Listing 1 - 10 of 27 | << page >> |
Sort by
|
Choose an application
Computer and Information Security Handbook, Third Edition, provides the most current and complete reference on computer security available in one volume. The book offers deep coverage of an extremely wide range of issues in computer and cybersecurity theory, applications, and best practices, offering the latest insights into established and emerging technologies and advancements. With new parts devoted to such current topics as Cloud Security, Cyber-Physical Security, and Critical Infrastructure Security, the book now has 100 chapters written by leading experts in their fields, as well as 12 updated appendices and an expanded glossary. It continues its successful format of offering problem-solving techniques that use real-life case studies, checklists, hands-on exercises, question and answers, and summaries. Chapters new to this edition include such timely topics as Cyber Warfare, Endpoint Security, Ethical Hacking, Internet of Things Security, Nanoscale Networking and Communications Security, Social Engineering, System Forensics, Wireless Sensor Network Security, Verifying User and Host Identity, Detecting System Intrusions, Insider Threats, Security Certification and Standards Implementation, Metadata Forensics, Hard Drive Imaging, Context-Aware Multi-Factor Authentication, Cloud Security, Protecting Virtual Infrastructure, Penetration Testing, and much more. Online chapters can also be found on the book companion website: https://www.elsevier.com/books-and-journals/book-companion/9780128038437 Written by leaders in the field Comprehensive and up-to-date coverage of the latest security technologies, issues, and best practices Presents methods for analysis, along with problem-solving techniques for implementing practical solutions
Computer networks --- Security measures. --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Computer security. --- Data protection. --- Rechnernetz --- Computersicherheit --- Datensicherung --- Informationssystem --- Datenschutz
Choose an application
This book constitutes the thoroughly refereed post-conference proceedings of the Second International Workshop on Critical Information Infrastructures Security, CRITIS 2007, held in Benalmadena-Costa, Spain, in October 2007 in conjunction with ITCIP 2007, the first conference on Information Technology for Critical Infrastructure Protection. The 29 revised full papers presented were carefully reviewed and selected from a total of 75 submissions. The papers address all security-related heterogeneous aspects of critical information infrastructures and are organized in topical sections on R&D agenda, communication risk and assurance, code of practice and metrics, information sharing and exchange, continuity of services and resiliency, SCADA and embedded security, threats and attacks modeling, as well as information exchange and modeling.
Computer Science. --- Computer Communication Networks. --- Systems and Data Security. --- Data Encryption. --- Algorithm Analysis and Problem Complexity. --- Management of Computing and Information Systems. --- Computers and Society. --- Computer science. --- Data protection. --- Data encryption (Computer science). --- Computer software. --- Information Systems. --- Informatique --- Réseaux d'ordinateurs --- Protection de l'information (Informatique) --- Chiffrement (Informatique) --- Logiciels --- Computer security --- Computers --- Telecommunications --- Computer Science --- Engineering & Applied Sciences --- Electrical & Computer Engineering --- Access control --- Information Technology --- Computer Science (Hardware & Networks) --- Information storage and retrieval systems --- Systèmes d'information --- Kritische Informationsinfrastruktur --- Computersicherheit --- Datensicherung --- Kryptoanalyse --- Risikoanalyse --- Computer communication systems. --- Computer security. --- Algorithms. --- User interfaces (Computer systems). --- Computers and civilization. --- User Interfaces and Human Computer Interaction. --- Civilization and computers --- Civilization --- Interfaces, User (Computer systems) --- Human-machine systems --- Human-computer interaction --- Algorism --- Algebra --- Arithmetic --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Foundations --- Protection --- Security measures --- Distributed processing --- Cryptology. --- Software, Computer
Choose an application
This book constitutes the refereed proceedings of the 7th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2013, held in Zhangjiajie, China, in August 2013. The 25 revised full papers presented together with 18 invited papers were carefully reviewed and selected from 80 submissions. The papers cover the following topics: effective and efficient state-of-the-art algorithm design and analysis, reliable and secure system development and implementations, experimental study and testbed validation, and new application exploration in wireless networks.
Computer science. --- Computer Communication Networks. --- Computer system performance. --- Computer software. --- Computer Science. --- Algorithm Analysis and Problem Complexity. --- Information Systems Applications (incl. Internet). --- System Performance and Evaluation. --- Computer Science, general. --- Wireless communication systems --- Mobile computing --- Engineering & Applied Sciences --- Computer Science --- Management --- Communication systems, Wireless --- Wireless data communication systems --- Wireless information networks --- Wireless telecommunication systems --- Software, Computer --- Informatics --- Computer communication systems. --- Computer system failures. --- Algorithms. --- Datensicherung. --- Datenverwaltung. --- Drahtloses Sensorsystem. --- Funknetz. --- Netzwerktopologie. --- Netzwerkverwaltung. --- Topologie --- Netzform --- Netzstruktur --- Netztopologie --- Netzarchitektur --- Rechnernetz --- Radio network --- Wireless network --- Drahtloses Telekommunikationsnetz --- Telekommunikationsnetz --- Wireless sensor network --- Drahtloses Sensornetz --- Sensorsystem --- Datenmanagement --- Dateiverwaltung --- Datensicherheit --- Sicherheit --- Computersicherheit --- Softwareschutz --- Netzwerkmanagement --- Network management --- Netzmanagement --- Telecommunication systems --- Netzwerk --- Datenverarbeitung --- Science --- Computer systems --- Application software. --- Computer failures --- Computer malfunctions --- Failure of computer systems --- System failures (Engineering) --- Fault-tolerant computing --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Algorism --- Algebra --- Arithmetic --- Failures --- Distributed processing --- Foundations --- Computer networks. --- Electronic digital computers—Evaluation. --- Computer and Information Systems Applications.
