O'Reilly logo

The Hidden Corporation: A Data Management Security Novel by David Schlesinger

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Tracking Information

On Monday morning of the next week, Nancy discovered that it was not that easy to locate the precise sources of the stolen information. Phil, from the Security Department, gave her a copy of the data that had been compromised. It looked like a spreadsheet of a thousand rows and each line had about 50 or so columns filled with data. There were home phone numbers, addresses, birthdays, and credit ratings; lists of purchases, dates, and passwords for their web access. The passwords had already been changed, she was assured, but much of the data, such as customer mobile phone numbers, would stay the same. It mixed both individual customers who purchased on-line, and corporate customers who purchased product in bulk, using web ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required