ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Information Privacy Engineering and Privacy by Design: Understanding privacy threats, technologies, and regulations

دانلود کتاب مهندسی حریم خصوصی اطلاعات و حریم خصوصی با طراحی: درک تهدیدات حریم خصوصی، فناوری ها و مقررات

Information Privacy Engineering and Privacy by Design: Understanding privacy threats, technologies, and regulations

مشخصات کتاب

Information Privacy Engineering and Privacy by Design: Understanding privacy threats, technologies, and regulations

ویرایش: [Original retail ed.] 
نویسندگان:   
سری:  
ISBN (شابک) : 0135302153, 9780135302156 
ناشر: Addison-Wesley Professional 
سال نشر: 6 Dec 2019 
تعداد صفحات: 528 
زبان: English 
فرمت فایل : EPUB (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 14 Mb 

قیمت کتاب (تومان) : 37,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 2


در صورت تبدیل فایل کتاب Information Privacy Engineering and Privacy by Design: Understanding privacy threats, technologies, and regulations به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب مهندسی حریم خصوصی اطلاعات و حریم خصوصی با طراحی: درک تهدیدات حریم خصوصی، فناوری ها و مقررات نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب مهندسی حریم خصوصی اطلاعات و حریم خصوصی با طراحی: درک تهدیدات حریم خصوصی، فناوری ها و مقررات

سازمان‌ها از همه نوع اهمیت حیاتی حفاظت از حریم خصوصی را تشخیص می‌دهند. مشتریان، کارمندان و سایر ذینفعان آن‌ها را می‌طلبند. امروزه، شکست در حفظ حریم خصوصی می‌تواند اعتبار سازمانی و حتی خود سازمان‌ها را از بین ببرد. اما اجرای موثر حفاظت از حریم خصوصی دشوار است و منابع جامع کمی برای کسانی که وظیفه انجام این کار را دارند وجود دارد. در کتاب مهندسی حریم خصوصی اطلاعات و طراحی حریم خصوصی، نویسنده مشهور فناوری اطلاعات، ویلیام استالینگز، راهنمایی جامع و عملی را که برای موفقیت نیاز دارید، گرد هم آورده است. Stallings نشان می‌دهد که چگونه می‌توانید بهترین شیوه‌های اجماع امروزی و اسناد استانداردهای پذیرفته‌شده را در محیط خود اعمال کنید، از سیاست‌ها، رویه‌ها و فناوری برای برآورده کردن الزامات قانونی و نظارتی و محافظت از همه کسانی که به شما وابسته هستند، استفاده کنید. مانند دیگر متون برنده جوایز استالینگز، این راهنما برای کمک به خوانندگان طراحی شده است تا به سرعت اطلاعات را بیابند و تسلط لازم برای اجرای حریم خصوصی موثر را به دست آورند. پوشش شامل: • برنامه ریزی برای حفظ حریم خصوصی: رویکردهایی برای مدیریت و کنترل عملکرد کنترل حریم خصوصی. چگونه الزامات محیط فناوری اطلاعات خود را تعریف کنیم؛ و چگونگی تدوین سیاست ها و رویه های مناسب برای آن • تهدیدات حریم خصوصی: درک و شناسایی طیف وسیعی از تهدیدات حریم خصوصی در جمع آوری، ذخیره سازی، پردازش، دسترسی و انتشار اطلاعات • فناوری حریم خصوصی اطلاعات: برآورده کردن الزامات حریم خصوصی که با استفاده از کنترل‌های فنی، خط‌مشی‌های حفظ حریم خصوصی، آگاهی کارکنان، خط‌مشی‌های استفاده قابل قبول، و سایر تکنیک‌ها تعریف کرده‌اید. • الزامات قانونی و نظارتی: درک GDPR و همچنین طیف فعلی مقررات حریم خصوصی ایالات متحده، با بینش برای ترسیم الزامات نظارتی به اقدامات فناوری اطلاعات