Choose an application
This book constitutes the refereed proceedings of the 10th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2013, held in Berlin, Germany, in July 2013. The 9 revised full papers presented together with 3 short papers were carefully reviewed and selected from 38 submissions. The papers are organized in topical sections on malware; network security, Web security; attacks and defenses; and host security.
Computer science. --- Computer Communication Networks. --- Computer network architectures. --- Software engineering. --- Data protection. --- Information Systems. --- Computer Science. --- Systems and Data Security. --- e-Commerce/e-business. --- Computer System Implementation. --- Management of Computing and Information Systems. --- Software Engineering. --- Computer security --- Engineering & Applied Sciences --- Computer Science --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Computer software engineering --- Architectures, Computer network --- Network architectures, Computer --- Informatics --- Computer communication systems. --- Architecture, Computer. --- Computer security. --- Management information systems. --- E-commerce. --- Computersicherheit. --- Eindringerkennung. --- Kryptoanalyse. --- Malware. --- Softwareschwachstelle. --- Software Vulnerability --- Sicherheitslücke --- Exploit --- Malicious software --- Malicious code --- Böswillige Software --- Schadsoftware --- Schadprogramm --- Computervirus --- Spyware --- Cryptoanalysis --- Angriff --- Attacke --- Kryptoanalytische Attacke --- Kryptoanalytischer Angriff --- Cryptanalysis --- Kryptologie --- Dechiffrierung --- Intrusion Detection --- Einbruchserkennung --- Erkennen von Eindringversuchen --- Erkennung von Eindringlingen --- Intruder Detection --- Eindring-Erkennungssystem --- Intrusion Detection System --- IDS --- Eindringerkennungssystem --- Computersicherheit --- Datenverarbeitungssystem --- Computer --- Datensicherung --- Softwareschutz --- Sicherheit --- Cybersicherheit --- IT-Sicherheit --- Engineering --- Computer architecture --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Angriffserkennungssystem --- Informationssicherheit --- Science --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Architecture, Computer --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Commerce --- Information superhighway --- Communication systems --- Distributed processing
Choose an application
This book constitutes the refereed proceedings of the 7th International Conference on Information Systems Security, ICISS 2011, held in Kolkata, India, in December 2011. The 20 revised full papers presented together with 4 short papers and 4 invited papers were carefully reviewed and selected from 105 submissions. The papers are organized in topical sections on access control and authorization, malwares and anomaly detection, crypto and steganographic systems, verification and analysis, wireless and mobile systems security, Web and network security.
Computer security --- Information networks --- Computer networks --- Computers --- Data encryption (Computer science) --- Data protection --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Telecommunications --- Computer Science --- Access control --- Security measures --- Information Technology --- Computer Science (Hardware & Networks) --- Automated information networks --- Networks, Information --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Protection of computer systems --- Protection --- Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Information storage and retrieval. --- Management information systems. --- Computer Science. --- Computer Communication Networks. --- Systems and Data Security. --- Information Systems Applications (incl. Internet). --- Information Storage and Retrieval. --- Management of Computing and Information Systems. --- Data Encryption. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Distributed processing --- Information storage and retrieva. --- Information Systems. --- Cryptology. --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Datensicherung. --- Informationssystem. --- Kryptoanalyse. --- Privatsphäre. --- Rechnernetz. --- Zugriffskontrolle. --- Information services --- Information storage and retrieval systems --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software
Choose an application
This book constitutes the refereed proceedings of six workshops of the 14th International Conference on Web-Age Information Management, WAIM 2013, held in Beidaihe, China, June 2013. The 37 revised full papers are organized in topical sections on the six following workshops: The International Workshop on Big Data Management on Emerging Hardware (HardBD 2013), the Second International Workshop on Massive Data Storage and Processing (MDSP 2013), the First International Workshop on Emergency Management in Big Data Age (BigEM 2013), the International Workshop on Trajectory Mining in Social Networks (TMSN 2013), the First International Workshop on Location-based Query Processing in Mobile Environments (LQPM 2013), and the First International Workshop on Big Data Management and Service (BDMS 2013).
