My Account Log in

1 option

Data Security : Technical and Organizational Protection Measures against Data Loss and Computer Crime / by Thomas H. Lenhard.

SpringerLink Books Computer Science (2011-2024) Available online

View online
Format:
Book
Author/Creator:
Lenhard, Thomas H., Author.
Contributor:
SpringerLink (Online service)
Series:
Computer Science (SpringerNature-11645)
Language:
English
Subjects (All):
Data protection.
Computer science.
Data and Information Security.
Computer Science.
Local Subjects:
Data and Information Security.
Computer Science.
Physical Description:
1 online resource (XI, 113 pages) : 10 illustrations, 8 illustrations in color.
Edition:
1st ed. 2022.
Contained In:
Springer Nature eBook
Place of Publication:
Wiesbaden : Springer Fachmedien Wiesbaden : Imprint: Springer, 2022.
System Details:
text file PDF
Summary:
Using many practical examples and notes, the book offers an easy-to understand introduction to technical and organizational data security. It provides an insight into the technical knowledge that is mandatory for data protection officers. Data security is an inseparable part of data protection, which is becoming more and more important in our society. It can only be implemented effectively if there is an understanding of technical interrelationships and threats. This book is a translation of the original German 2nd edition Datensicherheit by Thomas H. Lenhard, published by Springer Fachmedien Wiesbaden GmbH, part of Springer Nature in 2020. The translation was done with the help of artificial intelligence (machine translation by the service DeepL.com). A subsequent human revision was done primarily in terms of content, so that the book will read stylistically differently from a conventional translation. Springer Nature works continuously to further the development of tools for the production of books and on the related technologies to support the authors. The Content How computers communicate - Dangers to data files - Technical threats - Dangerous software - Dangers from mobile devices - Dangers of phone systems - Destruction of data - Securing data - Encryption - Identification of computers - Firewalls - Configuration problems - DMZ - et cetera The Target Groups (Future) data protection officers Lawyers who want to learn about data security Executives who would like to gain an insight into IT security Students of computer science and business informatics The Author Dr. Thomas H. Lenhard is an internationally recognized expert on information technology and data protection. He draws on a wealth of experience from three decades of data protection and data security.
Contents:
Data protection and data security
How computers communicate with each other
What can happen to data files
Technical threats
Dangerous software
Dangers from mobile data carriers and devices
Telephone system as a source of danger
Destruction of data
Securing data
Encryption
Security of websites
Common threats to IT security
Identification of computers and IP addresses
Firewalls
Routers
Configuration of protection systems
The demilitarized zone
Organizational data protection.
Other Format:
Printed edition:
ISBN:
978-3-658-35494-7
9783658354947
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account