Fifty years ago, in 1984, George Orwell imagined a future in which privacy was demolished by a totalitarian state that used spies, video surveillance, historical revisionism, and control over the media to maintain its power.
Applying the Data Protection Act to the CloudThe UK s Data Protection Act 1998 (DPA) applies to the whole lifecycle of information, from its original collection to its final destruction.
With a view to helping managers ask the right questions, Data Protection and the Cloud explains how you can effectively manage the risks associated with the Cloud and meet regulatory requirements.
This pocket guide is a primer for any OES (operators of essential services) that needs to comply with the NIS Regulations, and explores who they are, and why the NIS Regulations are different for them.
Written by an acknowledged expert on the ISO/IEC 27001 Standard, ISO 27001:2022 - An Introduction to information security and the ISMS standard is an ideal primer for anyone implementing an information security management system aligned to ISO 27001:2022.
This pocket guide is a primer for any DSPs (digital service providers) that needs to comply with the NIS Regulations, and explores who they are, and why the NIS Regulations are different for them.
An ideal primer for anyone implementing a PIMS based on ISO/IEC 27701ISO/IEC 27701:2019 is a privacy extension to the international information security management standard, ISO/IEC 27001.
This pocket guide is a primer for any OES (operators of essential services) that needs to comply with the NIS Regulations, and explores who they are, and why the NIS Regulations are different for them.
Written by an acknowledged expert on the ISO/IEC 27001 Standard, ISO 27001:2022 - An Introduction to information security and the ISMS standard is an ideal primer for anyone implementing an information security management system aligned to ISO 27001:2022.
This pocket guide is a primer for any DSPs (digital service providers) that needs to comply with the NIS Regulations, and explores who they are, and why the NIS Regulations are different for them.
With a view to helping managers ask the right questions, Data Protection and the Cloud explains how you can effectively manage the risks associated with the Cloud and meet regulatory requirements.
Fifty years ago, in 1984, George Orwell imagined a future in which privacy was demolished by a totalitarian state that used spies, video surveillance, historical revisionism, and control over the media to maintain its power.
This probing account of the erosion of privacy in America shows that we are often unwitting, if willing, accomplices, providing personal data in exchange for security or convenience.
Amenazados presenta una advertencia urgente: mostrar los peligros que entraña Internet para todos quienes la utilizamos, pues ella es parte de nuestras vidas, casi como el aire que respiramos.
This Guide is considered Entry-To-Medium level in Websites and Web Applications penetration testing, it is a good starting point for those who want to start their career as a Web Applications Penetration testers or Security analysts.
"Checklisten und Sicherheitstipps - entspannt Surfen" Computerviren und Würmer, die weltweit Millionen von PCs befallen und lahmlegen, wie es Melissa und dem I-Love-You-Virus vor 15 Jahren gelang, gibt es heute nicht mehr.
El propósito de esta obra es trasmitir a los equipos responsables de la ciberseguridad, estudiantes, ingenieros y profesionales del sector los procesos necesarios para la gestión de los ciberriesgos, proporcionando las herramientas más actuales y aplicables para identificar los riesgos, cuantificarlos, mitigarlos y transferirlos.