Sale!

Information Privacy Engineering and Privacy by Design: Understanding Privacy Threats, Technology, and Regulations Based on Standards and Best Practices – eBook

, , , ,

eBook details

  • Author: William Stallings
  • File Sizes: 14 MB, 22 MB
  • Format: ePub (original), PDF (converted)
  • Length: 528 pages
  • Publisher: Addison-Wesley Professional
  • Publication Date: December 6, 2019
  • Language: English
  • ASIN: B082FMW1XX
  • ISBN-10: 0135302153
  • ISBN-13: 9780135302156

$43.11 $8.00

Product ID: 102404 SKU: information-privacy-engineering-and-privacy-by-design-understanding-privacy-threats-technology-and-regulations-based-on-standards-and-best-practices-ebook Categories: , , , , Tags: ,

Information Privacy Engineering and Privacy by Design: Understanding Privacy Threats, Technology, and Regulations Based on Standards and Best Practices is the Comprehensive Guide to Engineering and Implementing Privacy Best Practices

As systems grow more complex and cybersecurity attacks more unfaltering, safeguarding privacy is ever more challenging. Organizations are increasingly responding in two ways, and both are mandated by key standards like GDPR and ISO/IEC 27701:2019. The first approach, privacy by design, intends to embed privacy throughout the design and architecture of IT systems and business practices. The second, privacy engineering, includes the technical capabilities and management processes needed to implement, deploy, and operate privacy features and controls in working systems.
In Information Privacy Engineering and Privacy by Design, (ePub/PDF) internationally renowned IT consultant and author William Stallings brings together the comprehensive knowledge engineers and privacy executives need to apply both approaches. Utilizing the techniques he presents, technical professionals and IT leaders can systematically expect and respond to a wide spectrum of privacy requirements, vulnerabilities, and threats —addressing regulations, organizational policies, contractual commitments, and the expectations of their key stakeholders.

• Prevent data losses and breaches

• Address privacy issues related to cloud computing and IoT

• Enforce database privacy via anonymization and de-identification

• Understand the concepts of privacy by design and privacy engineering

• Review privacy-related essentials of information security and cryptography

• Respond to key privacy rules including GDPR, U.S. federal law, and the California Consumer Privacy Act

• Use modern system access controls and security countermeasures to partially satisfy privacy requirements

• Establish effective information privacy management, from governance and culture to audits and impact assessment

This guide will be an essential resource for anyone with privacy responsibilities in any organization, and for all college students studying the privacy attributes of cybersecurity.

NOTE: The product includes the ebook, Information Privacy Engineering and Privacy by Design in original ePub (kindle) formal. A converted PDF is also included. No access codes are included.

Reviews

There are no reviews yet.

Be the first to review “Information Privacy Engineering and Privacy by Design: Understanding Privacy Threats, Technology, and Regulations Based on Standards and Best Practices – eBook”

You may also like…