Home > Store

Information Privacy Engineering and Privacy by Design: Understanding Privacy Threats, Technology, and Regulations Based on Standards and Best Practices

Register your product to gain access to bonus material or receive a coupon.

Information Privacy Engineering and Privacy by Design: Understanding Privacy Threats, Technology, and Regulations Based on Standards and Best Practices

Best Value Purchase

Book + eBook Bundle

  • Your Price: $79.44
  • List Price: $136.98
  • Includes EPUB and PDF
  • About eBook Formats
  • This eBook includes the following formats, accessible from your Account page after purchase:

    ePub EPUB The open industry format known for its reflowable content and usability on supported mobile devices.

    Adobe Reader PDF The popular standard, used most often with the free Acrobat® Reader® software.

    This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.

More Purchase Options

Book

  • Your Price: $55.99
  • List Price: $69.99
  • Usually ships in 24 hours.

eBook

  • Your Price: $53.59
  • List Price: $66.99
  • Includes EPUB and PDF
  • About eBook Formats
  • This eBook includes the following formats, accessible from your Account page after purchase:

    ePub EPUB The open industry format known for its reflowable content and usability on supported mobile devices.

    Adobe Reader PDF The popular standard, used most often with the free Acrobat® Reader® software.

    This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.

About

Features

  • Ideal for all students studying the privacy aspects of cybersecurity
  • Includes full sections on planning for privacy, identifying and understanding threats, applying modern privacy technologies, and understanding evolving legal and regulatory requirements (including GDPR)
  • Reflects best practices and widely-accepted standards, and supports key Human Security elements of Cybersecurity Curricula 2017 (CSEC2017)
  • Multiple learning features promote rapid access and mastery: from clear learning objectives and glossary definitions to QR weblinks and a frequently updated website
  • Ancillary resources, including lecture slides, provide instructors ample support in integrating this text 
  • By William Stallings, 13-time winner of the prestigious TAA Computer Science Textbook of the Year Award

Description

  • Copyright 2020
  • Dimensions: 7" x 9-1/8"
  • Pages: 528
  • Edition: 1st
  • Book
  • ISBN-10: 0-13-530215-3
  • ISBN-13: 978-0-13-530215-6

The Comprehensive Guide to Engineering and Implementing Privacy Best Practices

As systems grow more complex and cybersecurity attacks more relentless, safeguarding privacy is ever more challenging. Organizations are increasingly responding in two ways, and both are mandated by key standards such as GDPR and ISO/IEC 27701:2019. The first approach, privacy by design, aims to embed privacy throughout the design and architecture of IT systems and business practices. The second, privacy engineering, encompasses the technical capabilities and management processes needed to implement, deploy, and operate privacy features and controls in working systems.

In Information Privacy Engineering and Privacy by Design, internationally renowned IT consultant and author William Stallings brings together the comprehensive knowledge privacy executives and engineers need to apply both approaches. Using the techniques he presents, IT leaders and technical professionals can systematically anticipate and respond to a wide spectrum of privacy requirements, threats, and vulnerabilities–addressing regulations, contractual commitments, organizational policies, and the expectations of their key stakeholders.

• Review privacy-related essentials of information security and cryptography
• Understand the concepts of privacy by design and privacy engineering
• Use modern system access controls and security countermeasures to partially satisfy privacy requirements
• Enforce database privacy via anonymization and de-identification
• Prevent data losses and breaches
• Address privacy issues related to cloud computing and IoT
• Establish effective information privacy management, from governance and culture to audits and impact assessment
• Respond to key privacy rules including GDPR, U.S. federal law, and the California Consumer Privacy Act

This guide will be an indispensable resource for anyone with privacy responsibilities in any organization, and for all students studying the privacy aspects of cybersecurity.

Downloads

Downloads

Download: Appendix: Answers to Review Questions (879 KB .pdf)

Sample Content

Online Sample Chapter

Online Privacy: Threats and Requirements

Table of Contents

  • Part I: Planning for Privacy
  • 1. Information Privacy Concepts
  • 2. Security Governance and Management
  • 3. Risk Assessment
  • Part II: Privacy Threats
  • 4. Information Storage and Processing
  • 5. Information Collection and Dissemination
  • 6. Intrusion and Interference
  • Part III: Information Privacy Technology
  • 7. Basic Privacy Controls
  • 8. Privacy Enhancing Technology
  • 9. Data Loss Prevention
  • 10. Online Privacy
  • 11. Detection of Conflicts In Security Policies
  • 12. Privacy Evaluation
  • Part IV: Information Privacy Regulations
  • 13. GDPR
  • 14. U.S. Privacy Laws and Regulations

Updates

Submit Errata

More Information

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.