Data Protection

, by
Data Protection by David G. Hill, 9781439806937
Note: Supplemental materials are not guaranteed with Rental or Used book purchases.
  • ISBN: 9781439806937 | 1439806934
  • Cover: Nonspecific Binding
  • Copyright: 4/19/2016

  • Rent

    (Recommended)

    $80.73
     
    Term
    Due
    Price
    *This item is part of an exclusive publisher rental program and requires an additional convenience fee. This fee will be reflected in the shopping cart.
  • Buy New

    Usually Ships in 3-5 Business Days

    $108.79
  • eBook

    eTextBook from VitalSource Icon

    Available Instantly

    Online: 180 Days

    Downloadable: 180 Days

    $54.78
Failure to appreciate the full dimensions of data protection can lead to poor data protection management, costly resource allocation issues, and exposure to unnecessary risks. Data Protection: Governance, Risk Management, and Complianceexplains how to gain a handle on the vital aspects of data protection. The author begins by building the foundation of data protection from a risk management perspective. He then introduces the two other pillars in the governance, risk management, and compliance (GRC) framework. After exploring data retention and data security in depth, the book focuses on data protection technologies primarily from a risk management viewpoint. It also discusses the special technology requirements for compliance, governance, and data security; the importance of eDiscovery for civil litigation; the impact of third-party services in conjunction with data protection; and data processing facets, such as the role of tiering and server and storage virtualization. The final chapter describes a model to help businesses get started in the planning process to improve their data protection. By examining the relationships among the pieces of the data protection puzzle, this book offers a solid understanding of how data protection fits into various organizations. It allows readers to assess their overall strategy, identify security gaps, determine their unique requirements, and decide what technologies and tactics can best meet those requirements.
Loading Icon

Please wait while the item is added to your bag...
Continue Shopping Button
Checkout Button
Loading Icon
Continue Shopping Button