Information Privacy Engineering and Privacy by Design Understanding Privacy Threats, Technology, and Regulations Based on Standards and Best Practices
Afbeeldingen
Sla de afbeeldingen over
Artikel vergelijken
Auteur:
William Stallings
William Stallings
- Engels
- Paperback
- 9780135302156
- 24 januari 2020
- 528 pagina's
William Stallings
"William Stallings is an American author. He has written textbooks on computer science topics such as operating systems, computer networks, computer organization, and cryptography. He also maintains a website titled Computer Science Student Resource. He has authored 17 titles, and counting revised editions, a total of over 40 books on various aspects of these subjects. In over 20 years in the field, he has been a technical contributor, technical manager, and an executive with several high-technology firms. Currently he is an independent consultant whose clients have included computer and networking manufacturers and customers, software development firms, and leading-edge government research institutions.
(Bron: Wikipedia. Beschikbaar onder de licentie Creative Commons Naamsvermelding/Gelijk delen.)"
(Bron: Wikipedia. Beschikbaar onder de licentie Creative Commons Naamsvermelding/Gelijk delen.)"
Samenvatting
In Information Privacy Engineering and Privacy by Design, renowned information technology author William Stallings brings together the comprehensive and practical guidance that is needed to succeed as organizations of all kinds are recognizing the crucial importance of protecting privacy. Stallings shows how to apply today’s consensus best practices and widely-accepted standards documents in your environment, leveraging policy, procedures, and technology to meet legal and regulatory requirements and protect everyone who depends on you. Like Stallings’ other award-winning texts, this guide is designed to help students quickly find the information and gain the mastery needed to implement effective privacy. Coverage includes:
The Comprehensive Guide to Engineering and Implementing Privacy Best Practices
As systems grow more complex and cybersecurity attacks more relentless, safeguarding privacy is ever more challenging. Organizations are increasingly responding in two ways, and both are mandated by key standards such as GDPR and ISO/IEC 27701:2019. The first approach, privacy by design, aims to embed privacy throughout the design and architecture of IT systems and business practices. The second, privacy engineering, encompasses the technical capabilities and management processes needed to implement, deploy, and operate privacy features and controls in working systems.
In Information Privacy Engineering and Privacy by Design, internationally renowned IT consultant and author William Stallings brings together the comprehensive knowledge privacy executives and engineers need to apply both approaches. Using the techniques he presents, IT leaders and technical professionals can systematically anticipate and respond to a wide spectrum of privacy requirements, threats, and vulnerabilities–addressing regulations, contractual commitments, organizational policies, and the expectations of their key stakeholders.
• Review privacy-related essentials of information security and cryptography
• Understand the concepts of privacy by design and privacy engineering
• Use modern system access controls and security countermeasures to partially satisfy privacy requirements
• Enforce database privacy via anonymization and de-identification
• Prevent data losses and breaches
• Address privacy issues related to cloud computing and IoT
• Establish effective information privacy management, from governance and culture to audits and impact assessment
• Respond to key privacy rules including GDPR, U.S. federal law, and the California Consumer Privacy Act
This guide will be an indispensable resource for anyone with privacy responsibilities in any organization, and for all students studying the privacy aspects of cybersecurity.
