Data protection: governance, risk management, and compliance
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Boca Raton, FLA
Taylor & Francis
2009
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XXV, 304 S. |
ISBN: | 9781439806920 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV035729504 | ||
003 | DE-604 | ||
005 | 20091118 | ||
007 | t | ||
008 | 090917s2009 xxu |||| 00||| eng d | ||
010 | |a 2009024410 | ||
020 | |a 9781439806920 |c hardcover : alk. paper |9 978-1-4398-0692-0 | ||
035 | |a (OCoLC)277196158 | ||
035 | |a (DE-599)BVBBV035729504 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-473 |a DE-634 | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 004 | |
082 | 0 | |a 005.8/6 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Hill, David G. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Data protection |b governance, risk management, and compliance |c David G. Hill |
264 | 1 | |a Boca Raton, FLA |b Taylor & Francis |c 2009 | |
300 | |a XXV, 304 S. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 4 | |a Computer security | |
650 | 4 | |a Data protection | |
650 | 4 | |a Information technology |x Security measures | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |5 DE-604 | |
856 | 4 | 2 | |m Digitalisierung UB Bamberg |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018006126&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-018006126 |
Datensatz im Suchindex
_version_ | 1804140008692514816 |
---|---|
adam_text | Contents
Preface
xix
The Sea Change in Data Protection
xx
Who Should Read This Book
xx
What Should You Read
xxii
Acknowledgments
xxiii
About the Author
xxv
Chapter
1
The Time Has Come for Change
1
1.1
What to Look for in This Chapter
1
1.2
Why Data Protection Is Important
1
1.3
What Data Protection Is
2
1.4
Data Protection Has to Be Placed in the
Right Framework
3
1.5
Evolving to the Governance, Risk Management, and
Compliance Framework
4
1.6
Ride the Sea Change in Data Protection
4
1.7
How to Read This Book
5
1.8
An Aside on Process Management
7
1.9
KeyTakeaways
7
Chapter
2
Business Continuity: The First Foundation for
Data Protection
9
2.1
What to Look for in This Chapter
9
2.2
Business Continuity as a Key to Risk Management
9
2.3
Business Continuity and Data Protection
10
2.4
Business Continuity Is Not Just Disaster Recovery
11
2.5
Disaster Recovery: Let s Get Physical
14
2.6
Operational Recovery: Think Logically
16
VII
viii
Data Protection: Governance, Risk Management, and Compliance
2.7
Disaster Recovery Requires Judgment; Operational
Recovery Requires Automation
17
2.8
Logical Data Protection Gets Short Shift in
Business Continuity
19
2.8.1
Logical Problems Feature Prominently
in Data Loss or Downtime
20
2.8.2
Logical Data Protection Problems
Manifest in a Number of Ways
20
2.9
Do Not Neglect Any Facet of Data Protection
22
2.10
Key Takeaway
s
22
Chapter
3
Data Protection
—
Where the Problems Lie
25
3.1
What to Look for in This Chapter
25
3.2
Data Protection as It Was in the Beginning
25
3.3
Typical Data Protection Technology Today Still
Leaves a Lot to Be Desired
29
3.3.1
Operational Continuity/Physical:
Generally Strong, but Some
Improvement Needed
31
3.3.2
Operational Continuity/Logical: More
Attention Needs to Be Paid to Logical
Data Protection
32
3.3.3
Disaster Continuity/Physical: Done
Well, but Cost and Distance Are Issues
32
3.3.4
Disaster Continuity/Logical: The
Danger of Being Under Protected May
Be Very Real
34
3.4
Summing Up Data Protection Challenges
by Category
34
3.5
Key
Ta keaways
3 6
Chapter
4
Data Protection
—
Setting the Right Objectives
37
4.1
What to Look for in This Chapter
37
4.2
How High Is High Enough for Data Availability?
