Nik Zulkarnaen Khidzir, Shekh Abdullah-Al-Musa Ahmed
Guardians of Data (eBook, ePUB)
A Comprehensive Guide to Digital Data Protection
45,95 €
45,95 €
inkl. MwSt.
Erscheint vor. 16.05.25
23 °P sammeln
45,95 €
Als Download kaufen
45,95 €
inkl. MwSt.
Erscheint vor. 16.05.25
23 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
45,95 €
inkl. MwSt.
Erscheint vor. 16.05.25
Alle Infos zum eBook verschenken
23 °P sammeln
Unser Service für Vorbesteller - Ihr Vorteil ohne Risiko:
Sollten wir den Preis dieses Artikels vor dem Erscheinungsdatum senken, werden wir Ihnen den Artikel bei der Auslieferung automatisch zum günstigeren Preis berechnen.
Sollten wir den Preis dieses Artikels vor dem Erscheinungsdatum senken, werden wir Ihnen den Artikel bei der Auslieferung automatisch zum günstigeren Preis berechnen.
Nik Zulkarnaen Khidzir, Shekh Abdullah-Al-Musa Ahmed
Guardians of Data (eBook, ePUB)
A Comprehensive Guide to Digital Data Protection
- Format: ePub
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book helps to reduce risks of data loss by monitoring and controlling the flow of sensitive data via the network, email or web. This book also shows the guidance about data protection that data is not corrupted, is accessible for authorized purposes only, and is in compliance with applicable legal or regulatory requirements.
- Geräte: eReader
- mit Kopierschutz
- eBook Hilfe
- Größe: 4.97MB
Andere Kunden interessierten sich auch für
- Nik Zulkarnaen KhidzirGuardians of Data (eBook, PDF)45,95 €
- Kevin Lynn McLaughlinCybersecurity Operations and Fusion Centers (eBook, ePUB)48,95 €
- Akashdeep BhardwajInsecure Digital Frontiers (eBook, ePUB)45,95 €
- Agile Security in the Digital Era (eBook, ePUB)54,95 €
- Cybersecurity in Knowledge Management (eBook, ePUB)51,95 €
- Ravindra DasRansomware (eBook, ePUB)30,95 €
- Pierre-Luc PomerleauEvidence-Based Cybersecurity (eBook, ePUB)45,95 €
-
-
-
This book helps to reduce risks of data loss by monitoring and controlling the flow of sensitive data via the network, email or web. This book also shows the guidance about data protection that data is not corrupted, is accessible for authorized purposes only, and is in compliance with applicable legal or regulatory requirements.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis eBooks
- Erscheinungstermin: 16. Mai 2025
- Englisch
- ISBN-13: 9781040344811
- Artikelnr.: 73737781
- Verlag: Taylor & Francis eBooks
- Erscheinungstermin: 16. Mai 2025
- Englisch
- ISBN-13: 9781040344811
- Artikelnr.: 73737781
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Nik Zulkarnaen Khidzir, PhD, is a Certified MBOT Professional Technologist, an Associate Professor in the Faculty of Creative Technology and Heritage, and Deputy Director of the University Malaysia Kelantan (UMK) International. His research interests include advanced methods for educational technology, multimedia and visual communication interaction in Islamic perspectives, software engineering, cybersecurity risks, information security risk management, entrepreneurial leadership, business and education computing/e-commerce and creative computing-related projects. As a founder of Cre8tivation Lab UMK, Universiti Malaysia Kelantan, he leads several high-impact entrepreneurship innovation projects and consultancy focuses on creative innovation and digital technology. Before taking an academic position, he had more than 20 years of experience in ICT integration entrepreneurship projects for government agencies, private companies and higher education. His niche area of research work focuses on creative innovation and digital technology. He has received various recognitions and awards in research and innovation competitions at the national and international levels. He was granted 10 IP for various innovations and inventions from technology research to innovative entrepreneurship education models, and he has written more than 70 journal articles, case studies, conference proceedings and other writings in the areas of applied digital technology, creative computing, entrepreneurship education innovation and cybersecurity. He is a member of the MBA Advisory Board (UniKL), the DBA Advisory Board (MIU), Master Trainer of Computational Thinking (MDEC), Professional Software Tester (MSTB), TTAC Auditor and member of the Panel of Assessment for Professional Technologist (MBOT). He received a top 2018 Outstanding Entrepreneurship Mentor Award from the Ministry of Higher Education Malaysia. He is a member of the Technology Advisory Board for Bayarcash, a digital financial merchant payment gateway online solution owned by Web Impian Sdn Bhd.
