Data Security: High-impact Strategies - What You Need to Know: Definitions, Adoptions, Impact, Benefits, Maturity, Vendors

ebook

By Kevin Roebuck

cover image of Data Security: High-impact Strategies - What You Need to Know: Definitions, Adoptions, Impact, Benefits, Maturity, Vendors

Sign up to save your library

With an OverDrive account, you can save your favorite libraries for at-a-glance information about availability. Find out more about OverDrive accounts.

   Not today

Find this title in Libby, the library reading app by OverDrive.

Download Libby on the App Store Download Libby on Google Play

Search for a digital library with this title

Title found at these libraries:

Library Name Distance
Loading...
Data security is the means of ensuring that data is kept safe from corruption and that access to it is suitably controlled. Thus data security helps to ensure privacy. It also helps in protecting personal data. This book is your ultimate resource for Data Security. Here you will find the most up-to-date information, analysis, background and everything you need to know. In easy to read chapters, with extensive references and links to get you to know all there is to know about Data Security right away, covering: Data security, 2009 Sidekick data loss, Active hard-drive protection, Administrative share, AFSSI-5020, Air gap (networking), Alternative compensation system, Anomaly detection, Asset (computer security), Backup, Glossary of backup terms, Backup validation, BCWipe, Biometric passport, Blancco, Budapest Declaration on Machine Readable Travel Documents, Certified Information Security Manager, Certified Information Systems Auditor, Certified Information Systems Security Professional, Chinese wall, Cloud storage gateway, Compartmentalization (information security), Context-based access control, Data architect, Data breach, Data erasure, Data remanence, Data Shredder, Data theft, Database activity monitoring, Database audit, Database security, DBAN, De-perimeterisation, Defense in depth (computing), Disk Utility, End point security, Extended Access Control, Extrusion detection, Federation Against Software Theft, File deletion, Firewall (computing), First Department, Gutmann method, HDDerase, Holistic Information Security Practitioner, Incremental backup, Inference attack, Information repository, Information security, Information Security Forum, Information security management system, Information sensitivity, Information Systems Security Association, Information Trust Institute, Intrusion detection, IT risk, IT risk management, Jericho Forum, Jericho Forum Commandments, LogLogic, Loss of United Kingdom child benefit data (2007), Macro-Perimeterisation, Mayfield's Paradox, McCumber cube, Merritt method, Misuse detection, Multi Party Authorization, MyDLP, National Industrial Security Program, Negative database, Network Security & Cryptography, NIST RBAC model, Offline private key, Offline private key protocol, Password fatigue, Pod slurping, Q/ISP, Relocatable user backup, Remote data deletion, Restricting Access to Databases, Salami slicing, Sanitization (classified information), Screened-subnet firewall, Screening router, Secure Network, Security controls, Security convergence, Security information and event management, Security information management, Security level management, Security of automated teller machines, Self-destruct, Separation of duties, Shred (Unix), Single loss expectancy, Splunk, Srm (Unix), Standard of Good Practice, Titan Rain, Transient-key cryptography, Trusted paper key, United Kingdom government security breaches, Virtual private database, Wireless identity theft, Wireless intrusion prevention system. This book explains in-depth the real drivers and workings of Data Security. It reduces the risk of your technology, time and resources investment decisions by enabling you to compare your understanding of Data Security with the objectivity of experienced professionals.
Data Security: High-impact Strategies - What You Need to Know: Definitions, Adoptions, Impact, Benefits, Maturity, Vendors