37
4.3
SNIA s Data Value Classification: A Point
of Departure
39
4.4
Do Not Equate Availability with Value
41
4.5
Availability Objectives for Operational Recovery
and Disaster Recovery Are Not Necessarily
the Same
44
Contents
¡χ
4.6
Availability Is Not the Only Data Protection
Objective
45
4.7
All Primary Data Protection Objectives Have to
Be Met
47
4.8
KeyTakeaways
48
Chapter
5
Data Protection
—
Getting the Right Degree
49
5.1
What to Look for in This Chapter
49
5.2
General Use Classes of Data
49
5.2.1
Tape Is a Special Case
50
5.2.2
Understanding Degrees of Data
Protection
51
5.3
The Third Degree
—
Levels of Exposure
52
5.3.1
Mapping Degrees of Protection
52
5.4
KeyTakeaways
54
Chapter
6
Information Lifecycle Management Changes the
Data Protection Technology Mix
57
6.1
What to Look for in This Chapter
57
6.2
Why Data Lifecycle Management Is Not
Enough
—
The Need for Metadata and Management
59
6.3
ILM Is Deep into Logical Pools of Storage
60
6.3.1
Logical Storage Pools at a High Level
61
6.3.2
Moving Information Across Pools
—
A
Distillation Process
62
6.4
Archiving Through a New Lens
62
6.4.1
Archiving: The Makeover
64
6.4.2
Protecting Archived Data
66
6.5
Active Archiving and Deep Archiving
66
6.5.1
Active Archiving Requires Active
Archive Management
67
6.5.2
Long-Term
Archiving as Part of an
Active Archive
68
6.6
ILM Changes the Data Protection Technology Mix
69
6.7
KeyTakeaways
70
Chapter
7
Compliance: A Key Piece of the GRC Puzzle
73
7.1
What to Look for in This Chapter
73
7.2
What Compliance Is All About
73
χ
Data Protection: Governance, Risk Management, and Compliance
7.3
The Relationship Between Compliance and
Risk Management
74
7.4
Compliance and Data Protection
75
7.4.1
What Must Be Done
—
Financial
Reporting
75
7.4.2
What Must Not Be Done—Data
Privacy Illustration
79
7.5
The Role of People in Compliance
82
7.6
The Role of Process in Compliance
83
7.7
The Role of Technology in Compliance
84
7.8
KeyTakeaways
85
Chapter
8
Governance: The Last Piece in the GRC Puzzle
87
8.1
What to Look for in This Chapter
87
8.2
Data Governance Must Respond to Changes in
the Federal Rules of Civil Procedure
88
8.2.1
Data Knowledge Is a Data Protection
Objective of Data Governance
89
8.2.2
Litigation Holds
89
8.2.3
Data Auditability Is a Data Protection
Objective of Data Governance
90
8.2.4
ESI in Litigation Hold Should Be Placed
in an Active Archive
91
8.2.5
Deciding What Data to Put on Litigation
Hold May Be a Challenge
91
8.2.6
When Is Good Faith a Safe Harbor?
92
8.2.7
The Burden of Inaccessible Data
92
8.2.8
Sharing Responsibility
93
8.3
The Impact on Global Civil Litigation
94
8.4
The Big Three
—
Governance, Risk Management,
and Compliance
—
and Data Protection Objectives
95
8.4.1
Data Protected Differs by Management
Responsibility
97
8.5
KeyTakeaways
98
Chapter
9
The Critical Role of Data Retention
101
9.1
What to Look for in This Chapter
101
9.2
The Need for Data Retention Management
101
9.3
Where the Responsibility for Data Retention
Policy Management Lies
102
9.3.1
The Limits of Ownership
102
Contents
x¡
9.3.2
The Limits of Custodianship
103
9.3.3
The Limits of Stewardship
104
9.3.4
The Focus of Different Stewards and
Custodians
105
9.3.5
The Data Governance Team
106
9.4
Making the Case for Archiving for Data Retention
107
9.4.1
Disposition of Data
107
9.4.2
Data Retention Required for Both
Compliance and Governance
108
9.5
Creating Data Archive Storage Pools by Data
Retention Attributes
109
9.6
KeyTakeaways
111
Chapter
10
Data Security
—
An Ongoing Challenge
113
10.1
What to Look for in This Chapter
113
10.2
How Data Protection and Data Security
Are Interrelated
113
10.3
Information Security Versus Data Security
114
10.4
Information Assurance
11 5
10.4.1
Defining the Information Assurance
Process
116
10.4.2
The Focus of Information Assurance
11 7
10.5
Information Risk Management
119
10.6
Data Preservation Is Data That Is Good to the
Last Bit
