Data protection :
Hill, David G.
Data protection : governance, risk management, and compliance / David G. Hill. - Boca Raton, FL : Taylor & Francis, 2009 - xxv, 304 p. : ill. ; 25 cm.
1. The time has come for change
2. Business continuity: the first foundation for data protection
3. Data protection - where the problems lie
4. Data protection - setting the right objectives
5. Data protection - getting the right degree
6. Information lifecycle management changes the data protection technology mix
7. Compliance: a key piece of the grc puzzle
8. Governance: the last piece in the grc puzzle
9. The critical role of data retention
10. Data security - an ongoing challenge
11. Where data protection technologies fit in the new model
12. Back to basics - extending the current model
13. When supporting actors play lead roles
14. Disk and tape - complementing and competing with one another
15. Technologies for high availability and low (or no) data loss
16. Special requirements for compliance, governance and data security
17. Ediscovery and the electronic discovery reference model
18. Cloud computing, saas and other data protection services
19. Other considerations in data protection
20. Typing it all together, including the pro-tech data protection model
9781439806920 (hardcover : alk. paper) 1439806926 (hardcover : alk. paper)
Computer security.
Data protection.
Information technology--Security measures.
005.86 / H5501
Data protection : governance, risk management, and compliance / David G. Hill. - Boca Raton, FL : Taylor & Francis, 2009 - xxv, 304 p. : ill. ; 25 cm.
1. The time has come for change
2. Business continuity: the first foundation for data protection
3. Data protection - where the problems lie
4. Data protection - setting the right objectives
5. Data protection - getting the right degree
6. Information lifecycle management changes the data protection technology mix
7. Compliance: a key piece of the grc puzzle
8. Governance: the last piece in the grc puzzle
9. The critical role of data retention
10. Data security - an ongoing challenge
11. Where data protection technologies fit in the new model
12. Back to basics - extending the current model
13. When supporting actors play lead roles
14. Disk and tape - complementing and competing with one another
15. Technologies for high availability and low (or no) data loss
16. Special requirements for compliance, governance and data security
17. Ediscovery and the electronic discovery reference model
18. Cloud computing, saas and other data protection services
19. Other considerations in data protection
20. Typing it all together, including the pro-tech data protection model
9781439806920 (hardcover : alk. paper) 1439806926 (hardcover : alk. paper)
Computer security.
Data protection.
Information technology--Security measures.
005.86 / H5501