توضیحاتی درمورد کتاب به خارجی

Organizations of all kinds are recognizing the crucial importance of protecting privacy. Their customers, employees, and other stakeholders demand it. Today, failures to safeguard privacy can destroy organizational reputations – and even the organizations themselves. But implementing effective privacy protection is difficult, and there are few comprehensive resources for those tasked with doing so. In Information Privacy Engineering and Privacy by Design, renowned information technology author William Stallings brings together the comprehensive and practical guidance you need to succeed. Stallings shows how to apply today’s consensus best practices and widely-accepted standards documents in your environment, leveraging policy, procedures, and technology to meet legal and regulatory requirements and protect everyone who depends on you. Like Stallings’ other award-winning texts, this guide is designed to help readers quickly find the information and gain the mastery needed to implement effective privacy. Coverage includes: • Planning for privacy: Approaches for managing and controlling the privacy control function; how to define your IT environment’s requirements; and how to develop appropriate policies and procedures for it • Privacy threats: Understanding and identifying the full range of threats to privacy in information collection, storage, processing, access, and dissemination • Information privacy technology: Satisfying the privacy requirements you’ve defined by using technical controls, privacy policies, employee awareness, acceptable use policies, and other techniques • Legal and regulatory requirements: Understanding GDPR as well as the current spectrum of U.S. privacy regulations, with insight for mapping regulatory requirements to IT actions



