• Bookbook – grāmatas tikai angļu valodā!
90,99 €
Information Privacy Engineering and Privacy by Design
Information Privacy Engineering and Privacy by Design
  • Izpārdots
Information Privacy Engineering and Privacy by Design
Information Privacy Engineering and Privacy by Design
El. knyga:
90,99 €
Organizations of all kinds are recognizing the crucial importance of protecting privacy. Their customers, employees, and other stakeholders demand it. Today, failures to safeguard privacy can destroy organizational reputations - and even the organizations themselves. But implementing effective privacy protection is difficult, and there are few comprehensive resources for those tasked with doing so. In Information Privacy Engineering and Privacy by Design, renowned information technology author…
0
  • Autors: Stallings William
  • Izdevējs
  • Gads: 2019
  • Lapas: 528
  • ISBN: 9780135278369
  • ISBN-10 : 0135278368
  • ISBN-13 : 9780135278369
  • Formāts: PDF
  • Valoda: Anglų

Information Privacy Engineering and Privacy by Design | Bookbook.lv

Atsauksmes

Apraksts

Organizations of all kinds are recognizing the crucial importance of protecting privacy. Their customers, employees, and other stakeholders demand it. Today, failures to safeguard privacy can destroy organizational reputations - and even the organizations themselves. But implementing effective privacy protection is difficult, and there are few comprehensive resources for those tasked with doing so. In Information Privacy Engineering and Privacy by Design, renowned information technology author William Stallings brings together the comprehensive and practical guidance you need to succeed. Stallings shows how to apply today's consensus best practices and widely-accepted standards documents in your environment, leveraging policy, procedures, and technology to meet legal and regulatory requirements and protect everyone who depends on you. Like Stallings' other award-winning texts, this guide is designed to help readers quickly find the information and gain the mastery needed to implement effective privacy. Coverage includes:
  • Planning for privacy: Approaches for managing and controlling the privacy control function; how to define your IT environment's requirements; and how to develop appropriate policies and procedures for it
  • Privacy threats: Understanding and identifying the full range of threats to privacy in information collection, storage, processing, access, and dissemination
  • Information privacy technology: Satisfying the privacy requirements you've defined by using technical controls, privacy policies, employee awareness, acceptable use policies, and other techniques
  • Legal and regulatory requirements: Understanding GDPR as well as the current spectrum of U.S. privacy regulations, with insight for mapping regulatory requirements to IT actions
90,99 €
Piesakieties, lai
un par šo preci jūs saņemsiet
0,91 Grāmatu eiro! ?

E-grāmata:
Tūlītēja nosūtīšana pēc pasūtīšanas! Tikai lasīšanai datorā, planšetdatorā vai citā elektroniskā ierīcē.

Zemākā cena 30 dienu laikā: 90,99 €

Tiek reģistrēta zemākā cena: Cena nemainās


Organizations of all kinds are recognizing the crucial importance of protecting privacy. Their customers, employees, and other stakeholders demand it. Today, failures to safeguard privacy can destroy organizational reputations - and even the organizations themselves. But implementing effective privacy protection is difficult, and there are few comprehensive resources for those tasked with doing so. In Information Privacy Engineering and Privacy by Design, renowned information technology author William Stallings brings together the comprehensive and practical guidance you need to succeed. Stallings shows how to apply today's consensus best practices and widely-accepted standards documents in your environment, leveraging policy, procedures, and technology to meet legal and regulatory requirements and protect everyone who depends on you. Like Stallings' other award-winning texts, this guide is designed to help readers quickly find the information and gain the mastery needed to implement effective privacy. Coverage includes:
  • Planning for privacy: Approaches for managing and controlling the privacy control function; how to define your IT environment's requirements; and how to develop appropriate policies and procedures for it
  • Privacy threats: Understanding and identifying the full range of threats to privacy in information collection, storage, processing, access, and dissemination
  • Information privacy technology: Satisfying the privacy requirements you've defined by using technical controls, privacy policies, employee awareness, acceptable use policies, and other techniques
  • Legal and regulatory requirements: Understanding GDPR as well as the current spectrum of U.S. privacy regulations, with insight for mapping regulatory requirements to IT actions

Atsauksmes

  • Nav atsauksmju
0 klienti novērtēja šo produktu.
5
0%
4
0%
3
0%
2
0%
1
0%