-
Data Breaches: Crisis and Opportunity
Author Sherri Davidoff
Protect Your Organization Against Massive Data Breaches and Their ConsequencesData breaches can be catastrophic, but they remain mysterious because victims don't want to talk about them. In Data Breaches, world-renowned cybersecurity expert Sherri Davidoff shines ....
Release Date 2019/10 -
Data Diplomacy: Keeping Peace and Avoiding Data Governance Bureaucracy
Author Håkan Edvinsson
Successful data governance requires replacing governance with diplomacy. This book is your guide to applying a lean and friendly yet proven approach to data governance and data design by leveraging your existing workforce, and allowing these data workers to create ....
Release Date 2020/01 -
Data Protection and Compliance in Context
Author Stewart Room
This comprehensive accessible guide for those with little or no legal knowledge provides detailed analysis of current data protection laws. It enables the reader to construct a platform on which to build internal compliance strategies. The author is chair of the Nat....
Release Date 2006/11 -
Data Protection and Compliance, 2nd Edition
Author Stewart Room , Michelle Maher , Niall O'Brien , Adam Panagiotopoulos , Shervin Nahid
This comprehensive guide for those with little or no legal knowledge provides detailed analysis of current data protection laws. It enables the reader to operationalise a truly risk-based approach to data protection and compliance, beyond just emphasis on regulatory frameworks and legalistic complia....
Release Date 2021/11 -
Data Protection and Information Lifecycle Management
Author Tom Petrocelli
The Definitive Guide to Protecting Enterprise DataYour enterprise data is your most critical asset. If it's compromised, your business can be destroyed. Don't let that happen-leverage today's state-of-the-art strategies, best practices, and technologies and prote....
Release Date 2005/09 -
Data Protection and the Cloud: Are the risks too great?
Author Paul Ticher
Applying the Data Protection Act to the Cloud The UK’s Data Protection Act 1998 (DPA) applies to the whole lifecycle of information, from its original collection to its final destruction. Failure to comply with the DPA’s eight principles could lead to ....
Release Date 2015/02 -
Data Protection vs. Freedom of Information
Author Paul Ticher
How would you respond to a freedom of information request, whilst ensuring compliance with the Data Protection Act?Get clear and practical guidance on this key data governance issue!Freedom of information is often mentioned in the same breath as data protection. In ....
Release Date 2008/11 -
Author David D. Busch
DAVID BUSCH'S NIKON D3200 GUIDE TO DIGITAL SLR PHOTOGRAPHY is your onestop resource and reference for the Nikon D3200, the latest entrylevel DSLR in the Nikon product line, featuring a 16.2 megapixel sensor, full HDTV video, and ISO up to 12,800. With this book in ....
Release Date 2012/07 -
DAVID BUSCH’S NIKON® D800/D800E GUIDE TO DIGITAL SLR PHOTOGRAPHY
Author David D. Busch
Are you looking for a sure, complete guide to your new Nikon D800/D800E? If so, DAVID BUSCH'S NIKON D800/D800E GUIDE TO DIGITAL SLR PHOTOGRAPHY is the perfect companion for you. The Nikon D800/D800E is the long-anticipated replacement for Nikon's D700 full-frame (....
Release Date 2012/09 -
Dealing with a Lay Off: What to Expect When You Are No Longer Expected
Author Martha I. Finney
This Element is an excerpt from Rebound: A Proven Plan for Starting Over After Job Loss (ISBN: 9780137021147) by Martha Finney. Available in print and digital formats.Get your head and heart together after you’re laid off: what you’ll feel and how to handle it.You’v....
Release Date 2010/02 -
Author Kathleen Iannello
Decisions Without Hierarchy is based on a two-year examination of three feminist organizations: a peace group, health collective, and business women's group. From these case studies, Iannello constructs a model of organizations that, while structured, is neverthele....
Release Date 2013/06 -
Author Dr Sabina Dosani , Infinite Ideas
Defeat depression tackles this greatly misunderstood condition head on with over 50 inspirational ideas from a psychiatrist who struggled with and overcame depression as a young adult. Defeat depression offers a real insight into the condition with practical, tried ....
Release Date 2011/12 -
Author Amanda Berlin , Lee Brotherston
Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to ....
Release Date 2017/04 -
Author Joseph L. Badaracco Jr.
When Business and Personal Values CollideDefining moments” occur when managers face business decisions that trigger conflicts with their personal values. These moments test a person’s commitment to those values and ultimately shape their character. But these are a....
Release Date 2016/08 -
Author Dimitar P. Mishev , Aliakbar Montazer Haghighi
Presents an introduction to differential equations, probability, and stochastic processes with real-world applications of queues with delay and delayed network queuesFeaturing recent advances in queueing theory and modeling, Delayed and Network Queues provides the ....
