Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Data protection
Material
Language
Keywords
  • 1
    Book
    Book
    London : ISTE Ltd | Hoboken, NJ : John Wiley & Sons, Inc
    ISBN: 9781786300867 , 1786300869
    Language: English
    Series Statement: Information systems, web and pervasive computing series
    Parallel Title: Erscheint auch als Computing and connected society set
    DDC: 303.48/33
    Keywords: Technological innovations ; Information society ; Data protection ; Privacy, Right of ; Technischer Fortschritt ; Digitale Revolution ; Informationsgesellschaft ; Datenschutz ; Privatsphäre ; Überwachung
    Note: Verfasser des 1. Bandes: André Vitalis , Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    London : ISTE | Hoboken, NJ : Wiley
    Language: English
    Parallel Title: Erscheint auch als Computing and connected society set
    DDC: 303.48/33
    Keywords: Technological innovations ; Information society ; Data protection ; Privacy, Right of ; Technischer Fortschritt ; Digitale Revolution ; Informationsgesellschaft ; Datenschutz ; Privatsphäre ; Überwachung
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Book
    Book
    London : ISTE Ltd | Hoboken, NJ : John Wiley & Sons, Inc
    ISBN: 9781786300867 , 1786300869
    Language: English
    Series Statement: Information systems, web and pervasive computing series
    Parallel Title: Erscheint auch als Computing and connected society set
    DDC: 303.48/33
    Keywords: Technological innovations ; Information society ; Data protection ; Privacy, Right of ; Technischer Fortschritt ; Digitale Revolution ; Informationsgesellschaft ; Datenschutz ; Privatsphäre ; Überwachung
    Note: Verfasser des 1. Bandes: André Vitalis , Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Amsterdam : Amsterdam University Press
    ISBN: 9048557992 , 9789048557998
    Language: English
    Pages: 1 Online-Ressource (338 pages) , illustrations
    Parallel Title: Erscheint auch als
    Keywords: Data protection ; Privacy, Right of ; Sociological jurisprudence ; Protection de l'information (Informatique) ; Sociologie juridique ; Law and society ; Technology: general issues ; Privacy and data protection ; LAW / Science & Technology ; LAW / Privacy ; SOCIAL SCIENCE / Privacy & Surveillance (see also POLITICAL SCIENCE / Privacy & Surveillance) * ; Control, privacy and safety in society ; Data protection law ; Privacy and data protection ; Social and Political Sciences ; SPS ; Law ; Media Studies ; MEDIA ; Politics and Government ; POL & GOV ; Personal data, anonymous data, pseudonymous data, metadata, sensitive personal data
    Abstract: The legal domain distinguishes between different types of data and attaches a different level of protection to each of them. Thus, non-personal data are left largely unregulated, while privacy and data protection rules apply to personal data or personal information. There are stricter rules for processing sensitive personal data than for 'ordinary' personal data, and metadata or communications data are regulated differently than content communications data. Technological developments challenge these legal categorisations on at least three fronts: First, the lines between the categories are becoming harder to draw and more fluid. Second, working with various categories of data works well when the category a datum or dataset falls into is relatively stable. However, this is less and less so. Third, scholars increasingly question the rationale behind the various legal categorisations. This book assesses to what extent either of these strategies is feasible and to what extent alternative approaches could be developed by combining insights from three fields: technology, practice and law
    Description / Table of Contents: Chapter 1 -- Introduction Chapter 2 -- Object Re-identification: Problems, Algorithms, and Responsible Research Practice Chapter 3: The Quantum Threat to Cybersecurity and Privacy Chapter 4 -- Realistic Face Anonymisation Chapter 5 Use of bulk data by intelligence and security services: caught between a rock and a hard place? Chapter 6 Farm Data Sharing: current practices and principles Chapter 7 Microdata access at Statistics Netherlands Chapter 8 Atmospheric profiling and surveillance in the Stratumseind Living Lab: pushing the limits of identifiability Chapter 9 -- Data used in governmental automated decision-making & profiling: towards more practical protection 10. Data: a very short introduction to the EU galaxy and to five potential paths forward 11. The regulation of access to personal and non-personal data in the EU: from bits and pieces to a system? Chapter 12: Regulating 'non-personal data': Developments in India Chapter 13 Data Protection Without Data: Informationless chilling effects and data protection law Chapter 14 Identity, Profiles and Pseudonyms in the Digital Environment Chapter 15 Biometric Data, Within And Beyond Data Protection Chapter 16 -- Conclusions
    Note: "Amsterdam University Press"
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Singapore : Springer Nature Singapore | Singapore : Imprint: Springer
    ISBN: 9789819949434
    Language: English
    Pages: 1 Online-Ressource(XIV, 204 p. 54 illus., 42 illus. in color.)
    Edition: 1st ed. 2024.
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    Keywords: Computational intelligence. ; Data protection ; Data protection. ; Artificial intelligence
    Abstract: Chapter 1 Introduction -- Chapter 2 Privacy Protection Related Technologies -- Chapter 3 Privacy Computing Theory -- Chapter 4 Privacy Computing Technology -- Chapter 5 The future trend of privacy computing.
    Abstract: The continuous evolution and widespread application of communication technology, network technology and computing technology have promoted the intelligent interconnection of all things and ubiquitous sharing of information. The cross-border, cross-system, and cross-ecosystem exchange of user data has become commonplace. At the same time, difficulties in the prevention of private information abuse and lack of protection methods have become global problems. As such, there is an urgent need to intensify basic theoretical research in this field to support the protection of personal information in a ubiquitously interconnected environment. The authors of this book proposed the concept, definition and research scope of privacy computing for the first time in 2015. This book represents their original and innovative scientific research achievement dedicated to privacy computing research, and systematically explains the basic theory and technology involved. It introduces readers to the connection between personal information and privacy protection, defines privacy protection and privacy desensitization, clarifies and summarizes the limitations of existing privacy-preserving technologies in practical information system applications, analyzes the necessity of conducting privacy computing research, and proposes the concept, definition and research scope of privacy computing. It comprehensively expounds the theoretical system of privacy computing and some privacy-preserving algorithms based on the idea of privacy computing. In closing, it outlines future research directions.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    ISBN: 9783031610899
    Language: English
    Pages: 1 Online-Ressource (X, 183 p. 27 illus., 17 illus. in color)
    Edition: 1st ed. 2024
    Series Statement: Lecture Notes in Computer Science 13888
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    DDC: 3,034,834
    Keywords: Computers and Society ; Computer and Information Systems Applications ; Computer Communication Networks ; Computer System Implementation ; Cryptology ; Data and Information Security ; Computers and civilization ; Application software ; Computer networks  ; Computer systems ; Cryptography ; Data encryption (Computer science) ; Data protection
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Language: English
    Pages: 1 online resource (1040 pages) , illustrations
    Edition: Sixth edition.
    DDC: 005.8
    Keywords: Computer security ; Data protection ; Privacy, Right of
    Abstract: Now extensively updated throughout, Security in Computing, Sixth Edition, is today's one-stop, primary text for everyone teaching, learning, and practicing information cybersecurity. It defines core principles associated with modern security policies, processes, and protection; illustrates them with up-to-date sidebars and examples; and shows how to apply them in practice. Modular and flexibly organized, it supports a wide array of courses, strengthens professionals' knowledge of foundational principles; and imparts a more expansive understanding of modern security. This edition adds or expands coverage of artificial intelligence and machine learning tools; app and browser security; security by design; securing cloud, IoT, and embedded systems; privacy-enhancing technologies; protecting vulnerable individuals and groups; strengthening security culture; cryptocurrencies and blockchain; offensive cyberwarfare; post-quantum computing; and more. It contains many new diagrams, exercises, sidebars, and examples, and is mapped to two leading frameworks: the US NIST National Initiative for Cybersecurity Education (NICE) and the UK Cyber Body of Knowledge (CyBOK).
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Ely, Cambridgeshire : IT Governance Publishing
    ISBN: 9781787785090 , 1787785092
    Language: English
    Pages: 1 online resource (71 pages)
    Edition: [First edition].
    DDC: 332.1/788
    Keywords: Credit cards Security measures ; Credit cards Security measures ; Standards ; Data protection ; Cartes de crédit ; Sécurité ; Mesures ; Cartes de crédit ; Sécurité ; Mesures ; Normes ; Protection de l'information (Informatique)
    Abstract: The PCI DSS (Payment Card Industry Data Security Standard) is now on its fourth version. The withdrawal date for v3.2.1 is 31 March 2024. Many organisations around the world – particularly those that fall below the top tier of payment card transaction volumes – are not yet compliant with the new version. This book: Explains the fundamental concepts of PCI DSS v4.0; Is a perfect quick reference guide for PCI professionals, or a handy introduction for people new to the payment card industry; and covers the consequences of a data breach and how to comply with the Standard, giving practical insights. An ideal introduction to PCI DSS v4.0
    Note: Includes bibliographical references
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Language: English
    Pages: 1 online resource (275 pages) , illustrations
    Edition: First edition.
    DDC: 658.4/78
    Keywords: Data protection ; Privacy, Right of
    Abstract: Many organizations today analyze and share large, sensitive datasets about individuals. Whether these datasets cover healthcare details, financial records, or exam scores, it's become more difficult for organizations to protect an individual's information through deidentification, anonymization, and other traditional statistical disclosure limitation techniques. This practical book explains how differential privacy (DP) can help. Authors Ethan Cowan, Michael Shoemate, and Mayana Pereira and explain how these techniques enable data scientists, researchers, and programmers to run statistical analyses that hide the contribution of any single individual. You'll dive into basic DP concepts and understand how to use open source tools to create differentially private statistics, explore how to assess the utility/privacy trade-offs, and learn how to integrate differential privacy into workflows. With this book, you'll learn: How DP guarantees privacy when other data anonymization methods don't What preserving individual privacy in a dataset entails How to apply DP in several real-world scenarios and datasets Potential privacy attack methods, including what it means to perform a reidentification attack How to use the OpenDP library in privacy-preserving data releases How to interpret guarantees provided by specific DP data releases.
    Note: Includes bibliographical references
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    ISBN: 9781800563940 , 1800563949
    Language: English
    Pages: 1 online resource (1 video file (8 hr., 32 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer security ; Data protection ; Sécurité informatique ; Protection de l'information (Informatique) ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an in-depth exploration of the General Data Protection Regulation (GDPR), laying the foundational principles that underpin data protection in the digital age. It unpacks the significance of GDPR for businesses and individuals, emphasizing the importance of compliance in today's data-driven world. By dissecting the regulation piece by piece, the course offers clear, accessible insights into its complexities. The course focuses on key areas including the principles of GDPR, special topics such as consent, data breaches, and transfers of personal data, along with a detailed examination of individual rights under GDPR. This structured approach demystifies each component, making it easier to understand how GDPR affects various aspects of data handling and privacy. The course wraps up by addressing the crucial elements of accountability and governance, preparing you to implement GDPR-compliant strategies within your organization. Through this journey, you will gain the knowledge and tools necessary to navigate the requirements of GDPR, ensuring your business or organization not only complies with the regulation but also upholds the highest standards of data protection. What you will learn Understand GDPR's core principles Navigate GDPR compliance requirements Manage data breaches and notifications Enhance data protection and privacy Handle cross-border data transfers Apply GDPR in organizational contexts Audience This course is ideal for data protection officers, compliance managers, IT professionals, and legal advisors. Basic knowledge of data protection laws is beneficial. Perfect for those looking to ensure GDPR compliance within their organizations. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Adam Gordon: Adam Gordon has 30+ years as an IT instructor in the private and public sectors. He holds more than 160 IT certifications. He has trained thousands of IT pros over the course of his career. He has over 160 professional and IT certifications. Daniel Lowrie: Daniel Lowrie's IT career began with workstation support and Y2K compliance updates for a teaching hospital in North-Central Florida. His journey led him to become an in-classroom trainer and Mentored Learning Instructor, specializing in courses covering Microsoft Windows Desktops and Servers, Active Directory, Networking, CCNA, and Linux. He then transitioned to becoming a Systems and Network administrator for a large insurance company before joining ACI Learning as an Edutainer. Certifications: CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT Mike Rodrick: Mike Rodrick, the host, has more than 15 years of IT instruction experience, including 10 years as a Microsoft Certified Trainer. Mike became an ITProTV Edutainer in 2014. Certifications: GIAC Security Essentials; Azure Fundamentals; Microsoft 365 Fundamentals; Cybersec First Responder; CompTIA ITF+, A+, Network+, Security+, Project+; MCP; MCT; MCDST; MCITP; MCTS; MCSA; MCSE; MCDBA; Certified Ethical Hacker; Certified Wireless Administrator; Certified Internet Web Professional Cherokee Boose: Cherokee Boose started as a computer technician and moved to a network administrator role. Her love for learning is what pushed her towards a career in IT education. Certifications: MCSE Cloud Platform and Infrastructure; MCSA: Server 2012; MCT; MCP; MTA: Networking Fundamentals; MTA: Windows Operating System Fundamentals; Six Sigma Green Belt; CompTIA A+, A+ CE, Network+, CTT+, and Cloud+.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 4, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    ISBN: 9789819700882
    Language: English
    Pages: 1 Online-Ressource (XII, 314 p. 138 illus., 113 illus. in color)
    Edition: 1st ed. 2024
    Series Statement: Contributions to Environmental Sciences & Innovative Business Technology
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    DDC: 304.2
    Keywords: Sustainability ; Mobile and Network Security ; Blockchain ; Data Structures and Information Theory ; Security Services ; Cryptology ; Sustainability ; Computer networks / Security measures ; Blockchains (Databases) ; Data structures (Computer science) ; Information theory ; Data protection ; Cryptography ; Data encryption (Computer science)
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    Online Resource
    Online Resource
    [Place of publication not identified] : Pearson
    ISBN: 9780135341674 , 0135341671
    Language: English
    Pages: 1 online resource (1 video file (4 hr., 36 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Information technology Security measures ; Computer security Management ; Computer networks Security measures ; Data protection ; Technologie de l'information ; Sécurité ; Mesures ; Sécurité informatique ; Gestion ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Protection de l'information (Informatique) ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: 4+ hours of video instruction Gain an introductory understanding of secure operations and protections concepts. Understanding how to keep data operations secure and protect data is a critical part of any organizations day-to-day business. With over 4 hours of video training, the Secure Operations and Protections, 2nd Edition video course explores organizations' strategies, practices, and technologies to protect their systems, networks, and data, ultimately enhancing their overall security posture. Dive into the essential aspects of secure operations, including network security, system hardening, and incident response planning. Throughout the video course, expert trainer, author and cybersecurity expert Aamir Lakhani uses hands-on demos, in-depth discussions and lightboard work to teach cyber security fundamentals. This video course teaches you cybersecurity best practices in a way that is easy to access and implement in real world situations. Topics include: System and Network Architecture Concepts Efficiency and Process Improvement Recommended Controls to Mitigate Attacks and Software Vulnerabilities Analyzing Data to Prioritize Vulnerabilities About the Instructor: Aamir Lakhani is a leading senior security strategist. He is responsible for providing IT security solutions to major enterprises and government organizations. Mr. Lakhani creates technical security strategies and leads security implementation projects for Fortune 500 companies. Industries of focus include healthcare providers, educational institutions, financial institutions and government organizations. Aamir has designed offensive counter-defense measures for the Department of Defense and national intelligence agencies. He has also assisted organizations with safeguarding IT and physical environments from attacks perpetrated by underground cybercriminal groups. Mr. Lakhani is considered an industry leader for creating detailed security architectures within complex computing environments. His areas of expertise include cyber defense, mobile application threats, malware management, Advanced Persistent Threat (APT) research, and investigations relating to the Internet's dark security movement. He is the author or contributor of several books, and has appeared on FOX Business News, National Public Radio, and other media outlets as an expert on cybersecurity. Writing under the pseudonym Dr. Chaos, Mr. Lakhani also operates the popular security social media blog which is hosted at DrChaos.com. In its recent list of 46 Federal Technology Experts to Follow on Twitter, Forbes magazine described Aamir Lakhani as "a blogger, InfoSec specialist, super hero...and all around good guy." Skill Level: Beginner Learn How To: Protect data and secure an organizations operation in their day-to-day business Observe, collect, and secure date Detect common security encounters and be prepared for them Implement processes that allow communication of information in a correct and timely manner Who Should Take This Course: Cybersecurity Professionals Anyone interested in learning cyber security fundamentals. About Pearson Video Training: Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Prentice Hall, Sams, and Que Topics include: IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more. Learn more about Pearson Video training at http://www.informit.com/video.