121
10.7
Confidentiality as a Private and Public Concern
121
10.8
The Role of Data Availability in Data Security
122
10.9
Three Strategies for Protecting Confidentiality of
Information
124
10.10
Confidentiality Through Limiting Access to Data
125
10.10.1
Access Control Basics
125
10.10.2
Access Control Techniques
126
10.11
Confidentiality Through Limiting Use of
Information
129
10.11.1
Policy Stewards Play a Key Role in DLP
130
10.11.2
DLP Software Now Has the Final Say
131
10.11.3
Data Governance for Data Loss
Prevention
131
10.12
Confidentiality by Rendering Information
Unusable to Unauthorized Users
132
10.12.1
Data-in-Flight Encryption
132
xii
Data Protection: Governance, Risk Management, and Compliance
10.12.2
Data-at-Rest Encryption
133
10.13
The Special Case of Storage Security
135
10.13.1
Remote Access to Storage as a
Security Risk
135
10.13.2
The Need to Secure SAN and
NAS
Storage
136
10.14
Key Takeaway
s
137
Chapter
11
Where Data Protection Technologies Fit in the New
Model
139
11.1
What to Look for in This Chapter
139
11.2
Categorizing Data Protection Products
139
11.3
Mapping the Base Data Protection Technologies
to the ILM Version of the Data Protection
Framework
143
11.4
Key Takeaways
144
Chapter
12
Back to Basics
—
Extending the Current Model
145
12.1
What to Look for in This Chapter
145
12.2
The Move to Multiple-Parity RAID
145
12.3
Evolving Backup/Restore Software
146
12.4
Recovery Management
147
12.5
Moving Data Manually and Electronically
—
The
Place of Vaulting and Consolidation
149
12.6
Remote Office Data Protection
150
12.6.1
Straightforward Backup Consolidation
150
12.6.2
Backup Consolidation as a By-product
of Server-Storage
Consol
¡dation
151
12.7
At Your Service
—
The Role of Service Suppliers
152
12.8
Key
Ta keaways
15 2
Chapter
13
When Supporting Actors Play Lead Roles
155
13.1
What to Look for in This Chapter
155
13.2
Data Deduplication and Other Space-Saving
Technologies
156
13.3
WAN Acceleration
158
13.4
Data Protection Management
159
13.5
Data Protection Change Management
162
13.6
Disaster Recovery Testing
162
13.7
Data Classification
163
Contents xiü
13.7.1
Looking at Data Classification Through
Different Lenses
164
13.8
Key Takeaways
166
Chapter
14
Disk and Tape
—
Complementing and Competing with
One Another
169
14.1
What to Look for in This Chapter
169
14.2
Disk-Based Backup
170
14.3
Speeding up the Backup/Restore Process
—
Your
Mileage May Vary
170
14.4
Improving Restore Reliability
171
14.5
Keep in Mind
172
14.6
Virtual Tape
173
14.7
Virtual Tape Library
173
14.8
MAID
174
14.9
Removable Disk Drives and Disk Media
175
14.10
Data Protection Appliances
176
14.11
Tape Automation
177
14.12
Key Takeaways
179
Chapter
15
Technologies for High Availability and Low
(or No) Data Loss
181
15.1
What to Look for in This Chapter
181
15.2
Copy Strategies
182
15.2.1
Point-in-Time Copy
183
15.2.2
Continuous Data Protection
184
15.2.3
Scheduled-lmage Data Protection
185
15.3
Replication Strategies
186
15.3.1
Mirroring
187
15.3.2
Dated Replication—Pay Close Attention
190
15.4
Key Takeaways
192
Chapter
16
Special Requirements for Compliance,
Governance, and Data Security
193
1 6.1
What to Look for in This Chapter
193
16.2
The Use of WORM Technology
194
16.2.1
Issues with Physically Destroying
WORM Media
194
16.3
WORM Tape
195
16.4
WORM Disk
196
Data Protection: Governance, Risk Management, and Compliance
16.5
Electronic Locking
197
16.6
Guaranteeing the Authenticity of Data
197
16.7
Encryption Techniques
197
16.7.1
Software-Based Encryption
197
16.7.2
Encryption Appliance
198
16.7.3
Full Disk Encryption
198
16.7.4
Drive-Based Tape Encryption
199
16.7.5
Router-Based Tape Encryption
199
16.7.6
Switch-Based Encryption
199
16.8
Compliance/Governance Appliance
200
16.9
Data Shredding
200
16.10
Key Takeaways
203
Chapter
17
eDiscovery and the Electronic Discovery Reference
Model
205
1 7.1
What to Look for in This Chapter
205
1 7.2
