Readings Newsletter
Become a Readings Member to make your shopping experience even easier.
Sign in or sign up for free!
You’re not far away from qualifying for FREE standard shipping within Australia
You’ve qualified for FREE standard shipping within Australia
The cart is loading…
This book provides a comprehensive overview of data security and privacy protection with expert systematic coverage of related topics. It starts with the design of system architecture and key controls under the scope and objectives of data security. Then based on an in-depth analysis of data security risks and challenges, it provides the principles for the regulatory requirements for privacy protection, and implementation, as well as industry best practices.Moving onto applications in networks, this book expounds on the data security of information technology (IT), telecommunications, the Cloud, and the Internet of Things (IoT). Emerging technologies such as artificial intelligence (AI), blockchain and 5G are in turn examined as the frontier of theoretical and technical development in data security.This work is a culmination of the author's more than 20 years of experience in the field of cybersecurity and data security. As the chief cybersecurity architect of a large Forbes 500 company, he possesses a comprehensive knowledge of cybersecurity theory enriched by diverse practical experience.This book is a useful textbook for students of cyberspace security, computer, and information technology majors in colleges and universities. It is also suitable as a reference for practitioners and engineers in information security, cloud computing, and similar disciplines.
$9.00 standard shipping within Australia
FREE standard shipping within Australia for orders over $100.00
Express & International shipping calculated at checkout
This book provides a comprehensive overview of data security and privacy protection with expert systematic coverage of related topics. It starts with the design of system architecture and key controls under the scope and objectives of data security. Then based on an in-depth analysis of data security risks and challenges, it provides the principles for the regulatory requirements for privacy protection, and implementation, as well as industry best practices.Moving onto applications in networks, this book expounds on the data security of information technology (IT), telecommunications, the Cloud, and the Internet of Things (IoT). Emerging technologies such as artificial intelligence (AI), blockchain and 5G are in turn examined as the frontier of theoretical and technical development in data security.This work is a culmination of the author's more than 20 years of experience in the field of cybersecurity and data security. As the chief cybersecurity architect of a large Forbes 500 company, he possesses a comprehensive knowledge of cybersecurity theory enriched by diverse practical experience.This book is a useful textbook for students of cyberspace security, computer, and information technology majors in colleges and universities. It is also suitable as a reference for practitioners and engineers in information security, cloud computing, and similar disciplines.