Shivakumar et al., 2019 - Google Patents
DXP Information SecurityShivakumar et al., 2019
- Document ID
- 7442093684742589307
- Author
- Shivakumar S
- Sethii S
- Publication year
- Publication venue
- Building Digital Experience Platforms: A Guide to Developing Next-Generation Enterprise Applications
External Links
Snippet
Abstract Information security is crucial for digital platforms that are used for financial domains such as banking. In this chapter we discuss various aspects of information security. The best practices given in this chapter can be used for defining and implementing a robust …
- 238000000034 method 0 description 15
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Kalloniatis et al. | Towards the design of secure and privacy-oriented information systems in the cloud: Identifying the major concepts | |
| Jansen et al. | Guidelines on security and privacy in public cloud computing | |
| Sargiotis | Data security and privacy: Protecting sensitive information | |
| Jansen et al. | Sp 800-144. guidelines on security and privacy in public cloud computing | |
| Hassan et al. | Latest trends, challenges and solutions in security in the era of cloud computing and software defined networks | |
| Stankov et al. | Vulnerability and protection of business management systems: threats and challenges | |
| Berry | The importance of cybersecurity in supply chain | |
| Zargari et al. | Policing as a Service in the Cloud | |
| Shivakumar et al. | DXP Information Security | |
| Taherdoost | E-business security and control | |
| Sailakshmi | Analysis of Cloud Security Controls in AWS, Azure, and Google Cloud | |
| Haber et al. | Privileged Access Management (PAM) | |
| Zhang | Mitigating Insider Threats in Enterprise Storage Systems: A Security Framework for Data Integrity and Access Control | |
| Gunnam et al. | Securing Pci Data: Cloud Security Best Practices And Innovations | |
| Hutchings et al. | Criminals in the cloud: Crime, security threats, and prevention measures | |
| Alsmadi et al. | Introduction to information security | |
| Basson | The right to privacy: how the proposed POPI Bill will impact data security in a Cloud Computing environment | |
| Caballero | Advanced security architecture for cloud computing | |
| Kiat et al. | Advanced Cloud Security Frameworks: Tackling Evolving Threats and Ensuring Data Integrity | |
| Athukorale et al. | Evaluating Advanced Cybersecurity Technologies for Cloud Environments | |
| Panda et al. | Securing a SaaS application on AWS cloud | |
| Kyriazoglou | Information Security and Breach Definitions and Obligations | |
| Castillo | IT security | |
| Jansen van Vuuren et al. | Don’t be Caught Unaware: A Ransomware Primer with a Specific Focus on Africa | |
| Khandare et al. | A Global Overview of Data Security, Safety, Corporate Data Privacy, and Data Protection |