Information Management
—
Getting eDiscovery
Off on the Right Foot
207
1 7.2.1
The eDiscovery Information
Management Process
207
1 7.2.2
Records Management
—
Back to the
Future
208
1 7.2.3
Data Mapping
—
Carrying Out the
Data Knowledge Imperative
209
1 7.2.4
Again a Return to the Need for
Data Governance
211
1 7.3
Overview of the Steps of the EDRM Model
211
17.3.1
Identification
212
17.3.2
Preservation
213
17.3.3
Collection
216
17.3.4
Processing
218
17.3.5
Review
220
17.3.6
Analysis
221
17.3.7
Production
222
17.3.8
Presentation
223
1 7.4
Key Takeaways
223
Chapter
18
Cloud Computing, SaaS, and Other Data
Protection Services
225
18.1
What to Look for in This Chapter
225
Contents xv
18.2
Growth in
Services
Raises Questions for
Data Protection
225
18.2.1
Service-Related Data Protection Issues
226
18.2.2
The Off-Premises Third-Party Services
Food Chain
227
18.2.3
Services Point Toward Utility
Computing
228
18.3
An Introduction to Cloud Computing
229
18.3.1
Common Characteristics for Hosted or
On-Premises Cloud Computing
229
18.3.2
Characteristics of Hosted Cloud
Computing
231
18.3.3
An Introduction to
Software-as-a-Service
233
18.3.4
An Introduction to Storage-as-a-Service
234
18.4
Where IT Services Are Headed
234
18.4.1
The Drivers for the Services Model
234
18.4.2
IT for Competitive Advantage Is Still
Important
235
18.5
Data Protection Considerations in Using
a Services Model
236
18.5.1
Data Protection Requirements When
Using a Third-Party Supplier
237
18.5.2
Businesses Cannot Abrogate
Responsibility
237
18.5.3
Businesses Must Get What They
Need Done for Their Data
238
18.5.4
How Does the Third-Party Supplier
Deliver Its Capabilities
239
18.5.5
The Need to Know Location for
Data Protection Purposes
241
18.5.6
The Need for Formal Service-Level
Agreements
242
18.6
Confronting the Issue of Control and Third-Party
Services
244
18.7
Key
Ta
keaways
246
Chapter
19
Other Considerations in Data Protection
249
19.1
What to Look for in This Chapter
249
19.2
From Flash Computing to Tape
—
The Role of
Tiering in Data Protection
249
xvi
Data Protection: Governance, Risk Management, and Compliance
19.2.1
Tier
0
SSDs
250
19.2.2
Tieri
FC
and
SAS
253
19.2.3
Tier
2
SATA
254
19.2.4
Tier
3
Tape
255
19
.3
The Impact of Server and Storage Virtualization
on Data Protection
255
19.3.1
An Overview of Server Virtualization
256
19.3.2
Server Virtualization and Data
Protection
257
19.3.3
How Virtualization and High
Availability Go Together
258
19.3.4
How Virtualization and Operational
Recovery Go Together
259
19.3.5
How Virtualization and Disaster
Recovery Go Together
261
19
.4
Master Data Management and Data Protection
261
19.4.1
Referencing a Couple of Key IT
Initiatives
262
19.4.2
An Introduction to Master Data
Management
263
19.4.3
MDM
Architecture
264
19.4.4
Master Data Management and Data
Governance
265
19.4.5
The Need for a Data Governance
Maturity Model
266
19
.5
Green Computing and Data Protection
267
19
.6
Key Takeaway
s
270
Chapter
20
Tying It All Together, Including the PRO-Tech Data
Protection Model
271
20.1
What to Look for in This Chapter
271
20.2
The PRO-Tech Model for Data Protection
272
20.3
The PRO-Tech Model—Level
1 274
20.3.1
Process Layer
1 274
20.3.2
Rules Layer
1 275
20.3.3
Order Layer
1 276
20.3.4
TECHnology Provisioning Layer
1 277
20.4
Tying the PRO-Tech Layers to GRC Business
Responsibilities
279
20.5
Data Protection Is Everyone s Business
—
Last Call
for Data Governance
281
Contents xvii
20.6
Synthesizing a Data Protection Framework
282
20.7
Guidelines for Data Protection
284
20.8
The Challenge Ahead and a Call to Action
285
20.9
KeyTakeaways
285
Glossary
287
Index
299
|
any_adam_object | 1 |
author | Hill, David G. |
author_facet | Hill, David G. |
author_role | aut |
author_sort | Hill, David G. |
author_variant | d g h dg dgh |
building | Verbundindex |
bvnumber | BV035729504 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_rvk | ST 276 |
