000 04054nam a22005055i 4500
001 978-3-658-35494-7
003 DE-He213
005 20240423125541.0
007 cr nn 008mamaa
008 220104s2022 gw | s |||| 0|eng d
020 _a9783658354947
_9978-3-658-35494-7
024 7 _a10.1007/978-3-658-35494-7
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema
082 0 4 _a005.8
_223
100 1 _aLenhard, Thomas H.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
245 1 0 _aData Security
_h[electronic resource] :
_bTechnical and Organizational Protection Measures against Data Loss and Computer Crime /
_cby Thomas H. Lenhard.
250 _a1st ed. 2022.
264 1 _aWiesbaden :
_bSpringer Fachmedien Wiesbaden :
_bImprint: Springer,
_c2022.
300 _aXI, 113 p. 10 illus., 8 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
505 0 _aData protection and data security -- How computers communicate with each other -- What can happen to data files -- Technical threats -- Dangerous software -- Dangers from mobile data carriers and devices -- Telephone system as a source of danger -- Destruction of data -- Securing data -- Encryption -- Security of websites -- Common threats to IT security -- Identification of computers and IP addresses -- Firewalls -- Routers -- Configuration of protection systems -- The demilitarized zone -- Organizational data protection.
520 _aUsing many practical examples and notes, the book offers an easy-to understand introduction to technical and organizational data security. It provides an insight into the technical knowledge that is mandatory for data protection officers. Data security is an inseparable part of data protection, which is becoming more and more important in our society. It can only be implemented effectively if there is an understanding of technical interrelationships and threats. This book is a translation of the original German 2nd edition Datensicherheit by Thomas H. Lenhard, published by Springer Fachmedien Wiesbaden GmbH, part of Springer Nature in 2020. The translation was done with the help of artificial intelligence (machine translation by the service DeepL.com). A subsequent human revision was done primarily in terms of content, so that the book will read stylistically differently from a conventional translation. Springer Nature works continuously to further the development of tools for the production of books and on the related technologies to support the authors. The Content How computers communicate - Dangers to data files - Technical threats - Dangerous software - Dangers from mobile devices - Dangers of phone systems - Destruction of data - Securing data - Encryption - Identification of computers - Firewalls - Configuration problems - DMZ – etc. The Target Groups (Future) data protection officers Lawyers who want to learn about data security Executives who would like to gain an insight into IT security Students of computer science and business informatics The Author Dr. Thomas H. Lenhard is an internationally recognized expert on information technology and data protection. He draws on a wealth of experience from three decades of data protection and data security.
650 0 _aData protection.
650 0 _aComputer science.
650 1 4 _aData and Information Security.
650 2 4 _aComputer Science.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783658354930
776 0 8 _iPrinted edition:
_z9783658354954
856 4 0 _uhttps://doi.org/10.1007/978-3-658-35494-7
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
942 _cSPRINGER
999 _c179179
_d179179