This eBook includes the following formats, accessible from your Account page after purchase:
EPUB The open industry format known for its reflowable content and usability on supported mobile devices.
MOBI The eBook format compatible with the Amazon Kindle and Amazon Kindle applications.
PDF The popular standard, used most often with the free Adobe® Reader® software.
This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.
Also available in other formats.
Register your product to gain access to bonus material or receive a coupon.
Organizations of all kinds are recognizing the crucial importance of protecting privacy. Their customers, employees, and other stakeholders demand it. Today, failures to safeguard privacy can destroy organizational reputations – and even the organizations themselves. But implementing effective privacy protection is difficult, and there are few comprehensive resources for those tasked with doing so. In Information Privacy Engineering and Privacy by Design, renowned information technology author William Stallings brings together the comprehensive and practical guidance you need to succeed. Stallings shows how to apply today’s consensus best practices and widely-accepted standards documents in your environment, leveraging policy, procedures, and technology to meet legal and regulatory requirements and protect everyone who depends on you. Like Stallings’ other award-winning texts, this guide is designed to help readers quickly find the information and gain the mastery needed to implement effective privacy. Coverage includes:
Part I: Planning for Privacy1. Information Privacy Concepts2. Security Governance and Management3. Risk Assessment
Part II: Privacy Threats4. Information Storage and Processing5. Information Collection and Dissemination6. Intrusion and Interference
Part III: Information Privacy Technology7. Basic Privacy Controls8. Privacy Enhancing Technology9. Data Loss Prevention10. Online Privacy11. Detection of Conflicts In Security Policies12. Privacy Evaluation
Part IV: Information Privacy Regulations13. GDPR14. U.S. Privacy Laws and Regulations