    Note: Online resource; title from title details screen (O'Reilly, viewed April 16, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    Online Resource
    Online Resource
    [Place of publication not identified] : Apress
    ISBN: 9781484298725 , 1484298721
    Language: English
    Pages: 1 online resource (1 video file (40 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer security ; Computer networks Security measures ; Data protection ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: With cyber attacks on the rise, all individuals - and especially professionals handling potentially confidential company data - should be well-versed in how to protect their information from bad actors. This video will take you through the steps you can take to protect both your private and company data. The video will explain why cybersecurity is important on an individual and personal level, how cyber attacks have been evolving and what vulnerabilities you need to be aware of and protect. It'll go through topics and tricks to deal with these threats and explore the costs and impact of not protecting your data. What You Will Learn The financial impact of (non)-action How to deal with the evolving needs of security How attacks and vulnerabilities are evolving in the world Who This Video is For Non-technical professionals who are looking to understand how they can be careful with both their personal and professional data.
    Note: Online resource; title from title details screen (O'Reilly, viewed September 19, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    ISBN: 9781787784468 , 1787784460
    Language: English
    Pages: 1 online resource (78 pages)
    Edition: [First edition].
    DDC: 658.4/78
    Keywords: Chief information officers ; Information technology Management ; Computer networks Security measures ; Computer security ; Data protection
    Abstract: Understand how to maximise the benefits of the CISO’s role in your organization!
    Note: Includes bibliographical references
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    Orig.schr. Ausgabe: 初版.
    Title: セキュアで信頼性のあるシステム構築 : : Google SREが考える安全なシステムの設計, 実装, 保守 /
    Publisher: オライリー・ジャパン,
    ISBN: 9784814400256 , 481440025X
    Language: Japanese
    Pages: 1 online resource (588 pages)
    Edition: Shohan.
    Series Statement: Google SRE shirīzu dai 3-dan
    Uniform Title: Building secure and reliable systems
    DDC: 005.8
    Keywords: Computer networks Security measures ; Computer security ; Computer systems Reliability ; Systems engineering ; Data protection
    Note: In Japanese.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    Orig.schr. Ausgabe: 初版.
    Title: データ保護完全ガイド : : あらゆるデータの保全と回復を可能にする /
    Publisher: 東京都新宿区 : オライリー・ジャパン
    ISBN: 9784814400553 , 4814400551
    Language: Japanese
    Pages: 1 online resource (408 pages)
    Edition: Shohan.
    Uniform Title: Modern data protection
    DDC: 658.4/78
    Keywords: Business enterprises Data processing ; Security measures ; Data protection ; Entreprises ; Informatique ; Sécurité ; Mesures ; Protection de l'information (Informatique)
    Abstract: "Give your organization the data protection it deserves without the uncertainty and cost overruns experienced by your predecessors or other companies. System and network administrators have their work cut out for them to protect physical and virtual machines in the data center and the cloud; mobile devices including laptops and tablets; SaaS services like Microsoft 365, Google Workspace, and Salesforce; and persistent data created by Kubernetes and container workloads. To help you navigate the breadth and depth of this challenge, this book presents several solutions so you can determine which is right for your company. You'll learn the unique requirements that each workload presents, then explore various categories of commercial backup hardware, software, and services available to protect these data sources, including the advantages and disadvantages of each approach." -- Provided by publisher.
    Note: In Japanese.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    Online Resource
    Online Resource
    [Place of publication not identified] : Manning Publications
    Language: English
    Pages: 1 online resource (1 video file (7 hr.)) , sound, color.
    Edition: Video edition.
    DDC: 658/.05
    Keywords: Business Data processing ; Data protection ; Big data ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: Do you know what happens to your personal data when you are browsing, buying, or using apps? Discover how your data is harvested and exploited, and what you can do to access, delete, and monetize it. Data for All empowers everyone--from tech experts to the general public--to control how third parties use personal data. Read this eye-opening book to learn: The types of data you generate with every action, every day Where your data is stored, who controls it, and how much money they make from it How you can manage access and monetization of your own data Restricting data access to only companies and organizations you want to support The history of how we think about data, and why that is changing The new data ecosystem being built right now for your benefit The data you generate every day is the lifeblood of many large companies--and they make billions of dollars using it. In Data for All, bestselling author John K. Thompson outlines how this one-sided data economy is about to undergo a dramatic change. Thompson pulls back the curtain to reveal the true nature of data ownership, and how you can turn your data from a revenue stream for companies into a financial asset for your benefit. About the Technology Do you know what happens to your personal data when you're browsing and buying? New global laws are turning the tide on companies who make billions from your clicks, searches, and likes. This eye-opening book provides an inspiring vision of how you can take back control of the data you generate every day. About the Book Data for All gives you a step-by-step plan to transform your relationship with data and start earning a "data dividend"--hundreds or thousands of dollars paid out simply for your online activities. You'll learn how to oversee who accesses your data, how much different types of data are worth, and how to keep private details private. What's Inside The types of data you generate with every action, every day How you can manage access and monetization of your own data The history of how we think about data, and why that is changing The new data ecosystem being built right now for your benefit About the Reader For anyone who is curious or concerned about how their data is used. No technical knowledge required. About the Author John K. Thompson is an international technology executive with over 37 years of experience in the fields of data, advanced analytics, and artificial intelligence. Quotes An honest, direct, pull-no-punches source on one of the most important personal issues of our time....I changed some of my own behaviors after reading the book, and I suggest you do so as well. You have more to lose than you may think. - From the Foreword by Thomas H. Davenport, author of Competing on Analytics and The AI Advantage A must-read for anyone interested in the future of data. It helped me understand the reasons behind the current data ecosystem and the laws that are shaping its future. A great resource for both professionals and individuals. I highly recommend it. - Ravit Jain, Founder & Host of The Ravit Show, Data Science Evangelist.
    Note: Online resource; title from title details screen (O'Reilly, viewed November 15, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    ISBN: 9780738461199 , 0738461199
    Language: English
    Pages: 1 online resource (48 pages) , illustrations
    Edition: [First edition].
    DDC: 005.8
    Keywords: Information technology Security measures ; Computer security Management ; Computer networks Security measures ; Data protection
    Abstract: With IBM Z Flexible Capacity for Cyber Resiliency, IBM introduces a new temporary capacity, that offers clients new levels of flexibility and control. Flexible Capacity for Cyber Resiliency helps organizations to activate and deactivate capacity, within the Flexible Capacity record, between participating IBM z16 machines in production and remote sites to improve Cyber Resiliency and provides increased flexibility and control regarding when and how to move workloads. This Redpaper provides details about the functional and operational details of the feature and provides an HMC walkthrough that shows how to activate and use IBM Z Flexible Capacity for Cyber Resiliency on IBM z16.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 19
    Online Resource
    Online Resource
    [Place of publication not identified] : Take Control Books
    ISBN: 9781990783180 , 199078318X
    Language: English
    Pages: 1 online resource (174 pages) , illustrations
    Edition: Sixth edition.
    DDC: 005.8
    Keywords: Computers Access control ; Passwords ; Computer networks Security measures ; Computer security Management ; Data protection ; Information technology Security measures
    Abstract: Annoyed by having to type hard-to-remember passwords? Let 1Password do the heavy lifting. With coverage of 1Password version 8 for Mac, Windows, Linux, iOS/iPadOS, Android, and Apple Watch, author Joe Kissell shows you how to generate and enter secure passwords, speed up your online shopping, and share and sync web logins and other confidential data.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 20
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : JOHN WILEY
    ISBN: 9781394165247 , 1394165242 , 9781394165254 , 1394165250 , 9781394165230
    Language: English
    Pages: 1 online resource
    Parallel Title: Erscheint auch als
    DDC: 658.05
    Keywords: Business Data processing ; Electronic data processing Quality control ; Data protection ; Artificial intelligence
    Abstract: Discover how to achieve business goals by relying on high-quality, robust data In Data Quality: Empowering Businesses with Analytics and AI, veteran data and analytics professional delivers a practical and hands-on discussion on how to accelerate business results using high-quality data. In the book, you'll learn techniques to define and assess data quality, discover how to ensure that your firm's data collection practices avoid common pitfalls and deficiencies, improve the level of data quality in the business, and guarantee that the resulting data is useful for powering high-level analytics and AI applications. The author shows you how to: Profile for data quality, including the appropriate techniques, criteria, and KPIs Identify the root causes of data quality issues in the business apart from discussing the 16 common root causes that degrade data quality in the organization. Formulate the reference architecture for data quality, including practical design patterns for remediating data quality Implement the 10 best data quality practices and the required capabilities for improving operations, compliance, and decision-making capabilities in the business An essential resource for data scientists, data analysts, business intelligence professionals, chief technology and data officers, and anyone else with a stake in collecting and using high-quality data, Data Quality: Empowering Businesses with Analytics and AI will also earn a place on the bookshelves of business leaders interested in learning more about what sets robust data apart from the rest.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 21
    ISBN: 9780738461052 , 0738461059
    Language: English
    Pages: 1 online resource (48 pages) , illustrations
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer networks Security measures ; Information technology Security measures ; Computer security Management ; Data protection
    Abstract: This IBM® blueprint publication focuses on early threat detection within a database environment by using IBM Security® Guardium® Data Protection and IBM QRadar® . It also highlights how to proactively start a cyber resilience workflow in response to a cyberattack or potential malicious user actions. The workflow that is presented here uses IBM Copy Services Manager as orchestration software to start IBM FlashSystem® Safeguarded Copy functions. The Safeguarded Copy creates an immutable copy of the data in an air-gapped form on the same IBM FlashSystem for isolation and eventual quick recovery. This document describes how to enable and forward Oracle database user activities (by using IBM Security Guardium Data Protection) and IBM FlashSystem audit logs by using IBM FlashSystem to IBM QRadar. This document also describes how to create various rules to determine a threat, and configure and launch a suitable response to the detected threat in IBM QRadar. The document also outlines the steps that are involved to create a Scheduled Task by using IBM Copy Services Manager with various actions.
    Note: Includes bibliographical references
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 22
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781837639540 , 183763954X
    Language: English
    Pages: 1 online resource (1 audio file (18 hr., 24 min.))
    Edition: Third edition.
    DDC: 005.71369
    Keywords: Microsoft Windows (Computer file) ; Directory services (Computer network technology) ; Computer networks Security measures ; Windows PowerShell (Computer program language) ; Data protection ; Audiobooks
    Abstract: Become an expert at managing enterprise identity infrastructure with Active Directory Domain Services 2022. About This Audiobook Design and update your identity infrastructure by utilizing the latest Active Directory features and core capabilities Overcome migration challenges as you update to Active Directory Domain Services 2022 Establish a strong identity foundation in the cloud by consolidating secure access In Detail Mastering Active Directory, Third Edition is a comprehensive guide for Information Technology professionals looking to improve their knowledge about MS Windows Active Directory Domain Service. The audiobook will help you to use identity elements effectively and manage your organization's infrastructure in a secure and efficient way. This third edition has been fully updated to reflect the importance of cloud-based strong authentication and other tactics to protect identity infrastructure from emerging security threats. Mastering Active Directory, Third Edition provides extensive coverage of AD Domain Services and helps you explore their capabilities as you update to Windows Server 2022. This audiobook will also teach you how to extend on-premises identity presence to cloud via Azure AD hybrid setup. By the end of this Microsoft Active Directory, you'll feel confident in your ability to design, plan, deploy, protect, and troubleshoot your enterprise identity infrastructure. Audience If you are an Active Directory administrator, system administrator, or IT professional who has basic knowledge of Active Directory and is looking to become an expert in this topic, this audiobook is for you. You need to have some experience of working with Active Directory to make the most of this audiobook.
    Note: Online resource; title from title details screen (O'Reilly, viewed April 4, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 23
    Online Resource
    Online Resource
    Shelter Island, New York : Manning Publications
    ISBN: 9781633438774 , 1633438775
    Language: English
    Pages: 1 online resource (xxvi, 163 pages) , illustrations
    Parallel Title: Erscheint auch als
    DDC: 658.05
    Keywords: Business Data processing ; Data protection ; Big data
    Abstract: The data you generate every day is the lifeblood of many large companies—and they make billions of dollars using it. In Data for All, bestselling author John K. Thompson outlines how this one-sided data economy is about to undergo a dramatic change. Thompson pulls back the curtain to reveal the true nature of data ownership, and how you can turn your data from a revenue stream for companies into a financial asset for your benefit.
    Note: Includes bibliographical references and index. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 24
    Online Resource
    Online Resource
    [Place of publication not identified] : IT Governance Publishing
    ISBN: 9781787784123 , 1787784126
    Language: English
    Pages: 1 online resource (1 audio file (2 hr., 11 min.))
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer security ; Computer crimes Prevention ; Data protection ; Computer crimes ; Prevention ; Computer security ; Data protection ; Audiobooks ; Audiobooks
    Abstract: An accessible introduction to the most prevalent cyber threats in our current climate, this book discusses cyber terrorism, phishing, and ransomware attacks, and provides advice on how to mitigate such threats in our personal and professional lives.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 28, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 25
    Online Resource
    Online Resource
    Hoboken, NJ : John Wiley & Sons, Inc.
    ISBN: 9781119906773
    Language: English
    Pages: 1 online resource (288 pages) , illustrations
    Edition: [First edition].
    Series Statement: For dummies
    DDC: 005.8
    Keywords: Data protection ; Data protection
    Abstract: Data Governance For Dummies offers an accessible first step for decision makers into understanding how data governance works and how to apply it to an organization in a way that improves results and doesn't disrupt. Prep your organization to handle the data explosion (if you know, you know) and learn how to manage this valuable asset. Take full control of your organization’s data with all the info and how-tos you need. This book walks you through making accurate data readily available and maintaining it in a secure environment. It serves as your step-by-step guide to extracting every ounce of value from your data. This is the perfect handbook for professionals in the world of data analysis and business intelligence, plus the people who interact with data on a daily basis. And, as always, Dummies explains things in terms anyone can understand, making it easy to learn everything you need to know.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 26
    ISBN: 9780738461175 , 0738461172
    Language: English
    Pages: 1 online resource (136 pages) , illustrations (some color)
    Edition: First edition.