Computer science. --- Computer Communication Networks. --- Computer software. --- Database management. --- Data mining. --- Information storage and retrieval systems. --- Computer Science. --- Information Storage and Retrieval. --- Information Systems Applications (incl. Internet). --- Data Mining and Knowledge Discovery. --- Database Management. --- Algorithm Analysis and Problem Complexity. --- Database management --- Information storage and retrieval systems --- Web databases --- Data mining --- Engineering & Applied Sciences --- Computer Science --- Informatics --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Data base management --- Data services (Database management) --- Database management services --- DBMS (Computer science) --- Generalized data management systems --- Services, Database management --- Systems, Database management --- Systems, Generalized database management --- Software, Computer --- Computer communication systems. --- Algorithms. --- Information storage and retrieval. --- Abfrageverarbeitung. --- Data Mining. --- Datenbanksystem. --- Datensicherung. --- Information Retrieval. --- World Wide Web. --- WWW --- Hypermedia --- Internet --- Informationsretrieval --- Information --- Informationsrecherche --- Informationswiedergewinnung --- Retrieval --- Informationsrückgewinnung --- Informationsgewinnung --- Literaturrecherche --- Online-Recherche --- Recherche --- Information Extraction --- Datensicherheit --- Sicherheit --- Computersicherheit --- Softwareschutz --- Datenbankverwaltungssystem --- DBMS --- Datenbankbetriebssystem --- Datenbank --- Datenbankmanagementsystem --- Data base management system --- Data base system --- Datenbanksoftware --- Datenbankprogramm --- Datamining --- Datenmustererkennung --- Data-Mining --- Suchverfahren --- Wissensextraktion --- Anfrageverarbeitung --- Anfrageausführung --- Anfragebearbeitung --- Query processing --- Abfragesprache --- Wiedergewinnung --- Datenverarbeitung --- Betriebssystem --- Programm --- Information storage and retrieva. --- Computer systems --- Electronic data processing --- Database searching --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Informationssicherheit --- Application software. --- Algorism --- Algebra --- Arithmetic --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Foundations --- Distributed processing --- Computer networks.
Choose an application
Dit boek bevat een grondige en praktische studie van de Algemene Verordening Gegevensbescherming. De auteurs delen het analysekader en hun praktische oplossingen voor concrete vraagstukken met de lezer. Het boek wordt verder aangevuld met nuttige informatie van verschillende experts, waaronder de huidige en voormalige voorzitters van de Belgische Gegevensbeschermingsautoriteit. Het boek vormt op die manier een unieke combinatie van academische toelichting en praktijkervaring, waardoor het een onmisbaar instrument is voor iedere advocaat, jurist en student die met (de juridische aspecten van) verwerking van persoonsgegevens in aanraking komt.Het boek biedt een praktische leidraad o.m. bij het opstellen van overeenkomsten voor de verwerking van persoonsgegevens, privacyverklaringen en het register van verwerkingsactiviteiten, de aanstelling van een gegevensbeschermingsfunctionaris (DPO) en de melding van datalekken. Relevante beslissingspraktijk van verschillende nationale gegevensbeschermingsautoriteiten komt daarbij uitdrukkelijk aan bod. Verder gaat het boek in op de handhavingsprocedure voor de Belgische Gegevensbeschermingsautoriteit en de samenwerking met andere Europese gegevensbeschermingsautoriteiten. Tot slot behandelt het boek de concrete implementatie van enkele vaak voorkomende verwerkingsactiviteiten in het kader van direct marketing, fusies en overnames, HR, sociale media, cookies, enz.Bij het aanreiken van oplossingen houdt het boek rekening met de specifieke context waarin KMO’s opereren.De auteursequipe is samengesteld uit de volgende specialisten:Anouk Focquet is counsel bij het advocatenkantoor contrast. Zij is hoofd en stichtend lid van de afdeling privacy en data protection. Anouk is verbonden onderzoeker bij de multidisciplinaire Research Group on Law, Science, Technology & Society (‘LSTS’) van de Vrije Universiteit Brussel (VUB). Eline Declerck is senior advocaat bij het advocatenkantoor contrast en stichtend lid van de afdeling privacy en data protection. Beide auteurs zijn gespecialiseerd in privacy- en gegevensbeschermingswetgeving.Laurence Vanhyfte, Julie Van Pée en Laura Sente zijn advocaten bij het advocatenkantoor contrast en tevens lid van de afdeling privacy en data protection. (achterflap)
