Welcome to UE Central Library

Keep Smiling

Data protection : (Record no. 15957)

MARC details
000 -LEADER
fixed length control field 01814cam a2200229 a 4500
001 - CONTROL NUMBER
control field 15776522
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200908103118.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 090615s2009 flua 001 0 eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781439806920 (hardcover : alk. paper)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1439806926 (hardcover : alk. paper)
040 ## - CATALOGING SOURCE
Transcribing agency DLC
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.86
Edition number 22
Item number H5501
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Hill, David G.
245 10 - TITLE STATEMENT
Title Data protection :
Remainder of title governance, risk management, and compliance
Statement of responsibility, etc / David G. Hill.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Boca Raton, FL :
Name of publisher, distributor, etc Taylor & Francis,
Date of publication, distribution, etc 2009
300 ## - PHYSICAL DESCRIPTION
Extent xxv, 304 p. :
Other physical details ill. ;
Dimensions 25 cm.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data protection.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Information technology
General subdivision Security measures.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Books
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note 1. The time has come for change<br/>2. Business continuity: the first foundation for data protection<br/>3. Data protection - where the problems lie<br/>4. Data protection - setting the right objectives<br/>5. Data protection - getting the right degree<br/>6. Information lifecycle management changes the data protection technology mix<br/>7. Compliance: a key piece of the grc puzzle<br/>8. Governance: the last piece in the grc puzzle<br/>9. The critical role of data retention<br/>10. Data security - an ongoing challenge<br/>11. Where data protection technologies fit in the new model<br/>12. Back to basics - extending the current model<br/>13. When supporting actors play lead roles<br/>14. Disk and tape - complementing and competing with one another<br/>15. Technologies for high availability and low (or no) data loss<br/>16. Special requirements for compliance, governance and data security<br/>17. Ediscovery and the electronic discovery reference model<br/>18. Cloud computing, saas and other data protection services<br/>19. Other considerations in data protection<br/>20. Typing it all together, including the pro-tech data protection model<br/>
Holdings
Withdrawn status Damaged status Not for loan Home library Current library Date acquired Source of acquisition Full call number Barcode Date last seen Price effective from Koha item type
      UE-Central Library UE-Central Library 16.11.2018 U.E.24316 005.86 H5501 T9950 16.11.2018 16.11.2018 Books
Copyright © 2023, University of Education, Lahore. All Rights Reserved.
Email:centrallibrary@ue.edu.pk