Many big data-driven companies today are moving to protect certain types of data against intrusion, leaks, or unauthorized eyes. But how do you lock down data while granting access to people who need to see it? In this practical book, authors Ted Dunning and Ellen Friedman offer two novel and practical solutions that you can implement right away.
Ideal for both technical and non-technical decision makers, group leaders, developers, and data scientists, this book shows you how to:
If you’re intrigued by the synthetic data solution, explore the log-synth program that Ted Dunning developed as open source code (available on GitHub), along with how-to instructions and tips for best practice. You’ll also get a collection of use cases.
Providing lock-down security while safely sharing data is a significant challenge for a growing number of organizations. With this book, you’ll discover new options to share data safely without sacrificing security.
You can read this ebook online in a web browser, without downloading anything or installing software.
This ebook is available in file types:
This ebook is available in:
After you've bought this ebook, you can choose to download either the PDF version or the ePub, or both.
The publisher has supplied this book in DRM Free form with digital watermarking.
You can read this eBook on any device that supports DRM-free EPUB or DRM-free PDF format.
The publisher has supplied this book in encrypted form, which means that you need to install free software in order to unlock and read it.
To read this ebook on a mobile device (phone or tablet) you'll need to install one of these free apps:
To download and read this eBook on a PC or Mac:
The publisher has set limits on how much of this ebook you may print or copy.