فهرست مطالب

Cover
Half Title
Title Page
Copyright Page
Dedication
Table of Contents
Preface
Part I: Overview
	Chapter 1: Security and Cryptography Concepts
		1.1 Cybersecurity, Information Security, and Network Security
			Security Objectives
			The Challenges of Information Security
		1.2 Security Attacks
			Passive Attacks
			Active Attacks
		1.3 Security Services
			Authentication
			Access Control
			Data Confidentiality
			Data Integrity
			Nonrepudiation
			Availability Service
		1.4 Security Mechanisms
		1.5 Cryptographic Algorithms
			Keyless Algorithms
			Single-Key Algorithms
			Two-Key Algorithms
		1.6 Symmetric Encryption
		1.7 Asymmetric Encryption
		1.8 Cryptographic Hash Functions
		1.9 Digital Signatures
		1.10 Practical Considerations
			Selection of Cryptographic Algorithms and Key Lengths
			Implementation Considerations
			Lightweight Cryptographic Algorithms
			Post-Quantum Cryptographic Algorithms
		1.11 Public-Key Infrastructure
			Public-Key Certificates
			PKI Architecture
		1.12 Network Security
			Communications Security
			Device Security
		1.13 Key Terms and Review Questions
			Key Terms
			Review Questions
		1.14 References
	Chapter 2: Information Privacy Concepts
		2.1 Key Privacy Terminology
		2.2 Privacy by Design
			Privacy by Design Principles
			Requirements and Policy Development
			Privacy Risk Assessment
			Privacy and Security Control Selection
			Privacy Program and Integration Plan
		2.3 Privacy Engineering
			Privacy Implementation
			System Integration
			Privacy Testing and Evaluation
			Privacy Auditing and Incident Response
		2.4 Privacy and Security
			Areas of Overlap Between Security and Privacy
			Trade-Offs Between Security and Privacy
		2.5 Privacy Versus Utility
		2.6 Usable Privacy
			Users of Privacy Services and Functions
			Usability and Utility
		2.7 Key Terms and Review Questions
			Key Terms
			Review Questions
		2.8 References
Part II: Privacy Requirements and Threats
	Chapter 3: Information Privacy Requirements and Guidelines
		3.1 Personally Identifiable Information and Personal Data
			Sources of PII
			Sensitivity of PII
		3.2 Personal Information That Is Not PII
		3.3 Fair Information Practice Principles
		3.4 Privacy Regulations
			European Union
			U.S. Privacy Laws and Regulations
		3.5 Privacy Standards
			International Organization for Standardization (ISO)
			National Institute of Standards and Technology
		3.6 Privacy Best Practices
			Information Security Forum (ISF)
			Cloud Security Alliance (CSA)
		3.7 Key Terms and Review Questions
			Key Terms
			Review Questions
		3.8 References
	Chapter 4: Information Privacy Threats and Vulnerabilities
		4.1 The Evolving Threat Environment
			Overall Impact of Advances in Technology
			Repurposing Collected Data
			Means of Collection of PII
		4.2 Privacy Threat Taxonomy
			Information Collection
			Information Processing
			Information Dissemination
			Invasions
		4.3 NIST Threat Model
		4.4 Threat Sources
		4.5 Identifying Threats
		4.6 Privacy Vulnerabilities
			Vulnerability Categories
			Location of Privacy Vulnerabilities
			National Vulnerability Database and Common Vulnerability Scoring System
		4.7 Key Terms and Review Questions
			Key Terms
			Review Questions
		4.8 References
Part III: Technical Security Controls for Privacy
	Chapter 5: System Access
		5.1 System Access Concepts
			Privileges
			System Access Functions
			Privacy Considerations for System Access
		5.2 Authorization
			Privacy Authorization
		5.3 User Authentication
			Means of Authentication
			Multifactor Authentication
			A Model for Electronic User Authentication
		5.4 Access Control
			Subjects, Objects, and Access Rights
			Access Control Policies
			Discretionary Access Control
			Role-Based Access Control
			Attribute-Based Access Control
		5.5 Identity and Access Management
			IAM Architecture
			Federated Identity Management
		5.6 Key Terms and Review Questions
			Key Terms
			Review Questions
		5.7 Reference
	Chapter 6: Malicious Software and Intruders
		6.1 Malware Protection Activities
			Types of Malware
			The Nature of the Malware Threat
			Practical Malware Protection
		6.2 Malware Protection Software
			Capabilities of Malware Protection Software
			Managing Malware Protection Software
		6.3 Firewalls
			Firewall Characteristics
			Types of Firewalls
			Next-Generation Firewalls
			DMZ Networks
			The Modern IT Perimeter
		6.4 Intrusion Detection
			Basic Intrusion Detection Principles
			Approaches to Intrusion Detection
			Host-Based Intrusion Detection Techniques
			Network-Based Intrusion Detection Systems
			IDS Best Practices
		6.5 Key Terms and Review Questions
			Key Terms
			Review Questions
		6.6 References
Part IV: Privacy Enhancing Technologies
	Chapter 7: Privacy in Databases
		7.1 Basic Concepts
			Personal Data Attributes
			Types of Data Files
		7.2 Re-Identification Attacks
			Types of Attacks
			Potential Attackers
			Disclosure Risks
			Applicability to Privacy Threats
		7.3 De-Identification of Direct Identifiers
			Anonymization
			Pseudonymization
		7.4 De-Identification of Quasi-Identifiers in Microdata Files
			Privacy-Preserving Data Publishing
			Disclosure Risk Versus Data Utility
			PPDP Techniques
		7.5 K-Anonymity, L-Diversity, and T-Closeness
			K-Anonymity
			L-Diversity
			T-Closeness
		7.6 Summary Table Protection
			Frequency Tables
			Magnitude Tables
		7.7 Privacy in Queryable Databases
			Privacy Threats
			Protecting Queryable Databases
		7.8 Key Terms and Review Questions
			Key Terms
			Review Questions
		7.9 References
	Chapter 8: Online Privacy
		8.1 The Online Ecosystem for Personal Data
		8.2 Web Security and Privacy
			Web Server Security and Privacy
			Web Application Security and Privacy
			Web Browser Security and Privacy
		8.3 Mobile App Security
			Mobile Ecosystem
			Mobile Device Vulnerabilities
			BYOD Policies
