|
|
|
|
LEADER |
00000cam a2200000Mi 4500 |
001 |
JSTOR_on1107578119 |
003 |
OCoLC |
005 |
20231005004200.0 |
006 |
m o d |
007 |
cr |n|---||||| |
008 |
190810s2018 xx o 000 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d YDX
|d JSTOR
|d OCLCF
|d OCLCQ
|d EBLCP
|d OCLCQ
|d MM9
|d OTZ
|d K6U
|d UX1
|d VT2
|d REDDC
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 1090476245
|a 1119103048
|a 1143530905
|a 1175623542
|a 1200515251
|a 1202539394
|a 1225265897
|a 1226332875
|a 1227883261
|a 1228613997
|a 1244447935
|a 1249217086
|
020 |
|
|
|a 9781787780293
|
020 |
|
|
|a 1787780295
|
020 |
|
|
|z 1787780287
|
020 |
|
|
|z 9781787780286
|
020 |
|
|
|a 9781787780309
|q (electronic)
|
020 |
|
|
|a 1787780309
|
020 |
|
|
|a 1787780287
|
020 |
|
|
|a 9781787780286
|
024 |
8 |
|
|a 9781787780309
|
024 |
3 |
|
|a 9781787780286
|
029 |
1 |
|
|a AU@
|b 000065193235
|
029 |
1 |
|
|a AU@
|b 000066231101
|
029 |
1 |
|
|a AU@
|b 000067961746
|
035 |
|
|
|a (OCoLC)1107578119
|z (OCoLC)1090476245
|z (OCoLC)1119103048
|z (OCoLC)1143530905
|z (OCoLC)1175623542
|z (OCoLC)1200515251
|z (OCoLC)1202539394
|z (OCoLC)1225265897
|z (OCoLC)1226332875
|z (OCoLC)1227883261
|z (OCoLC)1228613997
|z (OCoLC)1244447935
|z (OCoLC)1249217086
|
037 |
|
|
|a 22573/ctv6w0zqv
|b JSTOR
|
050 |
|
4 |
|a HF5548.37
|b .T534 2018eb
|
082 |
0 |
4 |
|a 658.478
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Ticher, Paul.
|
245 |
1 |
0 |
|a Data Protection and the Cloud - Are You Really Managing the Risks? :
|b Second Edition.
|
250 |
|
|
|a 2nd ed.
|
260 |
|
|
|a Ely :
|b IT Governance Ltd,
|c 2018.
|
300 |
|
|
|a 1 online resource (71 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
490 |
0 |
|
|a ITpro collection
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Cover; Title; Copyright; About the Author; Contents; Introduction; Chapter 1: Background; Data protection obligations; Changes introduced by the GDPR; The NIS Directive; Chapter 2: Definitions; Chapter 3: The data controller/data processor relationship; Data controller-processor contracts; Chapter 4: Security of processing; Confidentiality, integrity and availability; Data in transit and at rest; Security in the Cloud; Chapter 5: Mitigating security risks in the Cloud; Cyber Essentials; Access controls; Other guidance and recommendations; Chapter 6: Transfers to third countries
|
505 |
8 |
|
|a A note on BrexitEU-US Privacy Shield; Chapter 7: Data subjects' rights; Chapter 8: Other legal and technical implications for Cloud contracts; Responding to breaches; Chapter 9: Checklist; References; Further Reading
|
520 |
|
|
|a With a view to helping managers ask the right questions, Data Protection and the Cloud explains how you can effectively manage the risks associated with the Cloud and meet regulatory requirements.
|
504 |
|
|
|a Includes bibliographical references.
|
542 |
|
|
|f © 2018 IT Governance
|g 2018
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Evidence Based Acquisitions
|
590 |
|
|
|a JSTOR
|b Books at JSTOR All Purchased
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Demand Driven Acquisitions (DDA)
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Data protection
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a Ticher, Paul.
|t Data Protection and the Cloud - Are You Really Managing the Risks? : Second Edition.
|d Ely : IT Governance Ltd, ©2018
|z 9781787780286
|
856 |
4 |
0 |
|u https://jstor.uam.elogim.com/stable/10.2307/j.ctv6wgk12
|z Texto completo
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL5796955
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL5790485
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 16124227
|
994 |
|
|
|a 92
|b IZTAP
|