Data protection
Resource Information
The concept Data protection represents the subject, aboutness, idea or notion of resources found in Mid-Continent Public Library.
The Resource
Data protection
Resource Information
The concept Data protection represents the subject, aboutness, idea or notion of resources found in Mid-Continent Public Library.
- Label
- Data protection
125 Items that share the Concept Data protection
Context
Context of Data protectionSubject of
No resources found
No enriched resources found
- 10 don'ts on your digital devices : the non-techie's survival guide to cyber security and privacy
- Active Directory disaster recovery
- Advanced persistent threat : understanding the danger and how to protect your organization
- Analyzing computer security : a threat/vulnerability/countermeasure approach
- Anti-hacker tool kit
- Application of big data for national security : a practitioner's guide to emerging technologies
- Auditing cloud computing : a security and privacy guide
- Black Hat physical device security : exploiting hardware and software
- Business continuity planning for data centers and systems : a strategic implementation guide
- Business plans handbook : a compilation of actual business plans developed by small businesses throughout North America, Volume 9
- CMS security handbook : the comprehensive guide for WordPress, Joomla!, Drupal, and Plone
- Cloud computing : assessing the risks
- Cloud computing security : foundations and challenges
- Cloud storage security : a practical guide
- Computer privacy annoyances : how to avoid the most annoying invasions of your personal and online privacy
- Counter hack reloaded : a step-by-step guide to computer attacks and effective defenses
- Cyber spies : the secret history of surveillance, hacking, and digital espionage
- Data : Ethical Use and Storage
- Data governance : how to design, deploy, and sustain an effective data governance program
- Data hiding : exposing concealed data in multimedia, operating systems, mobile devices, and network protocols
- Data leaks for dummies
- Data protection and information lifecycle management
- Data protection and the cloud : are the risks too great?
- Data stewardship : an actionable guide to effective data management and data governance
- Deployment guide for Infosphere Guardium
- Deployment guide series, Tivoli Continuous data protection for files V3.1
- Deployment guides series, IBM Tivoli Compliance Insight Manager
- Digital rights management for e-commerce systems
- Digital watermarking
- Dropbox in 30 minutes : the beginner's guide to Dropbox backup, syncing, and sharing
- Enterprise architecture and information assurance : developing a secure foundation
- Enterprise cybersecurity : how to build a successful cyberdefense program against advanced threats
- Eyes & spies : how you're tracked and why you should know
- FISMA certification & accreditation handbook
- Future Crimes : Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It
- Future crimes : everything is connected, everyone is vulnerable and what we can do about it
- Future crimes : everything is connected, everyone is vulnerable and what we can do about it
- Get the truth : former CIA officers teach you how to persuade anyone to tell all
- Getting started with OAuth 2.0
- Governance and internal controls for cutting edge IT
- Hacking exposed 6 : network security secrets & solutions
- Hadoop security
- How to survive a data breach : a pocket guide
- IBM QRadar Version 7.3 : planning and installation guide
- IBM TotalStorage FAStT700 and copy services
- IBM Virtualization Engine TS7700 with R1.7
- IBM system storage TS7650, TS7650G, and TS7610
- IBM system storage solutions for smarter systems
- ISO27001 / ISO27002 : a pocket guide
- ISO27001 / ISO27002 : a pocket guide / Alan Calder.
