Search Results: 'data security'


236 results for "data security"
Data Security at Mossack Fonseca By Mers Aberden
eBook (PDF): $8.99
Your information has never been safer than with Mossack Fonseca's secure Client Portal. To ensure we can provide our clients with the most secure and up-to-date protection available, we house all... More > of our servers in-house. Our Client Portal encryption certificates use the most powerful secure socket layer (SSL) encryption commercially available today. VeriSign is one of the most recognizable Internet security providers, and offers the strongest encryption available with the most rigorous authentication standards. Mossack Fonseca has always provided our clients with the most secure technology available and we join the 95% percent of Fortune 500 companies as well as the world's 40 largest banks who rely on this technology to keep client information protected.< Less
Data Security Complete Certification Kit - Core Series for IT By Ivanka Menken
Paperback: $299.95
Prints in 3-5 business days
Protect your valuable information and reduce risks through the implementation of Data Security. Data Security has become a crucial practice used by individuals and organizations to ensure data and... More > information are safe and secure at all times. Become a valued member of your organization by learning the importance of implementing Data Security processes and software. The industry is facing a bold, new world with the amazing developments of Data Security, and the challenges and the opportunities this presents are unprecedented. The Data Security Complete Certification Kit serves as a complete introductory guide for anyone looking to grasp a better understanding of Data Security concepts and their practical application in any environment. The Art of Service's introductory Data Security training and certification helps IT practitioners develop the skills that are crucial, as businesses embark on this massive transformation.< Less
Data Protection in Higher Education: A Comprehensive Review of IT Security Policies in a University Environment. By Michael Wells
eBook (PDF): $0.00
Computer information is omnipresent and when organizations collect and retain information about others, either in the form of financial records, personal data, or medical records, that organization... More > has an obligation to protect the information from falling into the wrong hands. One thing that makes colleges and universities different from corporate businesses is the fact that they are places for learning and exploring. Therefore, not only should policies have a succinct structure, but also they need to allow academic freedom while still being adhered to by various types of users. Human Resources and administration should work in partnership with IT to put policies in place quickly. The biggest barrier to swift development and deployment of computer security policies is the bureaucracy that is created within academia.< Less
Computer Security Exploits: Web Security By Wilbur Newhart
Paperback: List Price: $60.00 $36.00 | You Save: 40%
Prints in 3-5 business days
(1 Ratings)
An exploit is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability in order to cause unintended or unanticipated behavior to occur on... More > computer software, hardware, or something electronic. Such behavior frequently includes things like gaining control of a computer system, allowing privilege escalation, or a denial-of-service attack.< Less
Hackers vs. Security Pros - A Security Manager's Playbook By Shahriar Chowdhury
Paperback: $10.90
Prints in 3-5 business days
This book is a guide for Security Managers and CISOs to develop a security program for an organization of any size and industry. The concept of LEAN is introduced to build an efficient and... More > effective program, and several management theories are discussed to have a strategic view for IT Security Management. Success stories and pitfalls of specific technologies such as Data Loss Prevention (DLP), Security Incident and Event Management (SIEM), Malware Prevention are also introduced. Shahriar Chowdhury is an experienced Information Security Manager with over a decade of Security consulting and management experience at large organizations in New York City area.< Less
Present Value of Data Furnished By Homework Help Classof1
eBook (PDF): $5.99
Value the financial instrument below using excels functions. A security that will begin making payments when you retire in 20 of $20,000 per year for 3 years, then declines by 10% per year for the... More > next 3 years after that, and pays nothing thereafter. (Assume the discount rate is 10%)< Less
Cloud Infrastructure and Data Center By Duong Tran
eBook (ePub): $9.99
Cloud Infrastructure and Data Center Book is a collection of Information Technology big pictures. The purpose of the book is to help students and network system administrators to learn Information... More > Technology. The book covers many topics such as networking, system administration, cabling, VOIP, desktop management, server management, information storage, IT security, wireless, mobile management, cloud infrastructure, software-defined-data-center, software-defined-storage, software-defined-network, data center, automation, orchestration, problem solving, disaster and recovery, risk management, asset management, time management, budget management, project management, IT services, and the future of IT. The rated is entry level to manager level. The actual values of this book are $10,000 of training and four years degree.< Less
Data Security: High-impact Strategies - What You Need to Know: Definitions, Adoptions, Impact, Benefits, Maturity, Vendors By Kevin Roebuck
Paperback: $39.95
Prints in 3-5 business days
Data security is the means of ensuring that data is kept safe from corruption and that access to it is suitably controlled. Thus data security helps to ensure privacy. It also helps in protecting... More > personal data. This book is your ultimate resource for Data Security. Here you will find the most up-to-date information, analysis, background and everything you need to know. This book explains in-depth the real drivers and workings of Data Security. It reduces the risk of your technology, time and resources investment decisions by enabling you to compare your understanding of Data Security with the objectivity of experienced professionals.< Less
Data Protection for Slightly Bigger Companies By Alan Gillies
Paperback: List Price: $26.29 $21.03 | You Save: 20%
Prints in 3-5 business days
This practical hand book is designed to help small and slightly larger businesses look after their information and the information they hold on behalf of customers, clients and employees. It covers... More > the Data Protection Act and other similar legislation, standards for data protection (BS10012) and information security (ISO27001) and is designed to help companies highlight their risks, weaknesses and threats.< Less
The Path to IT Security: A Career Guide By Alexander Tang
eBook (PDF): $6.51
“News report – Credit Crunch, Nationalisation, Fraud, Data Loss, Systems been hacked”. Job redundancies, boredom, need a new challenge. How about a new career in IT Security. This... More > guide book will provide the necessary information to get you started.< Less