Narrow your search
Listing 1 - 10 of 52 << page
of 6
>>
Sort by

Book
Information security for managers
Authors: --- ---
ISBN: 1349101370 Year: 1989 Publisher: Houndmills, Basingstoke, Hampshire ; New York, New York : Macmillan Press Ltd : Stockton Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The purpose of this book is to answer the questions that all responsible managers are asking or will ask on the subject of information security. There are few managers with first hand experience of serious attacks or catastrophic occurrences with regard to integrated information systems.


Book
Second review of a new data management system for the Social Security Administration : a report to the Social Security Administration, Department of Health, Education and Welfare
Authors: --- ---
Year: 1979 Publisher: Washington, D.C. : National Academy of Sciences,


Book
Books, bytes, and bridges
Authors: ---
ISBN: 0838999921 Year: 2001 Publisher: Chicago : ALA Editions,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Do your library and computing center clash or collaborate? Successful collaborations improve service to faculty, students, and researchers. Patrons and librarians alike will have access to a full range of technology. As library instruction blends with software training, you have new partners. Books, Bytes and Bridges: Libraries and Computer Centers in Academic Institutions explores the strategies and working models for developing and maintaining successful partnerships between the two groups critical to providing information access in academic institutions. Larry Hardesty has assembled a team


Multi
Data teams : a unified management model for successful data-focused teams
Author:
ISBN: 9781484262283 148426228X Year: 2020 Publisher: [Place of publication not identified] : Apress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Learn how to run successful big data projects, how to resource your teams, and how the teams should work with each other to be cost effective. This book introduces the three teams necessary for successful projects, and what each team does. Most organizations fail with big data projects and the failure is almost always blamed on the technologies used. To be successful, organizations need to focus on both technology and management. Making use of data is a team sport. It takes different kinds of people with different skill sets all working together to get things done. In all but the smallest projects, people should be organized into multiple teams to reduce project failure and underperformance. This book focuses on management. A few years ago, there was little to nothing written or talked about on the management of big data projects or teams. Data Teams shows why management failures are at the root of so many project failures and how to proactively prevent such failures with your project. You will: Discover the three teams that you will need to be successful with big data Understand what a data scientist is and what a data science team does Understand what a data engineer is and what a data engineering team does Understand what an operations engineer is and what an operations team does Know how the teams and titles differ and why you need all three teams Recognize the role that the business plays in working with data teams and how the rest of the organization contributes to successful data projects.


Book
IT audit, control, and security.
Author:
ISBN: 9780471406761 Year: 2010 Publisher: Hoboken Wiley

Loading...
Export citation

Choose an application

Bookmark

Abstract

When it comes to computer security, the role of auditors today has never been more crucial. Auditors must ensure that all computers, in particular those dealing with e-business, are secure. The only source for information on the combined areas of computer audit, control, and security, the IT Audit, Control, and Security describes the types of internal controls, security, and integrity procedures that management must build into its automated systems. This very timely book provides auditors with the guidance they need to ensure that their systems are secure from both internal and external threats.


Book
Managing information security
Author:
ISBN: 1299808344 9781299808348 9780124166882 0124166881 0124166946 Year: 2014 Publisher: Amsterdam ; Boston : Elsevier/Syngress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth coverage of the current technology and practice as it relates to information security management solutions. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors' respect


Multi
Managing information security
Author:
ISBN: 1299808344 9781299808348 9780124166882 0124166881 0124166946 9780124166943 Year: 2014 Publisher: Amsterdam ; Boston : Elsevier/Syngress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth coverage of the current technology and practice as it relates to information security management solutions. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors' respect


Book
Coaching for high performance : how to develop exceptional results through coaching
Author:
ISBN: 1628700122 1849281041 1282263528 9786612263521 1849280037 9781849280037 9781628700121 1849280029 9781849280020 9781849280020 9781849281041 9781282263529 6612263520 Year: 2009 Publisher: Ely, U.K. : IT Governance Pub.,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Coaching for High Performance is intended to inspire IT managers with practical advice and tips on how to create a coaching environment in their department. Applying coaching skills in the IT workplace will help create a climate of high performance.

Enterprise operations management handbook
Author:
ISBN: 084939824X 1482287811 1280290501 0203997573 0429257201 0849399424 100306938X 9780849398247 9780203997574 9781420052169 1420052160 9781439870754 1439870756 9786610290505 6610290504 9780849399664 0849399661 9781003069386 9780367399368 9781000152746 100015274X 9781000125962 1000125963 9781000109702 1000109704 9780429257209 9781482287813 9781280290503 Year: 2000 Publisher: Boca Raton, Fla. : Auerbach,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The Enterprise Operations Management Handbook provides the expert advice and guidance of hundreds of leading computing practitioners and consultants. Covering all major areas of enterprise operations management, this edition provides essential information for managing a modern, evolving data center. Topics include business issues, technology issues, and operational issues. This current, practical reference also reviews such critical areas as strategic planning, data center management, data center controls, systems planning, network technology, contingency planning, human resource planning, desktop computing, and future directions. The Enterprise Operations Management Handbook serves as an invaluable tool for designing, building, and maintaining a high-performance, service-oriented data center.

Physical security for IT
Author:
ISBN: 128101494X 9786611014940 0080495907 155558327X 9781555583279 9780080495903 9781281014948 Year: 2005 Publisher: Amsterdam ; Boston : Elsevier Digital Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The physical security of IT, network, and telecommunications assets is equally as important as cyber security. We justifiably fear the hacker, the virus writer and the cyber terrorist. But the disgruntled employee, the thief, the vandal, the corporate foe, and yes, the terrorist can easily cripple an organization by doing physical damage to IT assets. In many cases such damage can be far more difficult to recover from than a hack attack or malicious code incident. It does little good to have great computer security if wiring closets are easily accessible or individuals can readily walk into an

Listing 1 - 10 of 52 << page
of 6
>>
Sort by