Filter
Datasikkerhet
Filter
Other books on information security metrics discuss number theory and statistics in academic terms. Light on mathematics and heavy on utility, PRAGMATIC Security Metrics: Applying …
Previous information security references do not address the gulf between general security awareness and the specific technical steps that need to be taken to protect information …
Leaders of many public and private organizations face increased pressure to allow the use of personal mobile devices in their enterprises. This book provides an understanding of …
Traditionally, software engineers have defined security as a non-functional requirement. As such, all too often it is only considered as an afterthought, making software …
Crisis management planning refers to the methodology used by executives to respond to and manage a crisis and is an integral part of a business resumption plan. Crisis Management …
Updated annually, the Information Security Management Handbook, Sixth Edition is the most comprehensive and up-to-date reference available on information security and assurance. …
Today, more than ever, organizations have to cope with increased concerns regarding privacy issues. These concerns are not limited to consumer fears about how information collected …
This book provides solutions for securing important data stored in something as nebulous sounding as a cloud. A primer on the concepts behind security and the cloud, it explains …
With an ever-increasing amount of information on the web, it is critical to understand the pedigree, quality, and accuracy of your data. Using provenance, you can ascertain the …
Offering compelling practical and legal reasons why de-identification should be one of the main approaches to protecting patients’ privacy, the Guide to the De-Identification of …