for at udvide
kategorilisten.
Søgning på underkategorier- og emner:
Bemærk: Kan leveres før jul.
Implement an effective and compliant information security management system using IT governance best practice.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
Is it possible to take advantage of the benefits of data collection - and mitigate risks - for both companies and customers?
Bemærk: Kan leveres før jul.
No data is completely safe. Cybersecurity: The Insights You Need from Harvard Business Review
Bemærk: Kan ikke leveres før jul.
Jonathan Lusthaus lifts the veil on cybercriminals in the most extensive account yet of the lives they lead and the vast international industry... Læs mere
Bemærk: Kan leveres før jul.
This book provides a comprehensive guide to the practical management of freedom of information compliance, including interpretation of the Act as well as the Environmental Information Regulations.
Bemærk: Kan ikke leveres før jul.
This book, representing researchers and practitioners across different information professions, will explore how social tags can link content across a variety of environments.
Bemærk: Kan ikke leveres før jul.
Cybersecurity and Privacy - bridging the gap addresses two very complex fields of the digital world, i.e., Cybersecurity and Privacy. These multifaceted,... Læs mere
Bemærk: Kan ikke leveres før jul.
The design of authentication protocols is discussed in depth, and this would also include looking into the role of formal verification in the design of security protocols.
Bemærk: Kan ikke leveres før jul.
The historic European Union Directive on Data Protection will take effect in October 1998. A key provision will prohibit transfer of personal information from Europe to other countries if they lack ""adequate"" protection of privacy.
Bemærk: Kan ikke leveres før jul.
This book introduces several cybersecurity and privacy research challenges and how they are being addressed in the scope of 15... Læs mere
Bemærk: Kan ikke leveres før jul.
This book explores the fundamentals and applications of Blockchain technology. Readers will learn about the decentralized peer-to-peer network, distributed ledger, and the trust model that defines Blockchain technology.