- Planning for privacy: Approaches for managing and controlling the privacy control function; how to define your IT environment’s requirements; and how to develop appropriate policies and procedures for it
- Privacy threats: Understanding and identifying the full range of threats to privacy in information collection, storage, processing, access, and dissemination
- Information privacy technology: Satisfying the privacy requirements you’ve defined by using technical controls, privacy policies, employee awareness, acceptable use policies, and other techniques
- Legal and regulatory requirements: Understanding GDPR as well as the current spectrum of U.S. privacy regulations, with insight for mapping regulatory requirements to IT actions
- Ideal for all students studying the privacy aspects of cybersecurity
- Includes full sections on planning for privacy, identifying and understanding threats, applying modern privacy technologies, and understanding evolving legal and regulatory requirements (including GDPR)
- Reflects best practices and widely-accepted standards, and supports key Human Security elements of Cybersecurity Curricula 2017 (CSEC2017)
- Multiple learning features promote rapid access and mastery: from clear learning objectives and glossary definitions to QR weblinks and a frequently updated website
- Ancillary resources, including lecture slides, provide instructors ample support in integrating this text
- By William Stallings, 13-time winner of the prestigious TAA Computer Science Textbook of the Year Award
- Ideal for anyone with privacy responsibilities in any organization, and for all students studying the privacy aspects of cybersecurity
- Includes full sections on planning for privacy, identifying and understanding threats, applying modern privacy technologies, and understanding evolving legal and regulatory requirements (including GDPR)
- Reflects best practices and widely-accepted standards, and supports key Human Security elements of Cybersecurity Curricula 2017 (CSEC2017)
- Multiple learning features promote rapid access and mastery: from clear learning objectives and glossary definitions to QR weblinks and a frequently updated website
- By William Stallings, 13-time winner of the prestigious TAA Computer Science Textbook of the Year Award
The Comprehensive Guide to Engineering and Implementing Privacy Best Practices
As systems grow more complex and cybersecurity attacks more relentless, safeguarding privacy is ever more challenging. Organizations are increasingly responding in two ways, and both are mandated by key standards such as GDPR and ISO/IEC 27701:2019. The first approach, privacy by design, aims to embed privacy throughout the design and architecture of IT systems and business practices. The second, privacy engineering, encompasses the technical capabilities and management processes needed to implement, deploy, and operate privacy features and controls in working systems.
In Information Privacy Engineering and Privacy by Design, internationally renowned IT consultant and author William Stallings brings together the comprehensive knowledge privacy executives and engineers need to apply both approaches. Using the techniques he presents, IT leaders and technical professionals can systematically anticipate and respond to a wide spectrum of privacy requirements, threats, and vulnerabilities–addressing regulations, contractual commitments, organizational policies, and the expectations of their key stakeholders.
• Review privacy-related essentials of information security and cryptography
• Understand the concepts of privacy by design and privacy engineering
• Use modern system access controls and security countermeasures to partially satisfy privacy requirements
• Enforce database privacy via anonymization and de-identification
• Prevent data losses and breaches
• Address privacy issues related to cloud computing and IoT
• Establish effective information privacy management, from governance and culture to audits and impact assessment
• Respond to key privacy rules including GDPR, U.S. federal law, and the California Consumer Privacy Act
This guide will be an indispensable resource for anyone with privacy responsibilities in any organization, and for all students studying the privacy aspects of cybersecurity.
Productspecificaties
Wij vonden geen specificaties voor jouw zoekopdracht '{SEARCH}'.
Inhoud
- Taal
- en
- Bindwijze
- Paperback
- Oorspronkelijke releasedatum
- 24 januari 2020
- Aantal pagina's
- 528
- Illustraties
- Nee
Betrokkenen
- Hoofdauteur
- William Stallings
- Tweede Auteur
- William Stallings
- Hoofduitgeverij
- Addison Wesley
Overige kenmerken
- Extra groot lettertype
- Nee
- Product breedte
- 180 mm
- Product hoogte
- 30 mm
- Product lengte
- 230 mm
- Studieboek
- Ja
- Verpakking breedte
- 179 mm
- Verpakking hoogte
- 31 mm
- Verpakking lengte
- 233 mm
- Verpakkingsgewicht
- 1076 g
EAN
- EAN
- 9780135302156
Je vindt dit artikel in
- Categorieën
- Boek, ebook of luisterboek?
- Boek
- Taal
- Engels
- Beschikbaarheid
- Leverbaar
- Studieboek of algemeen
- Studieboeken
Kies gewenste uitvoering
Kies je bindwijze
(2)
Prijsinformatie en bestellen
De prijs van dit product is 59 euro en 99 cent.
1 - 2 weken
Verkoop door bol
- Prijs inclusief verzendkosten, verstuurd door bol
- Ophalen bij een bol afhaalpunt mogelijk
- 30 dagen bedenktijd en gratis retourneren
- Dag en nacht klantenservice
Rapporteer dit artikel
Je wilt melding doen van illegale inhoud over dit artikel:
- Ik wil melding doen als klant
- Ik wil melding doen als autoriteit of trusted flagger
- Ik wil melding doen als partner
- Ik wil melding doen als merkhouder
Geen klant, autoriteit, trusted flagger, merkhouder of partner? Gebruik dan onderstaande link om melding te doen.