Listing 1 - 10 of 10 |
Sort by
|
Choose an application
A compendium of essential information for the modern security entrepreneur and practitioner The modern security practitioner has shifted from a predominantly protective site and assets manager to a leading contributor to overall organizational resilience. Accordingly, The Security Consultant's Handbook sets out a holistic overview of the essential core knowledge, emerging opportunities, and approaches to corporate thinking that are increasingly demanded by employers and buyers in the security market. This book provides essential direction for those who want to succeed in security, either individually or as part of a team. It also aims to stimulate some fresh ideas and provide new market routes for security professionals who may feel that they are underappreciated and overexerted in traditional business domains. Product overview Distilling the author’s fifteen years’ experience as a security practitioner, and incorporating the results of some fifty interviews with leading security practitioners and a review of a wide range of supporting business literature, The Security Consultant’s Handbook provides a wealth of knowledge for the modern security practitioner, covering: Entrepreneurial practice (including business intelligence, intellectual property rights, emerging markets, business funding, and business networking) Management practice (including the security function’s move from basement to boardroom, fitting security into the wider context of organizational resilience, security management leadership, adding value, and professional proficiency) Legislation and regulation (including relevant UK and international laws such as the Human Rights Act 1998, the Data Protection Act 1998 and the Geneva Conventions) Private investigations (including surveillance techniques, tracing missing people, witness statements and evidence, and surveillance and the law) Information and cybersecurity (including why information needs protection, intelligence and espionage, cybersecurity threats, and mitigation approaches such as the ISO 27001 standard for information security management) Protective security (including risk assessment methods, person-focused threat assessments, protective security roles, piracy, and firearms) Safer business travel (including government assistance, safety tips, responding to crime, kidnapping, protective approaches to travel security and corporate liability) Personal and organizational resilience (including workplace initiative...
Security consultants --- Computer networks --- Computer security --- Security measures --- ISO 27001:2013. --- information security. --- iso 27001. --- security career. --- security industry. --- security professionals.
Choose an application
This pocket guide is based on the approach used by BT to protect its own data security - one that draws on the capabilities of both people and technology. The guide will prove invaluable for IT managers, information security officers and business executives.
Business enterprises --- Information technology --- Computer networks --- Security measures. --- Management. --- BT. --- information security breaches. --- information security. --- iso 27001. --- iso27001.
Choose an application
This guide explains the fundamental concepts of the PCI DSS (v4.0) and is a perfect quick reference guide.
Credit cards --- Data protection. --- Security measures. --- Security measures --- Standards. --- 27001. --- ISO 27001 certification. --- ISO 27001 implementation. --- ISO 27001:2022. --- ISO 27002:2022. --- ISO IEC 27001. --- ISO/IEC 27001 2013. --- ISO/IEC 27001. --- ISO/IEC 27001:2013. --- PCI DSS Certification. --- PCI DSS Version 4.0. --- PCI DSS. --- auditing. --- book. --- cyber strategy. --- ebook. --- epub. --- iso 27001. --- iso27001 certification. --- iso27001. --- kindle. --- payment card industry data security standard. --- payment card industry.
Choose an application
Discover how internal audits can help you to improve business practice in your organisation.
Risk management. --- Financial risk management. --- Management audit. --- ISO 27001. --- ISO 9001. --- auditing. --- internal auditing. --- management system auditing. --- management systems. --- quality assurance. --- quality management. --- risk management.
Choose an application
Essential guidance for anyone tackling ISO 27001:2022 implementation for the first time.
Data protection. --- Computer security. --- Business enterprises --- Computer networks --- Security measures. --- 27001. --- AI. --- Artificial Intelligence. --- Business Continuity. --- Cyber Crime. --- Cyber Ethics. --- Cyber Protection. --- Cyber Resilience. --- Cyber Terrorism. --- Cyber Threat. --- Cyber War. --- Cyber Warfare. --- Data Security. --- Digital Ethics. --- Digital Terrorism. --- ISMS. --- ISO IEC 27001. --- ISO/IEC 27001. --- Incident Management System. --- Incident Response Management. --- Incident Response. --- Information Security. --- Ransomware. --- information security management system. --- iso 27001 implementation. --- iso 27001. --- iso27001.
Choose an application
Long description: Biographical note: Thomas W. Harich arbeitet als Leiter der Information Security in einem großen deutschen Industriekonzern. Nebenberuflich ist er als Dozent und IT-Berater tätig. Seine Schwerpunkte liegen in der Erstellung von IT-Sicherheitskonzepten und deren praktischer Umsetzung in einem international geprägten IT-Umfeld.
