Cargando…

Privacy What Developers and IT Professionals Should Know /

Praise for J.C. Cannon's Privacy "A wonderful exploration of the multifaceted work being done to protect the privacy of users, clients, companies, customers, and everyone in between."--Peter Wayner, author of Translucent Databases "Cannon provides an invaluable map to guide devel...

Descripción completa

Detalles Bibliográficos
Autor principal: Cannon, J. (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Addison-Wesley Professional, 2004.
Edición:1st edition.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ma 4500
001 OR_on1100902200
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cn|||||||||
008 160701s2004 xx o 000 0 eng d
040 |a CEF  |b eng  |e pn  |c CEF  |d OCLCO  |d OCLCF  |d CNCEN  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO 
020 |z 9780321224095 
020 |z 0321224094 
024 8 |a 9780321224095 
024 8 |a 0321224094 
029 1 |a AU@  |b 000067091795 
035 |a (OCoLC)1100902200 
049 |a UAMI 
100 1 |a Cannon, J.,  |e author. 
245 1 0 |a Privacy What Developers and IT Professionals Should Know /  |c Cannon, J. 
250 |a 1st edition. 
264 1 |b Addison-Wesley Professional,  |c 2004. 
300 |a 1 online resource (384 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
365 |b 49.99 
520 |a Praise for J.C. Cannon's Privacy "A wonderful exploration of the multifaceted work being done to protect the privacy of users, clients, companies, customers, and everyone in between."--Peter Wayner, author of Translucent Databases "Cannon provides an invaluable map to guide developers through the dark forest created by the collision of cutting-edge software development and personal privacy." -Eric Fredericksen, Sr. Software Engineer, PhD., Foundstone, Inc. "Cannon's book is the most comprehensive work today on privacy for managers and developers. I cannot name any technical areas not covered. No practitioners should miss it." -Ray Lai, Principal Engineer, Sun Microsystems, Inc., co-author of Core Security Patterns and author of J2EE Platform Web Services "Every developer should care deeply about privacy and this is the best book I've read on the subject. Get it, read it, and live it." -Keith Ballinger, Program Manager, Advanced Web Services, Microsoft "J.C. Cannon's book demonstrates that information and communication technology can contribute in a significant way to restoring individual privacy and raises more awareness of the complexity and importance of this societal problem." -Dr. John J. Borking, Former Commissioner and Vice-President of the Dutch Data Protection Authority "If you are planning, implementing, coding, or managing a Privacy campaign in your company or your personal computing, there is no more relevant reference. J.C. Cannon nails the issues." -Rick Kingslan, CISSP, Microsoft MVP-Windows Server: Directory Services and Right Management, West Corporation "It's often been said that security is a process, not a product. Privacy is no different! Unlike other privacy books, J.C. Cannon's book has something valuable to convey to everyone involved in the privacy process, from executives to designers and developers, many of whom aren't thinking about privacy but should be." -Keith Brown, Co-founder of Pluralsight and author of The .NET Developer's Guide to Windows Security and Programming Windows Security "J.C. Cannon's new book on electronic privacy is an important addition to the available works in this emerging field of study and practice. Through many humorous (and occasionally frightening) examples of privacy gone wrong, J.C. helps you better understand how to protect your privacy and how to build privacy awareness into your organization and its development process. Keenly illustrating both the pros and cons of various privacy-e ... 
542 |f Copyright © Addison-Wesley Professional  |g 2005 
550 |a Made available through: Safari, an O'Reilly Media Company. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Business enterprises  |x Computer networks  |x Security measures. 
650 0 |a Computer security. 
650 2 |a Computer Security 
650 6 |a Sécurité informatique. 
650 7 |a Business enterprises  |x Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
856 4 0 |u https://learning.oreilly.com/library/view/~/0321224094/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP