Spotlight on Security

This month, SearchDataManagement.com looks at the omnipresent issue of security, from security policy best practices to the malevolent effects of data theft and beyond.

This Content Component encountered an error

This month, SearchDataManagement.com looks at the omnipresent issue of security. Join us as we examine everything from security policy best practices to the malevolent effects of data theft and beyond. Read for all the latest news designed to help you implement the optimum data security policy.

 

  Data theft  
  Security and privacy policies  
  Security resources  

 

Chapter Download: Defeating the Hacker: A non-technical guide to computer security 
SearchDataManagement.com
Read this excerpt from Defeating the Hacker: A non-technical guide to computer security and heed the warning from the author, an admitted ex-hacker, "Information security is a fast-moving field, and the hackers' desire to find new methods of attack never wanes. Whatever you put in their way, they will use to their advantage."



 

Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation
SearchDataManagement.com
In this excerpt from Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation, Ted G. Lewis outlines a scientific approach to the process of infrastructure protection. Utilizing network theory, optimization theory and simulation software, Lewis addresses the key question in network security: What should be protected and how?

Dig deeper on Data management tutorials

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchBusinessAnalytics

SearchAWS

SearchContentManagement

SearchOracle

SearchSAP

SearchSOA

SearchSQLServer

Close