Libros importados hasta 50% OFF + Envío Gratis a todo USA  Ver más

menu

0
  • argentina
  • chile
  • colombia
  • españa
  • méxico
  • perú
  • estados unidos
  • internacional
portada Guide to Storage Encryption Technologies for End User Devices (in English)
Type
Physical Book
Language
Inglés
Pages
44
Format
Paperback
Dimensions
28.0 x 21.6 x 0.2 cm
Weight
0.13 kg.
ISBN13
9781494755683

Guide to Storage Encryption Technologies for End User Devices (in English)

U. S. Department of Commerce (Author) · Createspace Independent Publishing Platform · Paperback

Guide to Storage Encryption Technologies for End User Devices (in English) - U. S. Department of Commerce

Physical Book

$ 12.79

$ 15.99

You save: $ 3.20

20% discount
  • Condition: New
It will be shipped from our warehouse between Thursday, July 04 and Friday, July 05.
You will receive it anywhere in United States between 1 and 3 business days after shipment.

Synopsis "Guide to Storage Encryption Technologies for End User Devices (in English)"

In today's computing environment, there are many threats to the confidentiality of information stored on end user devices, such as personal computers, consumer devices (e.g., personal digital assistant, smart phone), and removable storage media (e.g., universal serial bus [USB] flash drive, memory card, external hard drive, writeable CD or DVD). Some threats are unintentional, such as human error, while others are intentional. Intentional threats are posed by people with many different motivations, including causing mischief and disruption and committing identity theft and other fraud. A common threat against end user devices is device loss or theft. Someone with physical access to a device has many options for attempting to view or copy the information stored on the device. Another concern is insider attacks, such as an employee attempting to access sensitive information stored on another employee's device. Malware, another common threat, can give attackers unauthorized access to a device, transfer information from the device to an attacker's system, and perform other actions that jeopardize the confidentiality of the information on a device.

Customers reviews

More customer reviews
  • 0% (0)
  • 0% (0)
  • 0% (0)
  • 0% (0)
  • 0% (0)

Frequently Asked Questions about the Book

All books in our catalog are Original.
The book is written in English.
The binding of this edition is Paperback.

Questions and Answers about the Book

Do you have a question about the book? Login to be able to add your own question.

Opinions about Bookdelivery

More customer reviews