TOP
月月讀書金,登入即領,滿600現折50!!
Data Leakage Detection and Prevention for Data Security

Data Leakage Detection and Prevention for Data Security

商品資訊

定價
:NT$ 1550 元
無庫存,下單後進貨(到貨天數約30-45天)
下單可得紅利積點 :46 點
商品簡介

商品簡介

1. Introduction to Data Security

The National-Institute-of-Standards-and-Technology (

NIST) explains term

data-security as a way for "protection afforded to an automated information

system in order to attain the applicable objectives of preserving the integrity,

availability, and confidentiality of information system resources (includes

hardware, software, firmware, information/data, and telecommunications)" [1]

[2].

1.1

Wireless networks are growing faster and are gaining popularity in almost

every industry since their appearance in around late 1970s. Moreover, in last

decade WN has got wings and is growing at a tremendous pace as wireless

network have enabled the industries with most promising things the mobility

and the data accessibility over electronic media/platforms. Data is now availa-

ble in fraction of seconds worldwide regardless of any geographical

boundations. On the top of all it is reasonable and approachable to masses

with ease [3] [4] [5].

This existing scenario of rapid network growth enabled the sharing of sensi-

tive data of any entity among diverse stakeholders within or outside the organ-

ization premises for analyzing purpose. This sharing of confidential data

among multiple entities; enhances the chances that sensitive information later

can be found at some unauthorized location as the data receiver might have

misused the data. Also, recipient of data even may leak it either for intentional

or an unintentional reasons. Restricted access to the confidential data may

hamper organization's growth and performance.

1. Introduction to Data Security

The National-Institute-of-Standards-and-Technology (

NIST) explains term

data-security as a way for "protection afforded to an automated information

system in order to attain the applicable objectives of preserving the integrity,

availability, and confidentiality of information system resources (includes

hardware, software, firmware, information/data, and telecommunications)" [1]

[2].

1.1

Wireless networks are growing faster and are gaining popularity in almost

every industry since their appearance in around late 1970s. Moreover, in last

decade WN has got wings and is growing at a tremendous pace as wireless

network have enabled the industries with most promising things the mobility

and the data accessibility over electronic media/platforms. Data is now availa-

ble in fraction of seconds worldwide regardless of any geographical

boundations. On the top of all it is reasonable and approachable to masses

with ease [3] [4] [5].

This existing scenario of rapid network growth enabled the sharing of sensi-

tive data of any entity among diverse stakeholders within or outside the organ-

ization premises for analyzing purpose. This sharing of confidential data

among multiple entities; enhances the chances that sensitive information later

can be found at some unauthorized location as the data receiver might have

misused the data. Also, recipient of data even may leak it either for intentional

or an unintentional reasons. Restricted access to the confidential data may

hamper organization's growth and performance.

購物須知

外文書商品之書封,為出版社提供之樣本。實際出貨商品,以出版社所提供之現有版本為主。部份書籍,因出版社供應狀況特殊,匯率將依實際狀況做調整。

無庫存之商品,在您完成訂單程序之後,將以空運的方式為你下單調貨。為了縮短等待的時間,建議您將外文書與其他商品分開下單,以獲得最快的取貨速度,平均調貨時間為1~2個月。

為了保護您的權益,「三民網路書店」提供會員七日商品鑑賞期(收到商品為起始日)。

若要辦理退貨,請在商品鑑賞期內寄回,且商品必須是全新狀態與完整包裝(商品、附件、發票、隨貨贈品等)否則恕不接受退貨。

定價:100 1550
無庫存,下單後進貨
(到貨天數約30-45天)

暢銷榜

客服中心

收藏

會員專區