    DDC: 005.8
    Keywords: Information technology Security measures ; Computer security Management ; Computer networks Security measures ; Data protection ; Computer networks ; Security measures ; Computer security ; Management ; Data protection ; Information technology ; Security measures
    Abstract: Non-compliance can lead to increasing costs. Regulatory violations involving data protection and privacy can have severe and unintended consequences. In addition, companies must keep pace with changes that arise from numerous legislative and regulatory bodies. Global organizations have the added liability of dealing with national and international-specific regulations. Proving that you are compliant entails compiling and organizing data from multiple sources to satisfy auditor's requests. Preparing for compliance audits can be a major time drain, and maintaining, updating, and adding new processes for compliance can be a costly effort. How do you keep constant changes to regulations and your security posture in check? It starts with establishing a baseline: knowing and understanding your current security posture, comparing it with IBM Z℗ʼ security capabilities, and knowing the latest standards and regulations that are relevant to your organization. IBM Z Security and Compliance Center can help take the complexity out of your compliance workflow and the ambiguity out of audits while optimizing your audit process to reduce time and effort. This IBM Redbooks℗ʼ publication helps you make the best use of IBM Z Security and Compliance Center and aid in mapping all the necessary IBM Z security capabilities to meet compliance and improve your security posture. It also shows how to regularly collect and validate compliance data, and identify which data is essential for auditors. After reading this document, you will understand how your organization can use IBM Z Security and Compliance Center to enhance and simplify your security and compliance processes and postures for IBM z/OS℗ʼ systems. This publication is for IT managers and architects, system and security administrators.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 27
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly Media, Inc.
    Language: English
    Pages: 1 online resource (400 pages) , illustrations
    Edition: First edition.
    DDC: 005.8
    Keywords: Computer networks Security measures ; Data protection ; Computer crimes Prevention
    Abstract: Why is it difficult for so many companies to get digital identity right? If you're still wrestling with even simple identity problems like modern website authentication, this practical book has the answers you need. Author Phil Windley provides conceptual frameworks to help you make sense of all the protocols, standards, and solutions available and includes suggestions for where and when you can apply them. By linking current social login solutions to emerging self-sovereign identity issues, this book explains how digital identity works and gives you a firm grasp on what's coming and how you can take advantage of it to solve your most pressing identity problems. VPs and directors will learn how to more effectively leverage identity across their businesses.
    Note: "Early release, raw & unedited.". - Includes bibliographical references
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 28
    Online Resource
    Online Resource
    Cham : Springer International Publishing | Cham : Springer
    ISBN: 9783031319068
    Language: English
    Pages: 1 Online-Ressource (XVIII, 334 p. 24 illus., 10 illus. in color)
    Edition: 3rd ed. 2023
    Series Statement: Undergraduate Topics in Computer Science
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    DDC: 303.4834
    Keywords: Computers and Society ; Data and Information Security ; Information Ethics ; Computer and Information Systems Applications ; Philosophy of Technology ; Computers and civilization ; Data protection ; Information technology—Moral and ethical aspects ; Application software ; Technology—Philosophy
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 29
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Manning Publications
    Language: Undetermined
    Pages: 1 online resource (1 audio file)
    DDC: 658/.05
    Keywords: Business Data processing ; Data protection ; Big data ; Gestion ; Informatique ; Protection de l'information (Informatique) ; Données volumineuses ; Big data ; Business ; Data processing ; Data protection ; Audiobooks ; Audiobooks ; Livres audio
    Abstract: Do you know what happens to your personal data when you are browsing, buying, or using apps? Discover how your data is harvested and exploited, and what you can do to access, delete, and monetize it. Data for All empowers everyone--from tech experts to the general public--to control how third parties use personal data. Read this eye-opening book to learn: The types of data you generate with every action, every day Where your data is stored, who controls it, and how much money they make from it How you can manage access and monetization of your own data Restricting data access to only companies and organizations you want to support The history of how we think about data, and why that is changing The new data ecosystem being built right now for your benefit The data you generate every day is the lifeblood of many large companies--and they make billions of dollars using it. In Data for All, bestselling author John K. Thompson outlines how this one-sided data economy is about to undergo a dramatic change. Thompson pulls back the curtain to reveal the true nature of data ownership, and how you can turn your data from a revenue stream for companies into a financial asset for your benefit. About the Technology Do you know what happens to your personal data when you're browsing and buying? New global laws are turning the tide on companies who make billions from your clicks, searches, and likes. This eye-opening book provides an inspiring vision of how you can take back control of the data you generate every day. About the Book Data for All gives you a step-by-step plan to transform your relationship with data and start earning a "data dividend"--hundreds or thousands of dollars paid out simply for your online activities. You'll learn how to oversee who accesses your data, how much different types of data are worth, and how to keep private details private. What's Inside The types of data you generate with every action, every day How you can manage access and monetization of your own data The history of how we think about data, and why that is changing The new data ecosystem being built right now for your benefit About the Reader For anyone who is curious or concerned about how their data is used. No technical knowledge required. About the Author John K. Thompson is an international technology executive with over 37 years of experience in the fields of data, advanced analytics, and artificial intelligence. Quotes An honest, direct, pull-no-punches source on one of the most important personal issues of our time....I changed some of my own behaviors after reading the book, and I suggest you do so as well. You have more to lose than you may think. - From the Foreword by Thomas H. Davenport, author of Competing on Analytics and The AI Advantage A must-read for anyone interested in the future of data. It helped me understand the reasons behind the current data ecosystem and the laws that are shaping its future. A great resource for both professionals and individuals. I highly recommend it. - Ravit Jain, Founder & Host of The Ravit Show, Data Science Evangelist.
    Note: Machine-generated record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 30
    Online Resource
    Online Resource
    New York, NY : Routledge | London : Taylor & Francis Group
    ISBN: 9781003244677 , 100324467X , 9781000896473 , 1000896471 , 9781000896459 , 1000896455
    Language: English
    Pages: 1 Online-Ressource
    DDC: 302.23/1
    Keywords: Social media and society ; Privacy ; Data protection ; SOCIAL SCIENCE / Media Studies ; Aufsatzsammlung
    Abstract: "This volume provides the basis for contemporary privacy and social media research and informs global as well as local initiatives to address issues related to social media privacy through research, policymaking, and education. Renowned scholars in the fields of communication, psychology, philosophy, informatics, and law look back on the last decade of privacy research and project how the topic will develop in the next decade. The text begins with an overview of key scholarship in online privacy, expands to focus on influential factors shaping privacy perceptions and behaviors-such as culture, gender, and trust-and continues with specific examinations of concerns around vulnerable populations such as children and older adults. It then looks at how privacy is managed and the implications of interacting with artificial intelligence, concluding by discussing feasible solutions to some of the more pressing questions surrounding online privacy. This handbook will be a valuable resource for advanced students, scholars, and policymakers in the fields of communication studies, digital media studies, psychology, and computer science"--...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 31
    ISBN: 1119866189 , 9781119866183
    Language: English
    Pages: 1 online resource
    DDC: 005.8
    Keywords: Data protection ; Computer security
    Abstract: Design, implement, and integrate a complete data sanitization program In Net Zeros and Ones: How Data Erasure Promotes Sustainability, Privacy, and Security, a well-rounded team of accomplished industry veterans delivers a comprehensive guide to managing permanent and sustainable data erasure while complying with regulatory, legal, and industry requirements. In the book, you'll discover the why, how, and when of data sanitization, including why it is a crucial component in achieving circularity within IT operations. You will also learn about future-proofing yourself against security breaches and data leaks involving your most sensitive information--all while being served entertaining industry anecdotes and commentary from leading industry personalities. The authors also discuss: Several new standards on data erasure, including the soon-to-be published standards by the IEEE and ISO How data sanitization strengthens a sustainability or Environmental, Social, and Governance (ESG) program How to adhere to data retention policies, litigation holds, and regulatory frameworks that require certain data to be retained for specific timeframes An ideal resource for ESG, data protection, and privacy professionals, Net Zeros and Ones will also earn a place in the libraries of application developers and IT asset managers seeking a one-stop explanation of how data erasure fits into their data and asset management programs.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 32
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Manning Publications
    Language: Undetermined
    Pages: 1 online resource (1 audio file)
    DDC: 658.4/78
    Keywords: Data protection ; Privacy, Right of ; Protection de l'information (Informatique) ; Audiobooks ; Livres audio
    Abstract: Engineer privacy into your systems with these hands-on techniques for data governance, legal compliance, and surviving security audits. In Data Privacy you will learn how to: Classify data based on privacy risk Build technical tools to catalog and discover data in your systems Share data with technical privacy controls to measure reidentification risk Implement technical privacy architectures to delete data Set up technical capabilities for data export to meet legal requirements like Data Subject Asset Requests (DSAR) Establish a technical privacy review process to help accelerate the legal Privacy Impact Assessment (PIA) Design a Consent Management Platform (CMP) to capture user consent Implement security tooling to help optimize privacy Build a holistic program that will get support and funding from the C-Level and board Data Privacy teaches you to design, develop, and measure the effectiveness of privacy programs. You'll learn from author Nishant Bhajaria, an industry-renowned expert who has overseen privacy at Google, Netflix, and Uber. The terminology and legal requirements of privacy are all explained in clear, jargon-free language. The book's constant awareness of business requirements will help you balance trade-offs, and ensure your user's privacy can be improved without spiraling time and resource costs. About the Technology Data privacy is essential for any business. Data breaches, vague policies, and poor communication all erode a user's trust in your applications. You may also face substantial legal consequences for failing to protect user data. Fortunately, there are clear practices and guidelines to keep your data secure and your users happy. About the Book Data Privacy: A runbook for engineers teaches you how to navigate the trade-off s between strict data security and real world business needs. In this practical book, you'll learn how to design and implement privacy programs that are easy to scale and automate. There's no bureaucratic process--just workable solutions and smart repurposing of existing security tools to help set and achieve your privacy goals. What's Inside Classify data based on privacy risk Set up capabilities for data export that meet legal requirements Establish a review process to accelerate privacy impact assessment Design a consent management platform to capture user consent About the Reader For engineers and business leaders looking to deliver better privacy. About the Author Nishant Bhajaria leads the Technical Privacy and Strategy teams for Uber. His previous roles include head of privacy engineering at Netflix, and data security and privacy at Google. Quotes I wish I had had this text in 2015 or 2016 at Netflix, and it would have been very helpful in 2008-2012 in a time of significant architectural evolution of our technology. - From the Foreword by Neil Hunt, Former CPO, Netflix Your guide to building privacy into the fabric of your organization. - John Tyler, JPMorgan Chase The most comprehensive resource you can find about privacy. - Diego Casella, InvestSuite Offers some valuable insights and direction for enterprises looking to improve the privacy of their data. - Peter White, Charles Sturt University.
    Note: Machine-generated record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 33
    ISBN: 9783031073151
    Language: English
    Pages: 1 Online-Ressource (XI, 135 p. 15 illus., 11 illus. in color)
    Edition: 1st ed. 2022
    Series Statement: Security and Cryptology 13279
    Parallel Title: Printed edition
    Parallel Title: Printed edition
    DDC: 303.4834
    Keywords: Computers and civilization ; Application software ; Computer networks  ; Computer systems ; Cryptography ; Data encryption (Computer science) ; Data protection
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 34
    ISBN: 9781801812818 , 1801812810
    Language: English
    Pages: 1 online resource (1 audio file (08 hr., 01 min.))
    Edition: [First edition].
    Series Statement: Expert insight
    DDC: 005.8
    Keywords: Computer security ; Data protection ; Computer crimes ; Audiobooks
    Abstract: Master cutting-edge techniques and countermeasures to protect your organization from live hackers. Learn how to harness cyber deception in your operations to gain an edge over the competition. About This Audiobook Gain an advantage against live hackers in a competition or real computing environment Understand advanced red team and blue team techniques with code examples Learn to battle in short-term memory, whether remaining unseen (red teams) or monitoring an attacker's traffic (blue teams) In Detail Little has been written about what to do when live hackers are on your system and running amok. Even experienced hackers tend to choke up when they realize the network defender has caught them and is zoning in on their implants in real time. This book will provide tips and tricks all along the kill chain of an attack, showing where hackers can have the upper hand in a live conflict and how defenders can outsmart them in this adversarial game of computer cat and mouse. This audiobook contains two subsections in each chapter, specifically focusing on the offensive and defensive teams. It begins by introducing you to adversarial operations and principles of computer conflict where you will explore the core principles of deception, humanity, economy, and more about human-on-human conflicts. Additionally, you will understand everything from planning to setting up infrastructure and tooling that both sides should have in place. Throughout this audiobook, you will learn how to gain an advantage over opponents by disappearing from what they can detect. You will further understand how to blend in, uncover other actors' motivations and means, and learn to tamper with them to hinder their ability to detect your presence. Finally, you will learn how to gain an advantage through advanced research and thoughtfully concluding an operation. By the end of this audiobook, you will have achieved a solid understanding of cyberattacks from both an attacker's and a defender's perspective. Audience Pentesters to red teamers, security operations center analysts to incident responders, attackers, defenders, general hackers, advanced computer users, and security engineers will benefit from this book. Participants in purple teaming or adversarial simulations will also learn a lot from its practical examples of processes for gaining an advantage over the opposing team. Basic knowledge of Python, Go, Bash, PowerShell, system administration as well as knowledge of incident response in Linux and prior exposure to any kind of cybersecurity knowledge, penetration testing, and ethical hacking basics will help you follow along.
    Note: Online resource; title from title details screen (O'Reilly, viewed October 4, 2022)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 35
    Online Resource
    Online Resource
    New York, NY : Springer New York
    ISBN: 9781071618677
    Language: English
    Pages: 1 online resource (571 pages) , Illustrationen, Diagramme
    Edition: Third edition
    Parallel Title: Erscheint auch als
    DDC: 302.30285
    Keywords: Data protection ; Facebook (Electronic resource) ; Facebook (Firm) ; Electronic books
    Abstract: Intro -- Acknowledgements -- About the Book -- Contents -- About the Author -- Part I: Prologue -- Chapter 1: From 1984 to Total Information Awareness -- 1.1 U.S. Capitol Riot on January 6, 2021 -- 1.2 President Ronald Reagan on April 3, 1984 -- 1.3 Total Information Awareness -- 1.4 Edward Snowden's NSA Leaks and PRISM -- 1.5 Social Networks' Responses to NSA Leaks and PRISM -- 1.6 Reform Government Surveillance and Reset the Net -- References -- Part II: Privacy in the Age of Big Data -- Chapter 2: Social Networks and Privacy -- 2.1 Zero Privacy and the Central Intelligence Agency -- 2.2 The Archer, Carrier Pigeons, and President Jimmy Carter -- 2.3 The Pervasiveness of Facebook -- 2.4 Chairs Are Like Facebook -- 2.5 Facebook and Personal Privacy -- 2.6 Facebook Friends and Personal Privacy -- 2.7 Facebook, Children, and COPPA -- 2.8 Netflix and Social Apps on Facebook -- 2.9 Facebook Timeline and Open Graph -- 2.10 Ambient Social Apps and Digital Surveillance -- 2.11 Stalking Apps and Badoo (aka Facebook for Sex) -- 2.12 Facial Recognition Apps -- 2.13 Facial Recognition on Facebook, Google, and iPhone -- 2.14 Virtual Passports: From Privacy to Data Use -- 2.15 Social Search: Google, plus Your World and Microsoft's Bing -- 2.16 Self-Destructing Messages -- 2.17 Facebook Anonymous Login -- 2.18 Anonymous Social Apps -- 2.19 Responses to Zero Privacy -- References -- Chapter 3: Smartphones and Privacy -- 3.1 Smartphones -- 3.2 Location Tracking on iPhone and iPad -- 3.3 Carrier IQ -- 3.4 Smartphone Data Collection Transparency -- 3.5 Always On -- 3.6 Mobile Apps Privacy Invasion -- 3.7 Mobile Apps for Children -- 3.8 Android Market and Google Play -- 3.9 Apple's App Store -- 3.10 Facebook App Center -- References -- Chapter 4: Privacy Breaches -- 4.1 Facebook's Massive Data Breaches -- 4.2 Google Street View -- 4.3 Google Easter Eggs in Disguise.
