pickabook books with huge discounts for everyone
pickabook books with huge discounts for everyone
Visit our new collection website www.collectionsforschool.co.uk
     
Email: Subscribe to news & offers:
Need assistance? Log In/Register


Item Details
Title: A SURVEY OF DATA LEAKAGE DETECTION AND PREVENTION SOLUTIONS
By: Asaf Shabtai, Yuval Elovici, Lior Rokach
Format: Paperback

List price: £26.99


We currently do not stock this item, please contact the publisher directly for further information.

ISBN 10: 1461420520
ISBN 13: 9781461420521
Publisher: SPRINGER-VERLAG NEW YORK INC.
Pub. date: 16 March, 2012
Edition: 2012
Series: SpringerBriefs in Computer Science
Pages: 92
Description: The presented taxonomy characterizes DLP solutions according to various aspects such as: leakage source, data state, leakage channel, deployment scheme, preventive/detective approaches, and the action upon leakage.
Synopsis: SpringerBriefs present concise summaries of cutting-edge research and practical applications across a wide spectrum of fields. Featuring compact volumes of 50 to 100 pages (approximately 20,000- 40,000 words), the series covers a range of content from professional to academic. Briefs allow authors to present their ideas and readers to absorb them with minimal time investment. As part of Springer's eBook collection, SpringBriefs are published to millions of users worldwide. Information/Data Leakage poses a serious threat to companies and organizations, as the number of leakage incidents and the cost they inflict continues to increase. Whether caused by malicious intent, or an inadvertent mistake, data loss can diminish a company's brand, reduce shareholder value, and damage the company's goodwill and reputation. This book aims to provide a structural and comprehensive overview of the practical solutions and current research in the DLP domain. This is the first comprehensive book that is dedicated entirely to the field of data leakage and covers all important challenges and techniques to mitigate them. Its informative, factual pages will provide researchers, students and practitioners in the industry with a comprehensive, yet concise and convenient reference source to this fascinating field.We have grouped existing solutions into different categories based on a described taxonomy. The presented taxonomy characterizes DLP solutions according to various aspects such as: leakage source, data state, leakage channel, deployment scheme, preventive/detective approaches, and the action upon leakage. In the commercial part we review solutions of the leading DLP market players based on professional research reports and material obtained from the websites of the vendors. In the academic part we cluster the academic work according to the nature of the leakage and protection into various categories. Finally, we describe main data leakage scenarios and present for each scenario the most relevant and applicable solution or approach that will mitigate and reduce the likelihood and/or impact of the leakage scenario.
Illustrations: 10 Tables, black and white; 9 Illustrations, black and white; VIII, 92 p. 9
Publication: US
Imprint: Springer-Verlag New York Inc.
Returns: Returnable
Some other items by this author:
BUILDING EFFECTIVE RECOMMENDER SYSTEMS (HB)
DATA MINING AND KNOWLEDGE DISCOVERY HANDBOOK (HB)
DATA MINING AND KNOWLEDGE DISCOVERY HANDBOOK (HB)
DATA MINING WITH DECISION TREES
DATA MINING WITH DECISION TREES: THEORY AND APPLICATIONS (2ND EDITION) (HB)
DATA MINING WITH DECISION TREES: THEORY AND APPLICATIONS (HB)
DECOMPOSITION METHODOLOGY FOR KNOWLEDGE DISCOVERY AND DATA MINING: THEORY AND APPLICATIONS (HB)
ENSEMBLE LEARNING: PATTERN CLASSIFICATION USING ENSEMBLE METHODS (HB)
INTRUSION DETECTION AND PREVENTION FOR MOBILE ECOSYSTEMS
INTRUSION DETECTION AND PREVENTION FOR MOBILE ECOSYSTEMS
INTRUSION DETECTION AND PREVENTION FOR MOBILE ECOSYSTEMS
INTRUSION DETECTION AND PREVENTION FOR MOBILE ECOSYSTEMS (HB)
PATTERN CLASSIFICATION USING ENSEMBLE METHODS (HB)
PROACTIVE DATA MINING WITH DECISION TREES (PB)
RECOMMENDER SYSTEMS HANDBOOK (HB)
RECOMMENDER SYSTEMS HANDBOOK (HB)
SECURITY AND PRIVACY IN SOCIAL NETWORKS (HB)
SECURITY AND PRIVACY IN SOCIAL NETWORKS (PB)
SOFT COMPUTING FOR KNOWLEDGE DISCOVERY AND DATA MINING (HB)
SOFT COMPUTING FOR KNOWLEDGE DISCOVERY AND DATA MINING (PB)

TOP SELLERS IN THIS CATEGORY
Data Driven Security (Paperback)
John Wiley & Sons Inc
Our Price : £34.19
more details
The Art of Intrusion (Paperback)
John Wiley and Sons Ltd
Our Price : £10.22
more details
The Art of Deception (Paperback)
John Wiley & Sons Inc
Our Price : £7.30
more details
Wireshark 101 (Paperback / softback)
Laura Chappell University
Our Price : £40.95
more details
The Art of Invisibility (Paperback)
Little, Brown & Company
Our Price : £12.74
more details
BROWSE FOR BOOKS IN RELATED CATEGORIES
 COMPUTING AND INFORMATION TECHNOLOGY
 computer communications & networking
 network security


Information provided by www.pickabook.co.uk
SHOPPING BASKET
  
Your basket is empty
  Total Items: 0
 






Early Learning
Little Worried Caterpillar (PB) Little Green knows she''s about to make a big change - transformingfrom a caterpillar into a beautiful butterfly. Everyone is VERYexcited! But Little Green is VERY worried. What if being a butterflyisn''t as brilliant as everyone says?Join Little Green as she finds her own path ... with just a littlehelp from her friends.
add to basket

Early Learning
add to basket

Picture Book
All the Things We Carry PB What can you carry?A pebble? A teddy? A bright red balloon? A painting you''ve made?A hope or a dream?This gorgeous, reassuring picture book celebrates all the preciousthings we can carry, from toys and treasures to love and hope. With comforting rhymes and fabulous illustrations, this is a warmhug of a picture book.
add to basket