|
Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection
With the expansion of technology and governance, the information
governance industry has experienced dramatic and often, sudden
changes. Among the most important shifts are the proliferation of
data privacy rules and regulations, the exponential growth of data
and the need for removing redundant, obsolete, and trivial
information and the growing threat of litigation and regulatory
fines based on a failure to properly keep records and manage data.
At the same time, longstanding information governance standards and
best practices exist, which transcend the sudden vicissitudes of
the day.This volume focuses on these core IG principles, with an
emphasis on how they apply to our target audience, which includes
law librarians, legal and research staff and other individuals and
departments in both the public and private sectors who engage
deeply with regulatory compliance matters. Core topics that will be
addressed include: the importance of implementing and maintaining
cohesive records management workflows that implement the classic
principles of capturing, checking, recording, consolidation, and
review; the classic records management principles of
Accountability, Transparency, Integrity, Protection, Compliance,
Accessibility, Retention and Disposition; and archives Management
and the two principles of Providence and Original Order.
Cyber-terrorism and corporate espionage are increasingly common and
devastating threats, making trained network security professionals
more important than ever. This timely text helps you gain the
knowledge and skills to protect networks using the tools and
techniques of an ethical hacker. The authors begin by exploring the
concept of ethical hacking and its practitioners, explaining their
importance in protecting corporate and government data from cyber
attacks. The text then provides an in-depth guide to performing
security testing against computer networks, covering current tools
and penetration testing methodologies. Updated for today's cyber
security environment, the Third Edition of this trusted text
features new computer security resources, coverage of emerging
vulnerabilities and innovative methods to protect networks, a new
discussion of mobile security, and information on current federal
and state computer crime laws, including penalties for illegal
computer hacking.
|
|