Algemene juridische begrippen : Privacy --- Notions juridiques générales : Vie privée --- Databeveiliging --- Privacy ; recht ; EU --- GDPR --- gegevensbescherming --- overeenkomsten --- persoonlijke gegevens --- BPB2007 --- 406 Privacy --- données data --- Respect de la vie privée (informatique) Bescherming van het privé-leven (informatica) --- accords --- dados pessoais --- date personale --- personal data --- személyes adatok --- osobní údaje --- dati personali --- henkilötiedot --- лични податоци --- dane osobowe --- personoplysninger --- asmens duomenys --- isikuandmed --- osobni podaci --- données personnelles --- të dhëna personale --- προσωπικά στοιχεία --- osebni podatki --- лични данни --- osobné údaje --- sonraí pearsanta --- datos personales --- personuppgifter --- personas dati --- persönliche Daten --- data personali --- лични подаци --- matični broj --- osobní data --- JMBG --- osobno ime --- personální údaje --- OIB --- osobni identifikacijski broj --- persondata --- personálie --- asmeniniai duomenys --- zaštita podataka --- tietosuoja --- ochrana údajov --- databeskyttelse --- protecția datelor --- adatvédelem --- përpunim i të dhënave --- Datenschutz --- varstvo podatkov --- protección de datos --- protection des données --- cosaint sonraí --- proteção dos dados --- uppgiftsskydd --- duomenų apsauga --- andmekaitse --- ochrona danych --- datu aizsardzība --- προστασία δεδομένων --- ochrana údajů --- защита на информация --- protezzjoni tad-data --- заштита на податоци --- data protection --- заштита података --- protezione dei dati --- Datensicherung --- varnost podatkov --- andmeturve --- ασφάλεια των δεδομένων --- zajištění dat --- dataskydd --- ochrana dat --- databeveiliging --- segurança de dados --- slándáil sonraí --- bezpečnost dat --- безбедност на податоци --- Datensicherheit --- data security --- datu drošība --- gegevensbeveiliging --- aineistoturvallisuus --- sigurnost podataka --- protecção dos dados --- sigurtà tad-data --- сигурност података --- datos protegidos --- sicurezza dei dati --- tietoturva --- zabezpečení údajů --- сигурност на данните --- sécurité des données --- bezpečnosť osobných údajov --- заштита на лични податоци --- bezpieczeństwo danych --- beveiliging van gegevens --- adatbiztonság --- zaštita informacija --- ochrana informací --- duomenų saugumas --- zabezpečení dat --- protezione dei dati personali --- securitate a datelor --- сигурност на податоци --- andmete turvalisus --- Protection de l'information (informatique) --- Droit à la vie privée --- Privacy, Right of --- Protection de la vie privée --- Data protection --- Protection des données --- Law and legislation
Choose an application
Nooit eerder deelden één miljard mensen, waaronder vijf miljoen Belgen, meer informatie met elkaar dan op sociaalnetwerksites. Populaire sites zoals Facebook hebben de spreekwoordelijke muren tussen familie, vrienden, kennissen en zelfs onbekenden neergehaald. Online vrienden delen allerhande persoonlijke informatie zoals hobby's, burgerlijke staat, seksuele oriëntatie, politieke ideologie, interesses en foto's. Sociaalnetwerksites vervullen hierdoor een belangrijke sociale functie in onze samenleving. Delen lijkt belangrijker dan privacy: delen is leuk, delen is hip en ierdeen kijkt mee. Maar is al dat delen wel zo onschuldig als het lijkt? Dit boek werpt een licht op wat overheid, sociaalnetwerksites, andere gebruikers en bedrijven kunnen doen met de schat aan (persoonlijke) informatie die gebruikers online zetten. Na het lezen van dit boek logt u waarschijnlijk niet voor altijd uit, maar heeft u wel een beter inzicht in de mogelijke privacy-gerelateerde risico's die u op sociaalnetwerksites loopt en surft u waakzamer en weerbaarder.
Computer architecture. Operating systems --- privacy --- mediawijsheid --- empowerment --- sociale media --- Mass communications --- 528.59 --- Internet --- 004.738 --- Facebook --- Sociale media --- Privacy --- #gsdb5 --- Internet - Overige onderwerpen --- Facebook (Ressource électronique) --- Online social networks --- Security measures --- Privacy [Right of ] --- Massacommunicatie --- Computerarchitectuur. Operating systems --- Netwerken --- Privacybescherming --- Sociale communicatie --- cyberpesten --- Netwerk (ict) --- Netwerk (relationeel) --- BPB2212 --- gegevensbescherming --- eerbiediging van het privé-leven --- Comité permanent de Contrôle des services de renseignement et de sécurité (Comité permanent R) --- Recht auf Respektierung der Privatsphäre --- тајност на писмата --- teisė į privatumą --- diritto della vita privata --- derecho a la intimidad --- tutela della vita privata --- a magán- és családi élet tiszteletben tartásához való jog --- právo na súkromie --- ochrana soukromého a rodinného života --- recht op privacy --- δικαίωμα σεβασμού της ιδιωτικής ζωής --- dreptul la respectatrea viații private --- õigus eraelu puutumatusele --- ret til privatliv --- right to privacy --- rätt till privatliv --- direito ao respeito da vida privada --- tiesības uz privāto dzīvi --- pravo na privatnost --- oikeus yksityisyyteen --- e drejtë për jetë private --- интегритет на личноста --- право на приватност --- právo na soukromí --- protecção da vida privada --- recht op privé-leven --- droit au respect de la vie privée --- derecho al honor --- rispetto della vita privata --- privatumo apsauga --- beskyttelse af privatlivet --- varstvo zasebnosti --- eraelu puutumatuse kaitse --- Schutz der Privatsphäre --- заштита на приватноста --- protezione della vita privata --- заштита приватности --- ochrana soukromí --- proteção da vida privada --- protection of privacy --- privatlivets helgd --- privātās dzīves aizsardzība --- protección de la vida privada --- προστασία