找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Data Security; Technical and Organi Thomas H. Lenhard Book 20221st edition Springer Fachmedien Wiesbaden GmbH, part of Springer Nature 2022

[复制链接]
查看: 29429|回复: 66
发表于 2025-3-21 16:53:38 | 显示全部楼层 |阅读模式
书目名称Data Security
副标题Technical and Organi
编辑Thomas H. Lenhard
视频video
概述Offers an easy to understand introduction.Shows numerous practical examples that can be implemented directly in companies and organizations.Presents technical correlations and hazards in relation to t
图书封面Titlebook: Data Security; Technical and Organi Thomas H. Lenhard Book 20221st edition Springer Fachmedien Wiesbaden GmbH, part of Springer Nature 2022
描述Using many practical examples and notes, the book offers an easy-to-understand introduction to technical and organizational data security. It provides an insight into the technical knowledge that is mandatory for data protection officers. Data security is an inseparable part of data protection, which is becoming more and more important in our society. It can only be implemented effectively if there is an understanding of technical interrelationships and threats. Data security covers much more information than just personal data. It secures all data and thus the continued existence of companies and organizations..This book is a translation of the original German 2.nd. edition .Datensicherheit .by Thomas H. Lenhard, published by Springer Fachmedien Wiesbaden GmbH, part of Springer Nature in 2020. The translation was done with the help of artificial intelligence (machine translation by the service DeepL.com). A subsequent human revision was done primarily in terms of content, so that the book will read stylistically differently from a conventional translation. Springer Nature works continuously to further the development of tools for the production of books and on the related technolo
出版日期Book 20221st edition
关键词Data Protection; Privacy; Backup and Recovery; Dangers of IT use; Computer Sabotage; Computer Crime; Prote
版次1
doihttps://doi.org/10.1007/978-3-658-35494-7
isbn_softcover978-3-658-35493-0
isbn_ebook978-3-658-35494-7
copyrightSpringer Fachmedien Wiesbaden GmbH, part of Springer Nature 2022
The information of publication is updating

书目名称Data Security影响因子(影响力)




书目名称Data Security影响因子(影响力)学科排名




书目名称Data Security网络公开度




书目名称Data Security网络公开度学科排名




书目名称Data Security被引频次




书目名称Data Security被引频次学科排名




书目名称Data Security年度引用




书目名称Data Security年度引用学科排名




书目名称Data Security读者反馈




书目名称Data Security读者反馈学科排名




单选投票, 共有 0 人参与投票
 

0票 0%

Perfect with Aesthetics

 

0票 0%

Better Implies Difficulty

 

0票 0%

Good and Satisfactory

 

0票 0%

Adverse Performance

 

0票 0%

Disdainful Garbage

您所在的用户组没有投票权限
发表于 2025-3-21 23:08:48 | 显示全部楼层
发表于 2025-3-22 00:40:16 | 显示全部楼层
https://doi.org/10.1007/978-3-658-37747-2Using examples, the chapter explains how easy it can be to trick websites that are based on so-called content management systems and to log on to such systems as an administrator. Although the security vulnerabilities used here are usually due to negligence in development or administration, the methods described are still common.
发表于 2025-3-22 06:04:11 | 显示全部楼层
发表于 2025-3-22 12:23:27 | 显示全部楼层
Additional Topics and DiscussionAn increased risk potential for IT systems and infrastructures always exists when resources within the network can be accessed and reached from the internet. The chapter describes the use of so-called demilitarized zones and the use of proxy servers to better secure corporate networks against attacks from the Internet.
发表于 2025-3-22 16:16:30 | 显示全部楼层
Data Protection and Data Security,Data protection is inconceivable without data security. But data security encompasses much more than just measures to protect personal data. The term data security is also by no means limited to the defense against hacker attacks. This chapter therefore provides an initial insight into the scope and tasks of data security.
发表于 2025-3-22 18:53:41 | 显示全部楼层
发表于 2025-3-23 00:11:20 | 显示全部楼层
Website Hacking,Using examples, the chapter explains how easy it can be to trick websites that are based on so-called content management systems and to log on to such systems as an administrator. Although the security vulnerabilities used here are usually due to negligence in development or administration, the methods described are still common.
发表于 2025-3-23 03:06:25 | 显示全部楼层
发表于 2025-3-23 05:46:52 | 显示全部楼层
The Demilitarized Zone,An increased risk potential for IT systems and infrastructures always exists when resources within the network can be accessed and reached from the internet. The chapter describes the use of so-called demilitarized zones and the use of proxy servers to better secure corporate networks against attacks from the Internet.
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-4-27 12:05
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表