- ISO27001/ISO27002 : una guÃa de bolsillo
- Implementing an InfoSphere Optim Data Growth Solution
- Implementing high availability and disaster recovery in IBM PureApplication Systems V2
- Information security : principles and practices
- Information security fundamentals
- Information security management handbook, Volume 6
- Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0
- Information storage and management : storing, managing, and protecting digital information in classic, virtualized, and cloud environments
- Information theft prevention : theory and practice
- Infosecurity 2008 threat analysis
- Instant Netcat starter : learn to harness the power and versatility of Netcat, and understand why it remains an integral part of IT and security toolkits to this day
- Internet and surveillance : the challenges of Web 2.0 and social media
- Introduction to computer and network security : navigating shades of gray
- Introduction to cyber-warfare : a multidisciplinary approach
- Investigating the Cyber Breach : the digital forensics guide for the network engineer
- Learning to love data science : explorations of emerging technologies and platforms for predictive analytics, machine learning, digital manufacturing, and supply chain optimization
- Lessons learned : critical information infrastructure protection : how to protect critical information infrastructure
- Living in information : responsible design for digital places
- Lossless information hiding in images
- Malicious cryptography : exposing cryptovirology
- Managing catastrophic loss of sensitive data
- Managing information security breaches : studies from real life
- Mastering Active Directory : automate tasks by leveraging PowerShell for Active Directory Domain Services 2016
- Mastering OAuth 2.0 : create powerful applications to interact with popular service providers such as Facebook, Google, Twitter, and more by leveraging the OAuth 2.0 Authorization Framework
- Mastering system center Data Protection Manager 2007
- Measuring and managing information risk : a FAIR approach
- Microsoft SharePoint 2013 disaster recovery guide
- Microsoft System Center Data Protection Manager 2012 R2 cookbook : over 100 recipes to build your own designs exploring the advanced functionality and features of System Center DPM 2012 R2
- Multi-domain master data management : advanced mdm and data governance in practice
- My online privacy for seniors
- Nine steps to success : an ISO27001:2013 implementation overview
- Non-invasive data governance : the path of least resistance and greatest success
- Once more unto the breach : managing information security in an uncertain world
- Oracle Data Guard 11gR2 administration beginner's guide : learn how to build and maintain Data Guard configurations with real-life, practical examples
- Oracle data guard 11g handbook
- PCI DSS 3.1 : the standard that killed SSL
- PRAGMATIC security metrics : applying metametrics to information security
- Penetration testing fundamentals
- Practical Hadoop security
- Preventing good people from doing bad things : implementing least privilege
- Privacy and big data
- Python forensics : a workbench for inventing and sharing digital forensic technology
- Responsive security : be ready to be secure
- Risk centric threat modeling : process for attack simulation and threat analysis
- Security and privacy in cyber-physical systems : foundations, principles, and applications
- Security de-engineering : solving the problems in information risk management
- Security in computing
- Security in computing
- Security in computing
- Security policies and implementation issues
- Sharing big data safely : managing data security
- Surreptitious software : obfuscation, watermarking, and tamperproofing for software protection
- Surveillance
- Technocreep : the surrender of privacy and the capitalization of intimacy
- The CERT guide to insider threats : how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud)
- The PayPal official insider guide to internet security : spot scams and protect your online business
- The art of invisibility : the world's most famous hacker teaches you how to be safe in the age of Big Brother and big data
- The art of invisibility : the world's most famous hacker teaches you how to be safe in the age of Big Brother and big data
- The art of invisibility : the world's most famous hacker teaches you how to be safe in the age of Big Brother and big data
- The art of invisibility : the world's most famous hacker teaches you how to be safe in the age of Big Brother and big data
- The business case for network security : advocacy, governance, and ROI
- The chief information security officer : insights, tools and survival skills
- The cloud security ecosystem : technical, legal, business and management issues
- The complete book of data anonymization : from planning to implementation
- The information systems security officer's guide : establishing and managing a cyber security program
- The privacy engineer's manifesto : getting from policy to code to QA to value
- The security risk assessment handbook : a complete guide for performing security risk assessments
- The shellcoder's handbook : discovering and exploiting security holes
- The shellcoder's handbook : discovering and exploiting security holes
- The true cost of information security breaches and cyber crime
- Total information risk management : maximizing the value of data and information assets
- Unauthorized access : the crisis in online privacy and security
- WordPress 3 ultimate security
- Writing information security policies
- You--for sale : protecting your personal data and privacy online
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.mymcpl.org/resource/cNuXtZ-TWhg/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.mymcpl.org/resource/cNuXtZ-TWhg/">Data protection</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.mymcpl.org/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.mymcpl.org/">Mid-Continent Public Library</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Concept Data protection
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.mymcpl.org/resource/cNuXtZ-TWhg/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.mymcpl.org/resource/cNuXtZ-TWhg/">Data protection</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.mymcpl.org/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.mymcpl.org/">Mid-Continent Public Library</a></span></span></span></span></div>