    Note: Description based on publisher supplied metadata and other sources
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 36
    Online Resource
    Online Resource
    [Place of publication not identified] : CRC Press
    ISBN: 9781003133308 , 1003133304 , 9781000530315 , 1000530310 , 9781000530308 , 1000530302
    Language: English
    Pages: 1 online resource (184 pages)
    Edition: First edition.
    Series Statement: Internal audit and IT audit
    Parallel Title: Erscheint auch als
    Keywords: Chief information officers ; Information technology Management ; Computer networks Security measures ; Computer security ; Data protection ; Computer Security ; Chefs des services de l'information ; Technologie de l'information ; Gestion ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Sécurité informatique ; Protection de l'information (Informatique) ; COMPUTERS ; Cryptography ; COMPUTERS ; Networking ; Security ; COMPUTERS ; Security ; Viruses ; Chief information officers ; Computer networks ; Security measures ; Computer security ; Data protection ; Information technology ; Management ; Electronic books
    Abstract: The Security Hippie is Barak Engel's second book. As the originator of the "Virtual CISO" (fractional security chief) concept, he has served as security leader in dozens of notable organizations, such as Mulesoft, Stubhub, Amplitude Analytics, and many others. The Security Hippie follows his previous book, Why CISOs Fail, which became a sleeper hit, earning a spot in the Cybercannon project as a leading text on the topic of information security management. In this new book, Barak looks at security purely through the lens of story-telling, sharing many and varied experiences from his long and accomplished career as organizational and thought leader, and visionary in the information security field. Instead of instructing, this book teaches by example, sharing many real situations in the field and actual events from real companies, as well as Barak's related takes and thought processes. An out-of-the-mainstream, counterculture thinker - Hippie - in the world of information security, Barak's rich background and unusual approach to the field come forth in this book in vivid color and detail, allowing the reader to sit back and enjoy these experiences, and perhaps gain insights when faced with similar issues themselves or within their organizations. The author works hard to avoid technical terms as much as possible, and instead focus on the human and behavioral side of security, finding the humor inherent in every anecdote and using it to demystify the field and connect with the reader. Importantly, these are not the stories that made the news; yet they are the ones that happen all the time. If you've ever wondered about the field of information security, but have been intimidated by it, or simply wished for more shared experiences, then The Security Hippie is the perfect way to open that window by accompanying Barak on some of his many travels into the land of security
    Note: Vendor-supplied metadata
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 37
    Language: English
    Pages: 1 online resource (44 pages) , color illustrations
    Edition: [First edition].
    DDC: 363.32/8028557
    Keywords: Computer networks Security measures ; Information technology Security measures ; Computer security Management ; Data protection ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Technologie de l'information ; Sécurité ; Mesures ; Sécurité informatique ; Gestion ; Protection de l'information (Informatique) ; Computer networks ; Security measures ; Computer security ; Management ; Data protection ; Information technology ; Security measures ; Electronic books
    Abstract: The focus of this blueprint is to highlight early threat detection by IBM℗ʼ QRadar℗ʼ and to proactively start a cyber resilience workflow in response to a cyberattack or malicious user actions. The workflow uses IBM Copy Services Manager (CSM) as orchestration software to start IBM DS8000℗ʼ Safeguarded Copy functions. The Safeguarded Copy creates an immutable copy of the data in an air-gapped form on the same DS8000 system for isolation and eventual quick recovery. This document also explains the steps that are involved to enable and forward IBM DS8000 audit logs to IBM QRadar. It also discusses how to use create various rules to determine a threat, and configure and start a suitable response to the detected threat in IBM QRadar. Finally, this document explains how to register a storage system and create a Scheduled Task by using CSM.
    Note: Includes bibliographical references
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 38
    Online Resource
    Online Resource
    Shelter Island, NY : Manning Publications
    ISBN: 9781633439986 , 1633439984
    Language: English
    Pages: 1 online resource (368 pages) , illustrations
    Edition: [First edition].
    DDC: 005.8
    Keywords: Microsoft .NET Framework ; Web sites Security measures ; Microsoft software ; Data protection ; Electronic books
    Abstract: ASP.NET Core Security teaches you the skills and countermeasures you need to keep your ASP.NET Core apps secure from the most common web application attacks. With this collection of practical techniques, you will be able to anticipate risks and introduce practices like testing as regular security checkups. You’ll be fascinated as the author explores real-world security breaches, including rogue Firefox extensions and Adobe password thefts. The examples present universal security best practices with a sharp focus on the unique needs of ASP.NET Core applications.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 39
    ISBN: 9780738460680 , 0738460680
    Language: English
    Pages: 1 online resource (190 pages) , illustrations
    Edition: [First edition].
    DDC: 005.8
    Keywords: Information technology Security measures ; Computer security Management ; Computer networks Security measures ; Data protection ; Electronic books
    Abstract: As cyberattacks continue to increase, the cost and reputation impacts of data breaches remain a top concern across all enterprises. Even if sensitive data is encrypted and is of no use now, cybercriminals are harvesting that data because they might gain access to a quantum computer that can break classical cryptographic algorithms sometime in the future. Therefore, organizations must start protecting their sensitive data today by using quantum-safe cryptography. This IBM® Redbooks® publication reviews some potential threats to classical cryptography by way of quantum computers and how to make best use of today's quantum-safe capabilities on the IBM Z platform. This book also provides guidance about how to get started on a quantum-safe journey and step-by-step examples for deploying IBM Z® quantum-safe capabilities. This publication is intended for IT managers, IT architects, system programmers, security administrators, and anyone who needs to plan for, deploy, and manage quantum-safe cryptography on the IBM Z platform. The reader is expected to have a basic understanding of IBM Z security concepts.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 40
    ISBN: 9780738460710 , 0738460710
    Language: English
    Pages: 1 online resource (44 pages) , illustrations
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer networks Security measures ; Information technology Security measures ; Computer security Management ; Data protection ; Electronic books
    Abstract: This IBM® blueprint publication focuses on early threat detection within a database environment by using IBM Security Guardium® Data Protection and IBM QRadar®. It also highlights how to proactively start a cyber resilience workflow in response to a cyberattack or potential malicious user actions. The workflow that is presented here uses IBM Copy Services Manager as orchestration software to start IBM FlashSystem® Safeguarded Copy functions. The Safeguarded Copy creates an immutable copy of the data in an air-gapped form on the same IBM FlashSystem for isolation and eventual quick recovery. This document describes how to enable and forward Oracle database user activities (by using IBM Security Guardium Data Protection) and IBM FlashSystem audit logs by using IBM FlashSystem to IBM QRadar. This document also describes how to create various rules to determine a threat, and configure and launch a suitable response to the detected threat in IBM QRadar. The document also outlines the steps that are involved to create a Scheduled Task by using IBM Copy Services Manager with various actions.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 41
    ISBN: 9781538155097 , 1538155095
    Language: English
    Pages: 1 online resource
    Parallel Title: Erscheint auch als
    DDC: 006.3
    Keywords: Artificial intelligence ; Information storage and retrieval systems Risk management ; Information technology Management ; Data privacy ; Data protection ; Artificial Intelligence ; Intelligence artificielle ; Systèmes d'information ; Gestion du risque ; Technologie de l'information ; Gestion ; Protection de l'information (Informatique) ; artificial intelligence ; Artificial intelligence ; Data privacy ; Data protection ; Information storage and retrieval systems ; Risk management ; Information technology ; Management
    Abstract: "The ability to hack AI and the technology industry's lack of effort to secure it is thought by experts to be the biggest unaddressed technology issue of our time. This book sheds light on the many hacking risks, encouraging readers to address problems before they become catastrophic"--
    Note: Includes bibliographical references and index. - Description based on print version record and CIP data provided by publisher; resource not viewed
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 42
    ISBN: 9781800208285 , 1800208286
    Language: English
    Pages: 1 online resource (528 p.) , color illustrations
    DDC: 658.15/5
    Keywords: Business enterprises Security measures ; Data protection ; Cyber intelligence (Computer security) ; Risk management ; Risk Management ; Entreprises ; Sécurité ; Mesures ; Protection de l'information (Informatique) ; Surveillance des menaces informatiques ; Gestion du risque ; risk management ; Electronic books
    Abstract: Develop the analytical skills to effectively safeguard your organization by enhancing defense mechanisms, and become a proficient threat intelligence analyst to help strategic teams in making informed decisions Key Features Build the analytics skills and practices you need for analyzing, detecting, and preventing cyber threats Learn how to perform intrusion analysis using the cyber threat intelligence (CTI) process Integrate threat intelligence into your current security infrastructure for enhanced protection Book Description The sophistication of cyber threats, such as ransomware, advanced phishing campaigns, zero-day vulnerability attacks, and advanced persistent threats (APTs), is pushing organizations and individuals to change strategies for reliable system protection. Cyber Threat Intelligence converts threat information into evidence-based intelligence that uncovers adversaries' intents, motives, and capabilities for effective defense against all kinds of threats. This book thoroughly covers the concepts and practices required to develop and drive threat intelligence programs, detailing the tasks involved in each step of the CTI lifecycle. You'll be able to plan a threat intelligence program by understanding and collecting the requirements, setting up the team, and exploring the intelligence frameworks. You'll also learn how and from where to collect intelligence data for your program, considering your organization level. With the help of practical examples, this book will help you get to grips with threat data processing and analysis. And finally, you'll be well-versed with writing tactical, technical, and strategic intelligence reports and sharing them with the community. By the end of this book, you'll have acquired the knowledge and skills required to drive threat intelligence operations from planning to dissemination phases, protect your organization, and help in critical defense decisions. What you will learn Understand the CTI lifecycle which makes the foundation of the study Form a CTI team and position it in the security stack Explore CTI frameworks, platforms, and their use in the program Integrate CTI in small, medium, and large enterprises Discover intelligence data sources and feeds Perform threat modelling and adversary and threat analysis Find out what Indicators of Compromise (IoCs) are and apply the pyramid of pain in threat detection Get to grips with writing intelligence reports and sharing intelligence Who this book is for This book is for security professionals, researchers, and individuals who want to gain profound knowledge of cyber threat intelligence and discover techniques to prevent varying types of cyber threats. Basic knowledge of cybersecurity and network fundamentals is required to get the most out of this book.
    Note: Description based upon print version of record. - AFI14-133 tradecraft standard for CTI
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 43
    Online Resource
    Online Resource
    Hoboken, New Jersey : Wiley
    ISBN: 9781119863120 , 1119863120 , 9781119863137 , 1119863139 , 9781119863113
    Language: English
    Pages: 1 online resource
    Edition: First edition.
    Parallel Title: Erscheint auch als
    DDC: 658.4/78
    Keywords: Data protection ; Computer security ; Computer networks Security measures ; Management information systems ; Computer crimes Risk assessment ; Computer networks ; Security measures ; Computer security ; Data protection ; Management information systems ; Electronic books
    Abstract: "This book offers any senior level executive an understanding of the core fundamentals of Cyber Risk, which is critical for any business to remain sustainable and viable in the information age era of disruptive cyber-attacks. For any executive to understand that Cyber Risk is like any other business risk, it needs to be explained in focused non-technical terms. The book provides core foundational precepts of cyber risk that will enable executive leadership to make well-informed decisions along with their senior cyber security executives regarding cyber risk management. In addition, describes the different approaches by executives to cyber risk. There are three types of executive leadership: (1) hindsight, (2) foresight, or (3) none of the two. This book shows how to be a cyber risk leader through foresight while maintaining the corporation's vision and objectives (proactive vs. reactive)"--
    Note: Includes bibliographical references and index. - Description based on print version record and CIP data provided by publisher; resource not viewed
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 44
    Online Resource
    Online Resource
    Ely, Cambridgeshire : IT Governance Publishing
    ISBN: 9781787783614 , 1787783618
    Language: English
    Pages: 1 online resource (108 pages)
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer security ; Computer crimes Prevention ; Data protection ; Electronic books
    Abstract: An accessible introduction to the most prevalent cyber threats in our current climate, this book discusses cyber terrorism, phishing, and ransomware attacks, and provides advice on how to mitigate such threats in our personal and professional lives.
    Note: Includes bibliographical references
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 45
    Online Resource
    Online Resource
    New York, NY : Springer New York | Ann Arbor, Michigan : ProQuest
    ISBN: 9781071618677
    Language: English
    Pages: 1 Online-Ressource (571 pages)
    Edition: 3rd ed.
    DDC: 302.30285
    Keywords: Data protection ; Facebook (Electronic resource) ; Facebook (Firm) ; Electronic books
    Note: Description based on publisher supplied metadata and other sources
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 46
    Online Resource
    Online Resource
    Singapore : Springer Nature Singapore | Cham : Springer International Publishing AG
    ISBN: 9789811633980 , 9811633983
    Language: English
    Pages: 1 Online-Ressource (XII, 442 Seiten) , 70 illus., 55 illus. in color.
    Edition: 1st ed. 2022
    Series Statement: Smart Innovation, Systems and Technologies 246
    Parallel Title: Erscheint auch als Principles of Social Networking
    DDC: 621.382
    Keywords: Telecommunication ; Social media ; Data protection ; Artificial intelligence ; Communications Engineering, Networks ; Social Media ; Data and Information Security ; Artificial Intelligence
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 47
    ISBN: 9783031073151
    Language: English
    Pages: 1 Online-Ressource (xi, 135 Seiten) , 15 Illustrationen, 11 in Farbe
    Series Statement: Lecture notes in computer science 13279
    Series Statement: Security and cryptology
    Series Statement: Lecture notes in computer science
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    DDC: 303.4834
    RVK:
    Keywords: Computers and Society ; Computer and Information Systems Applications ; Computer Communication Networks ; Computer System Implementation ; Cryptology ; Data and Information Security ; Computers and civilization ; Application software ; Computer networks  ; Computer systems ; Cryptography ; Data encryption (Computer science) ; Data protection ; Konferenzschrift 2022 ; Konferenzschrift 2022
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 48
    Online Resource
    Online Resource
    Berlin, Heidelberg : Springer Berlin Heidelberg | Berlin, Heidelberg : Imprint: Springer
    ISBN: 9783662645024
    Language: English
    Pages: 1 Online-Ressource (XIII, 195 p. 14 illus.)
    Series Statement: Springer eBook Collection
    Uniform Title: Die Rückseite der Cloud
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    Keywords: Datenschutz ; Cloud Computing ; Theorie ; Economics. ; Big Data ; Privacy ; Secret ; Cloud ; Digital Transformation ; Digital Age ; Facebook ; DSGVO ; Data protection
    Abstract: Introduction: The reverse side of the cloud -- Part 1: The secret private - introduction and derivation -- "Privacy is dead": How could it come to this?- Part 2: Symptoms of the structural change of the private -- Symptoms of an immanent digital omniscience -- Part 3: Theory of the structural change of the private -- Functional systematics of the structural change of the private -- Summary of the theory or: Thoughts are free - but no longer secret -- Conclusions -- Outlook: Digital authenticity - an immersive consumer experience.
