Additional Information

Additional Information
  • Home

Account Navigation

Account Navigation

Currency - All prices are in AUD

Currency - All prices are in AUD
 Loading... Please wait...
  • Call us on (US) 1.877.772.2536 or (AU) 07 32052596
  • My Account
  • Gift Certificates
The Art of Service

Data Loss Prevention (DLP): High-impact Strategies - What You Need to Know: Definitions, Adoptions, Impact, Benefits, Maturity, Vendors

$39.95

Data Loss Prevention (DLP): High-impact Strategies - What You Need to Know: Definitions, Adoptions, Impact, Benefits, Maturity, Vendors

$39.95

Product Description

Data Loss Prevention (DLP) is a computer security term referring to systems that identify, monitor, and protect data in use (e.g. endpoint actions), data in motion (e.g. network actions), and data at rest (e.g. data storage) through deep content inspection, contextual security analysis of transaction (attributes of originator, data object, medium, timing, recipient/destination and so on) and with a centralized management framework. Systems are designed to detect and prevent unauthorized use and transmission of confidential information Vendors refer to the term as Data Leak Prevention, Information Leak Detection and Prevention (ILDP), Information Leak Prevention (ILP), Content Monitoring and Filtering (CMF), Information Protection and Control (IPC) or Extrusion Prevention System by analogy to Intrusion-prevention system.

This book is your ultimate resource for Data Loss Prevention (DLP). Here you will find the most up-to-date information, analysis, background and everything you need to know.

Data Loss Prevention (DLP) is a computer security term referring to systems that identify, monitor, and protect data in use (e.g. endpoint actions), data in motion (e.g. network actions), and data at rest (e.g. data storage) through deep content inspection, contextual security analysis of transaction (attributes of originator, data object, medium, timing, recipient/destination and so on) and with a centralized management framework. Systems are designed to detect and prevent unauthorized use and transmission of confidential information Vendors refer to the term as Data Leak Prevention, Information Leak Detection and Prevention (ILDP), Information Leak Prevention (ILP), Content Monitoring and Filtering (CMF), Information Protection and Control (IPC) or Extrusion Prevention System by analogy to Intrusion-prevention system.

This book is your ultimate resource for Data Loss Prevention (DLP). Here you will find the most up-to-date information, analysis, background and everything you need to know.

In easy to read chapters, with extensive references and links to get you to know all there is to know about Data Loss Prevention (DLP) right away, covering: Data loss prevention software, Computer security, Portal:Computer security, 2009 Sidekick data loss, AAFID, Absolute Manage, Accelops, Acceptable use policy, Access token, Advanced Persistent Threat, Air gap (networking), Ambient authority, Anomaly-based intrusion detection system, Application firewall, Application security, Asset (computer security), Attack (computer), AutoRun, Blacklist (computing), Blue Cube Security, BlueHat, Centurion guard, Client honeypot, Cloud computing security, Collaboration-oriented architecture, Committee on National Security Systems, Computer Law and Security Report, Computer security compromised by hardware failure, Computer security incident management, Computer security model, Computer surveillance, Confused deputy problem, Countermeasure (computer), CPU modes, Crackme, Cross-site printing, CryptoRights Foundation, CVSS, Control system security, Cyber security standards, Cyber spying, Cyber Storm Exercise, Cyber Storm II, Cyberheist, Dancing pigs, Data breach, Data validation, Digital self-defense, Dolev-Yao model, DREAD: Risk assessment model, Dynamic SSL, Economics of security, Enterprise information security architecture, Entrust, Evasion (network security), Event data, Federal Desktop Core Configuration, Federal Information Security Management Act of 2002, Flaw hypothesis methodology, Footprinting, Forward anonymity, Four Horsemen of the Infocalypse, Fragmented distribution attack, Higgins project, High Assurance Guard, Host Based Security System, Human–computer interaction (security), Inference attack, Information assurance, Information Assurance Vulnerability Alert, Information security, Information Security Automation Program, Information Security Forum, Information sensitivity, Inter-Control Center Communications Protocol, Inter-protocol communication, Inter-protocol exploitation, International Journal of Critical Computer-Based Systems, Internet leak, Internet Security Awareness Training, Intrusion detection system evasion techniques, Intrusion prevention system, Intrusion tolerance, IT baseline protection, IT Baseline Protection Catalogs, IT risk, IT risk management, ITHC, Joe-E, Kill Pill, LAIM Working Group, Layered security, Likejacking, Linked Timestamping, Lock-Keeper, MAGEN (security), Mandatory Integrity Control, Mayfield's Paradox, National Cyber Security Awareness Month, National Vulnerability Database, Neurosecurity, Nobody (username), Non-repudiation, Novell Cloud Security Service, One-time authorization code...and much more.

This book explains in-depth the real drivers and workings of Data Loss Prevention (DLP). It reduces the risk of your technology, time and resources investment decisions by enabling you to compare your understanding of Data Loss Prevention (DLP) with the objectivity of experienced professionals.

Product Reviews

Find Similar Products by Category