251 pages
English

Découvre YouScribe en t'inscrivant gratuitement

Je m'inscris

Data Security: High-impact Strategies - What You Need to Know: Definitions, Adoptions, Impact, Benefits, Maturity, Vendors , livre ebook

-

Découvre YouScribe en t'inscrivant gratuitement

Je m'inscris
Obtenez un accès à la bibliothèque pour le consulter en ligne
En savoir plus
251 pages
English
Obtenez un accès à la bibliothèque pour le consulter en ligne
En savoir plus

Description

Data security is the means of ensuring that data is kept safe from corruption and that access to it is suitably controlled. Thus data security helps to ensure privacy. It also helps in protecting personal data.


This book is your ultimate resource for Data Security. Here you will find the most up-to-date information, analysis, background and everything you need to know.


In easy to read chapters, with extensive references and links to get you to know all there is to know about Data Security right away, covering: Data security, 2009 Sidekick data loss, Active hard-drive protection, Administrative share, AFSSI-5020, Air gap (networking), Alternative compensation system, Anomaly detection, Asset (computer security), Backup, Glossary of backup terms, Backup validation, BCWipe, Biometric passport, Blancco, Budapest Declaration on Machine Readable Travel Documents, Certified Information Security Manager, Certified Information Systems Auditor, Certified Information Systems Security Professional, Chinese wall, Cloud storage gateway, Compartmentalization (information security), Context-based access control, Data architect, Data breach, Data erasure, Data remanence, Data Shredder, Data theft, Database activity monitoring, Database audit, Database security, DBAN, De-perimeterisation, Defense in depth (computing), Disk Utility, End point security, Extended Access Control, Extrusion detection, Federation Against Software Theft, File deletion, Firewall (computing), First Department, Gutmann method, HDDerase, Holistic Information Security Practitioner, Incremental backup, Inference attack, Information repository, Information security, Information Security Forum, Information security management system, Information sensitivity, Information Systems Security Association, Information Trust Institute, Intrusion detection, IT risk, IT risk management, Jericho Forum, Jericho Forum Commandments, LogLogic, Loss of United Kingdom child benefit data (2007), Macro-Perimeterisation, Mayfield's Paradox, McCumber cube, Merritt method, Misuse detection, Multi Party Authorization, MyDLP, National Industrial Security Program, Negative database, Network Security & Cryptography, NIST RBAC model, Offline private key, Offline private key protocol, Password fatigue, Pod slurping, Q/ISP, Relocatable user backup, Remote data deletion, Restricting Access to Databases, Salami slicing, Sanitization (classified information), Screened-subnet firewall, Screening router, Secure Network, Security controls, Security convergence, Security information and event management, Security information management, Security level management, Security of automated teller machines, Self-destruct, Separation of duties, Shred (Unix), Single loss expectancy, Splunk, Srm (Unix), Standard of Good Practice, Titan Rain, Transient-key cryptography, Trusted paper key, United Kingdom government security breaches, Virtual private database, Wireless identity theft, Wireless intrusion prevention system


This book explains in-depth the real drivers and workings of Data Security. It reduces the risk of your technology, time and resources investment decisions by enabling you to compare your understanding of Data Security with the objectivity of experienced professionals.

Sujets

Informations

Publié par
Date de parution 24 octobre 2012
Nombre de lectures 0
EAN13 9781743049303
Langue English
Poids de l'ouvrage 8 Mo

Informations légales : prix de location à la page 0,1598€. Cette information est donnée uniquement à titre indicatif conformément à la législation en vigueur.

Extrait

  • Univers Univers
  • Ebooks Ebooks
  • Livres audio Livres audio
  • Presse Presse
  • Podcasts Podcasts
  • BD BD
  • Documents Documents
Alternate Text