Unternehmen --- Sicherheit --- Datenschutz --- Daten --- Richtlinien --- Verschlüsselung --- ITIL --- firewall --- Cloud Computing --- informationssicherheit --- buch --- digitale signatur --- system monitoring --- sicherheitsmanagement --- ISO 27001 --- IT Security --- business impact analyse --- schwachstellen --- mitp --- it sicherheit --- Administrator --- bsi grundschutz --- Datenintegrität --- eu datenschutz grundverordnung --- honeypot --- it forensik --- penetrationstests --- proxyserver --- risikomatrix --- security management --- Verschlüsselungsverfahren
Choose an application
Protection de l'information (informatique) --- Délégués à la protection des données --- Systèmes informatiques --- Identité numérique --- Identité numérique --- Évaluation du risque --- Informatique dans les nuages --- Norme ISO 27001 --- Administration publique --- Droit --- Mesures de sûreté --- Gestion du risque.
Choose an application
Human rights --- openbare besturen --- Belgium --- Data protection --- Privacy, Right of --- Civil service --- Protection de l'information (Informatique) --- Droit à la vie privée --- Fonction publique --- Law and legislation --- Droit --- Protection de l'information (informatique) --- Délégués à la protection des données --- Systèmes informatiques --- Identité numérique --- Évaluation du risque --- Informatique dans les nuages --- Norme ISO 27001 --- Administration publique --- Mesures de sûreté --- Gestion du risque. --- Délégués à la protection des données --- Systèmes informatiques --- Identité numérique --- Évaluation du risque --- Mesures de sûreté
Choose an application
This book is about data protection, privacy and liberty and the way these fundamental values of our societies are protected and enforced, particularly in their interaction with the ever developing capacities and possibilities of information and communication technologies. The authors are all closely involved in data protection and privacy. They represent the stakeholders in the debate: practitioners, civil liberties advocates, civil servants, data protection commissioners and academics. Their contributions evaluate current European data protection law against the background of the introduction of increasingly powerful, miniaturized, ubiquitous and autonomic forms of computing. The book assesses data protection and privacy law by analyzing the actual problems (trans-border data flows, proportionality of the processing, and sensitive data) and identifying lacunae and bottlenecks, while at the same time looking at prospects for the future (web 2.0., RFID, profiling) and suggesting paths for a rethinking and reinvention of the fundamental principles and concepts. From this perspective the recent constitutional acknowledgment of data protection as a fundamental right has a transformative power and should create the opportunity for a dynamic, participative, inductive and democratic process of ‘networked’ re-invention of data protection. The present book aims to make a contribution by seizing on this opportunity.
Data protection --- Law and legislation --- Interpretation and construction. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- 342.0858094 --- #SBIB:309H1015 --- #SBIB:327.7H231 --- Uk3 --- Protection de l'information (informatique) --- Banques de données (informatique) --- Confidentialité (informatique) --- Données (informatique) --- Données à caractère personnel (informatique) --- Données personnelles (informatique) --- Fichiers (informatique) --- Identité numérique --- Protection (informatique) --- Protection des données (informatique) --- Protection des fichiers (informatique) --- Protection des informations nominatives (informatique) --- Protection des renseignements personnels (informatique) --- Droits de la personnalité et Internet --- Droit à la vie privée --- Profilage --- Protection de l'information --- Services statistiques --- Traces numériques --- Chiffrement (informatique) --- Informatique --- Microordinateurs --- Norme ISO 27001 --- Norme ISO 27002 --- Norme ISO 27005 --- Ordinateurs --- Droit d'usage --- Systèmes informatiques --- Technologie de l'information --- Media: politieke, juridische, ethische, ideologische aspecten (incl. privacy) --- Europese Unie: sociaal-economisch beleid, landbouw-, milieu-, cultuur- en communicatiebeleid --- Protection --- droit --- informatique) -- Droit --- Droit --- Procédures de secours --- Accès -- Contrôle --- Mesures de sûreté --- Political science. --- Public International Law . --- Political Science. --- Administration --- Civil government --- Commonwealth, The --- Government --- Political theory --- Political thought --- Politics --- Science, Political --- Social sciences --- State, The --- Public international law. --- Law of nations --- Nations, Law of --- Public international law --- Law --- Data protection - Law and legislation - European Union countries - Congresses --- Protection de l'information (Informatique) --- Privacy, Right of
Choose an application
Le R.G.P.D., bien qu’il influence l’ensemble de nos activités quotidiennes, reste pour beaucoup un texte bien mystérieux.Les institutions publiques en particulier sont confrontées à de nombreuses questions. Quand faire une analyse d’impact ? Quels sont les rôles du DPO ? Comment protéger les systèmes informatiques des institutions administratives ? Quels sont les droits des citoyens à l’égard des administrations en ce qui concerne leurs données traitées ?Les auteurs de cet ouvrage, tous spécialistes de la matière (avocats, praticiens, délégués à la protection des données), ont décortiqué, les multiples questions et zones d’ombre suscitées par le règlement.Jean-Pierre Heymans, nous livre son retour d’expérience concernant les impacts concrets du R.G.P.D. et les mesures à prendre pour se mettre en conformité avec ce dernier.Stéphanie Golinvaux et Hannah Tacheny présentent le nouveau métier de délégué à la protection des données, et étudient les modalités de sa désignation, ses responsabilités ou encore l’assurabilité des risques liés à cette fonction.Laurentia Vanelven se penche sur les obligations du responsable de traitement. Saba Parsa et Nicolas Roland examinent en détail les droits des personnes concernées.Philippe Cornette revient sur le concept de principe de sécurité des données personnelles et ses enjeux au regard de la nouvelle réglementation, pour se concentrer ensuite plus particulièrement sur les impacts du R.G.P.D. sur les technologies de l’information, tant dans leur conception que dans leur utilisation quotidienne par les administrations.Enfin, Dominique Grégoire offre un regard à la fois interne et externe sur le défi que représente la mise en conformité des administrations au Règlement, l’envisageant comme l’occasion d’un changement profond source d’améliorations.Cet ouvrage, qui bénéficie de toute la rigueur scientifique nécessaire, se présente aussi comme un guide accessible et pratique. Toutes les contributions ont fait l’objet d’un peer review par Axel Beelen, spécialiste reconnu en protection des données personnelles.