της ιδιωτικής ζωής --- a magánélet védelme --- ochrana súkromia --- prawo do prywatności --- неприкосновеност на частен живот --- yksityisyyden suoja --- mbrojtja e jetës private --- zaštita privatnosti --- protezzjoni tal-privatezza --- cosaint príobháideachais --- protection de la vie privée --- protecția vieții private --- Datensicherung --- varnost podatkov --- andmeturve --- ασφάλεια των δεδομένων --- zajištění dat --- dataskydd --- ochrana dat --- databeveiliging --- segurança de dados --- slándáil sonraí --- bezpečnost dat --- безбедност на податоци --- Datensicherheit --- data security --- datu drošība --- gegevensbeveiliging --- aineistoturvallisuus --- sigurnost podataka --- protecção dos dados --- sigurtà tad-data --- сигурност података --- datos protegidos --- sicurezza dei dati --- tietoturva --- zabezpečení údajů --- сигурност на данните --- sécurité des données --- bezpečnosť osobných údajov --- заштита на лични податоци --- bezpieczeństwo danych --- beveiliging van gegevens --- adatbiztonság --- zaštita informacija --- ochrana informací --- duomenų saugumas --- zabezpečení dat --- protezione dei dati personali --- securitate a datelor --- сигурност на податоци --- andmete turvalisus --- zaštita podataka --- tietosuoja --- ochrana údajov --- databeskyttelse --- protecția datelor --- adatvédelem --- përpunim i të dhënave --- Datenschutz --- varstvo podatkov --- protección de datos --- protection des données --- cosaint sonraí --- proteção dos dados --- uppgiftsskydd --- duomenų apsauga --- andmekaitse --- ochrona danych --- datu aizsardzība --- προστασία δεδομένων --- ochrana údajů --- защита на информация --- protezzjoni tad-data --- заштита на податоци --- data protection --- заштита података --- protezione dei dati --- social network --- дружбени медиуми --- média social --- platformă (de comunicare) socială --- réseaux sociaux --- midja soċjali --- mezzi ta' komunikazzjoni soċjali --- sociālie plašsaziņas līdzekļi --- suhtlusmeedia --- ühismeedia --- sociální médium --- socialiniai tinklai --- rede social --- media sociale --- μέσο κοινωνικής δικτύωσης --- réseau social --- platforma społecznościowa --- Social Media --- družbeni medij --- medium soċjali --- socialt netværk --- sociálne médium --- redes sociales --- друштвена мрежа --- mezzi tax-xandir soċjali --- közösségi médium --- социјални медиуми --- social medium --- обществена медия --- социална мрежа --- sosiaalinen media --- медиуми за општење --- redes sociais --- médias sociaux --- sociální média --- обществени медии --- друштвени медиуми --- soziale Medien --- medios sociales --- družbeni mediji --- sociālie mediji --- media sociais --- sosiaalisen median väline --- media społecznościowe --- na meáin shóisialta --- sociala medier --- sociale medier --- social media --- közösségi média --- μέσα κοινωνικής δικτύωσης --- društveni mediji --- sotsiaalmeedia --- sociálne médiá --- media soċjali --- media sociali --- mijloace de comunicare sociale --- socialinė žiniasklaida --- mjetet e komunikimit social --- друштвени медији --- Vast Comité van Toezicht op de inlichtingen- en veiligheidsdiensten (Vast Comité I) --- eerbiediging van het privé-leven --- digitale geletterdheid
Choose an application
This book examines the massive changes currently taking place in the business world and commonly known under the label “digitalization.” In addition, it describes the significant impacts of technological innovations on processes, products, services and business models. The digital transformation resulting from these developments leads to disruption for many enterprises and industries. While for many years, IT departments mainly concentrated on fulfilling the requirements of business departments effectively and efficiently by means of high-quality IT services and operations, today’s IT departments are increasingly expected to actively co-design and co-create the enterprise. This book describes how information technology enables innovation for businesses, and how IT departments can proactively and in a timely manner collaborate with the business departments of their corporation to leverage these innovations. It also delineates the implications of digitalization for the structures, processes and people in today’s IT departments. IT leaders and managers who are responsible for corporate IT, as well as practice-oriented researchers, will find valuable inspirations and guidance in this book, the central mission of which is to encourage and enable a more proactive role for IT in the digital transformation processes. "This book demonstrates the impact of digital transformation on IT organizations and their management. It also presents potential risks for technology availability, security and data protection. The authors develop a vision of what IT management should look like in ten years if it is to continue playing an important role in the company. The book seeks to motivate IT executives and managers with IT responsibility to actively adapt their thinking and their IT organizations before they are forced to react to external pressure. Definitely worth reading!" Sven Kreimendahl, Director Business Technology Services, Campana & Schott.