Release Date 2016/10 -
Demystifying Cryptography with OpenSSL 3.0
Author Alexei Khlebnikov , Jarle Adolfsen
Use OpenSSL to add security features to your application, including cryptographically strong symmetric and asymmetric encryption, digital signatures, SSL/TLS connectivity, and PKI handlingKey FeaturesSecure your applications against common network security threats using OpenSSLGet to grips with the ....
Release Date 2022/10 -
Deploying Zone-Based Firewalls
Author Ivan Pepelnjak
Deploying Zone-Based Firewalls (Digital Short Cut)Ivan PepelnjakISBN: 1-58705-310-1Improved firewall policy configuration means network administrators can more easily understand the effect of firewall policies on network traffic. This functionality allows the groupi....
Release Date 2006/11 -
Author Samir Palnitkar
Design Verification with eSamir PalnitkarWritten for both experienced and new users, DesignVerification with e gives you a broadcoverage of e. It stresses the practical verification perspective of e rather than emphasizing only itslanguage aspects.This book—Introduc....
Release Date 2003/09 -
Author Eric C. Thompson
Develop a comprehensive plan for building a HIPAA-compliant security operations center, designed to detect and respond to an increasing number of healthcare data breaches and events. Using risk analysis, assessment, and management data combined with knowledge of cybersecu....
Release Date 2020/02 -
Designing an IAM Framework with Oracle Identity and Access Management Suite
Author Scheidel Jeff
Develop and Implement an End-to-End IAM Solution Maintain a high-performance, fully integrated security foundation across your enterprise using the detailed information in this Oracle Press guide. Designing an IAM Framework with Oracle Identity and Access Management....
Release Date 2010/07 -
Designing and Developing Secure Azure Solutions
Author Michael Howard , Simone Curzi , Heinrich Gantenbein
Plan, build, and maintain highly secure Azure applications and workloadsAs business-critical applications and workloads move to the Microsoft Azure cloud, they must stand up against dangerous new threats. That means you must build robust security into your designs, use proven best practices across t....
Release Date 2022/11 -
Designing and Implementing Linux Firewalls and QoS using netfilter, iproute2, NAT, and L7-filter
Author Lucian Gheorghe
Learn how to secure your system and implement QoS using real-world scenarios for networks of all sizesImplementing Packet filtering, NAT, bandwidth shaping, packet prioritization using netfilter/iptables, iproute2, Class Based Queuing (CBQ) and Hierarchical Token Bu....
Release Date 2006/10 -
Author Donald D. Dunn
Executive leaders need a framework with which to evaluate current and to create new corporate ethical management systems in their organizations. This book offers such a framework, called the Moldable Model©, a system of consistent components that give leaders ....
Release Date 2016/05 -
Author Gretchen Anderson
Designers of all stripes today are seeking social and civic projects that have a mission to serve the greater good at their core. Part of this growing trend stems from the desire to use skills for their highest potential. But the real payoff is the ability to use n....
Release Date 2015/06 -
Author Joshua Porter
No matter what type of web site or application you’re building, social interaction among the people who use it will be key to its success. They will talk about it, invite their friends, complain, sing its high praises, and dissect it in countless ways. With the righ....
Release Date 2008/04 -
Designing Menus with Encore DVD
Author John Skidgel
Designed to complement the Encore DVD software documentation, this full-color book begins with a brief description of the DVD specification, then introduces readers to DVD authoring concepts such as menu creation, timeline construction, navigation, transcoding,....
Release Date 2012/11 -
Designing Network Security Second Edition
Author Merike Kaeo
A practical guide to creating a secure network infrastructureUnderstand basic cryptography and security technologiesIdentify the threats and common attacks to a network infrastructureLearn how to create a security policyFind out how to recover from a security breach....
Release Date 2003/10 -
Author Tom Clark
Designing Storage Area Networks, Second Edition, succinctly captures the key technologies that are driving the storage networking industry. Tom Clark's works are helping to educate the IT community to the benefits and challenges of shared storage and are recommende....
Release Date 2003/03 -
Designing Trustworthy Organizations
Author Robert F. Hurley , Nicole Gillespie , Donald L. Ferrin , Graham Dietz
In the aftermath of the well-publicized frauds of Enron, WorldCom and Tyco circa 2001 and 2002, there were major efforts in the United States to restore trust and enforce corporate compliance. Among other things, the U.S. Congress passed the Sarbanes-Oxley Act ....
Release Date 2013/07 -
Detecting and Combating Malicious Email
Author Cade Kamachi , Julie JCH Ryan
Malicious email is, simply put, email with a malicious purpose. The malicious purpose could be fraud, theft, espionage, or malware injection. The processes by which email execute the malicious activity vary widely, from fully manual (e.g. human-directed) to fully au....
Release Date 2014/10