    Abstract: Our thoughts are free - but they are no longer secret. Today, our data is automatically stored and analyzed by algorithms behind the cloud - where we no longer have control over our data. Our most private and secret information is entrusted to the internet and permanently collected, stacked and linked to our digital twins. With and without our consent. "Privacy is dead", as Mark Zuckerberg put it. How could it come to this? And, if everyone knows everything: what is still private today, and are there any personal secrets at all when the "gods" behind the cloud know us better than our friends and family? The book uses a wealth of case studies (e.g. cryptocurrencies, journalism, digital traces of sexual preferences) to develop a typology of privacy in the history of ideas and shows the areas of life in which big data and artificial intelligence have already made inroads. This book is a translation of the original German 2nd edition Die Rückseite der Cloud by Peter Seele and Lucas Zapf, published by Springer-Verlag GmbH Germany, part of Springer Nature in 2020. The translation was done with the help of artificial intelligence (machine translation by the service DeepL.com). A subsequent human revision was done primarily in terms of content, so that the book will read stylistically differently from a conventional translation. The Authors Peter Seele is Professor of Business Ethics at the University of Italian Switzerland, USI Lugano, trained as a philosopher and economist. Twitter: PeterSeele Lucas Zapf is a postdoctoral researcher, religious economist, and interdisciplinary humanities scholar working at the University of Basel and the University of Applied Sciences, Brugg (CH). Also by the authors: '"Der Markt" existiert nicht. Aufklärung gegen die Marktvergötterung' ('"The Market" Doesn't Exist. Enlightenment against the Deification of the Market') (2017).
    Note: This book is a translation of the original German edition "Die Rückseite der Cloud" by Seele, Peter, published by Springer-Verlag GmbH Germany in 2020. The translation was done with the help of artificial intelligence (machine translation by the service DeepL.com)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 49
    Orig.schr. Ausgabe: 第1版.
    Title: Google 系统架构解密 : : 构建安全可靠的系统 = Building secure and reliable systems /
    Publisher: 人民邮电出版社,
    ISBN: 9787115569257 , 7115569258
    Language: Chinese
    Pages: 1 online resource , illustrations
    Edition: Di 1 ban.
    Uniform Title: Building secure and reliable systems
    DDC: 005.8
    Keywords: Computer networks Security measures ; Computer science ; Information storage and retrieval systems ; Software engineering ; Information technology ; Data protection ; Electronic books
    Abstract: Detailed summary in vernacular field.
    Note: 880-05;O'Reilly Media, Inc shou quan chu ban
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 50
    ISBN: 9781000413250 , 100041325X , 9781003090441 , 1003090443 , 9781000413205 , 1000413209
    Language: English
    Pages: 1 online resource (515 pages)
    Edition: Third edition.
    Parallel Title: Erscheint auch als
    Keywords: Business Data processing ; Security measures ; Computer security ; Data protection ; Risk assessment ; Computer Security ; Risk Assessment ; Gestion ; Informatique ; Sécurité ; Mesures ; Sécurité informatique ; Protection de l'information (Informatique) ; Évaluation du risque ; risk assessment ; BUSINESS & ECONOMICS ; Insurance ; Risk Assessment & Management ; BUSINESS & ECONOMICS ; Management ; COMPUTERS ; Networking ; Security ; Business ; Data processing ; Security measures ; Computer security ; Data protection ; Risk assessment
    Abstract: Conducted properly, information security risk assessments provide managers with the feedback needed to manage risk through the understanding of threats to corporate assets, determination of current control vulnerabilities, and appropriate safeguards selection. Performed incorrectly, they can provide the false sense of security that allows potential threats to develop into disastrous losses of proprietary information, capital, and corporate value. Picking up where its bestselling predecessors left off, The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments, Third Edition gives you detailed instruction on how to conduct a security risk assessment effectively and efficiently, supplying wide-ranging coverage that includes security risk analysis, mitigation, and risk assessment reporting. The third edition has expanded coverage of essential topics, such as threat analysis, data gathering, risk analysis, and risk assessment methods, and added coverage of new topics essential for current assessment projects (e.g., cloud security, supply chain management, and security risk assessment methods). This handbook walks you through the process of conducting an effective security assessment, and it provides the tools, methods, and up-to-date understanding you need to select the security measures best suited to your organization. Trusted to assess security for small companies, leading organizations, and government agencies, including the CIA, NSA, and NATO, Douglas J. Landoll unveils the little-known tips, tricks, and techniques used by savvy security professionals in the field. It includes features on how to Better negotiate the scope and rigor of security assessments Effectively interface with security assessment teams Gain an improved understanding of final report recommendations Deliver insightful comments on draft reports This edition includes detailed guidance on gathering data and analyzes over 200 administrative, technical, and physical controls using the RIIOT data gathering method; introduces the RIIOT FRAME (risk assessment method), including hundreds of tables, over 70 new diagrams and figures, and over 80 exercises; and provides a detailed analysis of many of the popular security risk assessment methods in use today. The companion website (infosecurityrisk.com) provides downloads for checklists, spreadsheets, figures, and tools.
    Note: Includes bibliographical references and index. - Online resource; title from digital title page (viewed on September 21, 2021)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 51
    ISBN: 9783030766634 , 3030766632
    Language: English
    Pages: 1 Online-Ressource (IX, 169 Seiten) , 33 illus., 22 illus. in color.
    Edition: 1st ed. 2021
    Series Statement: Security and Cryptology 12703
    Parallel Title: Erscheint auch als Privacy Technologies and Policy
    DDC: 3,034,834
    Keywords: Computers and civilization ; Computer engineering ; Computer networks  ; Data protection ; Information storage and retrieval systems ; Computers and Society ; Computer Engineering and Networks ; Data and Information Security ; Information Storage and Retrieval
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 52
    Book
    Book
    Cambridge, UK ; Medford, MA :Polity Press,
    ISBN: 978-1-5095-3641-2 , 978-1-5095-3642-9 , 1-5095-3642-6
    Language: English
    Pages: 154 Seiten ; , 22 cm.
    Parallel Title: Online version Lupton, Deborah Data selves
    DDC: 303.48/33
    RVK:
    RVK:
    RVK:
    Keywords: Information society ; Personal information management / Social aspects ; Self-monitoring ; Electronic surveillance / Social aspects ; Digital media / Social aspects ; Online social networks ; Data protection ; Feminist theory ; Materialism ; Databescherming ; Digitale systemen ; Informatiemaatschappij ; Sociale aspecten ; Internet. ; Digitale Daten. ; Datenschutz. ; Privatsphäre. ; Internet ; Digitale Daten ; Datenschutz ; Privatsphäre
    Abstract: "As people use self-tracking devices and other digital technologies, they generate increasing quantities of personal information online. Lupton develops a fresh and intriguing perspective on how people make sense of and use their personal data, and what they know about others who use this information"--
    Description / Table of Contents: More-than-human perspectives -- Materialising data -- Doing data -- Sharing and exploiting data -- Final thoughts
    URL: Cover
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 53
    ISBN: 9783030628031 , 3030628035
    Language: English
    Pages: 1 Online-Ressource (XI, 409 Seiten) , 47 illus., 33 illus. in color.
    Edition: 1st ed. 2020
    Series Statement: IFIP Advances in Information and Communication Technology 590
    Parallel Title: Erscheint auch als Human-Centric Computing in a Data-Driven Society
    DDC: 303.4834
    Keywords: Computers and civilization ; Data protection ; Artificial intelligence ; Computer engineering ; Computer networks  ; Application software ; Computers and Society ; Data and Information Security ; Artificial Intelligence ; Computer Engineering and Networks ; Computer and Information Systems Applications
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 54
    Online Resource
    Online Resource
    Piscataway, N.J : IEEE Communications Society
    ISBN: 9781728177533 , 1728177537
    Language: English
    Pages: Online-Ressource (1 Videodatei, 24 min.) , sound, color
    DDC: 303.48/33
    Keywords: Information technology ; Information technology Social aspects ; Data protection ; Data protection ; Information technology ; Information technology ; Social aspects ; Film ; Künstliche Intelligenz ; Digitalisierung ; Informationstechnik ; Datensicherung
    Abstract: This course explores a comprehensive and holistic approach for the responsible use and development of technology, and how the responsible use and development of technology fosters learning and wellness outcomes. Topics include why children and student data are valuable and require protection and data governance, achieving better outcomes from technology today, and how to be better prepared to create, build, acquire, and implement new technology tomorrow.
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 55
    ISBN: 9783030551964 , 3030551962
    Language: English
    Pages: 1 Online-Ressource (X, 213 Seiten) , 7 illus.
    Edition: 1st ed. 2020
    Series Statement: Security and Cryptology 12121
    Parallel Title: Erscheint auch als Privacy Technologies and Policy
    DDC: 3,034,834
    Keywords: Computers and civilization ; Application software ; Data protection ; Computers ; Cryptography ; Data encryption (Computer science) ; Computers and Society ; Computer and Information Systems Applications ; Security Services ; Computing Milieux ; Cryptology
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 56
    ISBN: 9783030375454 , 3030375455
    Language: English
    Pages: 1 Online-Ressource (X, 237 Seiten) , 53 illus., 33 illus. in color.
    Edition: 1st ed. 2020
    Series Statement: Communications in Computer and Information Science 1111
    Parallel Title: Erscheint auch als E-Democracy – Safeguarding Democracy and Human Rights in the Digital Age
    DDC: 3,034,834
    Keywords: Computers and civilization ; Application software ; Data protection ; Computer engineering ; Computer networks  ; Database management ; Social sciences Data processing ; Computers and Society ; Computer and Information Systems Applications ; Data and Information Security ; Computer Engineering and Networks ; Database Management ; Computer Application in Social and Behavioral Sciences
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 57
    Online Resource
    Online Resource
    Singapore : Springer Nature Singapore | Cham : Springer International Publishing AG
    ISBN: 9789811516757 , 9811516758
    Language: English
    Pages: 1 Online-Ressource (X, 108 Seiten) , 81 illus., 54 illus. in color.
    Edition: 1st ed. 2020
    Series Statement: IITK Directions 4
    Parallel Title: Erscheint auch als Cyber Security in India
    DDC: 303,483
    Keywords: Technology Sociological aspects ; Data protection ; Telecommunication ; Data structures (Computer science) ; Information theory ; Technical education ; Science, Technology and Society ; Data and Information Security ; Communications Engineering, Networks ; Data Structures and Information Theory ; Engineering and Technology Education
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 58
    Language: English
    Pages: 1 online resource (1 volume)
    Keywords: Data protection ; Privacy, Right of ; Corporate culture ; Trust ; Social aspects ; Electronic books ; Electronic books ; local
    Abstract: Beliefs and behaviors in today's virtual world blur the definitions and boundaries of responsibility for data privacy, which is reshaping consumers' expectations of protection. Organizations seeking to adapt their culture toward better digital trust face many challenges but can benefit from four activities in their journey toward better digital trust.
    Note: Place of publication from publisher's website. - "Reprint 60430.". - Includes bibliographical references. - Description based on online resource; title from cover (Safari, viewed June 5, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 59
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Edition: First edition.
    Keywords: Web applications ; Security measures ; Data protection ; Malware (Computer software) ; Electronic books ; Electronic books ; local
    Abstract: Despite deploying the latest security technologies, organizations still struggle to defend cloud-based web applications against sophisticated cyberattacks. Many companies have turned to the popular defense-in-depth (DiD) technique, but this multilayered approach has its shortcomings. So where is the industry headed next? This insightful ebook demonstrates a new approach to DiD that enables current security tools to operate in concert rather than independently. Stephen Gates, edge security evangelist and SME at Oracle Dyn, shows you how companies can establish integrated lines of defense similar to the way in which modern militaries operate on the battlefield. By the end of this book, CSOs, CISOs, security managers, and other professionals will understand how to implement the recommendations in this book today using the security technologies they already have in place. With this ebook, you'll examine: Why today's security technologies alone aren't enough to protect web applications How the existing approach to DiD for cybersecurity falls short of its goals An example of how the modern military uses integrated lines of defense that work in concert Eight lines of defense-including edge routers, DDoS defenses, and WAFs-that are best for protecting cloud-based web applications Ways to use automation and supervised machine learning to integrate your security approaches
    Note: Description based on online resource; title from title page (viewed May 16, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 60
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781838648374
    Language: English
    Pages: 1 online resource (1 streaming video file (8 hr., 17 min., 38 sec.)) , digital, sound, color
    Keywords: Computer security ; Computer networks ; Security measures ; Data protection ; Mobile computing ; Employees ; Training of ; Electronic videos ; local
    Abstract: "It's one of today's most important mobility challenges: How do you empower employees to be productive, while still protecting the massive amounts of data moving through your organization's mobile environment? Microsoft Enterprise Mobility + Security (EMS) provides the mobile productivity your employees want and the data protection your company needs. Through our EMS Learning Path, learn how EMS provides the tools to achieve both, providing your organization maximum mobile productivity. By taking this course, you will learn how to meet the challenges of enhancing the security and communications of your employees without interrupting workflow across users, devices, and apps."--Resource description page.
    Note: Title from resource description page (Safari, viewed May 9, 2019). - Presenter's name from title screen
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 61
    ISBN: 9783030337162 , 3030337162
    Language: English
    Pages: 1 Online-Ressource (X, 225 Seiten) , 159 illus., 18 illus. in color.
    Edition: 1st ed. 2019
    Series Statement: IFIP Advances in Information and Communication Technology 563
    Parallel Title: Erscheint auch als Trust Management XIII
    DDC: 303.4834
    Keywords: Computers and civilization ; Data protection ; Application software ; Computer networks  ; Computers and Society ; Data and Information Security ; Security Services ; Computer and Information Systems Applications ; Computer Communication Networks
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 62
    ISBN: 9783030217525 , 3030217523
    Language: English
    Pages: 1 Online-Ressource (XII, 211 Seiten) , 45 illus., 27 illus. in color.
    Edition: 1st ed. 2019
    Series Statement: Security and Cryptology 11498
    Parallel Title: Erscheint auch als Privacy Technologies and Policy
    DDC: 3,034,834
    Keywords: Computers and civilization ; Data protection ; Application software ; Operating systems (Computers) ; Computers and Society ; Data and Information Security ; Computer and Information Systems Applications ; Security Services ; Operating Systems
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 63
    ISBN: 9783030275471 , 3030275477
    Language: English
    Pages: 1 Online-Ressource (XI, 449 Seiten) , 283 illus., 199 illus. in color.