BPB9999 --- BPB2011 --- protection des données --- zaštita podataka --- tietosuoja --- ochrana údajov --- databeskyttelse --- protecția datelor --- adatvédelem --- përpunim i të dhënave --- Datenschutz --- varstvo podatkov --- protección de datos --- cosaint sonraí --- proteção dos dados --- uppgiftsskydd --- duomenų apsauga --- andmekaitse --- ochrona danych --- datu aizsardzība --- προστασία δεδομένων --- ochrana údajů --- gegevensbescherming --- защита на информация --- protezzjoni tad-data --- заштита на податоци --- data protection --- заштита података --- protezione dei dati --- Datensicherung --- varnost podatkov --- andmeturve --- ασφάλεια των δεδομένων --- zajištění dat --- dataskydd --- ochrana dat --- databeveiliging --- segurança de dados --- slándáil sonraí --- bezpečnost dat --- безбедност на податоци --- Datensicherheit --- data security --- datu drošība --- gegevensbeveiliging --- aineistoturvallisuus --- sigurnost podataka --- protecção dos dados --- sigurtà tad-data --- сигурност података --- datos protegidos --- sicurezza dei dati --- tietoturva --- zabezpečení údajů --- сигурност на данните --- sécurité des données --- bezpečnosť osobných údajov --- заштита на лични податоци --- bezpieczeństwo danych --- beveiliging van gegevens --- adatbiztonság --- zaštita informacija --- ochrana informací --- duomenų saugumas --- zabezpečení dat --- protezione dei dati personali --- securitate a datelor --- сигурност на податоци --- andmete turvalisus --- Jurisquare --- système informatique --- sistema informático --- računalni sustav --- система за обработка на данни --- edb-system --- computer system --- kompiuterių sistema --- Datenverarbeitungssystem --- sistema informatico --- atk-järjestelmä --- sistema tal-kompjuter --- datorsistēma --- računalniški sistem --- számítógépes rendszer --- рачунарски систем --- sistem kompjuterik --- компјутерски систем --- σύστημα πληροφορικής --- system informatyczny --- sistem informatic --- systém spracovania údajov --- arvutisüsteem --- počítačový systém --- databehandlingssystem --- informatieverwerkend systeem --- sistem de procesare a datelor --- kompjutorski sustav --- систем за обработка на податоци --- sistemi i përpunimit të të dhënave --- електронски систем --- компјутерска обработка на податоци --- data-processing system --- andmetöötlussüsteem --- informatički sustav --- μηχανογραφικό σύστημα --- duomenų apdorojimo sistema --- datu apstrādes sistēma --- computersysteem --- sustav za obradu podataka --- RGPD --- GDPR --- E-books --- Data protection --- Privacy, Right of --- Civil service --- Protection de l'information (Informatique) --- Droit à la vie privée --- Fonction publique --- Law and legislation --- Droit --- Protection de l'information (informatique) --- Délégués à la protection des données --- Systèmes informatiques --- Identité numérique --- Évaluation du risque --- Informatique dans les nuages --- Norme ISO 27001 --- Administration publique --- Mesures de sûreté --- Gestion du risque. --- Jurisquare. --- données data --- Respect de la vie privée (informatique) Bescherming van het privé-leven (informatica) --- Information (administration) Informatie (overheidsdiensten) --- córas ríomhaireachta --- Belgique --- système informatique --- protection des données
Listing 1 - 10 of 10 |
Sort by
|