語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Data Security = Technical and Organizational Protection Measures against Data Loss and Computer Crime /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Data Security/ by Thomas H. Lenhard.
其他題名:
Technical and Organizational Protection Measures against Data Loss and Computer Crime /
作者:
Lenhard, Thomas H.
面頁冊數:
XI, 113 p. 10 illus., 8 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Computer Science. -
電子資源:
https://doi.org/10.1007/978-3-658-35494-7
ISBN:
9783658354947
Data Security = Technical and Organizational Protection Measures against Data Loss and Computer Crime /
Lenhard, Thomas H.
Data Security
Technical and Organizational Protection Measures against Data Loss and Computer Crime /[electronic resource] :by Thomas H. Lenhard. - 1st ed. 2022. - XI, 113 p. 10 illus., 8 illus. in color.online resource.
Data protection and data security -- How computers communicate with each other -- What can happen to data files -- Technical threats -- Dangerous software -- Dangers from mobile data carriers and devices -- Telephone system as a source of danger -- Destruction of data -- Securing data -- Encryption -- Security of websites -- Common threats to IT security -- Identification of computers and IP addresses -- Firewalls -- Routers -- Configuration of protection systems -- The demilitarized zone -- Organizational data protection.
Using many practical examples and notes, the book offers an easy-to understand introduction to technical and organizational data security. It provides an insight into the technical knowledge that is mandatory for data protection officers. Data security is an inseparable part of data protection, which is becoming more and more important in our society. It can only be implemented effectively if there is an understanding of technical interrelationships and threats. This book is a translation of the original German 2nd edition Datensicherheit by Thomas H. Lenhard, published by Springer Fachmedien Wiesbaden GmbH, part of Springer Nature in 2020. The translation was done with the help of artificial intelligence (machine translation by the service DeepL.com). A subsequent human revision was done primarily in terms of content, so that the book will read stylistically differently from a conventional translation. Springer Nature works continuously to further the development of tools for the production of books and on the related technologies to support the authors. The Content How computers communicate - Dangers to data files - Technical threats - Dangerous software - Dangers from mobile devices - Dangers of phone systems - Destruction of data - Securing data - Encryption - Identification of computers - Firewalls - Configuration problems - DMZ – etc. The Target Groups (Future) data protection officers Lawyers who want to learn about data security Executives who would like to gain an insight into IT security Students of computer science and business informatics The Author Dr. Thomas H. Lenhard is an internationally recognized expert on information technology and data protection. He draws on a wealth of experience from three decades of data protection and data security.
ISBN: 9783658354947
Standard No.: 10.1007/978-3-658-35494-7doiSubjects--Topical Terms:
593922
Computer Science.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Data Security = Technical and Organizational Protection Measures against Data Loss and Computer Crime /
LDR
:03716nam a22004095i 4500
001
1092303
003
DE-He213
005
20220112012456.0
007
cr nn 008mamaa
008
221228s2022 gw | s |||| 0|eng d
020
$a
9783658354947
$9
978-3-658-35494-7
024
7
$a
10.1007/978-3-658-35494-7
$2
doi
035
$a
978-3-658-35494-7
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
100
1
$a
Lenhard, Thomas H.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1325781
245
1 0
$a
Data Security
$h
[electronic resource] :
$b
Technical and Organizational Protection Measures against Data Loss and Computer Crime /
$c
by Thomas H. Lenhard.
250
$a
1st ed. 2022.
264
1
$a
Wiesbaden :
$b
Springer Fachmedien Wiesbaden :
$b
Imprint: Springer,
$c
2022.
300
$a
XI, 113 p. 10 illus., 8 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
505
0
$a
Data protection and data security -- How computers communicate with each other -- What can happen to data files -- Technical threats -- Dangerous software -- Dangers from mobile data carriers and devices -- Telephone system as a source of danger -- Destruction of data -- Securing data -- Encryption -- Security of websites -- Common threats to IT security -- Identification of computers and IP addresses -- Firewalls -- Routers -- Configuration of protection systems -- The demilitarized zone -- Organizational data protection.
520
$a
Using many practical examples and notes, the book offers an easy-to understand introduction to technical and organizational data security. It provides an insight into the technical knowledge that is mandatory for data protection officers. Data security is an inseparable part of data protection, which is becoming more and more important in our society. It can only be implemented effectively if there is an understanding of technical interrelationships and threats. This book is a translation of the original German 2nd edition Datensicherheit by Thomas H. Lenhard, published by Springer Fachmedien Wiesbaden GmbH, part of Springer Nature in 2020. The translation was done with the help of artificial intelligence (machine translation by the service DeepL.com). A subsequent human revision was done primarily in terms of content, so that the book will read stylistically differently from a conventional translation. Springer Nature works continuously to further the development of tools for the production of books and on the related technologies to support the authors. The Content How computers communicate - Dangers to data files - Technical threats - Dangerous software - Dangers from mobile devices - Dangers of phone systems - Destruction of data - Securing data - Encryption - Identification of computers - Firewalls - Configuration problems - DMZ – etc. The Target Groups (Future) data protection officers Lawyers who want to learn about data security Executives who would like to gain an insight into IT security Students of computer science and business informatics The Author Dr. Thomas H. Lenhard is an internationally recognized expert on information technology and data protection. He draws on a wealth of experience from three decades of data protection and data security.
650
2 4
$a
Computer Science.
$3
593922
650
1 4
$a
Data and Information Security.
$3
1365785
650
0
$a
Computer science.
$3
573171
650
0
$a
Data protection.
$3
557764
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783658354930
776
0 8
$i
Printed edition:
$z
9783658354954
856
4 0
$u
https://doi.org/10.1007/978-3-658-35494-7
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入