You don't need to own a Kindle device to enjoy Kindle books. Download one of our FREE Kindle apps to start reading Kindle books on all your devices.

  • Apple
  • Android
  • Windows Phone
    Windows Phone
  • Click here to download from Amazon appstore

To get the free app, enter your mobile phone number.


Buying Options

Read this title for $0.00. Learn more
Read for $0.00
Kindle Price: $29.99
includes tax, if applicable

These promotions will be applied to this item:

Some promotions may be combined; others are not eligible to be combined with other offers. For details, please see the Terms & Conditions associated with these promotions.

Deliver to your Kindle or other device

Deliver to your Kindle or other device


Loading recommendations for you
Recommendations for you

Adding to Cart...

Added to Cart

Not Added

Item is in your Cart

View Cart

Not Added

There was a problem adding this item to Cart. Please try again later.
Sorry, we're having trouble showing recommendations right now. Please try again later.
Continue shopping
Personal Information Security & Systems Architecture: Techniques for PII Management in a Business by [Marlow, Keith]
Kindle App Ad

Follow the Author

Something went wrong. Please try your request again later.

Personal Information Security & Systems Architecture: Techniques for PII Management in a Business Kindle Edition

5.0 out of 5 stars 1 customer review

See all 2 formats and editions Hide other formats and editions
Amazon Price
New from Used from

Length: 282 pages Enhanced Typesetting: Enabled Page Flip: Enabled
Language: English

Get 90 days FREE of Amazon Music Unlimited
with the purchase of any eligible product. Shop now

Product description

Product Description

From the software engineer to product manager, CTO, and CEO and the Board, all have a role in implementing successful personal information system security. Securing personal information & data on computers is where this book comes into its own.

Globally, personal data breaches are at record levels. In 2017 identity theft, and related fraud cost $16 billion, affecting 6.7 million people, up 8% from 2016 (Javelin Strategy & Research, 2018). Generic cyber-attacks in APAC alone has cost an estimated $1.7 trillion in 2017 (Yu, 2018). The amount stolen is staggering; it's a multi-billion dollar "underground business" affecting everyone.

Governments, given such breaches and rampant wholesale data collection, are quickly creating robust legislation. Businesses, when faced with having to meet such evolving regulatory requirements, find it hard working out what to do; this is where this book excels. It explains what to focus on, when and why. Detailed are security, architectural and technical best practices based on real-world experience, combined with a PII focus - giving confidence that such sensitive information is handled correctly.

The book educates you on what PII is, how to recognise it and value it. Then it explains from first principals core security techniques and controls and how to apply them to your data processing system designs to ensure the PII is processed with the appropriate level of security focus. It provides practically minded ways to implement security and architecture to get the best outcomes.

Product details

  • Format: Kindle Edition
  • File Size: 6377 KB
  • Print Length: 282 pages
  • Sold by: Amazon Australia Services, Inc.
  • Language: English
  • Text-to-Speech: Enabled
  • X-Ray:
  • Word Wise: Not Enabled
  • Enhanced Typesetting: Enabled
  • Average Customer Review: 5.0 out of 5 stars 1 customer review
  • Amazon Bestsellers Rank: #530,337 Paid in Kindle Store (See Top 100 Paid in Kindle Store)
click to open popover

Customer reviews

5.0 out of 5 stars
1 customer rating
5 star
4 star 0% (0%) 0%
3 star 0% (0%) 0%
2 star 0% (0%) 0%
1 star 0% (0%) 0%

Review this product

Share your thoughts with other customers

1 customer review

23 January 2019