Shekh Abdullah-Al-Musa Ahmed, PhD, earned a BSc (Hons) in computing at UCSI University, Malaysia; an ME in information system security at Bangladesh University of Professionals (BUP); and a PhD at the University Malaysia Kelantan (UMK). He has written 19 research articles in peer-reviewed journals, case studies, conference proceedings, and other writings in the areas of applied digital technology, creative computing, entrepreneurship education innovation and cybersecurity. His research interests include advanced methods for educational technology, multimedia and visual communication interaction in education perspectives, software engineering, cybersecurity risks, information security risk management, entrepreneurial leadership, business and education computing/e-commerce and creative computing. His niche area focuses on creative innovation and digital technology. He has received various recognitions and awards in research and innovation competitions at the national and international levels.
Shekh Abdullah-Al-Musa Ahmed, PhD, earned a BSc (Hons) in computing at UCSI University, Malaysia; an ME in information system security at Bangladesh University of Professionals (BUP); and a PhD at the University Malaysia Kelantan (UMK). He has written 19 research articles in peer-reviewed journals, case studies, conference proceedings, and other writings in the areas of applied digital technology, creative computing, entrepreneurship education innovation and cybersecurity. His research interests include advanced methods for educational technology, multimedia and visual communication interaction in education perspectives, software engineering, cybersecurity risks, information security risk management, entrepreneurial leadership, business and education computing/e-commerce and creative computing. His niche area focuses on creative innovation and digital technology. He has received various recognitions and awards in research and innovation competitions at the national and international levels.
1. Foundation of Digital Security, Understanding and Safeguarding Data. 2.
Navigating the Digital Terrain: Understanding Data, Risks, and Regulations.
3. Legal Guardianship: Navigating Data Regulations and Threat Landscapes.
4. Guarding against the Tide: Understanding and Countering Cyber Threats.
5. Fortifying the Fortress: Strategies for Robust Data Protection. 6.
Building a Culture of Security: Training, Development, and Response. 7.
Privacy in Practice: Integrating Privacy by Design and Vendor Management.
8. Beyond Borders: Third-Party Security and Emerging Technologies. 9.
Innovations in Cybersecurity: Exploring. 10. Charting the Course:
Successes, Failures and Insights for Tomorrow's Data Guardians. 11. Into
the Future: Predictions, Innovations, and Proactive Strategies in Data
Protection.
Navigating the Digital Terrain: Understanding Data, Risks, and Regulations.
3. Legal Guardianship: Navigating Data Regulations and Threat Landscapes.
4. Guarding against the Tide: Understanding and Countering Cyber Threats.
5. Fortifying the Fortress: Strategies for Robust Data Protection. 6.
Building a Culture of Security: Training, Development, and Response. 7.
Privacy in Practice: Integrating Privacy by Design and Vendor Management.
8. Beyond Borders: Third-Party Security and Emerging Technologies. 9.
Innovations in Cybersecurity: Exploring. 10. Charting the Course:
Successes, Failures and Insights for Tomorrow's Data Guardians. 11. Into
the Future: Predictions, Innovations, and Proactive Strategies in Data
Protection.
1. Foundation of Digital Security, Understanding and Safeguarding Data. 2.
Navigating the Digital Terrain: Understanding Data, Risks, and Regulations.
3. Legal Guardianship: Navigating Data Regulations and Threat Landscapes.
4. Guarding against the Tide: Understanding and Countering Cyber Threats.
5. Fortifying the Fortress: Strategies for Robust Data Protection. 6.
Building a Culture of Security: Training, Development, and Response. 7.
Privacy in Practice: Integrating Privacy by Design and Vendor Management.
8. Beyond Borders: Third-Party Security and Emerging Technologies. 9.
Innovations in Cybersecurity: Exploring. 10. Charting the Course:
Successes, Failures and Insights for Tomorrow's Data Guardians. 11. Into
the Future: Predictions, Innovations, and Proactive Strategies in Data
Protection.
Navigating the Digital Terrain: Understanding Data, Risks, and Regulations.
3. Legal Guardianship: Navigating Data Regulations and Threat Landscapes.
4. Guarding against the Tide: Understanding and Countering Cyber Threats.
5. Fortifying the Fortress: Strategies for Robust Data Protection. 6.
Building a Culture of Security: Training, Development, and Response. 7.
Privacy in Practice: Integrating Privacy by Design and Vendor Management.
8. Beyond Borders: Third-Party Security and Emerging Technologies. 9.
Innovations in Cybersecurity: Exploring. 10. Charting the Course:
Successes, Failures and Insights for Tomorrow's Data Guardians. 11. Into
the Future: Predictions, Innovations, and Proactive Strategies in Data
Protection.