|
![]() |
|||
|
||||
OverviewFull Product DetailsAuthor: Thomas H. LenhardPublisher: Springer Imprint: Springer Edition: 1st ed. 2022 Weight: 0.178kg ISBN: 9783658354930ISBN 10: 3658354933 Pages: 113 Publication Date: 05 January 2022 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: Manufactured on demand ![]() We will order this item for you from a manufactured on demand supplier. Table of ContentsData protection and data security - How computers communicate with each other - What can happen to data files - Technical threats - Dangerous software - Dangers from mobile data carriers and devices - Telephone system as a source of danger - Destruction of data - Securing data - Encryption - Security of websites - Common threats to IT security - Identification of computers and IP addresses - Firewalls - Routers - Configuration of protection systems - The demilitarized zone - Organizational data protectionReviewsAuthor InformationDr. Thomas H. Lenhard is an internationally recognized expert on information technology and data protection. He draws on a wealth of experience from three decades of data protection and data security. Tab Content 6Author Website:Countries AvailableAll regions |