£40.48

CRC Press Controlling Privacy and the Use of Data Assets - Volume 1: Who Owns the New Oil? (Security, Audit and Leadership Series)

Price data last checked 24 day(s) ago - will refresh soon

View at Amazon

Price History & Forecast

Last 67 days • 67 data points (No recent data available)

Historical
Generating forecast...
£40.48 £37.81 £38.39 £38.97 £39.56 £40.14 £40.72 23 January 2026 08 February 2026 25 February 2026 13 March 2026 30 March 2026

Price Distribution

Price distribution over 67 days • 2 price levels

Days at Price
Current Price
29 days 38 days · current 0 10 19 29 38 £38 £40 Days at Price

Price Analysis

Most common price: £40 (38 days, 56.7%)

Price range: £38 - £40

Price levels: 2 different prices over 67 days

Description

"Ulf Mattsson leverages his decades of experience as a CTO and security expert to show how companies can achieve data compliance without sacrificing operability." Jim Ambrosini, CISSP, CRISC, Cybersecurity Consultant and Virtual CISO "Ulf Mattsson lays out not just the rationale for accountable data governance, he provides clear strategies and tactics that every business leader should know and put into practice. As individuals, citizens and employees, we should all take heart that following his sound thinking can provide us all with a better future." Richard Purcell, CEO Corporate Privacy Group and former Microsoft Chief Privacy Officer Many security experts excel at working with traditional technologies but fall apart in utilizing newer data privacy techniques to balance compliance requirements and the business utility of data. This book will help readers grow out of a siloed mentality and into an enterprise risk management approach to regulatory compliance and technical roles, including technical data privacy and security issues. The book uses practical lessons learned in applying real-life concepts and tools to help security leaders and their teams craft and implement strategies. These projects deal with a variety of use cases and data types. A common goal is to find the right balance between compliance, privacy requirements, and the business utility of data. This book reviews how new and old privacy-preserving techniques can provide practical protection for data in transit, use, and rest. It positions techniques like pseudonymization, anonymization, tokenization, homomorphic encryption, dynamic masking, and more. Topics include Trends and Evolution Best Practices, Roadmap, and Vision Zero Trust Architecture Applications, Privacy by Design, and APIs Machine Learning and Analytics Secure Multiparty Computing Blockchain and Data Lineage Hybrid Cloud, CASB, and SASE HSM, TPM, and Trusted Execution Environments Internet of Things Quantum Computing And much more!

Product Specifications

Format
paperback
Domain
Amazon UK
Release Date
27 June 2022
Listed Since
31 March 2022

Barcode

No barcode data available

Similar Products You Might Like

Controlling Privacy and the Use of Data Assets, Volume 1 and 2: 1-2
99% match

Controlling Privacy and the Use of Data Assets, Volume 1 and 2: 1-2

CRC Press

£57.79 30 Mar 2026
Cloud Security and Privacy- a pragmatic approach
98% match

Cloud Security and Privacy- a pragmatic approach

£45.49 05 Apr 2026
Information Security of Intelligent Vehicles Communication: Overview, Perspectives, Challenges, and Possible Solutions: 978 (Studies in Computational Intelligence, 978)
98% match

Information Security of Intelligent Vehicles Communication: Overview, Perspectives, Challenges, and Possible Solutions: 978 (Studies in Computational Intelligence, 978)

Springer

£87.06 05 Apr 2026
Cyber Security: Critical Infrastructure Protection: 56 (Computational Methods in Applied Sciences, 56)
98% match

Cyber Security: Critical Infrastructure Protection: 56 (Computational Methods in Applied Sciences, 56)

Springer

£120.83 14 Apr 2026
Transatlantic Data Protection in Practice
98% match

Transatlantic Data Protection in Practice

Springer

£91.63 30 Mar 2026
Engineering Secure Two-Party Computation Protocols: Design, Optimization, and Applications of Efficient Secure Function Evaluation
98% match

Engineering Secure Two-Party Computation Protocols: Design, Optimization, and Applications of Efficient Secure Function Evaluation

Springer

£91.15 04 Apr 2026
Information Assurance: Managing Organizational IT Security Risks
98% match

Information Assurance: Managing Organizational IT Security Risks

Butterworth-Heinemann

£57.50 12 Apr 2026
The Security Leader’s Communication Playbook: Bridging the Gap between Security and the Business (Security, Audit and Leadership Series)
98% match

The Security Leader’s Communication Playbook: Bridging the Gap between Security and the Business (Security, Audit and Leadership Series)

CRC Press

£45.85 11 Apr 2026
Building an Effective Security Program
98% match

Building an Effective Security Program

De Gruyter

£41.50 01 Apr 2026
Protocols for Authentication and Key Establishment (Information Security and Cryptography)
98% match

Protocols for Authentication and Key Establishment (Information Security and Cryptography)

Springer

£86.38 05 Apr 2026
Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities
98% match

Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities

Information Science Reference

£109.21 10 Apr 2026
Empirical Cloud Security: Practical Intelligence to Evaluate Risks and Attacks
98% match

Empirical Cloud Security: Practical Intelligence to Evaluate Risks and Attacks

De Gruyter Mouton

£41.42 19 Apr 2026
Practical Data Privacy: Enhancing Privacy and Security in Data
98% match

Practical Data Privacy: Enhancing Privacy and Security in Data

O'Reilly

£33.30 19 Apr 2026
A Practical Guide to Security Assessments
98% match

A Practical Guide to Security Assessments

Routledge

£121.46 21 Apr 2026
Security, Privacy and Trust in Cloud Systems
98% match

Security, Privacy and Trust in Cloud Systems

Springer

£63.40 13 Apr 2026
Artificial Intelligence for Cyber Security: Methods, Issues and Possible Horizons or Opportunities: 972 (Studies in Computational Intelligence, 972)
98% match

Artificial Intelligence for Cyber Security: Methods, Issues and Possible Horizons or Opportunities: 972 (Studies in Computational Intelligence, 972)

Springer

£83.00 11 Apr 2026
Information Assurance Architecture
98% match

Information Assurance Architecture

CRC Press

£59.27 09 Apr 2026
Classical and Physical Security of Symmetric Key Cryptographic Algorithms (Computer Architecture and Design Methodologies)
98% match

Classical and Physical Security of Symmetric Key Cryptographic Algorithms (Computer Architecture and Design Methodologies)

Springer

£107.73 12 Apr 2026
Security on the Web: 83 (Advances in Computers): Volume 83
98% match

Security on the Web: 83 (Advances in Computers): Volume 83

Academic Press

£102.12 11 Apr 2026
Applied Cryptography: Protocols, Algorithms and Source Code in C
98% match

Applied Cryptography: Protocols, Algorithms and Source Code in C

Wiley

£39.37 13 Apr 2026
Responsive Security: Be Ready to Be Secure
98% match

Responsive Security: Be Ready to Be Secure

CRC Press

£157.32 06 Apr 2026
Securing AI Using Zero Trust Principles (Networking Technology: Security)
98% match

Securing AI Using Zero Trust Principles (Networking Technology: Security)

Cisco

£45.59 09 Apr 2026
Information Security: Foundations, technologies and applications
98% match

Information Security: Foundations, technologies and applications

Institution of Engineering & Technology

£86.21 06 Apr 2026
Preserving Privacy Against Side-Channel Leaks: From Data Publishing to Web Applications: 68 (Advances in Information Security, 68)
98% match

Preserving Privacy Against Side-Channel Leaks: From Data Publishing to Web Applications: 68 (Advances in Information Security, 68)

Springer

£76.02 18 Apr 2026