    Edition: 1st ed. 2019
    Series Statement: Communications in Computer and Information Science 1049
    Parallel Title: Erscheint auch als Development of Transport by Telematics
    DDC: 3,034,834
    Keywords: Computers and civilization ; Computer networks  ; Education Data processing ; Social sciences Data processing ; Computer vision ; Data protection ; Computers and Society ; Computer Communication Networks ; Computers and Education ; Computer Application in Social and Behavioral Sciences ; Computer Vision ; Data and Information Security
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 64
    ISBN: 9783848752225 , 3845294027 , 3848752220 , 3845294027 , 9783848752225 , 9783845294025
    Language: English
    Pages: 1 Online-Ressource
    Edition: 1st edition
    Series Statement: MIPLC studies 35
    Parallel Title: Print version KULHARI, SHRADDHA BUILDING-BLOCKS OF A DATA PROTECTION REVOLUTION
    DDC: 005.8
    Keywords: Blockchains (Databases) ; Database security ; Data protection ; Blockchains (Databases) ; Database security ; Data protection ; Electronic books ; Blockchains (Databases) ; Data protection ; Database security
    Note: Includes bibliographical references
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 65
    ISBN: 9783848748976 , 3845290846 , 3848748975 , 3845290846 , 9783848748976 , 9783845290843
    Language: English
    Pages: 1 Online-Ressource (675 pages)
    Series Statement: Schriften zur rechtswissenschaftlichen Innovationsforschung Band 12
    Parallel Title: Print version Grafenstein, Maximilian von Principle of purpose limitation in data protection laws
    Dissertation note: Based on author's thesis (doctoral)
    Keywords: Data protection Law and legislation ; Data protection ; Data protection ; Law and legislation ; LAW ; Constitutional ; Hochschulschrift
    Abstract: "This [book] examines the principle of purpose limitation in data protection law from the perspective of regulating data-driven innovation. According to this approach, the principle of purpose limitation not only protects an individual's autonomy but simultaneously leaves sufficient room for data controllers to innovate when finding the best solution for protection. The first component of the principle of purpose limitation (i.e. to specify the purpose of data processing) is a precautionary protection instrument which obliges the controller to identify specific risks arising from its processing against all fundamental rights of the data subject. In contrast, the second component (i.e. the requirement to limit data processing to the preceding purpose) aims to control the risk caused by data processing that occurred at a later stage and adds to the risks which were previously identified. This approach provides an answer to the question of how the General Data Protection Regulation which does not only effectively protect an individual's autonomy but also helps controllers to turn their legal compliance into a mechanism that enhances innovation, should be interpreted with regard to all the fundamental rights of the data subject."--
    Description / Table of Contents: Introduction -- Conceptual definitions as a link for regulation -- The function of the principle of purpose limitation in light of Article 8 ECFR and further fundamental rights -- Empirical approach in order to assist answering open legal questions -- Final conclusion: The principle of purpose limitation can not only be open towards but also enhancing innovation.
    Note: Includes bibliographical references (pages 655-675)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 66
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: 1st edition.
    Series Statement: IBM redbooks
    Keywords: Computer networks ; Security measures ; Information technology ; Security measures ; Computer security ; Management ; Data protection ; Electronic books ; Electronic books ; local
    Abstract: Abstract With the advances of technology and the reoccurrence of data leaks, cyber security is a bigger challenge than ever before. Cyber attacks evolve as quickly as the technology itself, and hackers are finding more innovative ways to break security controls to access confidential data and to interrupt services. Hackers reinvent themselves using new technology features as a tool to expose companies and individuals. Therefore, cyber security cannot be reactive but must go a step further by implementing proactive security controls that protect one of the most important assets of every organization: the company's information. This IBM® Redbooks® publication provides information about implementing IBM QRadar® for Security Intelligence and Event Monitoring (SIEM) and protecting an organization's networks through a sophisticated technology, which permits a proactive security posture. It is divided in to the following major sections to facilitate the integration of QRadar with any network architecture: Chapter 2, "Before the installation" on page 3 provides a review of important requirements before the installation of the product. Chapter 3, "Installing IBM QRadar V7.3" on page 57 provides step-by-step procedures to guide you through the installation process. Chapter 4, "After the installation" on page 77 helps you to configure additional features and perform checks after the product is installed. QRadar is an IBM Security prime product that is designed to be integrated with corporate network devices to keep a real-time monitoring of security events through a centralized console. Through this book, any network or security administrator can understand the product's features and benefits.
    Note: Number on resource description page: SG24841200. - Includes bibliographical references. - Description based on online resource; title from cover (Safari, viewed January 31, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 67
    ISBN: 9780134755885 , 013475588X
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Keywords: Information technology ; Security measures ; Computer security ; Management ; Computer networks ; Security measures ; Data protection ; Electronic books ; Electronic books ; local
    Abstract: Investigating the Cyber Breach The Digital Forensics Guide for the Network Engineer Understand the realities of cybercrime and today's attacks Build a digital forensics lab to test tools and methods, and gain expertise Take the right actions as soon as you discover a breach Determine the full scope of an investigation and the role you'll play Properly collect, document, and preserve evidence and data Collect and analyze data from PCs, Macs, IoT devices, and other endpoints Use packet logs, NetFlow, and scanning to build timelines, understand network activity, and collect evidence Analyze iOS and Android devices, and understand encryption-related obstacles to investigation Investigate and trace email, and identify fraud or abuse Use social media to investigate individuals or online identities Gather, extract, and analyze breach data with Cisco tools and techniques Walk through common breaches and responses from start to finish Choose the right tool for each task, and explore alternatives that might also be helpful The professional's go-to digital forensics resource for countering attacks right now Today, cybersecurity and networking professionals know they can't possibly prevent every breach, but they can substantially reduce risk by quickly identifying and blocking breaches as they occur. Investigating the Cyber Breach: The Digital Forensics Guide for the Network Engineer is the first comprehensive guide to doing just that. Writing for working professionals, senior cybersecurity experts Joseph Muniz and Aamir Lakhani present up-to-the-minute techniques for hunting attackers, following their movements within networks, halting exfiltration of data and intellectual property, and collecting evidence for investigation and prosecution. You'll learn how to make the most of today's best open source and Cisco tools for cloning, data analytics, network and endpoint breach detection, case management, monitoring, analysis, and more. Unlike digital forensics books focused primarily on post-attack evidence gathering, this one offers complete coverage of tracking threats, improving intelligence, rooting out dormant malware, and responding effectively to breaches underway right now. This book is part of the Networking Technology: Security Series from Cisco Press®, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.
    Note: Includes bibliographical references. - Description based on online resource; title from title page (viewed January 18, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 68
    ISBN: 978-3-658-22816-3
    Language: German
    Pages: 1 Online-Ressource (XXV, 243 Seiten 59 Abb., 50 Abb. in Farbe).
    Series Statement: Xpert.press
    Series Statement: Xpert.press
    Parallel Title: Erscheint auch als
    DDC: 005.8
    RVK:
    RVK:
    RVK:
    Keywords: Systems and Data Security ; Information Systems Applications (incl. Internet) ; Computational Social Sciences ; Democracy ; Data protection ; Social sciences—Data processing ; Social sciences—Computer programs ; Democracy ; World Wide Web. ; Mensch-Maschine-Kommunikation. ; Trusted Computing. ; Personenbezogene Daten. ; Anonymisierung. ; Dezentralisation. ; Digitalisierung. ; Transformation. ; Geschäftsmodell. ; World Wide Web ; Mensch-Maschine-Kommunikation ; Trusted Computing ; Personenbezogene Daten ; Anonymisierung ; Dezentralisation ; Digitalisierung ; Transformation ; Geschäftsmodell
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 69
    ISBN: 978-3-658-21621-4
    Language: German
    Pages: 1 Online-Ressource (XXI, 215 Seiten 40 Abb., 34 Abb. in Farbe).
    Parallel Title: Erscheint auch als
    DDC: 004
    RVK:
    RVK:
    RVK:
    Keywords: Computers and Society ; Systems and Data Security ; Legal Aspects of Computing ; Political Communication ; Computer science ; Data protection ; Computers / Law and legislation ; Political communication ; Bürgerbeteiligung. ; Partizipation. ; Privatsphäre. ; Neue Medien. ; Aufsatzsammlung ; Bürgerbeteiligung ; Partizipation ; Privatsphäre ; Bürgerbeteiligung ; Neue Medien
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 70
    Online Resource
    Online Resource
    [Place of publication not identified] : O'Reilly
    Language: English
    Pages: 1 online resource (1 streaming video file (22 min., 59 sec.)) , digital, sound, color
    Keywords: Computer security ; Data protection ; Electronic videos ; local
    Abstract: "Creating and implementing an effective online security plan is vital in keeping a business safe, but how can the non-technical business manager participate in such planning without the language and understanding required to do so? In this course, Emmanuel Henri explores the basics of cybersecurity from a layman's perspective. He discusses what cybersecurity is and why it's important; he details the conversations managers must have with their teams to set the proper security initiatives and hire the proper staff; he explores the cybersecurity resources managers can easily tap into; and finishes by demonstrating the ways cybersecurity measures are applied in real life."--Resource description page.
    Note: Title from title screen (Safari, viewed February 11, 2019). - Release date from resource description page (Safari, viewed February 11, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 71
    Online Resource
    Online Resource
    Ely, Cambridgeshire, United Kingdom : IT Governance Publishing
    ISBN: 9781849289597 , 184928959X
    Language: English
    Pages: 1 online resource (92 pages)
    Keywords: Computer security ; Management ; Information resources management ; Database security ; Data protection ; Electronic books ; Electronic books ; local
    Abstract: "I loved the quotes at the beginning of each chapter - very interesting and thought-provoking. I also enjoyed the author's style and his technical expertise shone through," Christopher Wright, Wright CandA Consulting Ltd. Protecting critical information infrastructure (CII) is not an easy process. Risks need to be minimised and systems adequately protected. It is an endless balancing act, where one side is constantly on the defensive and the other on the offensive. Lessons Learned: Critical Information Infrastructure Protection aims to help you be as successful as possible in protecting your CII, and do so quickly with minimum effort, irrespective of whether you work for a critical infrastructure service provider, a company that organises the provision of critical infrastructure services, or a company that serves critical service providers. Drawing on more than 20 years of experience in the IT and cyber security sectors, the author defines critical infrastructure services and provides structured lessons for each chapter, summarising each with key takeaways, including how to: Describe the critical infrastructure service and determine its service level; Identify and analyse the interconnections and dependencies of information systems; Create a functioning organisation to protect CII; and Train people to make sure they are aware of cyber threats and know the correct behaviour. The key message - organisations must be prepared to provide critical infrastructure services without IT systems - is reinforced in the final chapter: "We must have some way of continuing to work even if computers fail", writes Mikko Hypponen. Understand how you can protect your organisation's critical information infrastructure.
    Note: Includes bibliographical references. - Description based on online resource; title from title page (Safari, viewed February 28, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 72
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781789342420
    Language: English
    Pages: 1 online resource (1 streaming video file (3 hr., 4 min., 32 sec.)) , digital, sound, color
    Keywords: Apache Kafka ; Application software ; Development ; Data encryption (Computer science) ; Application program interfaces (Computer software) ; Cloud computing ; Computer security ; Information technology ; Security measures ; Computer security ; Management ; Computer networks ; Security measures ; Data protection ; Electronic videos ; local
    Abstract: "Learn Kafka Security, with encryption (SSL), authentication (SSL & SASL), and authorization (ACL). Join hundreds of knowledge savvy students into learning some of the most important security concepts in a typical Apache Kafka stack. Kafka Security is important for the following reasons: Encryption (SSL) for Apache Kafka; Authentication (SSL & SASL) for Apache Kafka; Authorization (ACL) for Apache Kafka."--Resource description page.
    Note: Title from resource description page (Safari, viewed June 18, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 73
    Language: English
    Pages: 1 online resource (1 volume)
    Edition: First edition.
    Keywords: Web applications ; Security measures ; Data protection ; Malware (Computer software) ; Electronic books ; Electronic books ; local
    Abstract: Most enterprise applications today live on the network edge, right where attackers are focusing increasing attention and activities to gain access to your data. This practical report helps analyze your company's vulnerabilities to common web application security threats, such as malicious bots, application exploits, API attacks, DDoS attacks, and server-based malware. You'll learn proactive steps to implement services and strategies designed to protect online enterprise applications at the user edge. Authors Stephen Gates, edge security evangelist and SME at Oracle Dyn, and Allan Liska, threat intelligence architect at Recorded Future, explore how advanced DNS services, web application firewall (WAF) services, bot management, API security, DDoS defenses, and malware protection solutions combine to protect your sites and applications from malicious attacks and bad actors. Understand the current web application threats landscape Prioritize availability, confidentiality, and integrity and manage associated security risks Explore the role of DNS in maintaining availability Learn how to approach cloud-based web application security Plan your strategy with a web application security checklist
    Note: Description based on online resource; title from title page (Safari, viewed April 10, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 74
    Online Resource
    Online Resource
    Wiesbaden : Springer Fachmedien Wiesbaden | Cham : Springer International Publishing AG
    ISBN: 9783658216214 , 3658216212
    Language: German
    Pages: 1 Online-Ressource (XXI, 215 Seiten) , 40 Abb., 34 Abb. in Farbe.
    Edition: 1st ed. 2018
    Parallel Title: Erscheint auch als Digitale Bürgerbeteiligung
    DDC: 303.4834
    Keywords: Bürgerbeteiligung ; Neue Medien ; Computers and civilization ; Data protection ; Computers Law and legislation ; Information technology Law and legislation ; Communication in politics ; Computers and Society ; Data and Information Security ; Legal Aspects of Computing ; Political Communication ; Aufsatzsammlung
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 75
    Online Resource
    Online Resource
    Cham : Springer International Publishing | Cham : Springer International Publishing AG
    ISBN: 9783319952765 , 3319952765
    Language: English
    Pages: 1 Online-Ressource (IX, 161 Seiten) , 32 illus.
    Edition: 1st ed. 2018
    Series Statement: IFIP Advances in Information and Communication Technology 528
    Parallel Title: Erscheint auch als Trust Management XII
    DDC: 303.4834
    Keywords: Computers and civilization ; Data protection ; Artificial intelligence ; Social sciences Data processing ; Computers and Society ; Data and Information Security ; Artificial Intelligence ; Computer Application in Social and Behavioral Sciences
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 76
    ISBN: 9781119226062 , 1119226066
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Parallel Title: Erscheint auch als
    Keywords: Computer networks ; Security measures ; Data protection ; Computer security ; Electronic books ; local
    Abstract: Written by a team of experts at the forefront of the cyber-physical systems (CPS) revolution, this book provides an in-depth look at security and privacy, two of the most critical challenges facing both the CPS research and development community and ICT professionals. It explores, in depth, the key technical, social, and legal issues at stake, and it provides readers with the information they need to advance research and development in this exciting area. Cyber-physical systems (CPS) are engineered systems that are built from, and depend upon the seamless integration of computational algorithms and physical components. Advances in CPS will enable capability, adaptability, scalability, resiliency, safety, security, and usability far in excess of what today's simple embedded systems can provide. Just as the Internet revolutionized the way we interact with information, CPS technology has already begun to transform the way people interact with engineered systems. In the years ahead, smart CPS will drive innovation and competition across industry sectors, from agriculture, energy, and transportation, to architecture, healthcare, and manufacturing. A priceless source of practical information and inspiration, Security and Privacy in Cyber-Physical Systems: Foundations, Principles and Applications is certain to have a profound impact on ongoing R&D and education at the confluence of security, privacy, and CPS.
    Note: Includes bibliographical references. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 77
    Online Resource
    Online Resource
    Cham : Springer International Publishing | Cham : Springer International Publishing AG
    ISBN: 9783319577951 , 3319577956
    Language: English
    Pages: 1 Online-Ressource (XIX, 136 Seiten) , 17 illus. in color.
