Ссылка | Дата | Объем в кбайтах | Число страниц | Справка |
Information Security. Handle with Care also 5 ways to influence vendor management security and disaster recovery |
2011 |
3153 |
41 |
|
Technical guide on Data Privacy |
2011 |
171 |
21 |
|
Essential Guide to Data Protection |
2009 |
3846 |
43 |
|
Anatomy of a Data Breach Why Breaches Happen and What to Do About It (Symantec) |
2010 |
2433 |
15 |
|
Nine questions Encryption Vendors don't want to Answer A buyer guide to enterprise data encryption |
2009 |
638 |
11 |
|
Kill Your Data To Protect It From Cybercriminals by John Kindervag |
July 12, 2012 |
441 |
15 |
|
How to get Optimal Results with virtual Data Protection |
2011 |
161 |
8 |
|
A Holistic Approach to Dsts Protection |
2009 |
573 |
15 |
|
Data privacy best practices: time to take action! |
September 2008 |
236 |
20 |
|
Essential Guide to Threat Management |
2010 |
2808 |
43 |
|
2009 Annual Study; U.K. Enterprise Encryption Trends |
July 2009 |
530 |
27 |
|
Bueyer’s Guide to Antimalware |
2009 |
402 |
9 |
|
The Data Security Challenge A Layered Security Strategy for Preventing
Data Leakage, Theft and Insider Abuse |
2008 |
265 |
9 |
|
The Massachusetts Data Protection Low |
2009 |
5378 |
32 |
|
Secure Data Transmission: Using a Managed File Transfer |
2010 |
2051 |
6 |
|
2008 Annual Study: Cost of a Data Breach |
February 2009 |
7457 |
31 |
|
Protecting Data From the Cyber Theft Pandemic (FireEye) |
April, 2009 |
670 |
6 |
|
Data loss prevention strategies, practices and tools are more important than ever. Here’s what you need to know. |
2010 |
893 |
31 |
|
Data Breach Dangers: Learn to How to Protect Data and Lower Security Spending |
2009 |
550 |
7 |
|
Essentual Guide to DATA protection |
2011 |
1829 |
48 |
|
Top-10 Guide for Protecting Sensitive Data from Malicious Insiders |
2010 |
184 |
9 |
|
Anatomy of a Data Breach Why Breaches Happen and What to Do About It |
2010 |
2433 |
15 |
|
Data Protection and Recovery for Physical and Virtual Environments |
August 2011 |
124 |
5 |
|
The Next Generation of Network Data Leakege Protection |
2009 |
153 |
12 |
|
Encrypt (almost) anything. Adding a layer of protection to your data is easier than you think |
2013 |
1030 |
5 |
By Alex Castle |
2014 Year of Mega Breaches & Identity Theft Findings from the 2014 |
2015 |
4883 |
16 |
Breach Level Index |
Top Ten Database Security Threats The Most Significant Risks of 2015 and How to
Mitigate Them |
2015 |
202 |
9 |
Imperva |
EU data protection: Essential guide |
2017 |
4038 |
30 |
ComputerWeekly (GDPR) |
2019 Data Breach Investigations Report |
2019 |
6705 |
78 |
Verizon |
Data Protection and Digital Information Bill |
2022 |
797 |
192 |
Bill 143-EN; GB |
|
|
|
|
GB |