000 | 04054nam a22005055i 4500 | ||
---|---|---|---|
001 | 978-3-658-35494-7 | ||
003 | DE-He213 | ||
005 | 20240423125541.0 | ||
007 | cr nn 008mamaa | ||
008 | 220104s2022 gw | s |||| 0|eng d | ||
020 |
_a9783658354947 _9978-3-658-35494-7 |
||
024 | 7 |
_a10.1007/978-3-658-35494-7 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
100 | 1 |
_aLenhard, Thomas H. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
245 | 1 | 0 |
_aData Security _h[electronic resource] : _bTechnical and Organizational Protection Measures against Data Loss and Computer Crime / _cby Thomas H. Lenhard. |
250 | _a1st ed. 2022. | ||
264 | 1 |
_aWiesbaden : _bSpringer Fachmedien Wiesbaden : _bImprint: Springer, _c2022. |
|
300 |
_aXI, 113 p. 10 illus., 8 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
505 | 0 | _aData protection and data security -- How computers communicate with each other -- What can happen to data files -- Technical threats -- Dangerous software -- Dangers from mobile data carriers and devices -- Telephone system as a source of danger -- Destruction of data -- Securing data -- Encryption -- Security of websites -- Common threats to IT security -- Identification of computers and IP addresses -- Firewalls -- Routers -- Configuration of protection systems -- The demilitarized zone -- Organizational data protection. | |
520 | _aUsing many practical examples and notes, the book offers an easy-to understand introduction to technical and organizational data security. It provides an insight into the technical knowledge that is mandatory for data protection officers. Data security is an inseparable part of data protection, which is becoming more and more important in our society. It can only be implemented effectively if there is an understanding of technical interrelationships and threats. This book is a translation of the original German 2nd edition Datensicherheit by Thomas H. Lenhard, published by Springer Fachmedien Wiesbaden GmbH, part of Springer Nature in 2020. The translation was done with the help of artificial intelligence (machine translation by the service DeepL.com). A subsequent human revision was done primarily in terms of content, so that the book will read stylistically differently from a conventional translation. Springer Nature works continuously to further the development of tools for the production of books and on the related technologies to support the authors. The Content How computers communicate - Dangers to data files - Technical threats - Dangerous software - Dangers from mobile devices - Dangers of phone systems - Destruction of data - Securing data - Encryption - Identification of computers - Firewalls - Configuration problems - DMZ – etc. The Target Groups (Future) data protection officers Lawyers who want to learn about data security Executives who would like to gain an insight into IT security Students of computer science and business informatics The Author Dr. Thomas H. Lenhard is an internationally recognized expert on information technology and data protection. He draws on a wealth of experience from three decades of data protection and data security. | ||
650 | 0 | _aData protection. | |
650 | 0 | _aComputer science. | |
650 | 1 | 4 | _aData and Information Security. |
650 | 2 | 4 | _aComputer Science. |
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783658354930 |
776 | 0 | 8 |
_iPrinted edition: _z9783658354954 |
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-658-35494-7 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
942 | _cSPRINGER | ||
999 |
_c179179 _d179179 |