    Edition: 1st ed. 2018
    Series Statement: Women in Engineering and Science
    Parallel Title: Erscheint auch als Women in Security
    DDC: 303,483
    Keywords: Technology Sociological aspects ; Sex ; Data protection ; Security systems ; Science, Technology and Society ; Gender Studies ; Data and Information Security ; Security Science and Technology
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 78
    ISBN: 9781544329284 , 9781544329277
    Language: English
    Pages: 252 Seiten , Diagramme
    Series Statement: The annals of the American Academy of Political and Social Science volume 675 (January 2018)
    DDC: 320.6
    RVK:
    Keywords: Data curation ; Data protection ; Policy sciences ; Political planning ; Geschichte
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 79
    ISBN: 9781784718701
    Language: English
    Pages: xxvi, 241 Seiten
    Parallel Title: Erscheint auch als Courts, privacy and data protection in the digital environment
    Parallel Title: Erscheint auch als Courts, privacy and data protection in the digital environment
    DDC: 342.240858
    RVK:
    Keywords: Data protection Law and legislation ; Data protection Law and legislation ; European Union countries ; Data protection ; Aufsatzsammlung ; Europäische Union ; Europäischer Gerichtshof ; Datenschutz ; Digitalisierung
    Abstract: Through critical analysis of case law in European and national courts, this book reveals the significant role courts play in the protection of privacy and personal data within the new technological environment. It addresses the pressing question from a public who are increasingly aware of their privacy rights in a world of continual technological advances - namely, what can I do if my data privacy rights are breached? The expert contributors examine the jurisprudence of the Court of Justice of the European Union, the case law of the European Court of Human Rights and decisions by national courts. Together, they explore how judiciaries balance privacy and data protection rights against other interests and investigate the influence European courts have on national judges. This book also probes the ways in which courts deal with strategic litigation aimed at law and policy reform and, in doing so, sheds light on the role and ability of courts to safeguard privacy and data protection rights. This topical resource will benefit both academics and students of law, particularly those interested in the protection of fundamental rights and freedoms. Both policy makers and legal professionals alike will benefit from the insight into the judicial decision-making activities concerning data protection.-- $c Provided by publisher
    Abstract: I. Introduction : Courts, privacy and data protection in the digital environment / Evangelia Psychogiopoulou and Maja Brkan -- 2. The court of justice of the EU, privacy and data protection : judge-made law as a leitmotif in fundamental rights protection / Maja Brkan -- 3. The European Court of Human Rights, privacy and data protection in the digital era / Evangelia Psychogiopoulou -- 4. Courts, privacy and data protection in Belgium : fundamental rights that might as well be struck from the constitution / Paul De Hert -- 5. Courts, privacy and data protection in Finland : making privacy and data protection real with a little help from the courts / Tuomas Ojanen -- 6. Courts, privacy and data protection in Germany : informational self-determination in the digital environment / Johannes Eichenhofer and Christoph Gusy -- 7. Courts, privacy and data protection in Greece : systemic inconsistencies and incoherence in a rapidly changing landscape / Tania Kyriakou -- 8. Courts, privacy and data protection in Italy : implied constitutional rights / Claudio Di Cocco and Giovanni Sartor -- 9. Courts, privacy and data protection in the Netherlands : European influence and trends in litigation / Colette Cuijpers -- 10. Courts, privacy and data protection in Slovakia : a hesitant guardian? / Martin Husovec -- 11. Courts, privacy and data protection in Spain : experiencing data protection's dominance / Gloria Gonzâalez Fuster -- 12. Courts, privacy and data protection in the UK : why two wrongs don't make a right / Orla Lynskey --Provided by publisher
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 80
    ISBN: 9783319591711 , 3319591711
    Language: English
    Pages: 1 Online-Ressource (X, 229 Seiten) , 32 illus.
    Edition: 1st ed. 2017
    Series Statement: IFIP Advances in Information and Communication Technology 505
    Parallel Title: Erscheint auch als Trust Management XI
    DDC: 303.4834
    Keywords: Computers and civilization ; Data protection ; Information storage and retrieval systems ; Electronic commerce ; Software engineering ; Computers and Society ; Data and Information Security ; Information Storage and Retrieval ; e-Commerce and e-Business ; Software Engineering
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 81
    Online Resource
    Online Resource
    Shelter Island, NY : Manning Publications
    ISBN: 9781617293276
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Keywords: Application program interfaces (Computer software) ; World Wide Web ; Security measures ; Web services ; Access control ; Data protection ; Electronic books ; Electronic books ; local
    Abstract: Summary OAuth 2 in Action teaches you the practical use and deployment of this HTTP-based protocol from the perspectives of a client, authorization server, and resource server. You'll learn how to confidently and securely build and deploy OAuth on both the client and server sides. About the Technology Think of OAuth 2 as the web version of a valet key. It is an HTTP-based security protocol that allows users of a service to enable applications to use that service on their behalf without handing over full control. And OAuth is used everywhere, from Facebook and Google, to startups and cloud services. About the Book OAuth 2 in Action teaches you practical use and deployment of OAuth 2 from the perspectives of a client, an authorization server, and a resource server. You'll begin with an overview of OAuth and its components and interactions. Next, you'll get hands-on and build an OAuth client, an authorization server, and a protected resource. Then you'll dig into tokens, dynamic client registration, and more advanced topics. By the end, you'll be able to confidently and securely build and deploy OAuth on both the client and server sides. What's Inside Covers OAuth 2 protocol and design Authorization with OAuth 2 OpenID Connect and User-Managed Access Implementation risks JOSE, introspection, revocation, and registration Protecting and accessing REST APIs About the Reader Readers need basic programming skills and knowledge of HTTP and JSON. About the Authors Justin Richer is a systems architect and software engineer. Antonio Sanso is a security software engineer and a security researcher. Both authors contribute to open standards and open source.
    Note: Includes index. - Description based on online resource; title from title page (Safari, viewed May 4, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 82
    Online Resource
    Online Resource
    Boca Raton, FL : CRC Press, Taylor & Francis Group
    ISBN: 9781315354927 , 1315354926 , 9781482260953 , 1482260956
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Keywords: Cloud computing ; Security measures ; Computer networks ; Security measures ; Data protection ; Computer security ; Electronic books ; Electronic books ; local
    Abstract: This handbook offers a comprehensive overview of cloud computing security technology and implementation, while exploring practical solutions to a wide range of cloud computing security issues. With more organizations using cloud computing and cloud providers for data operations, proper security in these and other potentially vulnerable areas have become a priority for organizations of all sizes across the globe. Research efforts from both academia and industry in all security aspects related to cloud computing are gathered within one reference guide.
    Note: Includes bibliographical references and index. - Description based on online resource; title from title page (Safari, viewed December 5, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 83
    ISBN: 9783958456372 , 3958456375
    Language: German
    Pages: 1 Online-Ressource , illustrations
    Edition: 1. Auflage.
    RVK:
    RVK:
    RVK:
    Keywords: Internet ; Security measures ; Computer security ; Data protection ; Privacy, Right of ; Electronic books ; Electronic books ; local ; Internet ; Personenbezogene Daten ; Privatsphäre ; Datenschutz ; Internet ; Daten ; Anonymität
    Abstract: Ob Sie wollen oder nicht - jede Ihrer Online-Aktivitäten wird beobachtet und analysiert. Sie haben keine Privatsphäre. Im Internet ist jeder Ihrer Klicks für Unternehmen, Regierungen und kriminelle Hacker uneingeschränkt sichtbar. Ihr Computer, Ihr Smartphone, Ihr Auto, Ihre Alarmanlage, ja sogar Ihr Kühlschrank bieten potenzielle Angriffspunkte für den Zugriff auf Ihre Daten. Niemand kennt sich besser aus mit dem Missbrauch persönlicher Daten als Kevin D. Mitnick. Als von der US-Regierung ehemals meistgesuchter Computer-Hacker kennt er alle Schwachstellen und Sicherheitslücken des digitalen Zeitalters. Seine Fallbeispiele sind spannend und erschreckend: Sie werden Ihre Aktivitäten im Internet neu überdenken. Mitnick weiß aber auch, wie Sie Ihre Daten bestmöglich schützen. Er zeigt Ihnen anhand zahlreicher praktischer Tipps und Schritt-für-Schritt-Anleitungen, was Sie tun können, um online und offline anonym zu sein. Bestimmen Sie selbst über Ihre Daten. Lernen Sie, Ihre Privatsphäre im Internet zu schützen. Kevin D. Mitnick zeigt Ihnen, wie es geht. Hinterlassen Sie keine Spuren • Sichere Passwörter festlegen und verwalten • Mit dem Tor-Browser im Internet surfen, ohne Spuren zu hinterlassen • E-Mails und Dateien verschlüsseln und vor fremden Zugriffen schützen • Öffentliches WLAN, WhatsApp, Facebook & Co. sicher nutzen • Sicherheitsrisiken vermeiden bei GPS, Smart-TV, Internet of Things und Heimautomation • Eine zweite Identität anlegen und unsichtbar werden
    Note: Authorized German translation of the English language edition: The art of invisibility : the world's most famous hacker teaches you how to be safe in the age of Big Brother and big data. Cf. Title page verso. - Place of publication from publisher's website. - Includes bibliographical references. - Description based on online resource; title from title page (Safari, viewed January 4, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 84
    ISBN: 9780128044964 , 0128044969
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Keywords: Data encryption (Computer science) ; Data protection ; Electronic books ; local ; Electronic books
    Abstract: "This unique book delves down into the capabilities of hiding and obscuring data object within the Windows Operating System. However, one of the most noticeable and credible features of this publication is, it takes the reader from the very basics and background of data hiding techniques, and run's on the reading-road to arrive at some of the more complex methodologies employed for concealing data object from the human eye and/or the investigation . As a practitioner in the Digital Age, I can see this book siting on the shelves of Cyber Security Professionals, and those working in the world of Digital Forensics - it is a recommended read, and is in my opinion a very valuable asset to those who are interested in the landscape of unknown unknowns . This is a book which may well help to discover more about that which is not in immediate view of the onlooker, and open up the mind to expand its imagination beyond its accepted limitations of known knowns ." - John Walker, CSIRT/SOC/Cyber Threat Intelligence Specialist Featured in Digital Forensics Magazine , February 2017 In the digital world, the need to protect online communications increase as the technology behind it evolves. There are many techniques currently available to encrypt and secure our communication channels. Data hiding techniques can take data confidentiality to a new level as we can hide our secret messages in ordinary, honest-looking data files. Steganography is the science of hiding data. It has several categorizations, and each type has its own techniques in hiding. Steganography has played a vital role in secret communication during wars since the dawn of history. In recent days, few computer users successfully manage to exploit their Windows® machine to conceal their private data. Businesses also have deep concerns about misusing data hiding techniques. Many employers are amazed at how easily their valuable information can get out of their company walls. In many legal cases a disgruntled employee would successfully steal company private data despite all security measures implemented using simple digital hiding techniques. Human right activists who live in countries controlled by oppressive regimes need ways to smuggle their online communications without attracting surveillance monitoring systems, continuously scan in/out internet traffic for interesting keywords and other artifacts. The same applies to journalists and whistleblowers all over the world. Computer forensic invest...
    Note: Includes bibliographical references and index. - Description based on online resource; title from title page (viewed October 10, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 85
    ISBN: 9781787283077 , 1787283070
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Keywords: Microsoft Windows (Computer file) ; Directory services (Computer network technology) ; Computer networks ; Security measures ; Windows PowerShell (Computer program language) ; Data protection ; Electronic books ; Electronic books ; local
    Abstract: Become a master at managing enterprise identity infrastructure by leveraging Active Directory About This Book Manage your Active Directory services for Windows Server 2016 effectively Automate administrative tasks in Active Directory using PowerShell Manage your organization's network with ease Who This Book Is For If you are an Active Directory administrator, system administrator, or network professional who has basic knowledge of Active Directory and are looking to gain expertise in this topic, this is the book for you. What You Will Learn Explore the new features in Active Directory Domain Service 2016 Automate AD tasks with PowerShell Get to know the advanced functionalities of the schema Learn about Flexible Single Master Operation (FSMO) roles and their placement Install and migrate Active directory from older versions to Active Directory 2016 Manage Active Directory objects using different tools and techniques Manage users, groups, and devices effectively Design your OU structure in the best way Audit and monitor Active Directory Integrate Azure with Active Directory for a hybrid setup In Detail Active Directory is a centralized and standardized system that automates networked management of user data, security, and distributed resources and enables interoperation with other directories. If you are aware of Active Directory basics and want to gain expertise in it, this book is perfect for you. We will quickly go through the architecture and fundamentals of Active Directory and then dive deep into the core components, such as forests, domains, sites, trust relationships, OU, objects, attributes, DNS, and replication. We will then move on to AD schemas, global catalogs, LDAP, RODC, RMS, certificate authorities, group policies, and security best practices, which will help you gain a better understanding of objects and components and how they can be used effectively. We will also cover AD Domain Services and Federation Services for Windows Server 2016 and all their new features. Last but not least, you will learn how to manage your identity infrastructure for a hybrid-cloud setup. All this will help you design, plan, deploy, manage operations on, and troubleshoot your enterprise identity infrastructure in a secure, effective manner. Furthermore, I will guide you through automating administrative tasks using PowerShell cmdlets. Toward the end of the book, we will cover best practices and troubleshooting techniques that can be used to improve ...
    Note: Description based on online resource; title from title page (Safari, viewed July 24, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 86
    Online Resource
    Online Resource
    Manchester : Manchester University Press
    ISBN: 9781526108364
    Language: English
    Pages: 1 Online-Ressource (xii, 220 pages) , Illustrationen
    Series Statement: New approaches to conflict analysis
    Series Statement: Knowledge Unlatched Frontlist Collection 2016
    Series Statement: Political science
    DDC: 325
    RVK:
    RVK:
    Keywords: Emigration and immigration Government policy ; National security ; Data protection ; Electronic books ; Aufsatzsammlung ; Electronic books ; Aufsatzsammlung ; Electronic books ; Aufsatzsammlung
    Note: Includes bibliographical references and index
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 87
    Book
    Book
    Manchester : Manchester University Press
    ISBN: 1526107457 , 9781526107459
    Language: English
    Pages: xii, 220 Seiten , Illustrationen , 25 cm
    Series Statement: New approaches to conflict analysis
    DDC: 325
    RVK:
    RVK:
    RVK:
    Keywords: Emigration and immigration Government policy ; National security ; Data protection ; Data protection ; Emigration and immigration ; National security ; Aufsatzsammlung ; Aufsatzsammlung ; Aufsatzsammlung ; Mobilität ; Sicherheit
    Abstract: Introduction: Security/ Mobility and the politics of movement / Marie Beauchamps ... [et al.] -- Prologue: Movement then and now. Connectivity as problem : security, mobility, liberals, and Christians / Luis Lobo-Guerrero and Friederike Kuntz -- Part I: Things on the move. The power of cyberspace centralisation : analysing the example of data territorialisation / Andreas Baur-Ahrens ; Commercialised occupation skills : Israeli security experience as an international brand / Erella Grassiani ; Mobility, circulation, and homeomorphism: data becoming risk information / Nathaniel O'Grady -- Part II: People on the move. 'Illegals' in the Law School of Athens : public presence, discourse, and migrants as threat / Giannis Gkolfinopoulos ; The management of African asylum seekers and the imaginary of the border in Israel / Sharon Weinblum ; Reinventing political order? A discourse view on the European Community and the abolition of border controls in the second half of the 1980s / Stef Wittendorp -- Part III: Circumscribing movement. Gender (in)securities : surveillance and transgender bodies in a post- 9/11 era of neoliberalism / Christine Quinan ; One thing left on the checklist : ontological coordination and the assessment of consistency in asylum requests / Bruno Magalhães ; Modelling the self, creating the other : French denaturalisation law on the brink of World War II / Marie Beauchamps -- Epilogue. Unpacking the new mobilities paradigm : lessons for critical security studies? / Emmanuel-Pierre Guittet
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 88
    ISBN: 9783319646770 , 331964677X
    Language: English
    Pages: 1 Online-Ressource (XVI, 422 Seiten) , 60 illus.