Information technology --- Strategic planning. --- Management. --- Information technology. --- Organization. --- Leadership. --- IT in Business. --- Information Systems Applications (incl. Internet). --- Business Strategy/Leadership. --- Innovation/Technology Management. --- Administration --- Industrial relations --- Organization --- Ability --- Command of troops --- Followership --- Organisation --- Management --- IT (Information technology) --- Technology --- Telematics --- Information superhighway --- Knowledge management --- information technology --- impact study --- data protection --- digitisation --- innovation --- Business—Data processing. --- Application software. --- Planning. --- Industrial management. --- Business administration --- Business enterprises --- Business management --- Corporate management --- Corporations --- Industrial administration --- Management, Industrial --- Rationalization of industry --- Scientific management --- Business --- Industrial organization --- Creation (Literary, artistic, etc.) --- Executive ability --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- data processing --- business administration --- economia de negócios --- verslo administravimas --- ekonomika przedsiębiorstwa --- uzņēmuma administrācija --- бизнес администрация --- yritystalous --- деловна администрација --- ekonomika podjetij --- administrarea afacerii --- économie de l'entreprise --- economia aziendale --- företagsekonomi --- administrim biznesi --- správa podniku --- amministrazzjoni operatorja --- poslovno upravljanje --- virksomhedsøkonomi --- ärikorraldus --- економика предузећа --- vállalati gazdálkodás --- economía de la empresa --- Betriebswirtschaft --- οικονομικά της επιχείρησης --- bedrijfseconomie --- üzemgazdaság --- economia afacerii --- hospodárenie podniku --- řízení podnikové činnosti --- uzņēmējdarbības ekonomika --- business economics --- бизнис економија --- ekonomi biznesi --- ekonomika poduzeća --- poslovna administracija --- vállalkozás gazdálkodása --- verslo valdymas --- podniková ekonomika --- riadenie podniku --- ärimajandus --- verslo vadyba --- бизнис администрација --- economia da empresa --- управување со претпријатија --- liiketalous --- liikkeenjohto --- vállalat-gazdaságtan --- řízení podniku --- verslo ekonomika --- zaštita podataka --- tietosuoja --- ochrana údajov --- databeskyttelse --- protecția datelor --- adatvédelem --- përpunim i të dhënave --- Datenschutz --- varstvo podatkov --- protección de datos --- protection des données --- cosaint sonraí --- proteção dos dados --- uppgiftsskydd --- duomenų apsauga --- andmekaitse --- ochrona danych --- datu aizsardzība --- προστασία δεδομένων --- ochrana údajů --- gegevensbescherming --- защита на информация --- protezzjoni tad-data --- заштита на податоци --- заштита података --- protezione dei dati --- Datensicherung --- varnost podatkov --- andmeturve --- ασφάλεια των δεδομένων --- zajištění dat --- dataskydd --- ochrana dat --- databeveiliging --- segurança de dados --- slándáil sonraí --- bezpečnost dat --- безбедност на податоци --- Datensicherheit --- data security --- datu drošība --- gegevensbeveiliging --- aineistoturvallisuus --- sigurnost podataka --- protecção dos dados --- sigurtà tad-data --- сигурност података --- datos protegidos --- sicurezza dei dati --- tietoturva --- zabezpečení údajů --- сигурност на данните --- sécurité des données --- bezpečnosť osobných údajov --- заштита на лични податоци --- bezpieczeństwo danych --- beveiliging van gegevens --- adatbiztonság --- zaštita informacija --- ochrana informací --- duomenų saugumas --- zabezpečení dat --- protezione dei dati personali --- securitate a datelor --- сигурност на податоци --- andmete turvalisus --- Datenverarbeitung --- обрада података --- gegevensverwerking --- obdelava podatkov --- përpunim të të dhënave --- duomenų apdorojimas --- databehandling --- procesarea datelor --- trattamento dei dati --- επεξεργασία δεδομένων --- processamento de dados --- proċessar tad-data --- traitement des données --- обработка на данни --- obrada podataka --- обработка на податоци --- tratamiento de datos --- zpracování dat --- tietojenkäsittely --- adatfeldolgozás --- andmetöötlus --- spracovanie údajov --- datu apstrāde --- próiseáil sonraí --- przetwarzanie danych --- traitement électronique des données --- trattamento elettronico dei dati --- tratamiento electrónico de datos --- elektronické spracovanie údajov --- automatizované spracovanie údajov --- автоматска обработка на податоци --- automatska obrada podataka --- elektronikus adatfeldolgozás --- automatiseeritud andmetöötlus --- automātiskā datu apstrāde --- elektronička obrada podataka --- beeldverwerking --- tratamento de imagem --- elektroniskā datu apstrāde --- automatinis duomenų apdorojimas --- përpunim automatik i të dhënave --- automatic data processing --- electronic data processing --- adatkezelés --- automaatne andmetöötlus --- automaattinen tietojenkäsittely --- επεξεργασία εικόνων --- përpunim elektronik i të dhënave --- prelucrarea automată a datelor --- tratamento eletrónico dos dados --- traitement des images --- tratamento dos dados --- procesarea automată a datelor --- processamento informático --- elaborazione dei dati --- billedbehandling --- elektronické zpracování dat --- procesarea electronică a datelor --- elektrooniline andmetöötlus --- elektronische Datenverarbeitung --- Bildverarbeitung --- elektroninis duomenų apdorojimas --- tratamento de dados --- bildbehandling --- trattamento delle immagini --- automatické zpracování dat --- elektronische gegevensverwerking --- tratamiento de gráficos --- Informationstechnologie --- informaatioteknologia --- teknologjia e informacionit --- infotehnoloogia --- tecnología de la información --- informatietechnologie --- tecnologia da informação --- informačná technológia --- информационна технология --- informationsteknologi --- teknoloġija tal-informazzjoni --- informācijas tehnoloģija --- technologie de l'information --- informační technologie --- tehnologia informației --- információtechnológia --- информатичка технологија --- информациона технологија --- informationsteknik --- τεχνολογία των πληροφοριών --- technologia informacyjna --- informacinė technologija --- tecnologia dell'informazione --- informacijska tehnologija --- sidetehnoloogia --- communications technology --- teknologji komunikacioni --- Kommunikationstechnologie --- Information and communication technologies --- technologie de la communication --- výpočetní technika --- komunikačná technológia --- komunikācijas tehnoloģijas --- informacijos technologija --- tehnologia comunicațiilor --- komunikační technologie --- technique de l'information --- ryšių priemonių technologija --- телекомуникациска технологија --- επικοινωνιακή τεχνολογία --- tecnologia da comunicação --- комуникациска технологија --- viestintäteknologia --- ICT --- tecnologia delle telecomunicazioni --- tecnologia delle comunicazioni --- informační technika --- tecnología de la comunicación --- obavijesna tehnologija --- kommunikationsteknologi --- communicatietechnologie --- τεχνική των πληροφοριών --- információs technológia --- riarachán gnó --- teicneolaíocht faisnéise
Choose an application
This fully revised and updated edition of the bestselling Chief Data Officer's Playbook offers new insights into the role of the CDO and the data environment. Written by two of the world's leading experts in data driven transformation, it addresses the changes that have taken place in 'data', in the role of the 'CDO', and the expectations and ambitions of organisations. Most importantly, it will place the role of the CDO into the context of a c-suite player for organisations that wish to recover quickly and with long-term stability from the current global economic downturn.New coverage includes:the evolution of the CDO role, what those changes mean for organisations and individuals, and what the future might holda focus on ethics, the data revolution and all the areas that help readers take their first steps on the data journeynew conversations and experiences from an alumni of data leaders compiled over the past three yearsnew chapters and reflections on being a third generation CDO and on working across a broad spectrum of organisations who are all on different parts of their data journey.Written in a highly accessible and practical manner, The Chief Data Officer's Playbook, Second Edition brings the most up-to-date guidance to CDO's who wish to understand their position better; to those aspiring to become CDO's; to those who might be recruiting a CDO and to recruiters to understand an organisation seeking a CDO and the CDO landscape.
