The Complete Book of Data Anonymization
- Length: 267 pages
- Edition: 1
- Language: English
- Publisher: Auerbach Publications
- Publication Date: 2013-05-21
- ISBN-10: 1439877300
- ISBN-13: 9781439877302
- Sales Rank: #1734643 (See Top 100 Books)
The Complete Book of Data Anonymization: From Planning to Implementation supplies a 360-degree view of data privacy protection using data anonymization. It examines data anonymization from both a practitioner’s and a program sponsor’s perspective. Discussing analysis, planning, setup, and governance, it illustrates the entire process of adapting and implementing anonymization tools and programs.
Part I of the book begins by explaining what data anonymization is. It describes how to scope a data anonymization program as well as the challenges involved when planning for this initiative at an enterprisewide level.
Part II describes the different solution patterns and techniques available for data anonymization. It explains how to select a pattern and technique and provides a phased approach towards data anonymization for an application.
A cutting-edge guide to data anonymization implementation, this book delves far beyond data anonymization techniques to supply you with the wide-ranging perspective required to ensure comprehensive protection against misuse of data.
Table of Contents
Chapter 1 – Overview of Data Anonymization
Chapter 2 – Enterprise Data Privacy Governance Model
Chapter 3 – Enterprise Data Classification Policy and Privacy Laws
Chapter 4 – Operational Processes, Guidelines, and Controls for Enterprise Data Privacy Protection
Chapter 5 – The Different Phases of a Data Anonymization Program
Chapter 6 – Departments Involved in Enterprise Data Anonymization Program
Chapter 7 – Privacy Meter—Assessing the Maturity of Data Privacy Protection Practices in the Organization
Chapter 8 – Enterprise Data Anonymization Execution Model
Chapter 9 – Tools and Technology
Chapter 10 – Anonymization Implementation—Activities and Effort
Chapter 11 – The Next Wave of Data Privacy Challenges
Chapter 12 – Data Anonymization Patterns
Chapter 13 – Data State Anonymization Patterns
Chapter 14 – Anonymization Environment Patterns
Chapter 15 – Data Flow Patterns across Environments
Chapter 16 – Data Anonymization Techniques
Chapter 17 – Data Anonymization Implementation
Appendix A: Glossary