor --- kompjutorski sustav --- систем за обработка на податоци --- sistemi i përpunimit të të dhënave --- електронски систем --- компјутерска обработка на податоци --- data-processing system --- andmetöötlussüsteem --- informatički sustav --- μηχανογραφικό σύστημα --- duomenų apdorojimo sistema --- datu apstrādes sistēma --- computersysteem --- sustav za obradu podataka --- RGPD --- GDPR --- E-books --- Data protection --- Privacy, Right of --- Civil service --- Protection de l'information (Informatique) --- Droit à la vie privée --- Fonction publique --- Law and legislation --- Droit --- Protection de l'information (informatique) --- Délégués à la protection des données --- Systèmes informatiques --- Identité numérique --- Évaluation du risque --- Informatique dans les nuages --- Norme ISO 27001 --- Administration publique --- Mesures de sûreté --- Gestion du risque. --- Jurisquare. --- données data --- Respect de la vie privée (informatique) Bescherming van het privé-leven (informatica) --- Information (administration) Informatie (overheidsdiensten) --- córas ríomhaireachta --- Belgique --- système informatique --- protection des données

Listing 1 - 10 of 10
Sort by