Categories

Categories

Additional Information

Additional Information
  • Home

Account Navigation

Account Navigation

Currency - All prices are in AUD

Currency - All prices are in AUD
 Loading... Please wait...
  • Call us on (US) 1.877.772.2536 or (AU) 07 32052596
  • My Account
The Art of Service

Categories

Categories

Data Security: High-impact Strategies - What You Need to Know: Definitions, Adoptions, Impact, Benefits, Maturity, Vendors

$39.95

Data Security: High-impact Strategies - What You Need to Know: Definitions, Adoptions, Impact, Benefits, Maturity, Vendors

$39.95

Product Description

Data security is the means of ensuring that data is kept safe from corruption and that access to it is suitably controlled. Thus data security helps to ensure privacy. It also helps in protecting personal data.

This book is your ultimate resource for Data Security. Here you will find the most up-to-date information, analysis, background and everything you need to know.

This book explains in-depth the real drivers and workings of Data Security. It reduces the risk of your technology, time and resources investment decisions by enabling you to compare your understanding of Data Security with the objectivity of experienced professionals.

Data security is the means of ensuring that data is kept safe from corruption and that access to it is suitably controlled. Thus data security helps to ensure privacy. It also helps in protecting personal data.

This book is your ultimate resource for Data Security. Here you will find the most up-to-date information, analysis, background and everything you need to know.

In easy to read chapters, with extensive references and links to get you to know all there is to know about Data Security right away, covering: Data security, 2009 Sidekick data loss, Active hard-drive protection, Administrative share, AFSSI-5020, Air gap (networking), Alternative compensation system, Anomaly detection, Asset (computer security), Backup, Glossary of backup terms, Backup validation, BCWipe, Biometric passport, Blancco, Budapest Declaration on Machine Readable Travel Documents, Certified Information Security Manager, Certified Information Systems Auditor, Certified Information Systems Security Professional, Chinese wall, Cloud storage gateway, Compartmentalization (information security), Context-based access control, Data architect, Data breach, Data erasure, Data remanence, Data Shredder, Data theft, Database activity monitoring, Database audit, Database security, DBAN, De-perimeterisation, Defense in depth (computing), Disk Utility, End point security, Extended Access Control, Extrusion detection, Federation Against Software Theft, File deletion, Firewall (computing), First Department, Gutmann method, HDDerase, Holistic Information Security Practitioner, Incremental backup, Inference attack, Information repository, Information security, Information Security Forum, Information security management system, Information sensitivity, Information Systems Security Association, Information Trust Institute, Intrusion detection, IT risk, IT risk management, Jericho Forum, Jericho Forum Commandments, LogLogic, Loss of United Kingdom child benefit data (2007), Macro-Perimeterisation, Mayfield's Paradox, McCumber cube, Merritt method, Misuse detection, Multi Party Authorization, MyDLP, National Industrial Security Program, Negative database, Network Security & Cryptography, NIST RBAC model, Offline private key, Offline private key protocol, Password fatigue, Pod slurping, Q/ISP, Relocatable user backup, Remote data deletion, Restricting Access to Databases, Salami slicing, Sanitization (classified information), Screened-subnet firewall, Screening router, Secure Network, Security controls, Security convergence, Security information and event management, Security information management, Security level management, Security of automated teller machines, Self-destruct, Separation of duties, Shred (Unix), Single loss expectancy, Splunk, Srm (Unix), Standard of Good Practice, Titan Rain, Transient-key cryptography, Trusted paper key, United Kingdom government security breaches, Virtual private database, Wireless identity theft, Wireless intrusion prevention system. 

This book explains in-depth the real drivers and workings of Data Security. It reduces the risk of your technology, time and resources investment decisions by enabling you to compare your understanding of Data Security with the objectivity of experienced professionals.

Product Reviews

Find Similar Products by Category