Data security blueprints a practical guide to data security workflows and implementation

Once you decide to implement a data security strategy, it can be difficult to know where to start. With so many potential threats and challenges to resolve, teams often try to fix everything at once. But this boil-the-ocean approach is difficult to manage efficiently and ultimately leads to frustrat...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Castanedo, Federico (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Sebastopol, CA O'Reilly Media, Inc. 2024
Ausgabe:[First edition].
Schlagworte:
Online-Zugang:lizenzpflichtig
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a22000002 4500
001 ZDB-30-ORH-109654382
003 DE-627-1
005 20241107103332.0
007 cr uuu---uuuuu
008 241107s2024 xx |||||o 00| ||eng c
035 |a (DE-627-1)109654382 
035 |a (DE-599)KEP109654382 
035 |a (ORHE)9781098172985 
035 |a (DE-627-1)109654382 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
082 0 |a 658.4/78  |2 23/eng/20241008 
100 1 |a Castanedo, Federico  |e VerfasserIn  |4 aut 
245 1 0 |a Data security blueprints  |b a practical guide to data security workflows and implementation  |c by Federico Castanedo 
250 |a [First edition]. 
264 1 |a Sebastopol, CA  |b O'Reilly Media, Inc.  |c 2024 
300 |a 1 online resource (48 pages)  |b illustrations 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
520 |a Once you decide to implement a data security strategy, it can be difficult to know where to start. With so many potential threats and challenges to resolve, teams often try to fix everything at once. But this boil-the-ocean approach is difficult to manage efficiently and ultimately leads to frustration, confusion, and halted progress. There's a better way to go. In this report, data science and AI leader Federico Castanedo shows you what to look for in a data security platform that will deliver the speed, scale, and agility you need to be successful in today's fast-paced, distributed data ecosystems. Unlike other resources that focus solely on data security concepts, this guide provides a road map for putting those concepts into practice. This report reveals: The most common data security use cases and their potential challenges What to look for in a data security solution that's built for speed and scale Why increasingly decentralized data architectures require centralized, dynamic data security mechanisms How to implement the steps required to put common use cases into production Methods for assessing risks--and controls necessary to mitigate those risks How to facilitate cross-functional collaboration to put data security into practice in a scalable, efficient way You'll examine the most common data security use cases that global enterprises across every industry aim to achieve, including the specific steps needed for implementation as well as the potential obstacles these use cases present. Federico Castanedo is a data science and AI leader with extensive experience in academia, industry, and startups. Having held leadership positions at DataRobot and Vodafone, he has a successful track record of leading high-performing data science teams and developing data science and AI products with business impact. 
650 0 |a Management information systems  |x Security measures 
650 0 |a Computer security 
650 4 |a Systèmes d'information de gestion ; Sécurité ; Mesures 
650 4 |a Sécurité informatique 
856 4 0 |l TUM01  |p ZDB-30-ORH  |q TUM_PDA_ORH  |u https://learning.oreilly.com/library/view/-/9781098172985/?ar  |m X:ORHE  |x Aggregator  |z lizenzpflichtig  |3 Volltext 
912 |a ZDB-30-ORH 
951 |a BO 
912 |a ZDB-30-ORH 
049 |a DE-91 