    Edition: 1st ed. 2017
    Series Statement: Information Systems and Applications, incl. Internet/Web, and HCI 10428
    Parallel Title: Erscheint auch als Electronic Government
    DDC: 3,034,834
    Keywords: Computers and civilization ; Application software ; Coding theory ; Information theory ; Data protection ; Software engineering ; Computers and Society ; Computer and Information Systems Applications ; Coding and Information Theory ; Data and Information Security ; Software Engineering
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 89
    ISBN: 9783319672809 , 3319672800
    Language: English
    Pages: 1 Online-Ressource (XIV, 231 Seiten) , 59 illus.
    Edition: 1st ed. 2017
    Series Statement: Security and Cryptology 10518
    Parallel Title: Erscheint auch als Privacy Technologies and Policy
    DDC: 3,034,834
    Keywords: Computers and civilization ; Data protection ; Electronic commerce ; Application software ; Algorithms ; Computers and Society ; Data and Information Security ; e-Commerce and e-Business ; Computer and Information Systems Applications ; Algorithms
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 90
    ISBN: 9783319711171 , 3319711172
    Language: English
    Pages: 1 Online-Ressource (XII, 273 Seiten) , 58 illus.
    Edition: 1st ed. 2017
    Series Statement: Communications in Computer and Information Science 792
    Parallel Title: Erscheint auch als E-Democracy – Privacy-Preserving, Secure, Intelligent E-Government Services
    DDC: 3,034,834
    Keywords: Computers and civilization ; Data protection ; Application software ; Social sciences Data processing ; Education Data processing ; Computers and Society ; Data and Information Security ; Computer and Information Systems Applications ; Computer Application in Social and Behavioral Sciences ; Computers and Education
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 91
    ISBN: 9783319700878 , 3319700871
    Language: English
    Pages: 1 Online-Ressource (XVIII, 936 Seiten) , 263 illus.
    Edition: 1st ed. 2017
    Series Statement: Theoretical Computer Science and General Issues 10634
    Parallel Title: Erscheint auch als Neural Information Processing
    DDC: 3,034,834
    Keywords: Computers and civilization ; Artificial intelligence ; Data mining ; Algorithms ; Data protection ; Computers and Society ; Artificial Intelligence ; Data Mining and Knowledge Discovery ; Algorithms ; Data and Information Security
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 92
    Online Resource
    Online Resource
    Acton, ACT, Australia : Australian National University Press
    ISBN: 9781760460303 , 1760460311
    Language: English
    Pages: 1 Online-Ressource (xxiii, 318 pages)
    Series Statement: Research monograph
    DDC: 305.8991500723
    Keywords: Maori (New Zealand people) ; Data protection ; Records ; Aboriginal Australians ; Aboriginal Australians ; Data protection ; Records
    Abstract: "As the global 'data revolution' accelerates, how can the data rights and interests of indigenous peoples be secured? Premised on the United Nations Declaration on the Rights of Indigenous Peoples, this book argues that indigenous peoples have inherent and inalienable rights relating to the collection, ownership and application of data about them, and about their lifeways and territories. As the first book to focus on indigenous data sovereignty, it asks: what does data sovereignty mean for indigenous peoples, and how is it being used in their pursuit of self-determination?"--Publisher's website
    Note: Includes bibliographical references and index
    URL: Volltext  (Kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 93
    Online Resource
    Online Resource
    Acton, ACT, Australia : Australian National University Press | New York : JSTOR
    ISBN: 9781760460310 , 1760460311
    Language: English
    Pages: 1 Online-Ressource (xxiii, 318 Seiten) , Illustrations
    Series Statement: Research monograph / Centre for Aboriginal Economic Policy Research no. 38
    DDC: 305.8991500723
    Keywords: Aboriginal Australians Statistics ; Records Access control ; Aboriginal Australians Legal status, laws, etc ; Data protection ; Maori (New Zealand people) Statistics ; Data protection ; Records Access control ; Australasia, Oceania and other land areas ; Australasia ; Australia ; Computer security ; Computing and information technology ; Data capture and analysis ; Databases ; Ethnic studies ; Indigenous peoples ; Privacy and data protection ; Social groups ; Society and culture: general ; Society and social sciences Society and social sciences ; POLITICAL SCIENCE Public Policy ; Cultural Policy ; Aboriginal Australians ; Aboriginal Australians Legal status, laws, etc ; Data protection ; Maori (New Zealand people) ; Records Access control ; Mana whakairo hinengaro ; Tatauranga ; Pātengi raraunga ; Iwi taketake ; Australian ; Statistics ; Electronic books
    Abstract: "As the global 'data revolution' accelerates, how can the data rights and interests of indigenous peoples be secured? Premised on the United Nations Declaration on the Rights of Indigenous Peoples, this book argues that indigenous peoples have inherent and inalienable rights relating to the collection, ownership and application of data about them, and about their lifeways and territories. As the first book to focus on indigenous data sovereignty, it asks: what does data sovereignty mean for indigenous peoples, and how is it being used in their pursuit of self-determination?"--Publisher's website.
    Note: Includes bibliographical references and index
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 94
    ISBN: 9783319413549 , 3319413546
    Language: English
    Pages: 1 Online-Ressource (XII, 191 Seiten) , 47 illus.
    Edition: 1st ed. 2016
    Series Statement: IFIP Advances in Information and Communication Technology 473
    Parallel Title: Erscheint auch als Trust Management X
    DDC: 303.4834
    RVK:
    Keywords: Computers and civilization ; Data protection ; Computer networks  ; Computers and Society ; Data and Information Security ; Computer Communication Networks ; Konferenzschrift 18.07.-22.07.2016
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 95
    ISBN: 9781317553700 , 1317553705
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Series Statement: Routledge studies in innovation, organization and technology 41
    Parallel Title: Erscheint auch als
    DDC: 658.4/78
    RVK:
    Keywords: Data protection ; Computer security ; Management information systems ; Security measures ; Computer networks ; Security measures ; Electronic books ; local ; Electronic books
    Abstract: As retail businesses migrate to the digital realm, internal information theft incidents continue to threaten on-line and off-line retail operations. The evolving propagation of internal information theft has surpassed the traditional techniques of crime prevention practices. Many business organizations search for internal information theft prevention guides that fit into their retail business operation, only to be inundated with generic and theoretical models. This book examines applicable methods for retail businesses to effectively prevent internal information theft. Information Theft Prevention offers readers a comprehensive understanding of the current status of the retail sector information theft prevention models in relation to the internationally recognized benchmark of information security. It presents simple and effective management processes for ensuring better information system security, fostering a proactive approach to internal information theft prevention. Furthermore, it builds on well-defined retail business cases to identify applicable solutions for businesses today. Integrating the retail business operations and information system security practices, the book identifies ways to coordinate efforts across a business in order to achieve the best results. IT security managers and professionals, financial frauds consultants, cyber security professionals and crime prevention professionals will find this book a valuable resource for identifying and creating tools to prevent internal information theft.
    Note: Includes bibliographical references and index. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 96
    Online Resource
    Online Resource
    Santa Monica, Calif : Rand Corporation
    ISBN: 9780833093127 , 0833093126 , 9780833094940 , 0833094947
    Language: English
    Pages: 1 Online-Ressource (xv, 61 pages)
    Series Statement: Research report RR-1187-ICJ
    Parallel Title: Print version Ablon, Lillian Consumer attitudes toward data breach notifications and loss of personal information
    Keywords: Identity theft ; Computer crimes ; Computer security ; Consumer protection ; Data protection ; Disclosure of information ; Consumers Attitudes ; Identity theft ; Computer crimes ; Computer security ; Consumer protection ; Data protection ; Disclosure of information ; Consumers ; Computer security ; Consumer protection ; Consumers ; Attitudes ; Data protection ; Disclosure of information ; Identity theft ; United States ; COMPUTERS ; Internet ; Security ; Computer crimes ; Electronic book
    Abstract: "Data breaches continue to plague private-sector companies, nonprofit organizations, and government agencies. Despite the mounting rate of these breaches, the continuing harms imposed on consumers and firms, and over a decade of breach notification laws, very little research exists that examines consumer response to these developments. This report sets out the results of a nationally representative survey of the consumer experience with data breaches: the frequency of notifications of data breaches and the type of data taken; consumer attitudes toward data breaches, breach notifications, and company follow-on responses; and perceived personal costs resulting from the breach, with the goal to establish a baseline of information about consumer attitudes toward data loss and company practices in responding to such events. Key findings include: (1) Twenty-six percent of respondents, or an estimated 64 million U.S. adults, recalled a breach notification in the past 12 months; (2) 44 percent of those notified were already aware of the breach; (3) 62 percent of respondents accepted offers of free credit monitoring; (4) only 11 percent of respondents stopped dealing with the affected company following a breach; (5) 32 percent of respondents reported no costs of the breach and any inconvenience it garnered, while, among those reporting some cost, the median cost was 500 dollars; and (6) 77 percent of respondents were highly satisfied with the company's post-breach response"--Publisher's description
    Abstract: "Data breaches continue to plague private-sector companies, nonprofit organizations, and government agencies. Despite the mounting rate of these breaches, the continuing harms imposed on consumers and firms, and over a decade of breach notification laws, very little research exists that examines consumer response to these developments. This report sets out the results of a nationally representative survey of the consumer experience with data breaches: the frequency of notifications of data breaches and the type of data taken; consumer attitudes toward data breaches, breach notifications, and company follow-on responses; and perceived personal costs resulting from the breach, with the goal to establish a baseline of information about consumer attitudes toward data loss and company practices in responding to such events. Key findings include: (1) Twenty-six percent of respondents, or an estimated 64 million U.S. adults, recalled a breach notification in the past 12 months; (2) 44 percent of those notified were already aware of the breach; (3) 62 percent of respondents accepted offers of free credit monitoring; (4) only 11 percent of respondents stopped dealing with the affected company following a breach; (5) 32 percent of respondents reported no costs of the breach and any inconvenience it garnered, while, among those reporting some cost, the median cost was 500 dollars; and (6) 77 percent of respondents were highly satisfied with the company's post-breach response"--Publisher's description
    Note: "RR-1187-ICJ"--Page 4 of cover , Includes bibliographical references (pages 57-61)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 97
    ISBN: 9783319448053 , 3319448056
    Language: English
    Pages: 1 Online-Ressource (XXV, 345 Seiten) , 74 illus.
    Edition: 1st ed. 2016
    Series Statement: IFIP Advances in Information and Communication Technology 474
    Parallel Title: Erscheint auch als Technology and Intimacy: Choice or Coercion
    DDC: 303.4834
    Keywords: Computers and civilization ; User interfaces (Computer systems) ; Human-computer interaction ; Application software ; Information technology Management ; Data protection ; Communication ; Computers and Society ; User Interfaces and Human Computer Interaction ; Computer and Information Systems Applications ; Computer Application in Administrative Data Processing ; Data and Information Security ; Media and Communication
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 98
    Online Resource
    Online Resource
    Waltham, MA : Syngress, an imprint of Elsevier
    ISBN: 9780128046494 , 012804649X
    Language: English
    Pages: 1 online resource
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    DDC: 332.1/788028558
    Keywords: BUSINESS & ECONOMICS / Finance ; Data protection ; Electronic commerce / Security measures ; Credit cards Security measures ; Credit cards Security measures ; Standards ; Data protection ; Electronic commerce Security measures
    Abstract: PCI DSS has recently updated its standard to 3.1. While the changes are fairly minor in nature, there are massive implications to companies relying on SSL as a scope reducing tool inside their enterprise. This update book goes through the specific changes to PCI DSS 3.1, and includes new case studies that discuss the specific implications for making the change to 3.1. This concise supplement also includes a detailed explanation of each changed requirement and how it will impact your environment. PCI Compliance, 3.1 Addendum serves as an update to Syngress' comprehensive reference volume PCI Compliance, Fourth Edition
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 99
    Online Resource
    Online Resource
    [Place of publication not identified] : O'Reilly
    ISBN: 9781491942352
    Language: English
    Pages: 1 online resource (1 streaming video file (3 hr., 40 min., 10 sec.)) , digital, sound, color
    Keywords: Data protection ; Business enterprises ; Data processing ; Management ; Big data ; Electronic videos ; local
    Abstract: "In this video, data management expert John Adler leads you through the maze of data governance issues facing companies today--security breaches, regulatory agencies, in-house turf battles over who controls the data, monetizing data, and more. In this fast-paced and thorough discussion of how to plan for, implement, and run a successful data governance program, you'll get an overview of the ways data has been managed in the past and how the smart companies do it now. Along with an introduction to the operational frameworks used in data governance, Adler describes the roles of the Chief Data Officer and the Data Steward, outlines a set of commonly used policies and standards, and shows you how to build the business case for a data governance program. (If people in your company are suspicious of the term 'data governance,' you'll also learn some alternative terms many companies use to socialize and gain acceptance for their data governance programs.) Watch this video and you'll exit the data maze with a fundamental understanding of the origins, business goals, conceptual structure, and value of data governance. Review the business and technology trends that drive the requirement for data governance; learn about the tools, technologies, and frameworks used in successful data governance programs; understand the roles and responsibilities of the key players in data governance; discover the best ways to plan, implement, and run a data governance program; understand the impact that agile development and Big Data collection technologies have on data governance."--Resource description page.
    Note: Title from title screen (viewed February 12, 2016). - Date of publication from resource description page
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 100
    ISBN: 9780128023792 , 0128023791
    Language: English
    Pages: 1 online resource (1 volume)
    Edition: Third edition.
    Keywords: Computer security ; Data protection ; Electronic books ; local ; Electronic books
    Abstract: The Information Systems Security Officer's Guide: Establishing and Managing a Cyber Security Program , Third Edition, provides users with information on how to combat the ever-changing myriad of threats security professionals face. This entirely updated edition presents practical advice on establishing, managing, and evaluating a successful information protection program in a corporation or government agency, covering everything from effective communication to career guidance for the information security officer. The book outlines how to implement a new plan or evaluate an existing one, and is especially targeted to those who are new to the topic. It is the definitive resource for learning the key characteristics of an effective information systems security officer (ISSO), and paints a comprehensive portrait of an ISSO's duties, their challenges, and working environments, from handling new technologies and threats, to performing information security duties in a national security environment. Provides updated chapters that reflect the latest technological changes and advances in countering the latest information security threats and risks and how they relate to corporate security and crime investigation Includes new topics, such as forensics labs and information warfare, as well as how to liaison with attorneys, law enforcement, and other agencies others outside the organization Written in an accessible, easy-to-read style
    Note: Includes bibliographical references and index. - Description based on online resource; title from title page (viewed October 27, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...