With a view to helping managers ask the right questions, Data Protection and the Cloud explains how you can effectively manage the risks associated with the Cloud and meet regulatory requirements.
An ideal primer for anyone implementing a PIMS based on ISO/IEC 27701ISO/IEC 27701:2019 is a privacy extension to the international information security management standard, ISO/IEC 27001.
With a view to helping managers ask the right questions, Data Protection and the Cloud explains how you can effectively manage the risks associated with the Cloud and meet regulatory requirements.
A detailed argument of how our government has interfered in the direction of America's media landscape that traces major transformations in media since the printing press and charts a path for reform.
A detailed argument of how our government has interfered in the direction of America's media landscape that traces major transformations in media since the printing press and charts a path for reform.
El Reglamento de Servicios Digitales constituye un instrumento crucial mediante el cual la Unión Europea pretende acometer los retos que suponen la sociedad digital y, en particular, las plataformas con un enorme impacto social, económico y político.
This book delivers insights into how social science and technology might aid new advancements in managing the complexity inherent within national and international security landscape.
This book evidences the cyclical failures of online safety policy and challenge conventional policy and educational approaches to tackling online harms, and provide a robust argument for a critical, evidence-based approaches which align with the needs of those we claim to wish to protect.
This book investigates the recent history of the drug market on the dark web and suggests interventions that can be used to curb the trade of illegal products in the internet's underbelly.
This book introduces some fundamentals of information and communication technology (ICT) and other current and future technologies that are relevant to the field of cybersecurity.
This book explores the intersection of cybersecurity and psychology, examining the motivations and behaviours of cybersecurity professionals, employees, hackers, and cybercriminals.
This book investigates the recent history of the drug market on the dark web and suggests interventions that can be used to curb the trade of illegal products in the internet's underbelly.
This book delivers insights into how social science and technology might aid new advancements in managing the complexity inherent within national and international security landscape.
This book presents the 16th ICGS3-24 conference which aims to understand the full impact of cyber-security, AI, deepfake, and quantum computing on humanity.
This book examines the international forums in which states develop cyber norms-"e;rules of the road"e; for how governments use information and communication technologies.