did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780135302156

Information Privacy Engineering and Privacy by Design Understanding Privacy Threats, Technology, and Regulations Based on Standards and Best Practices

by
  • ISBN13:

    9780135302156

  • ISBN10:

    0135302153

  • Edition: 1st
  • Format: Paperback
  • Copyright: 2019-12-12
  • Publisher: Addison-Wesley Professional
  • Purchase Benefits
This product is included in:
Learn More
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
  • Buyback Icon We Buy This Book Back!
    In-Store Credit: $3.94
    Check/Direct Deposit: $3.75
    PayPal: $3.75
  • Complimentary 7-Day eTextbook Access - Read more
    When you rent or buy this book, you will receive complimentary 7-day online access to the eTextbook version from your PC, Mac, tablet, or smartphone. Feature not included on Marketplace Items.
List Price: $69.99 Save up to $26.03
  • Buy New
    $67.89
    Add to Cart Free Shipping Icon Free Shipping

    THIS IS A HARD-TO-FIND TITLE. WE ARE MAKING EVERY EFFORT TO OBTAIN THIS ITEM, BUT DO NOT GUARANTEE STOCK.

    7-Day eTextbook Access 7-Day eTextbook Access

Supplemental Materials

What is included with this book?

Summary

The Comprehensive Guide to Engineering and Implementing Privacy Best Practices

As systems grow more complex and cybersecurity attacks more relentless, safeguarding privacy is ever more challenging. Organizations are increasingly responding in two ways, and both are mandated by key standards such as GDPR and ISO/IEC 27701:2019. The first approach, privacy by design, aims to embed privacy throughout the design and architecture of IT systems and business practices. The second, privacy engineering, encompasses the technical capabilities and management processes needed to implement, deploy, and operate privacy features and controls in working systems.

In Information Privacy Engineering and Privacy by Design, internationally renowned IT consultant and author William Stallings brings together the comprehensive knowledge privacy executives and engineers need to apply both approaches. Using the techniques he presents, IT leaders and technical professionals can systematically anticipate and respond to a wide spectrum of privacy requirements, threats, and vulnerabilities–addressing regulations, contractual commitments, organizational policies, and the expectations of their key stakeholders.

• Review privacy-related essentials of information security and cryptography
• Understand the concepts of privacy by design and privacy engineering
• Use modern system access controls and security countermeasures to partially satisfy privacy requirements
• Enforce database privacy via anonymization and de-identification
• Prevent data losses and breaches
• Address privacy issues related to cloud computing and IoT
• Establish effective information privacy management, from governance and culture to audits and impact assessment
• Respond to key privacy rules including GDPR, U.S. federal law, and the California Consumer Privacy Act

This guide will be an indispensable resource for anyone with privacy responsibilities in any organization, and for all students studying the privacy aspects of cybersecurity.

Author Biography

Dr. William Stallings, author of the forthcoming Pearson book Effective Cybersecurity: A Practical Guide to Standards and Best Practices, has made a unique contribution to understanding the broad sweep of technical developments in computer networking, computer architecture, and network security. He has authored more than 40 books on various aspects of these subjects, and is a 13-time winner of the Text and Academic Author Association (TAA) Computer Science Textbook of the Year Award. In over 30 years in the field, he has been a technical contributor, technical manager, and an executive with several high-technology firms. Currently he is an independent consultant whose clients have included computer and networking manufacturers and customers, software development firms, and leading-edge government research institutions. Stallings' specialties include information review and analysis of security, data communications, and networking products and services; research for and writing of technical white papers; assistance as subject-matter expert for technical advisory boards; security policy development and implementation; evaluation of security awareness and training programs; and advice relevant to compliance with IETF, NIST, and IEEE standards. Dr. Stallings is a member of the editorial board of Cryptologia, a scholarly journal devoted to all aspects of cryptology. He holds a PhD from M.I.T. in Computer Science and a BS from Notre Dame in electrical engineering.

Table of Contents

Part I: Planning for Privacy
1. Information Privacy Concepts
2. Security Governance and Management
3. Risk Assessment

Part II: Privacy Threats
4. Information Storage and Processing
5. Information Collection and Dissemination
6. Intrusion and Interference

Part III: Information Privacy Technology
7. Basic Privacy Controls
8. Privacy Enhancing Technology
9. Data Loss Prevention
10. Online Privacy
11. Detection of Conflicts In Security Policies
12. Privacy Evaluation

Part IV: Information Privacy Regulations
13. GDPR
14. U.S. Privacy Laws and Regulations

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program