Data protection. --- Knowledge management. --- Intellectual capital. --- Information technology --- Technological innovations --- Industrial management. --- Business administration --- Business enterprises --- Business management --- Corporate management --- Corporations --- Industrial administration --- Management, Industrial --- Rationalization of industry --- Scientific management --- Management --- Business --- Industrial organization --- Capital, Intellectual --- Human capital --- Knowledge management --- Knowledge workers --- Management of knowledge assets --- Intellectual capital --- Organizational learning --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Management. --- Protection des données --- data protection --- Gestion des connaissances --- knowledge management --- data science --- data collection --- zaštita podataka --- tietosuoja --- ochrana údajov --- databeskyttelse --- protecția datelor --- adatvédelem --- përpunim i të dhënave --- Datenschutz --- varstvo podatkov --- protección de datos --- protection des données --- cosaint sonraí --- proteção dos dados --- uppgiftsskydd --- duomenų apsauga --- andmekaitse --- ochrona danych --- datu aizsardzība --- προστασία δεδομένων --- ochrana údajů --- gegevensbescherming --- защита на информация --- protezzjoni tad-data --- заштита на податоци --- заштита података --- protezione dei dati --- Datensicherung --- varnost podatkov --- andmeturve --- ασφάλεια των δεδομένων --- zajištění dat --- dataskydd --- ochrana dat --- databeveiliging --- segurança de dados --- slándáil sonraí --- bezpečnost dat --- безбедност на податоци --- Datensicherheit --- data security --- datu drošība --- gegevensbeveiliging --- aineistoturvallisuus --- sigurnost podataka --- protecção dos dados --- sigurtà tad-data --- сигурност података --- datos protegidos --- sicurezza dei dati --- tietoturva --- zabezpečení údajů --- сигурност на данните --- sécurité des données --- bezpečnosť osobných údajov --- заштита на лични податоци --- bezpieczeństwo danych --- beveiliging van gegevens --- adatbiztonság --- zaštita informacija --- ochrana informací --- duomenų saugumas --- zabezpečení dat --- protezione dei dati personali --- securitate a datelor --- сигурност на податоци --- andmete turvalisus --- collecte de données --- ġbir ta' dejta --- colectarea datelor --- sběr dat --- zbiranje podatkov --- adatgyűjtés --- прикупљање података --- duomenų rinkimas --- recogida de datos --- recolha de dados --- prikupljanje podataka --- прибирање податоци --- grumbullim i të dhënave --- bailiú sonraí --- tietojen keruu --- verzamelen van gegevens --- raccolta dei dati --- gromadzenie danych --- datainsamling --- andmekogumine --- събиране на данни --- dataindsamling --- datu vākšana --- zber údajov --- συλλογή δεδομένων --- Datenerhebung --- tietojen koostaminen --- nxjerrje të dhënash --- chamada de dados --- očevidnik --- përpilim të dhënash --- andmete kogumine --- data retrieval --- συγκέντρωση δεδομένων --- shromažďování informací --- compilarea datelor --- ανάκτηση δεδομένων --- raggruppamento dei dati --- dataopsamling --- adatok kinyerése --- compiling data --- shromažďování dat --- adatok visszanyerése --- Datensammlung --- spájanie údajov --- andmeotsing --- sběr informací --- duomenų paieška --- reunião de dados --- rappel des données --- ricerca dei dati --- regăsirea informației --- kompiliuotieji duomenys --- datu izgūšana --- vyhľadávanie údajov --- datu apkopošana --- oproepen van gegevens --- hromadění dat --- наука за данните --- andmeteadus --- datavidenskab --- duomenų mokslas --- znanost o podacima --- ciência dos dados --- datatiede --- datawetenschap --- xjenza tad-data: --- science des données --- dátová veda --- podatkovne vede --- datová věda --- ciencia de datos --- Datenwissenschaft --- datu zinātne --- scienza dei dati --- nauka o danych --- επιστήμη δεδομένων --- știința datelor --- adattudomány --- gegevenswetenschap --- datavetenskap --- riadenie vedomostí --- διαχείριση των γνώσεων --- upravljanje znanjem --- управљање знањем --- Wissensmanagement --- gestione delle conoscenze --- управување на знаењето --- immaniġġjar tal-għarfien --- upravljanje znanja --- gestión de conocimientos --- zarządzanie wiedzą --- videnhåndtering --- tudásmenedzsment --- žinių valdymas --- menaxhim i dijeve --- kennisbeheer --- kunskapshantering --- zināšanu pārvaldība --- gestão dos conhecimentos --- znalostní management --- tietämyksen hallinta --- managementul cunostințelor --- teadmusjuhtimine --- gestion des connaissances --- управление на знанието --- tudás tőkésítése --- kapitalizim i dijes --- подобрување на знаењето --- unapređenje znanja --- udbredelse af knowhow --- tietämyksen hyödyntäminen --- μεταλαμπάδευση γνώσεων --- pořádání znalostí --- transmiterea cunoștințelor --- naudojimasis žiniomis --- transmission des savoirs --- videndeling --- κεφαλαιοποίηση των γνώσεων --- μετάδοση τεχνογνωσίας --- kunskapsöverföring --- transmission des savoir-faire --- zināšanu kapitalizācija --- capitalização dos conhecimentos --- management znalostí --- kunskapsspridning --- διάδοση τεγχνογνωσίας --- håndtering af viden --- capitalizzazione delle conoscenze --- kennisoverdracht --- capitalising on knowledge --- teadmiste kapitaliseerimine --- capitalisation des connaissances --- kapitaliziranje znanja --- μετάδοση των γνώσεων --- nyttiggørelse af viden --- zināšanu uzlabošana --- trasmissione del sapere --- transmisión de conocimientos --- transmissão dos conhecimentos --- унапредување на знаењето --- transmisión de know-how --- trasmissione del know-how --- överföring av know-how --- пренесување на знаењето --- transmissão de saber-fazer --- žinių gausinimas --- taitotiedon siirtäminen --- capitalizarea cunoștințelor --- употреба на знаењето --- enhancement of knowledge --- përforcim i dijeve --- capitalización de conocimientos --- teadmiste suurendamine --- bainistíocht eolais
Listing 1 - 10 of 27 | << page >> |
Sort by
|