Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
The second edition of Data Protection goes beyond the traditional topics including deduplication, continuous availability, snapshots, replication, backup and recovery, and explores such additional considerations as legal, privacy, and ethical issues
Bemærk: Kan ikke leveres før jul.
Cyber Strategy Risk-Driven Security and Resiliency provides a process and roadmap for any company to develop its unified Cybersecurity and Cyber... Læs mere
Bemærk: Kan ikke leveres før jul.
Bringing together international experts, this book offers an interdisciplinary approach to cybercrime, explores a range of issues from cybersecurity to hacking to fraud, and lays out frameworks for collaboration between different fields.
Bemærk: Kan ikke leveres før jul.
Like many concepts, privacy has a commonly accepted core of meaning with an indefinite or variable periphery
Bemærk: Kan ikke leveres før jul.
This book provides emergent knowledge relating to physical, cyber, and human risk mitigation in a practical and readable approach for the corporate environment. The book guides readers to a greater depth of understanding and action-oriented options.
Bemærk: Kan ikke leveres før jul.
Offering compelling practical and legal reasons why de-identification should be one of the main approaches to protecting patients’ privacy,... Læs mere
Bemærk: Kan ikke leveres før jul.
This book covers the introduction of and state-of-the-art watermarking techniques developed in various domains along with their hardware... Læs mere
Bemærk: Kan ikke leveres før jul.
The EU's General Data Protection Regulation created the position of corporate Data Protection Officer (DPO), who is empowered to ensure the... Læs mere
Bemærk: Kan ikke leveres før jul.
CryptoWars offers a history of the half century contest between the US government and its citizens to... Læs mere
Bemærk: Kan leveres før jul.
As use of information technology increases, we worry that our personal information is being shared inappropriately, violating key... Læs mere
Bemærk: Kan leveres før jul.
Bemærk: Kan ikke leveres før jul.
This book mainly concentrates on protecting data security and privacy when participants communicate with each other in the Internet of Things (IoT).