Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Reading Level
      Reading Level
      Clear All
      Reading Level
  • Content Type
      Content Type
      Clear All
      Content Type
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Item Type
    • Is Full-Text Available
    • Subject
    • Publisher
    • Source
    • Donor
    • Language
    • Place of Publication
    • Contributors
    • Location
4,729 result(s) for "Data protection Standards."
Sort by:
Information Security Breaches
If something happens, your company needs to be ready to take prompt and decisive action to resolve the issue. This book tells you the plans and procedures you need to put in place to tackle an information security breach should it occur. In particular, the book gives you clear guidance on how to treat an information security breach in accordance with ISO27001. If a breach occurs, the evidence needs to be secured professionally. You need to know the rules on evidence gathering, and you need to be capable of isolating the suspect laptops right from the start. If you want your company to respond rapidly to an information security breach, you need to make sure that the responsibilities and roles in your company are clearly defined.
PCI DSS: A Practical Guide to Implementing and Maintaining Compliance
The objective of this revised practical guide is to give entities advice and tips on the entire PCI implementation process. It provides a roadmap, helping entities to navigate the broad, and sometimes confusing, PCI DSS v2, and shows them how to build and maintain a sustainable PCI compliance programme. This latest revision also includes increased guidance on how to ensure your compliance programme is ‘sustainable’ and has been based on real-life scenarios, which should help to ensure your PCI compliance programme remains compliant. Although the guide starts with sections on why and what is PCI, it is not intended to replace the ‘publicly available’ PCI information. This book looks to serve those who have been given the responsibility of PCI, and does not attempt to provide all the answers. It should be read, absorbed and digested only with a good helping of other PCI ‘publicly available’ information. In other words, it will help an organisation or individual, get started, and hopefully furnish the reader with enough of the fundamental basics to create, design and build the organisation’s own PCI compliance framework.
ISO27001/ISO27002
Questa indispensabile guida tascabile fornisce un'utile panoramica di due importanti norme sulla sicurezza delle informazioni Così ricco di consigli pratici per l'attuazione di un sistema di gestione della sicurezza delle informazioni che vi chiederete come avete potuto farne a meno prima d'ora. Acquista la tua copia oggi stesso.
Security without Obscurity
The traditional view of information security includes three cornerstones: confidentiality, integrity, and availability; however the author asserts authentication is the third keystone. As the field has become more complex, novices and professionals need a reliable reference that outlines the basics. Rather than focusing on compliance or policies and procedures, this book takes a top-down approach. Providing insight from the author's experience developing dozens of standards, it provides an understanding of how to approach information security from the bedrock principles of confidentiality, integrity, and authentication.
ISO27001 / ISO27002
Information is one of your organisation’s most important resources. Keeping it secure is therefore vital to your business. This handy pocket guide is an essential overview of two key information security standards that cover the formal requirements (ISO27001:2013) for creating an Information Security Management System (ISMS), and the best-practice recommendations (ISO27002:2013) for those responsible for initiating, implementing or maintaining it.
PCI Compliance
Identity theft and other confidential information theft have now topped the charts as the leading cybercrime.In particular, credit card data is preferred by cybercriminals.Is your payment processing secure and compliant?.
ISO27001/ISO27002
Dieser unverzichtbare Taschenführer bietet einen hilfreichen Überblick über zwei wichtige Informationssicherheitsstandards. Voll gepackt mit praktischen Tipps zur Implementierung eines Informationssicherheit-Managementsystems, werden Sie sich schnell fragen, wie Sie bislang ohne ausgekommen sind. Sichern Sie sich Ihr Exemplar noch heute.
Data Protection by Design Tool for Automated GDPR Compliance Verification Based on Semantically Modeled Informed Consent
The enforcement of the GDPR in May 2018 has led to a paradigm shift in data protection. Organizations face significant challenges, such as demonstrating compliance (or auditability) and automated compliance verification due to the complex and dynamic nature of consent, as well as the scale at which compliance verification must be performed. Furthermore, the GDPR’s promotion of data protection by design and industrial interoperability requirements has created new technical challenges, as they require significant changes in the design and implementation of systems that handle personal data. We present a scalable data protection by design tool for automated compliance verification and auditability based on informed consent that is modeled with a knowledge graph. Automated compliance verification is made possible by implementing a regulation-to-code process that translates GDPR regulations into well-defined technical and organizational measures and, ultimately, software code. We demonstrate the effectiveness of the tool in the insurance and smart cities domains. We highlight ways in which our tool can be adapted to other domains.
Nueve pasos para el éxito
Orientación paso a paso sobre la implementación de la ISO 27001 con éxito En lenguaje sencillo y nada técnico, esta guía le llevará por los pasos clave de un proyecto de la ISO 27001 para asegurar su éxito, desde el comienzo a la certificación: Encargo del proyectoInicio del proyectoInicio del SGSIMarco de la gestiónCriterios de seguridad de referenciaGestión del riesgoImplementaciónMedición, monitorización y revisiónCertificación Ahora en esta tercera edición y alineada con la ISO 27001:2013, esta guía es ideal para cualquiera que emprenda la norma por primera vez. \"Es como tener un consultor de $300/h codo con codo mientras considera los aspectos de obtener apoyo de la gerencia, la planificación, el alcance, la comunicación, etc.\" Thomas F. Witwicki Con este libro, averiguará cómo: Conseguir apoyo de la gerenciay mantener la atención del consejo;Crear un marco de gestióny realizar un análisis de las deficiencias, para que pueda entender claramente los controles que ya tiene implantados e identificar dónde tiene que centrar sus esfuerzos;Estructurar y conseguir recursos para su proyecto, incluido le asesoramiento sobre si utilizar consultores o hacerlo usted mismo, y un examen de las herramientas y recursos disponibles que harán su trabajo más fácil;Llevar a cabo una evaluación del riesgo en cinco pasos, y crear una Declaración de aplicabilidad y un plan de tratamiento del riesgo;Integrarsu SGSI de la ISO 27001 con un SGC de la ISO 9001 y otros sistemas de calidad;Abordar los retos de la documentaciónque afrontará cuando cree políticas empresariales, procedimientos, instrucciones de trabajo y registros, incluidas alternativas viables para un enfoque de prueba y error costoso;Mejorar continuamente su SGSI, incluida la auditoría y prueba internas, y la revisión gerencial; Este título le dará la orientación que necesita para entender los requisitos de la norma y asegurarse de que su proyecto de implementación sea un éxito, lo cual incluye losseis secretos para un éxito de certificación. Experiencia Lograr y mantener una certificación acreditada con la ISO 27001, la norma internacional que expone los requisitos de un SGSI, puede ser una tarea complicada, especialmente para los implementadores que sean nuevos con la norma. El autor, Alan Calder, conoce la ISO 27001 al derecho y al revés: es el fundador y presidente ejecutivo de IT Governance, y dirigió la implementación del primer sistema de gestión en lograr una certificación acreditada con la BS 7799, la precursora de la ISO 27001, y ha estado trabajando con la norma y sus sucesoras desde entonces. Cientos de organizaciones en todo el mundo han logrado una certificación acreditada con la ISO 27001 con la orientación de IT Governance, que está condensada en este libro. Compre este libro hoy y aprenda los nueve pasos esenciales para una implementación con éxito del SGSI de la ISO 27001.