			Mobile Application Vetting
			Resources for Mobile Device Security
		8.4 Online Privacy Threats
			Web Application Privacy
			Mobile App Privacy
		8.5 Online Privacy Requirements
			Online Privacy Principles
			Online Privacy Framework
			Simplified Consumer Choice
			Transparency of Data Practices
		8.6 Privacy Notices
			Notice Requirements
			Notice Content
			Notice Structure
			Mobile App Privacy Notices
			Privacy Notice Design Space
		8.7 Tracking
			Cookies
			Other Tracking Technologies
			Do Not Track
		8.8 Key Terms and Review Questions
			Key Terms
			Review Questions
		8.9 References
	Chapter 9: Other PET Topics
		9.1 Data Loss Prevention
			Data Classification and Identification
			Data States
			DLP for Email
			DLP Model
		9.2 The Internet of Things
			Things on the Internet of Things
			Components of IoT-Enabled Things
			IoT and Cloud Context
		9.3 IoT Security
			IoT Device Capabilities
			Security Challenges of the IoT Ecosystem
			IoT Security Objectives
		9.4 IoT Privacy
			An IoT Model
			Privacy Engineering Objectives and Risks
			Challenges for Organizations
		9.5 Cloud Computing
			Cloud Computing Elements
			Threats for Cloud Service Users
		9.6 Cloud Privacy
			Data Collection
			Storage
			Sharing and Processing
			Deletion
		9.7 Key Terms and Review Questions
			Key Terms
			Review Questions
		9.8 References
Part V: Information Privacy Management
	Chapter 10: Information Privacy Governance and Management
		10.1 Information Security Governance
			Information Security Management System
			Information Security Governance Concepts
			Security Governance Components
			Integration with Enterprise Architecture
			Policies and Guidance
		10.2 Information Privacy Governance
			Information Privacy Roles
			The Privacy Program Plan
		10.3 Information Privacy Management
			Key Areas of Privacy Management
			Privacy Planning
			Privacy Policy
		10.4 OASIS Privacy Management Reference Model
			Privacy Management Reference Model and Methodology (PMRM)
			Privacy by Design Documentation for Software Engineers
		10.5 Key Terms and Review Questions
			Key Terms
			Review Questions
		10.6 References
	Chapter 11: Risk Management and Privacy Impact Assessment
		11.1 Risk Assessment
			Risk Assessment Process
			Risk Assessment Challenges
			Quantitative Risk Assessment
			Qualitative Risk Assessment
		11.2 Risk Management
			NIST Risk Management Framework
			ISO 27005: Information Security Risk Management
			Risk Evaluation
			Risk Treatment
		11.3 Privacy Risk Assessment
			Privacy Impact
			Likelihood
			Assessing Privacy Risk
		11.4 Privacy Impact Assessment
			Privacy Threshold Analysis
			Preparing for a PIA
			Identify PII Information Flows
			Identify Potential User Behavior
			Determine Relevant Privacy Safeguarding Requirements
			Assess Privacy Risk
			Determine Risk Treatment
			The PIA Report
			Implement Risk Treatment
			Review/Audit Implementation
			Examples
		11.5 Key Terms and Review Questions
			Key Terms
			Review Questions
		11.6 References
	Chapter 12: Privacy Awareness, Training, and Education
		12.1 Information Privacy Awareness
			Awareness Topics
			Awareness Program Communication Materials
			Awareness Program Evaluation
		12.2 Privacy Training and Education
			Cybersecurity Essentials
			Role-Based Training
			Education and Certification
		12.3 Acceptable Use Policies
			Information Security Acceptable Use Policy
			PII Acceptable Use Policy
		12.4 Key Terms and Review Questions
			Key Terms
			Review Questions
		12.5 References
	Chapter 13: Event Monitoring, Auditing, and Incident Response
		13.1 Event Monitoring
			Security Event Logging
			Security Event Management
			Event Logging Related to PII
		13.2 Information Security Auditing
			Data to Collect for Auditing
			Internal and External Audits
			Security Audit Controls
		13.3 Information Privacy Auditing
			Privacy Audit Checklist
			Privacy Controls
		13.4 Privacy Incident Management and Response
			Objectives of Privacy Incident Management
			Privacy Incident Response Team
			Preparing for Privacy Incident Response
			Detection and Analysis
			Containment, Eradication, and Recovery
			Notification to Affected Individuals
			Post-Incident Activity
		13.5 Key Terms and Review Questions
			Key Terms
			Review Questions
		13.6 References
Part VI: Legal and Regulatory Requirements
	Chapter 14: The EU General Data Protection Regulation
		14.1 Key Roles and Terms in the GDPR
		14.2 Structure of the GDPR
		14.3 GDPR Objectives and Scope
			Objectives
			Scope of the GDPR
		14.4 GDPR Principles
			Fairness
			Lawful
			Transparency
		14.5 Restrictions on Certain Types of Personal Data
			Children’s Personal Data
			Special Categories of Personal Data
		14.6 Rights of the Data Subject
		14.7 Controller, Processor, and Data Protection Officer
			Data Protection by Design and Default
			Records of Processing Activities
			Security of Processing
			Data Protection Officer
		14.8 Data Protection Impact Assessment
			Risk and High Risk
			Determining Whether a DPIA Is Needed
			DPIA Process
			GDPR Requirements
			Criteria for an Acceptable DPIA
		14.9 Key Terms and Review Questions
			Key Terms
			Review Questions
		14.10 References
	Chapter 15: U.S. Privacy Laws
		15.1 A Survey of Federal U.S. Privacy Laws
		15.2 Health Insurance Portability and Accountability Act
			HIPAA Overview
			HIPAA Privacy Rule
		15.3 Health Information Technology for Economic and Clinical Health Act
			Breach Notification
			Encryption of PHI
			Data Destruction
		15.4 Children’s Online Privacy Protection Act
			General Provisions
			The COPPA Final Rule
		15.5 California Consumer Privacy Act
			Basic Concepts
			Rights of Consumers
			Comparison with the GDPR
		15.6 Key Terms and Review Questions
			Key Terms
			Review Questions
		15.7 References
Index
	A
	B
	C
	D
	E
	F
	G
	H
	I
	J
	K
	L
	M
	N
	O
	P
	Q
	R
	S
	T
	U
	V
	W
	Z




نظرات کاربران