Home > Store

Information Privacy Engineering and Privacy by Design: Understanding Privacy Threats, Technology, and Regulations Based on Standards and Best Practices

Information Privacy Engineering and Privacy by Design: Understanding Privacy Threats, Technology, and Regulations Based on Standards and Best Practices

eBook (Watermarked)

  • Your Price: $44.79
  • List Price: $55.99
  • Includes EPUB, MOBI, and PDF
  • About eBook Formats
  • This eBook includes the following formats, accessible from your Account page after purchase:

    ePub EPUB The open industry format known for its reflowable content and usability on supported mobile devices.

    MOBI MOBI The eBook format compatible with the Amazon Kindle and Amazon Kindle applications.

    Adobe Reader PDF The popular standard, used most often with the free Adobe® Reader® software.

    This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.

Also available in other formats.

Register your product to gain access to bonus material or receive a coupon.


  • Copyright 2020
  • Pages: 528
  • Edition: 1st
  • eBook (Watermarked)
  • ISBN-10: 0-13-527840-6
  • ISBN-13: 978-0-13-527840-6

Organizations of all kinds are recognizing the crucial importance of protecting privacy. Their customers, employees, and other stakeholders demand it. Today, failures to safeguard privacy can destroy organizational reputations – and even the organizations themselves. But implementing effective privacy protection is difficult, and there are few comprehensive resources for those tasked with doing so. In Information Privacy Engineering and Privacy by Design, renowned information technology author William Stallings brings together the comprehensive and practical guidance you need to succeed. Stallings shows how to apply today’s consensus best practices and widely-accepted standards documents in your environment, leveraging policy, procedures, and technology to meet legal and regulatory requirements and protect everyone who depends on you. Like Stallings’ other award-winning texts, this guide is designed to help readers quickly find the information and gain the mastery needed to implement effective privacy. Coverage includes:

  • Planning for privacy: Approaches for managing and controlling the privacy control function; how to define your IT environment’s requirements; and how to develop appropriate policies and procedures for it
  • Privacy threats: Understanding and identifying the full range of threats to privacy in information collection, storage, processing, access, and dissemination
  • Information privacy technology: Satisfying the privacy requirements you’ve defined by using technical controls, privacy policies, employee awareness, acceptable use policies, and other techniques
  • Legal and regulatory requirements: Understanding GDPR as well as the current spectrum of U.S. privacy regulations, with insight for mapping regulatory requirements to IT actions



Download: Appendix: Answers to Review Questions (879 KB .pdf)

Sample Content

Table of Contents

Part I: Planning for Privacy1. Information Privacy Concepts2. Security Governance and Management3. Risk Assessment
Part II: Privacy Threats4. Information Storage and Processing5. Information Collection and Dissemination6. Intrusion and Interference
Part III: Information Privacy Technology7. Basic Privacy Controls8. Privacy Enhancing Technology9. Data Loss Prevention10. Online Privacy11. Detection of Conflicts In Security Policies12. Privacy Evaluation
Part IV: Information Privacy Regulations13. GDPR14. U.S. Privacy Laws and Regulations


Submit Errata

More Information

Unlimited one-month access with your purchase
Free Safari Membership