Datensatz im Suchindex

DE-BY-TUM_katkey ZDB-30-ORH-109654382
_version_ 1818767362330984448
adam_text
any_adam_object
author Castanedo, Federico
author_facet Castanedo, Federico
author_role aut
author_sort Castanedo, Federico
author_variant f c fc
building Verbundindex
bvnumber localTUM
collection ZDB-30-ORH
ctrlnum (DE-627-1)109654382
(DE-599)KEP109654382
(ORHE)9781098172985
dewey-full 658.4/78
dewey-hundreds 600 - Technology (Applied sciences)
dewey-ones 658 - General management
dewey-raw 658.4/78
dewey-search 658.4/78
dewey-sort 3658.4 278
dewey-tens 650 - Management and auxiliary services
discipline Wirtschaftswissenschaften
edition [First edition].
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03127nam a22003612 4500</leader><controlfield tag="001">ZDB-30-ORH-109654382</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20241107103332.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">241107s2024 xx |||||o 00| ||eng c</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)109654382</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP109654382</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781098172985</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)109654382</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.4/78</subfield><subfield code="2">23/eng/20241008</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Castanedo, Federico</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Data security blueprints</subfield><subfield code="b">a practical guide to data security workflows and implementation</subfield><subfield code="c">by Federico Castanedo</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">[First edition].</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Sebastopol, CA</subfield><subfield code="b">O'Reilly Media, Inc.</subfield><subfield code="c">2024</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (48 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Once you decide to implement a data security strategy, it can be difficult to know where to start. With so many potential threats and challenges to resolve, teams often try to fix everything at once. But this boil-the-ocean approach is difficult to manage efficiently and ultimately leads to frustration, confusion, and halted progress. There's a better way to go. In this report, data science and AI leader Federico Castanedo shows you what to look for in a data security platform that will deliver the speed, scale, and agility you need to be successful in today's fast-paced, distributed data ecosystems. Unlike other resources that focus solely on data security concepts, this guide provides a road map for putting those concepts into practice. This report reveals: The most common data security use cases and their potential challenges What to look for in a data security solution that's built for speed and scale Why increasingly decentralized data architectures require centralized, dynamic data security mechanisms How to implement the steps required to put common use cases into production Methods for assessing risks--and controls necessary to mitigate those risks How to facilitate cross-functional collaboration to put data security into practice in a scalable, efficient way You'll examine the most common data security use cases that global enterprises across every industry aim to achieve, including the specific steps needed for implementation as well as the potential obstacles these use cases present. Federico Castanedo is a data science and AI leader with extensive experience in academia, industry, and startups. Having held leadership positions at DataRobot and Vodafone, he has a successful track record of leading high-performing data science teams and developing data science and AI products with business impact.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Management information systems</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systèmes d'information de gestion ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781098172985/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection>
id ZDB-30-ORH-109654382
illustrated Illustrated
indexdate 2024-12-18T08:48:40Z
institution BVB
language English
open_access_boolean
owner DE-91
DE-BY-TUM
owner_facet DE-91
DE-BY-TUM
physical 1 online resource (48 pages) illustrations
psigel ZDB-30-ORH
publishDate 2024
publishDateSearch 2024
publishDateSort 2024
publisher O'Reilly Media, Inc.
record_format marc
spelling Castanedo, Federico VerfasserIn aut
Data security blueprints a practical guide to data security workflows and implementation by Federico Castanedo
[First edition].
Sebastopol, CA O'Reilly Media, Inc. 2024
1 online resource (48 pages) illustrations
Text txt rdacontent
Computermedien c rdamedia
Online-Ressource cr rdacarrier
Once you decide to implement a data security strategy, it can be difficult to know where to start. With so many potential threats and challenges to resolve, teams often try to fix everything at once. But this boil-the-ocean approach is difficult to manage efficiently and ultimately leads to frustration, confusion, and halted progress. There's a better way to go. In this report, data science and AI leader Federico Castanedo shows you what to look for in a data security platform that will deliver the speed, scale, and agility you need to be successful in today's fast-paced, distributed data ecosystems. Unlike other resources that focus solely on data security concepts, this guide provides a road map for putting those concepts into practice. This report reveals: The most common data security use cases and their potential challenges What to look for in a data security solution that's built for speed and scale Why increasingly decentralized data architectures require centralized, dynamic data security mechanisms How to implement the steps required to put common use cases into production Methods for assessing risks--and controls necessary to mitigate those risks How to facilitate cross-functional collaboration to put data security into practice in a scalable, efficient way You'll examine the most common data security use cases that global enterprises across every industry aim to achieve, including the specific steps needed for implementation as well as the potential obstacles these use cases present. Federico Castanedo is a data science and AI leader with extensive experience in academia, industry, and startups. Having held leadership positions at DataRobot and Vodafone, he has a successful track record of leading high-performing data science teams and developing data science and AI products with business impact.
Management information systems Security measures
Computer security
Systèmes d'information de gestion ; Sécurité ; Mesures
Sécurité informatique
TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9781098172985/?ar X:ORHE Aggregator lizenzpflichtig Volltext
spellingShingle Castanedo, Federico
Data security blueprints a practical guide to data security workflows and implementation
Management information systems Security measures
Computer security
Systèmes d'information de gestion ; Sécurité ; Mesures
Sécurité informatique
title Data security blueprints a practical guide to data security workflows and implementation
title_auth Data security blueprints a practical guide to data security workflows and implementation
title_exact_search Data security blueprints a practical guide to data security workflows and implementation
title_full Data security blueprints a practical guide to data security workflows and implementation by Federico Castanedo
title_fullStr Data security blueprints a practical guide to data security workflows and implementation by Federico Castanedo
title_full_unstemmed Data security blueprints a practical guide to data security workflows and implementation by Federico Castanedo
title_short Data security blueprints
title_sort data security blueprints a practical guide to data security workflows and implementation
title_sub a practical guide to data security workflows and implementation
topic Management information systems Security measures
Computer security
Systèmes d'information de gestion ; Sécurité ; Mesures
Sécurité informatique
topic_facet Management information systems Security measures
Computer security
Systèmes d'information de gestion ; Sécurité ; Mesures
Sécurité informatique
url https://learning.oreilly.com/library/view/-/9781098172985/?ar
work_keys_str_mv AT castanedofederico datasecurityblueprintsapracticalguidetodatasecurityworkflowsandimplementation