ctrlnum | (OCoLC)277196158 (DE-599)BVBBV035729504 |
dewey-full | 004 005.8/6 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science 005 - Computer programming, programs, data, security |
dewey-raw | 004 005.8/6 |
dewey-search | 004 005.8/6 |
dewey-sort | 14 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01447nam a2200409zc 4500</leader><controlfield tag="001">BV035729504</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20091118 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">090917s2009 xxu |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2009024410</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781439806920</subfield><subfield code="c">hardcover : alk. paper</subfield><subfield code="9">978-1-4398-0692-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)277196158</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV035729504</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8/6</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Hill, David G.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Data protection</subfield><subfield code="b">governance, risk management, and compliance</subfield><subfield code="c">David G. Hill</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton, FLA</subfield><subfield code="b">Taylor & Francis</subfield><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXV, 304 S.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Bamberg</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018006126&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-018006126</subfield></datafield></record></collection> |
id | DE-604.BV035729504 |
illustrated | Not Illustrated |
indexdate | 2024-07-09T21:53:09Z |
institution | BVB |
isbn | 9781439806920 |
language | English |
lccn | 2009024410 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-018006126 |
oclc_num | 277196158 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG DE-634 |
owner_facet | DE-473 DE-BY-UBG DE-634 |
physical | XXV, 304 S. |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | Taylor & Francis |
record_format | marc |
spelling | Hill, David G. Verfasser aut Data protection governance, risk management, and compliance David G. Hill Boca Raton, FLA Taylor & Francis 2009 XXV, 304 S. txt rdacontent n rdamedia nc rdacarrier Computer security Data protection Information technology Security measures Datensicherung (DE-588)4011144-1 gnd rswk-swf Datensicherung (DE-588)4011144-1 s DE-604 Digitalisierung UB Bamberg application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018006126&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Hill, David G. Data protection governance, risk management, and compliance Computer security Data protection Information technology Security measures Datensicherung (DE-588)4011144-1 gnd |
subject_GND | (DE-588)4011144-1 |
title | Data protection governance, risk management, and compliance |
title_auth | Data protection governance, risk management, and compliance |
title_exact_search | Data protection governance, risk management, and compliance |
title_full | Data protection governance, risk management, and compliance David G. Hill |
title_fullStr | Data protection governance, risk management, and compliance David G. Hill |
title_full_unstemmed | Data protection governance, risk management, and compliance David G. Hill |
title_short | Data protection |
title_sort | data protection governance risk management and compliance |
title_sub | governance, risk management, and compliance |
topic | Computer security Data protection Information technology Security measures Datensicherung (DE-588)4011144-1 gnd |
topic_facet | Computer security Data protection Information technology Security measures Datensicherung |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018006126&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT hilldavidg dataprotectiongovernanceriskmanagementandcompliance |